It is interesting to see what data companies collect on us. Unfortunately, that usually happens when the company suffers a breach. WWE joined the crowd of businesses that can’t quite remember to protect data that they make publicly accessible on the Internet. One more time, the data was stored at Amazon. In this case it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the wake of the recent London Bridge terrorist attack using a truck as a weapon, British Prime Minister Theresa May has renewed her desire for software vendors to provide her with an encryption backdoor so that British law enforcement can look at messages from iPhones and Facebook’s Whatsapp, among other software. In the U.S., […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have heard from two big name firms who succumbed to the recent Petya/NotPetya ransomware attack and they provide interesting insights into dealing with the attack. First a quick background. A week ago the world was coming to grips with a new ransomware attack. Initially called Petya because it looked like a strain of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this is certainly not a breach, it surely is not what you are expecting. Have you ever noticed after you went to a web site, started to fill out a form but then abandoned it, that you got an email from the web site? If you have gotten one, you are not alone. That […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the things that we see from time to time is SSL/TLS certificates issued by less than reputable – or simply don’t care – certificate authorities for domains that the certificate requester does not own. The Internet Engineering Task Force, the body that oversees the technical operation of the Internet, has released a new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Both the NSA and CIA have been in the news way too many times recently when organizations like WikiLeaks and others released stolen software that the organizations would rather remain private. In the case of the spy agencies, that software is their internally developed hacking tools. Now it is someone else’s turn. Microsoft has acknowledged […]
Continue reading →
[DISPLAY_ACURAX_ICONS]