720-891-1663

Hacking Your Car – It Is Not So Hard

Probably many of you saw the 60 Minutes segment on hacking your car (see video here).  In the 60 Minutes segment, the researcher/hacker was able to turn on the wipers and washers, blow the horn and disable the brakes in that demonstration.  Here is a link to a conversation with the guys who did the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Another Small Office/Home Office Router FATAL Vulnerability

Security researchers at the International Conference On Cyber Security And Cyber Law reported that they have found a fatal security hole in a wide variety of SOHO Internet Routers. As is often the case, the researchers discovered this problem accidentally while examining the code of a router for a completely different problem (see the researcher’s […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Simple Advice For Improving Your CyberSecurity Hygiene

While tips and tricks won’t make your organization bulletproof, it will help make you bullet resistant.  Here is a list from Boston Business News that is simple and right on. 1. IT Risk Assessment.  You MUST start with a risk assessment and if you are up for it, I would recommend a business risk assessment. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Medical ID Fraud A Challenging Problem

The Medical Identity Fraud Alliance (MIFA) and the Ponemon Institute released their fifth annual study on Medical ID fraud. Short version of the results:  It is very costly, time consuming and complicated for consumers to resolve medical ID fraud and only 10 percent of the respondents to the study report achieving a completely satisfactory conclusion to the […]

Continue reading → [DISPLAY_ACURAX_ICONS]