As I predicted (which did not require a large amount of clairvoyance) after the Cottage Health fiasco, insurance companies prefer to deposit premium checks and have begun to fight cyber insurance claims. Since most people don’t read their insurance policies and even fewer make sure that they are in compliance with the terms of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. government acknowledged that it uses zero-day bugs not only for espionage and intelligence gathering, but also for law enforcement. What else it uses them for is still unknown. Last November, the government released a document titled Vulnerabilities Equities Process. This policy describes the policy, dating back to 2010, that allows agencies to decide […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While I am not a Linux user personally, I am a big fan of it. However, I am not delusional enough to think that just because a piece of software is open source, it is secure and bug free. Anyone who thought that should have had those delusions ripped away when the Heartbleed bug was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As we see the news of attacks day after day and think “can it get any worse?”, the reality is that likely, it is much worse than we think. Buried in the mass of data that was released by the Sony hackers were some emails from VP of legal compliance Courtney Schaberg telling some people […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here is an interesting group of vulnerabilities that make life easy for hackers and the Chinese (or Russians, or Ukrainians or pick your country). Dell has a couple of features in Dell Foundation Services. One allows an unauthenticated user to get the Service Tag (Dell’s version of a serial number) over the net. With that, you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As Businesses up their security act, the hackers are upping their act too. Banks, for example, have added two factor authentication to make logins more secure. In fact companies from Amazon to Paypal have added optional two factor authentication. So the hackers decided to up their game too. Welcome Bankosy malware. This malware intercepts your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]