![]() ![]() ![]() Even if I don't quite understand the direct risks or how they'd use this information, I trust that Microsoft's professional security analysts have more of a handle on cyber / real-life attack vectors than I do. These are all things I wouldn't want a truly malicious person to know. Whatever other things may appear on this page besides the "successful sign-in" and "successful password reset" log entries, I do not know.I can start to build a vague picture of your personal real life patterns by piecing together access times and locations. Device history and usage patterns, which, depending on your patterns, an attacker might be able to glean some information out of.Other approximate location information. ![]() which machines to potentially, say, scan for vulnerabilities on, and they also know the OS being used to help them out), but also can give up your location with sometimes eerie accuracy (, and when I type in mine it's within about 200 feet of my house). if an attacker is trying to target you, they now know e.g. Your IP address history, which not only is a potential direct risk (e.g.This contains a few obvious bits of sensitive information: Here is a screen shot of that page (I've left the maps uncensored as it's no secret that I'm in NYC, it's on my profile): The reason they do this is simply because they feel the information on that page is too sensitive to continue revealing to a potential attacker, and they assume there is a potential attacker because for whatever reason their system flagged the account as potentially compromised. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |