The Computer Emergency Response Team (CERT), a part of the Department Of Homeland Security, released an alert this week regarding yet another series of DSL routers that have hard coded userids and passwords. The routers, which likely share firmware from a common Chinese manufacturer, all have passwords of the form XXXXairocon, where XXXX are the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There was a recent Network World article that reported that some people are freaking out because IF you setup Windows 10 to do facial recognition to log you in, it works even if you have disabled your camera. Call me dumb, but if you ask Windows to use the camera to log you in, it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Skyhigh Networks, a cloud security product vendor, did an analysis of data from government employees on cloud service usage. They say that the average public sector organization uses 742 cloud services, of which 60 are sanctioned. That means that typical organization uses 682 services that no one has looked at the security of – or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the Ashley Madison data is more widely circulated and people have a chance to digest it, consequences are beginning to add up which will have a negative impact on the parent company Avid Life Media, likely for years to come. Granted this is a somewhat unusual situation, so some of the consequences may not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Wyndham Hotel chain was hacked several times going back as far as 2012. The FTC came after the hotel chain using Section 5 of the FTC Act, claiming unfair business practices. Usually what happens in these cases – and there have been a number of them – is that the company and the FTC […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While hacking credit cards for fun and profit is still a popular pastime, two additional hacking models need to be considered. The first additional model is the Anthem Blue Cross or Office Of Personnel Management model. In those cases, hackers are looking to amass vast amounts of data on as many people as possible. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]