While most people agree that Apple’s closed ecosystem is more secure than Android’s open ecosystem, that does not mean that Apple’s world is without risk. This week Apple is removing hundreds of fake apps. These apps carried brand labels like Dillards, Nordstrom, Christian Dior and Salvatore Ferragamo. The actual brands have nothing to do with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following in the tradition of the Ruskies with the DNC, DNCC and Clinton campaign hacks, hackers in the Middle East are using a phishing technique dubbed Moonlight to catch unsuspecting users with phishing emails. What is interesting is that the tech involved is “off-the-shelf”. What they have spent time working on is the phishing emails […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Chinese parliament is about to enact a new cybersecurity law which will force U.S. companies doing business in China to make some ugly choices which could, potentially, affect you. If Parliament passes the law on Monday November 7th, it will become law. Foreign business interests (like U.S. tech companies) are sorta unhappy because losing […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Denial of Service attacks are a big deal now. Last week the attack against Dyn stopped people from accessing Twitter and hundreds of other busy web sites for hours. These attacks, called denial of service or distributed denial of service (DDoS) attacks have many computers send a lot of data at a web server until […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you still think that clicking on any of those shortened web page links (like http://bit.ly/4wx345) is a good idea, here comes the best reason ever NOT to click on those links. It appears that the Hillary Clinton email leak may have been caused by clicking on one of those stupid shortened URLs. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
OK, that subject, while true, was really just to catch your attention. Here is the rest of the story (and sorry, this is a bit of a rant). Google has a team that researches security vulnerabilities in all kinds of software. The team, founded in 2014, is called Project Zero. While I am sure it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]