Probably many of you saw the 60 Minutes segment on hacking your car (see video here). In the 60 Minutes segment, the researcher/hacker was able to turn on the wipers and washers, blow the horn and disable the brakes in that demonstration. Here is a link to a conversation with the guys who did the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security researchers at the International Conference On Cyber Security And Cyber Law reported that they have found a fatal security hole in a wide variety of SOHO Internet Routers. As is often the case, the researchers discovered this problem accidentally while examining the code of a router for a completely different problem (see the researcher’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While tips and tricks won’t make your organization bulletproof, it will help make you bullet resistant. Here is a list from Boston Business News that is simple and right on. 1. IT Risk Assessment. You MUST start with a risk assessment and if you are up for it, I would recommend a business risk assessment. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Medical Identity Fraud Alliance (MIFA) and the Ponemon Institute released their fifth annual study on Medical ID fraud. Short version of the results: It is very costly, time consuming and complicated for consumers to resolve medical ID fraud and only 10 percent of the respondents to the study report achieving a completely satisfactory conclusion to the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Register is reporting that there are a couple of ways a hacker can take over a PC just by having you insert a Blu-Ray disc. The first method exploits a poor software design in PowerDVD, the free DVD player software that is loaded on many PCs. It allows the hacker to exploit a bug […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I came across an item today that stunned me. The Wall Street Journal and Findlaw reported on a case from late last year where a Virginia State judge ruled that an arrestee may have to offer up his fingerprint to unlock his phone – the Fifth Amendment does not apply. Now before everyone goes crazy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]