About a year ago, Android users were fighting something called the Stagefright bug. Buried deep in the bowels of the operating system was a series of bugs that would allow an attacker to send you a specially crafted text message and take over your Android phone. Stagefright affected close to a billion phones in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. Department of Health and Human Services Office of Civil Rights, the government entity that manages the privacy of health care information that you share with doctors and others, has issued new guidance on ransomware. While technically, it only applies to organizations that they regulate, in reality, almost everything they said applies equally to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A recent Ponemon Institute study revealed what a lot of us have been saying for a long time. Despite spending millions of dollars, 79 percent of the IT and IT security staff reported that their ability to identify and stop threats are either non-existent, ad hoc or inconsistently applied throughout the enterprise. The companies participating […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft has been fighting with the U.S. Department of Justice since 2013 when the DoJ tried to get Microsoft to get them to hand over data belonging to a user, stored exclusively in Ireland. This case has gone back and forth in the courts since then. The bottom line issue is whether a U.S. Court […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
IT World Canada ran an article the other day regarding the payment of ransom at the University of Calgary. The piece is almost an editorial as the writer beat the University up for paying the ransom. Here is the story that the article laid out. In June the University was infected with a “significant malware […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In March the FBI announced that one of the hackers who broke into a number of celebrities ‘ phones in 2014 pleaded guilty. Ryan Collins, 36, of Pennsylvania, pleaded guilty to one felony count of violating the Computer Fraud and Abuse Act by illegally accessing a protected computer to obtain information. This month, Illinois resident […]
Continue reading →
[DISPLAY_ACURAX_ICONS]