720-891-1663

So You Think You Are Saving Money by Letting People Use Personally Owned Computers

Many companies allow employees to use their own personal computers for work. They do this for employee convenience and an apparent cost savings. After all, if we don’t have to buy employees their own laptop, certainly we will save money. At least it seems like that is true. In a perfect world, with no hackers, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending February 24, 2023

European Governments Want to be Able to Snoop on ALL of Our Communications As is usually the case, their excuse it that “it is to protect the children”. They want to break encryption while sprinkling magic fairy dust to not break encryption (an impossibility) in an effort to force kiddie porn traders (now called child […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Google Working to Improve Android Hardware Security

As operating system vendors (Apple and Google) improve their security and make hacking their products more difficult, hackers are looking elsewhere for “ways in”. While users consider their phones a single computer, the reality is that there are whole bunch of computers under the hood. Processors for each radio in the phone such as the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

GoDaddy Admits Hackers Roamed Their Network for THREE YEARS!

I’ve never been a fan of GoDaddy for a variety of reasons, but now I have a major reason not to like them. In 2020 GoDaddy alerted 28,000 customers that an attacker used their credentials in 2019 to abuse their hosting accounts. That is over 3 years ago and that was the start of a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending February 17, 2023

BlackCat Leaks Irish University’s Hacked Data I reported last week that Munster Technological University closed several of its campuses after a ransomware attack, which the university, apparently did not pay. The Irish High Court issued an injunction prohibiting the hackers from leaking the data and return any data that they had. They did “return” it […]

Continue reading → [DISPLAY_ACURAX_ICONS]