720-891-1663

Why Browser Extensions Are a Security Risk

Web browsers have become the center of our daily Internet universe.  But browsers, by themselves, are often not sufficiently powerful to do what people want them to do.  Enter the world of plugins or addins or browser extensions.  These little bits of code allow a browser to do something that they were not designed by […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Courts Easing on Requirements For “Standing” in Breach Cases?

One of the things that has always been a barrier for people who’s data was compromised during a breach is what lawyers call “Standing”.  Standing derives from Article III of the U.S. Constitution.  The courts have said that there are three requirements for “standing” to bring an action against another – Injury in fact, causation […]

Continue reading → [DISPLAY_ACURAX_ICONS]

More IoT Webcams Hackable – Trivially

Researchers at Bitdefender say that they have uncovered two vulnerabilities in low cost Chinese cameras. One of the cameras is used in the iDoorbell – which represents a software supply chain issue on top of it.  The cameras come from Shenzen Neo Electronics.  Researchers suspect that other cameras are affected as well. Using the search […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Industrial Espionage – Much Worse Than Credit Card Breaches

General Keith Alexander, former director of the National Security Agency, said that cyber espionage is the greatest transfer of wealth in history.  In 2012 when he made that statement, the the value of cyber industrial espionage on an annual basis was $338 billion.  Per year.  5 years later I am sure that number is greater. […]

Continue reading → [DISPLAY_ACURAX_ICONS]