Following on from yesterday’s United Airlines post, both Kaspersky and Symantec are reporting about a hacking group that is not interested in stealing credit cards. Instead, they are stealing corporate secrets for financial gain. Whether they are using them for insider trading or selling them to the highest bidder, the group, whom Kaspersky calls Wild […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We are so used to breaches in the news that we are blind to the likely way larger number of breaches that never make the news. In this case, United Airlines was hacked, likely by the same Chinese group that hacked OPM and Anthem. Bloomberg is reporting that the attackers stole manifests, among other data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With Windows 10 (and previously, Windows 8.1 phone), Microsoft has created a way for you to share WiFi passwords without revealing them – sort of. In my opinion, and in the opinion of a lot of other security professionals, this is a complete security disaster. There are some things that you can do to mitigate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the Ashley Madison breach, CNN read through the Ashley Madison license agreement. Here are a few tidbits from their reading of the agreement. 1. They can sell your personally identifiable information in connection with the sale of the business or sale of the assets. If this was Facebook, we might not care. If we […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HP’s security folks tested the security features on 10 smartwatches along with their cloud and management infrastructure and the results, while not surprising to me, are disappointing. Smart watches are in their infancy; the compute power is relatively limited and, as is usually the case, features win out over security. The question to ask is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Stagefright is an Android subsystem that processes video in your phone. Stagefright has been around since Android 2.2. That means that the potential to affect around 950 million Android phones exist. The bugs (there are several of them) that researchers have discovered are really nasty because at least one of them does not even require […]
Continue reading →
[DISPLAY_ACURAX_ICONS]