Hacking, just like all other Internet businesses, is morphing to survive. And to be very clear, hacking is a business. Before people make funny jokes, no, hackers do NOT hack into porn sites for the pictures. They could use stolen credit cards if that was all they wanted. The porn site Brazzers was hacked, apparently […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is getting a bit crazy. I am thinking about paying cash next time I stay at a hotel. UPDATE: The Hutton breach is tied to another breach from last week, HEI Hotels. The Hutton is managed by HEI. HEI also manages hotels for Intercontinental, which owns Kimpton. Also, Noble, which owns Ocean Key, below, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this column is directed at lawyers, it applies equally well to anyone sending or receiving confidential communications via email and expecting those communications to actually be confidential. We think of business email compromise as one of those spear phishing emails that pretend to come from the boss telling you to wire money to China […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Merchants want you to believe that HTTPS equals secure. I keep saying that it doesn’t. Here is another story for my side of the argument. First, a little background. If a web site want to support HTTPS (also known as SSL or TLS), they need to have a certificate. The certificate is used as part […]
Continue reading →
[DISPLAY_ACURAX_ICONS]