Microsoft Pulls Patches AGAIN After Some Computers Become Super Secure Users of Sophos and Avast, especially those running Windows 7 or Windows 8 – but not Windows 10 – got their computers bricked after this month’s update. Microsoft has had multiple update failures over the last 6 months, causing admins to wait a week or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at Ben Gurion University in Israel created malware that could infect a CT scanner and cause it to provide either false positive or false negative readings. The researchers took real CT lung scans and let their malware modify the scans. In the cases where the researchers created fake cancerous nodes, the radiologists who read […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Brian Krebs reported that Indian mega-outsourcer Wipro was hacked. Apparently Wipro’s systems were being used to launch attacks against Wipro’s customers. Wipro’s PR police said that they are investigating. I am sure that they are. Given that Wipro’s customers likely trust Wipro, it is a good launchpad for attacks against their customers. When Brian (Krebs) […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While some people say that you can’t prove that people have been harmed by lax cybersecurity practices, the laws are making it more expensive for companies to believe this. Fines in the hundreds of thousands, millions and even billions of dollars are happening. So whether companies believe cybersecurity is an issue or not, their wallets […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A New Reason to Not Use Huawei 5G Telecom Equipment The President has been trying to get our allies to not use Huawei equipment in the buildout of their next generation cellular networks due to concerns that the Chinese government would compromise the equipment. Now the British spy agency GCHQ is saying that Huawei’s security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For many years hackers have been content destroy companys’ office networks and demand ransom if those companies wanted control of their systems back in order to do business. But that is not enough for the hackers. They want to shut down factories and due damage. There have been a couple of barriers to hackers being […]
Continue reading →
[DISPLAY_ACURAX_ICONS]