May 7, 2019 is the day things changed in the City and County of Baltimore. That is the day that hackers encrypted computers used by 10,000 people in the offices of Baltimore City and County. While 911 services continued to work. unfortunately the same could not be said for their phones and email. The hackers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Way back in 2011 Lockheed Martin released a white paper defining the concept of the “Cyber Kill Chain” (see below). The cyber kill chain defined the steps in a hacking attack and then the way a defender can use that to “kill” that attack. It is a very effective tool and here is a link […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Be Thankful That You Are Not Equifax – Costs Reach $1.4 Billion So Far Two years after the big breach, Equifax reported financials for the first quarter. They reported a loss of $555.9 million compared to a net income of $90 million for the same period in 2018 on basically flat revenue. Equifax had $125 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
System, network and application administrators can do the most damage in case of a malware attack. The permissions that they have allow them to do many things that the average user can’t do and those things, in the hands of a hacker, can mean a lot of damage inside every company. So here is what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Military prosecutors who are prosecuting a Navy SEAL for killing an Islamic State prisoner are now charged with bugging emails and documents that they sent to defense lawyers. The bugs, known in the trade as beacons, tell the person who installed it who has opened the document based on their IP address and also provides […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Eight Americans and one Irishman have been charged with wire fraud for stealing people’s phone identities without ever having to go near your phone. In this case, the gang used the stolen phones to compromise the victim’s cryptocurrency wallets, among other things. This was possible because the victims used text messages as the second factor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]