Another day, another car hack. Computerworld reported that hackers at the Usenix Security Conference demonstrated taking over a Corvette by remotely accessing a telematics device that plugs into the on board diagnostics port (OBD-II). These devices are often used by insurance companies to collect data on driving habits to figure out what insurance rates should […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When I talk to some people, their first comment is “we are no one special, who would want to steal our stuff?” The news today is an example of who and why. The Justice Department announced charges against 9 defendants for breaking into several press release services and stealing information before it became public. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Oracle has a love-hate relationship with security researchers. Actually, mostly hate. Given that Oracle finds enough of it’s own bugs – it released 193 patches in it’s July patch fest – maybe it doesn’t want people to find any more bugs. This all started when Oracle Chief Security Officer Mary Ann Davidson wrote a rather […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
People say that it is too hard to stop the bad guys. Well, you can make it a lot harder on them if you don’t just play into their hands. Ubiquiti Networks, a tech company who makes wireless equipment, is publicly traded and had revenue of $150 million in the quarter ending Sep. 30, 2014, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired wrote a piece about an attack that some researchers presented at Blackhat that represents an interesting attack that we don’t have a good solution for. Wired says: “For most users that’s really a throw-your-machine-away kind of situation. Most people and organizations don’t have the wherewithal to physically open up their machine and electrically reprogram […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft is just reading Google’s playbook on destroying your privacy, but that does not mean that you have to drink the entire glass of that Kool-Aid. Here are a couple of things that you can do on Windows 10 to dial back the information theft a little bit. First of all, what does Microsoft tell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]