Computer systems at the almost 100 year old Hollywood Presbyterian Medical Center in Los Angeles were down for over a week due to being hacked. The story started about ten days ago when users at the teaching hospital associated USC began having problems accessing the electronic health record system at the Hospital. They could not access […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Samsung made some news last week. As we know, some smart TVs are always listening to the talking in the room. The way the software works is that it captures all voice and looks for the trigger words. Samsung, in it’s privacy policy, said “Please be aware that if your spoken words include […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the San Bernadino shooters in last December’s attack had a work iPhone that, apparently, was locked. Also, apparently, the organization that the shooter worked for was not using device management software, which would allow them to control the device. The FBI wants to unlock the phone but doesn’t know how to do it. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Congress has been trying to pass some sort of cyber security bill for 3 or 4 years now, but up until last December, was never able to pass one. Part of the reason is that knowledgeable people understand that this information sharing will likely not help you or me at all. Last December, Congress quietly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When it comes to cyber security, paranoia – or more accurately concern – is appropriate. One challenge that some information security pros have is that they see cyber security as black and white. In my opinion, there is no black or white when it comes to cyber security, only shades of gray. So when […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the last couple of months we have seen attacks on all of the major cyber security infrastructure products. Juniper. Cisco. Fortinet. Is this because something magic happened and opened the vulnerabilities flood gates? Unlikely. Is this because the hackers and/or intelligence community opened their kimonos and started sharing their zero-day vulnerabilities with us? Also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]