For years we have been worrying about whether the apps (or applications) that we use are secure. Now we have to worry about whether the back end servers that our apps talk to are secure. You may remember that recently hackers discovered thousands of Mongo database servers that had no Admin password and created a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For a long time I have said that there are multiple forms of ransomware such as: The hacker encrypts your computer and gives you the decryption key if you pay the ransom. The hacker encrypts your computer and DOES NOT give you the decryption key when you pay the ransom. The hacker PRETENDS to encrypt […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FTC recently did an experiment to see how quickly thieves used stolen data after it was posted on the dark web. They created 100 fictitious consumers and gave them credit cards or bitcoin wallets. Each fictitious consumer had a name, email and passwords as well. They posted the data twice – first on April […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who are not familiar with the OWASP Top 10, it is a great set of vulnerabilities to check your web application for. If your software QA team, in addition to the normal functional stuff that they check for can also check for these exposures, that will likely catch a number of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Is it possible that North Korea used stolen NSA hacking tools to infect medical devices at U.S. hospitals? Forbes says, yes it is. When the WannaCry ransomware spread out of control last week infecting 48 hospital trusts in the UK and unnamed medical facilities in the U.S. for the most part U.S. businesses were not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We hear a lot about data breaches of businesses. Target. Home Depot. Anthem Blue Cross. 21st Century Oncology and thousands of others. But there is a whole other category of breaches. Government. At all levels from local to national. Everyone remembers the OPM’s loss of 20+ million security clearance background checks. Or the IRS’s loss […]
Continue reading →
[DISPLAY_ACURAX_ICONS]