Well it seemed like the whole damn country. Over 15,000 website have been hacked, including, not surprisingly, newspapers, government offices and TV stations. After the sites were defaced by the hackers, they were taken offline. Newspapers said it was the biggest attack in the country’s history, even bigger than the 2008 attack by Russia. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No, this is not an Apple-bashing post, just coincidence. The problem could just as easily happen to an Android user. The short answer to the question in the subject of this post is, apparently, at least according to the courts in London. Here is the story. Jemima is a digital convert. She is a resident […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
These are the words right out of the mouth of Katie Arrington, The Pentagon’s Chief Information Security Officer for the acquistion policy office. Katie reports up to Kevin Fahey, the Assistant Defense Secretary for Acquisition. He is the guy who is responsible making sure that the Pentagon spends those hundreds of billions of dollars a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of you have probably seen or heard of the threatening email that starts with “Hi, I know one of your passwords is: xxxxx“. The email goes on to say that the email writer has infected the recipient’s PC, including access to the recipient’s webcam. The attacker claims, by virtue of installing the malware on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Database Leaked 179 GB of Personal Data of military personnel, officials and hotel customers. I wish this was a new story. Autoclerk, a Best Western service that manages reservations, revenue, loyalty programs, payment processing and other functions for the hotel chain. left an elastic search database exposed. Hundreds of thousands of guest reservations were exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SIMJacking, the attack where a hacker replaces the SIM card that is associated with your phone in the carrier’s database with the attacker’s SIM card number and then has access to all of your phone calls and text messages, is becoming more popular – because it is profitable. At this point, the carriers have not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]