One of the things that we see from time to time is SSL/TLS certificates issued by less than reputable – or simply don’t care – certificate authorities for domains that the certificate requester does not own. The Internet Engineering Task Force, the body that oversees the technical operation of the Internet, has released a new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Both the NSA and CIA have been in the news way too many times recently when organizations like WikiLeaks and others released stolen software that the organizations would rather remain private. In the case of the spy agencies, that software is their internally developed hacking tools. Now it is someone else’s turn. Microsoft has acknowledged […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the WannaCry Ransomware affected businesses in 150 countries last month, you would think that people would have learned. Apparently not. The Petya ransomware doesn’t encrypt files, it encrypts the whole disk. Unlike typical ransomware that picks selected files (like Word or Excel files), instead this ransomware replaces the Master Boot Record or MBR and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week the German Parliament passed a law that allows hack your computer or phone when investigating anything from murder to betting fraud and many other crimes. How would this work? It would allow police to covertly install software on your computer or phone that allows police to siphon data off your phone. Whether that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You may recall that a hacking group called the Dark Overlord hacked into Larson Studios, a third party provider to Netflix and other studios. They stole the unreleased copies of the whole season of Orange as well as about 36 other series and movies. Now we are beginning to hear the back story and it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The universe is an interesting place. While the Senate and House, among others, are trying to figure out how much damage Russia did during last year’s election cycle, Cisco and others are sharing their source code with the people who supposedly hacked us. Seem strange? It is! Here is the story. For some countries, including […]
Continue reading →
[DISPLAY_ACURAX_ICONS]