ITEM 1: As I wrote about a couple of weeks ago, Appalachian Regional Healthcare was attacked with some form of malware, forcing them to shut down every single computer in every hospital that they run. Finally, after twenty days, the hospital chain says that things are back to normal. Appalachian says that they do not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As a follow on to last week’s posts on why patching is critical and the CERT alert on The Shadow Broker’s release of a whole raft of firewall hacks, this week Cisco is announcing that their software is vulnerable to attack, there is no workaround and they are working on patches. BUT, there is a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ClixSense, a company that pays users to look at ads and fill in surveys was hacked last week. The hackers dumped 2 million “samples” on Pastebin to advertise the sale and security researchers say that the data appears to be real. In total, there are over 6 million records “available”. Information that is in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This week, Microsoft released it’s September patch dump. 14 security bulletins. 50 vulnerabilities in Windows. 26 more vulnerabilities in Flash player that was bundled with the Edge browser. The patches affect Internet Explorer, Microsoft Edge, Microsoft Office, OLE Automation, VB Scripting and Flash, among others. Other Microsoft products patched include Silverlight and Exchange server. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Israeli researchers at Ben-Gurion University have come up with a model that says that hackers, for a modest amount of money, could disable the 911 service in a state, and, for a little more money, the entire United States. While you might think it would be hard to do that, it really is not. Many […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last month a hacker group known as The Shadow Brokers released a series of exploits that they said belong to an NSA contractor that has been called the Equation Group. Whether the Equation Group is real and whether they are a vendor of exploits to the NSA or not is really not terribly relevant in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]