Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is a great piece on ZDNet today about a writer who’s phone number was stolen (not the phone, the number) using a SIM swap attack. In this case, the phone company was T-Mobile and all the hacker had to do is call them, given them a bit of the victim’s information (like secret stuff […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The message this administration has been delivering over the last two-three years is less regulation; less controls. So what, exactly, is the FTC doing? Are they going off the reservation or is there a plan here? My guess is that there is a plan. Last week the FTC whacked DealerBuilt, a service provider that provides […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
“Think of this – one man with total control of billions of people’s stolen data. All their secrets, their lives, their futures…” So begins a fake video using technology and videos of Mark Zuckerberg saying completely different things (see here). It even has a CBS News logo on it. CBS asked Facebook to take it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SandboxEscaper Releases Yet Another Windows Zero-Day SandboxEscaper has it in for Microsoft. He or she has released over a half dozen zero-days including four of them just a couple of weeks ago. He or she has put Microsoft behind the power curve multiple times and now he or she is doing it again. This time […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Remember the Wannacry attack that basically took down the UK healthcare system and which CBS says will cost about $4 billion to mitigate? Well, a few medical experts with a bent towards hacking presented the results of a simulation they conducted regarding what would happen if local hospitals were hit by a coordinated malware attack. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]