720-891-1663

New Android Trojan Hijacks Routers

Normally when hackers want to attack a router, they attempt to compromise the router directly.  They try default passwords or a list of passwords;  they look for software vulnerabilities. Maybe patches that haven’t been applied. Another approach is to compromise a device inside the network and use that device to compromise the router from the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

DHS Asks Visitors For Social Media Account Information

Last December, DHS started asking some foreign visitors for their social media account information.  The request is ‘optional’. Social media platforms such as Facebook, Google+, Instagram and others are on a list where visitors are asked to enter their account names.  Note that they are not being asked for their passwords. The Feds are trying […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Steal Millions in Bitcoin Using Only A Phone Number

Just after midnight on August 11th, Jered Kenna in Medellin, Columbia  was notified that two of his email accounts had their passwords reset. He tried regaining control of the accounts by getting the services to send him a text, which he never received. When he called his phone company (T-Mobile), they said that he didn’t […]

Continue reading → [DISPLAY_ACURAX_ICONS]