A few days ago I wrote about a public-private partnership between the Russian spy folks and Russian hackers that was uncovered when the Feds indicted two hackers and two Russian spies. In that case, the hackers gave the Russians the data that they wanted and kept and used the rest for themselves. Now there are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A group of hackers is threatening to wipe the devices of more than 600 million Apple users on April 7th using hacked Apple account passwords. According to the hackers 220 million of the credentials have been verified to work. Initially, the hackers asked for $75,000 in Bitcoin or Etherium, but they have raised that “request” […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. and Britain announced new restrictions on carry on electronics this week. While this has been considered many times before, it is now being implemented, but only from a limited number of airports and a limited number of airlines. The U.S. and British lists are different – of course. I will only talk about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We think of a virtual machine as a way to isolate one system from another and, in general, it works well. But not always. Pwn2Own is a hacking contest that is part of the CanSecWest security conference in Vancouver, BC, Canada. This year researchers who were members of Qihoo 360’s security team figured out a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A U.S. citizen of Ethiopian heritage was hacked a few years ago by the Ethiopian government here in the U.S. The victim, who goes by the pseudonym of Mr. Kidane to protect his family here and in Ethiopia, is being represented by the EFF, the Jones Day law firm and the law firm Robins Kaplan. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month I wrote about Stewart International Airport in New York leaving a backup drive exposed to the Internet without a password or encryption, exposing extremely sensitive information (see post here). Now it has been revealed that an unnamed DoD officer, possibly a Lt. Colonel, had a backup drive with thousands of sensitive documents exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]