The Ashley Madison web site, where people go to cheat on their spouses, was hacked last week. This is an interesting situation for a number of reasons. First, a little background. The Ashley Madison web site is owned by Avid Life Media (ALM), which also runs several other web sites – Cougar Life and Established […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I wrote about the other day, service providers look like they are the new target of opportunity for hackers. Until the other day, PNI Digital Media, owned by Staples, ran kiosks in places like CVS, Walmart and Costco, where people could print their digital pictures. The place on their web site has now removed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Add UCLA to the list of health care providers that have been hacked. UCLA says they discovered the hacking last September, but it was not until May that they discovered that the hackers had gotten into the part of the system that stores patient records. Even now they are not sure if the hackers took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Ponemon Institute released a study that compares the views of about 7,000 Board members and 11,000 IT security people and the results show some interesting data. The first question is ” Our board of directors understands the security risks to the organization”. While 70% of the board members agree or strongly agree with that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Car makers are limiting the data they are sharing with Apple and Google though car entertainment systems (what the car makers call infotainment). This is not because they value your privacy, but rather because they want to be able to sell your data themselves and if they no longer own it because they gave […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yesterday was Patch Tuesday. Microsoft had 14 bulletins, 5 of which they deemed critical, covering 59 vulnerabilities. Oracle released patches covering 193 vulnerabilities, including 25 Java patches, one of which is already being exploited in the wild. 44 of these vulnerabilities came from third party components. Of the 25 Java vulnerabilities fixed, 23 of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]