Microsoft has detailed an attack by an Asian hacking group that can evade the Windows (or likely any other OS) Firewall. That is because the attack operates at a level below the operating system. Microsoft has dubbed the group PLATINUM. The attack leverages a known flaw in the Intel Management Platform called Active Management […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When Dick Cheney was Veep, stories kept popping up that the Secret Service had made sure that his pacemaker was not remotely controllable. Some people weren’t sure that it was a problem – not because they didn’t like Cheney, but because they didn’t think they were hackable. Well now we have a different story. Researchers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An unnamed but well speculated bank in Brazil (likely Banrisul) had its DNS servers taken over by hackers for a period of about 6 hours one Saturday afternoon last October. Before I explain the impact, let me spend a minute on what DNS is and why it is important. The Internet works on numbers; humans […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this is not unusual it is still worth reiterating. A web server at the Paul F. Glenn Center for the Biology of Aging at Stanford hosted malware for months, undetected. The malware started by installing a web shell onto the web server. This shell was able to do a number of things including upload […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An unprotected database containing 10 million vehicle identification numbers or VINs has been discovered on the Internet. That database also included make and model information, sales gross, monthly payment, customer name, address, phone, email, birth date and many other fields. But here is the interesting part. Even though that researchers discovered the unprotected database 137 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Back in April, General Kelly, Secretary of the Department of Homeland Security, in Congressional hearings said that non-citizens might be detained or denied entry to the US if they didn’t let Homeland Security rummage through their electronic devices and maybe even make copies of them at the border. He seemed to indicate that this wasn’t […]
Continue reading →
[DISPLAY_ACURAX_ICONS]