The Wyndham Hotel chain was hacked several times going back as far as 2012. The FTC came after the hotel chain using Section 5 of the FTC Act, claiming unfair business practices. Usually what happens in these cases – and there have been a number of them – is that the company and the FTC […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While hacking credit cards for fun and profit is still a popular pastime, two additional hacking models need to be considered. The first additional model is the Anthem Blue Cross or Office Of Personnel Management model. In those cases, hackers are looking to amass vast amounts of data on as many people as possible. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The AP is reporting that the IRS didn’t really know how many taxpayers had their information stolen by hackers who used the Get Transcript web site. Originally, the IRS said that hackers tried to get information for about 200,000 taxpayers and were successful in getting information for 100,000 of them. Originally, they said the hack […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE August 19, 2015 – As I predicted, there are now web sites which allow you to search the Ashley Madison data. Check this Wired article for links: http://www.wired.com/2015/08/check-loved-one-exposed-ashley-madison-hack/ . The hackers who broke into the Ashley Madison web site last month threatened to make the data that they stole public if Ashley Madison’s parent […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
GM Says that they have fixed the vulnerability that allowed a hacker to take over the GM Onstar Remotelink software. Once the hacker has taken over the software, she can do anything the owner can do – remote unlock, remote start, etc. The attack worked because GM was not validating the SSL certificates […]
Continue reading →
[DISPLAY_ACURAX_ICONS]