720-891-1663

U.S. Discloses Zero-Day Exploitation Practices

The U.S. government acknowledged that it uses zero-day bugs not only for espionage and intelligence gathering, but also for law enforcement.  What else it uses them for is still unknown. Last November, the government released a document titled Vulnerabilities Equities Process.  This policy describes the policy, dating back to 2010, that allows agencies to decide […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Dell, Lenovo, AOL and Shodan Make Life Easy For Hackers and Foreign Intelligence Services

Here is an interesting group of vulnerabilities that make life easy for hackers and the Chinese (or Russians, or Ukrainians or pick your country). Dell has a couple of features in Dell Foundation Services.  One allows an unauthenticated user to get the Service Tag (Dell’s version of a serial number) over the net.  With that, you […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Android.Bankosy Malware Defeats Two Factor Authentication

As Businesses up their security act, the hackers are upping their act too. Banks, for example, have added two factor authentication to make logins more secure.  In fact companies from Amazon to Paypal have added optional two factor authentication. So the hackers decided to up their game too. Welcome Bankosy malware.  This malware intercepts your […]

Continue reading → [DISPLAY_ACURAX_ICONS]