The Israeli company Cellebrite, known for building hardware and software to extract data from most cell phones, was itself hacked. Earlier this week a hacker gave Motherboard 900 gigabytes of data from Cellebrite. We do not know if this is all they have or merely the beginning of a long trickle. Motherboard says that there […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About four months, a security firm named Medsec discovered some flaws in St Jude Medical’s cardiac implantable products. The accepted way to deal with this is to privately let the manufacturer know what you found, let them fix it and then release your research. In this case, Medsec had been told that St. Jude would […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
MongoDB, the free and open source NoSQL database (see Wikipedia entry here) that is used by hundreds of thousands of web sites is under attack. A number of attackers are using search engines like Shodan to find Mongo databases that are exposed to the Internet and attempting to compromise them. Apparently, a surprising number of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I wrote the other day about hackers stealing your phone number to be able to capture the text messages for password resets. Here is another reason to be concerned about the security of your phone and phone number. The banks are walking a tightrope. Millennials just don’t relate to banks the way their parents do, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Politics being what it is, the FBI and DNC, a year after the attack on the DNC, are fighting over who did what and when. Since everyone in Washington has to cover their rear ends, this is not a particular surprise, especially after Comey’s “We are investigating Clinton again …. oh, false alarm” letters to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are creative if nothing else. A hacker going by the name of Harak1r1 is going around looking for unprotected Mongo databases. Mongo is a database used on many websites. The only problem is that on some of them, people do not protect the administrator account. What the hacker is doing is this. First the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]