Ransomware, as I have said in past talks and blog posts is really nasty stuff. And it was morphing. First came vanilla ransomware. We encrypt your files, you pay the ransom, we give you the key to decrypt it (usually) and most of the time (but not always) the decryption process works as described. There […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A few days ago I wrote about a public-private partnership between the Russian spy folks and Russian hackers that was uncovered when the Feds indicted two hackers and two Russian spies. In that case, the hackers gave the Russians the data that they wanted and kept and used the rest for themselves. Now there are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. and Britain announced new restrictions on carry on electronics this week. While this has been considered many times before, it is now being implemented, but only from a limited number of airports and a limited number of airlines. The U.S. and British lists are different – of course. I will only talk about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We think of a virtual machine as a way to isolate one system from another and, in general, it works well. But not always. Pwn2Own is a hacking contest that is part of the CanSecWest security conference in Vancouver, BC, Canada. This year researchers who were members of Qihoo 360’s security team figured out a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A U.S. citizen of Ethiopian heritage was hacked a few years ago by the Ethiopian government here in the U.S. The victim, who goes by the pseudonym of Mr. Kidane to protect his family here and in Ethiopia, is being represented by the EFF, the Jones Day law firm and the law firm Robins Kaplan. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month I wrote about Stewart International Airport in New York leaving a backup drive exposed to the Internet without a password or encryption, exposing extremely sensitive information (see post here). Now it has been revealed that an unnamed DoD officer, possibly a Lt. Colonel, had a backup drive with thousands of sensitive documents exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]