If you believe all of the news reports, quantum computers are here and can break all of the encryption that we have ever used. A bit hyperbolic. Dorothy Denning, a very well know security researcher who has written 4 books and over 200 articles while teaching at Purdue, Georgetown and the Naval Postgraduate School wrote […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FCC to Investigate Centurylink In an example of “can you believe this”, Ajit Pai, who earlier this year said that the FCC can’t regulate Internet providers wants to investigate why Internet provider Centurylink had an outage today that affected 911 call centers across the country. Centurylink, who told people earlier today that if they had […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the trade war between the U.S. and China heats up, President Trump is considering issuing an executive order banning all U.S. companies from buying telecommunications gear from companies deemed to be a national security threat. Right now this threat is deemed to be a targeted attack against two Chinese vendors – ZTE and Huawei. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Merry Christmas! The hackers, of course, do not take Christmas off and are working hard to ruin yours. Today’s story is about a very active spam campaign that is disguised as Amazon order confirmations. The first stage of the campaign looks something like this with different subject lines: Notice that you have to click on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here is a scary thought: According to research, 59% of employees who leave will steal proprietary data, 20% will sell passwords to an outsider and 44% will do so for $1,000. If you don’t already have a employee termination checklist, consider this the perfect start for that list: Cancel the employee’s accounts. Now that companies […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Patches This Week Microsoft issued an emergency out of band patch for an Internet Explorer zero day bug that affects IE 9, 10 and 11 on Windows 7,8,10 and the related server versions. The bug allows a hacker to remotely execute code by getting a victim to view a web page, HTML document, PDF or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]