Symantec, who is already on probation for issuing inappropriate SSL certificates, issued more than a hundred additional “illegit” certificates. SSL certificates – more technically TLS certificates – are the bits of technology required to make those “secure” web sites work. Certificates are issued by certificate authorities (CAs) – organizations who have supposedly set up processes […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When cyber criminals steal credit cards or buy stolen credit cards, they are buying somewhat of an unknown. Small time crooks test small numbers of cards by trying to use them at self service gas pumps in the middle of the night, but that doesn’t scale up and you run the risk of getting caught. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Former NY mayor Rudolph Giuliani has been in the security business since leaving the mayor’s job in 2001 and is now the cybersecurity czar for President Trump. After he was nominated, security experts checked out his website. The web site, GiulianiSecurity.com is a tad bit unsecure. The site is built using Joomla, a low end content […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A new piece of Apple Mac malware was discovered recently but may have been running around the Mac universe for two years. The malware dubbed Fruitfly by Apple, is apparently a pretty simplistic piece of code. It can capture webcam images , screenshots, information about every device on the network and then tries to connect […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Houston, we have a problem! So goes the famous NASA mis-quote (Apollo 13 astronaut Jack Swigert actually said “Houston, we HAD a problem here”. You may recall that the Apollo 13 capsule did limp home after aborting its mission. The “problem” that they had was more like a catastrophe and it was, to most people, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Every year at this time there are new laws and this year is no exception. Illinois, Nebraska and Nevada have added usernames or email to data elements that are considered personal information if that information is combined with other information that would let a hacker access your online account. In other words, a username with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]