Multiple sources are reporting a feature of iPhone apps that is a major privacy concern. This is not new and it also is an issue on Android phones, but, for some reason, everyone seems to be highlighting the problem with iPhones. PERHAPS, that is because it it is being exploited in the wild on iPhones […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Does your organization allow thumb drives? Do you use them at home? What do you store on them? What follows could be called nightmare on Main Street. A private citizen found a thumb drive (AKA flash drive or memory stick) and did what any smart cyber security aware person would do. He took it to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Consumers have been wrestling for years now about access to their personal data. There are many non-bank financial products such as Mint and WalletGyde that help consumers manage their money, but it has always been a fight between the banks and these companies (of which there are at least hundreds, maybe more). As a group, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You might think that after the Panama Papers breach in which the law firm of Mossack Fonseca was hacked and 11 million documents exposed – including ones that forced the prime minister of Iceland to resign and the prime minister of Pakistan to be removed from office – that law firms around the world would […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you didn’t know whom or what to believe in the battle between Gene Kaspersky and the U.S. Government, it just got a little weirder. You probably remember that the DoD told its people to remove Kaspersky’s software from it’s machines. They didn’t say why. But, no matter how this story plays out, that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI released an alert this week about malware called CrySiS that attacks public facing servers that have RDP enabled. RDP or Remote Desktop Protocol is an old Microsoft protocol that was designed to allow IT people to remotely control a Windows machine (server or desktop) to perform maintenance. The protocol is old – it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]