720-891-1663

The Chinese Don’t Need To Hack Us, They Let Themselves In Via The Back Door They Left Open

The Computer Emergency Response Team (CERT), a part of the Department Of Homeland Security, released an alert this week regarding yet another series of DSL routers that have hard coded userids and passwords.  The routers, which likely share firmware from a common Chinese manufacturer, all have passwords of the form XXXXairocon, where XXXX are the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Government Employee Use Of Underground IT 10 Times Private Sector

Skyhigh Networks, a cloud security product vendor, did an analysis of data from government employees on cloud service usage. They say that the average public sector organization uses 742 cloud services, of which 60 are sanctioned.  That means that typical organization uses 682 services that no one has looked at the security of – or […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Ashley Madison Fallout – It Could Be Your Company

As the Ashley Madison data is more widely circulated and people have a chance to digest it, consequences are beginning to add up which will have a negative impact on the parent company Avid Life Media, likely for years to come. Granted this is a somewhat unusual situation, so some of the consequences may not […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Businesses Need To Consider The New Hacking Paradigm

While hacking credit cards for fun and profit is still a popular pastime, two additional hacking models need to be considered. The first additional model is the Anthem Blue Cross or Office Of Personnel Management model.  In those cases, hackers are looking to amass vast amounts of data on as many people as possible.  They […]

Continue reading → [DISPLAY_ACURAX_ICONS]