There is never a good time for the information systems of one of the world’s largest hosted services providers to go down, but in this case, at least it wasn’t April 6th. One of the Dutch firm Wolters Kluwer’s big services is CCH, the online tax software that many accounting firms, large and small, use. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Wiping Github and Other Repos Hackers are attacking repositories of users on Github, Gitlab and Bitbucket, leaving a ransom note that says pay up if you want your software back. The ransom isn’t much – around $500, – which may cause people to pay up rather than trying to recover the data, which I […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I think it would be hard to argue with the statement that when it comes to mobile (phone) security, Apple has it all over Google. For the most part, other than for the Google branded phones, that is because they have to work through the handset manufacturers and wireless carriers. Apparently, not any more. For […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This time the attack is against an eCommerce platform, PrismWeb, that is used by College bookstores. The attack is similar to other attacks, in the the hackers somehow got into the company’s system and inserted a tiny bit of Javascript that steals credit card data – very similar to Magecart that is affecting sites from […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Trains UAE Spies to Spy on Americans Reuters has written an expose on how the State Department granted a U.S. Company an ITAR license to train UAE spies on hacking. The plan, which got out of control, what to constraint the UAE spies, but once they were trained, they fired their U.S. trainers and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One good thing about breach notification laws – we tend to find out more information about what actually happened. Last month Citrix announced that hackers broke into their network and stole documents – corporate secrets. They said they found out when the FBI came to tell them (that probably was not fun to admit). Security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]