Anthem Blue Cross, you likely remember, was one of the first “Blues” to admit that they had lost control of the data on their subscribers to the tune of around 79 million people. After Anthem admitted that, a number of other insurance companies – both Blues and others – admitted that they, too, had been […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have been standing on my IoT soapbox for a while, saying that IoT is dangerous and people don’t know it. As a result, people aren’t doing anything about it. Well, today I received a dose of reality. We recently completed a vulnerability scan for a client of ours and one of the findings was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When was the last time you patched your Internet router? Probably never. That is what the CIA is counting on. As well as foreign governments and just plain hackers. But when it comes to the CIA, they are probably not interested in you. That may not be the case when it comes to the other […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In what has to be one of the largest disclosures of personal data ever, it appears that a Republican National Committee vendor exposed their collection of data on 198 million U.S. voters in the cloud for anyone to trip over. Unlike other cases where hackers broke in or used zero day exploits to compromise systems, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Aptos, an outsource point of sale vendor for many businesses, announced that they were breached. Sort of announced, but not really. The breach was active from February 2016 thru November 2016, but they didn’t notify their merchants until February of this year. Now the vendors are slowly notifying their customers. Potentially, customers are not going […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What if the attack on the Kiev power station last Christmas which killed power to a goodly chunk for the city was just a dry run? For what? Security researchers at ESET and Dragos analyzed the malware used in the attack and say it represents a dangerous advancement in attacks on critical infrastructure. Like Stuxnet […]
Continue reading →
[DISPLAY_ACURAX_ICONS]