Warning: Sorry, this post is way more technical than most of my posts. If you are an executive reading this, you may want to show this to your security or IT folks and ask “how are we handling this?”. They should be able to explain that to you in English. Incident response is all about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Orphaned Data in the Cloud Researchers at security firm vpnMentor found an unsecured S3 bucket with passport, tax forms, background checks, job applications and other sensitive data for thousands of employees of British consultancies. Many of the firms involved are no longer in business. The researchers reported this to Amazon and the UK’s Computer Emergency […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is not a done deal yet, but it is a very interesting development and one, if it holds, that could have significant impact on a lot of countries, including the U.S. Over the last few years, a number of countries have enacted laws that allow their intelligence apparatuses to override many privacy laws and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A SIM is the (usually) hardware card that gives your phone its “personality”. The SIM is tied to the carrier and contains all the information that the phone needs to talk to your carrier. As users SLOOOOWLY migrate to using text messages as an extra layer of authentication for logging in to a variety of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
DoD continues to take actions that lead us to believe that they are very serious about the Cybersecurity Maturity Model Certification process. This process will require that all DoD contractors ultimately get a third party cybersecurity certification on an annual basis if they want to continue to be part of the DoD food chain. When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Albany Int’l Airport Hit By Ransomware via MSP In what is becoming an all too common story, the Managed Service Provider that supported Albany, NY’s airport, Logical Net of Schenectady, NY, was hacked and from there, the hackers were able to connect to the airports administrative network and infect it with REvil ransomware, the same […]
Continue reading →
[DISPLAY_ACURAX_ICONS]