720-891-1663

Businesses Need To Consider The New Hacking Paradigm

While hacking credit cards for fun and profit is still a popular pastime, two additional hacking models need to be considered. The first additional model is the Anthem Blue Cross or Office Of Personnel Management model.  In those cases, hackers are looking to amass vast amounts of data on as many people as possible.  They […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Apple iOS Quicksand Vulnerability Revealed

Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice.  Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]

Continue reading → [DISPLAY_ACURAX_ICONS]

IRS Breach Grows – Do They Really Know The Answer?

The AP is reporting that the IRS didn’t really know how many taxpayers had their information stolen by hackers who used the Get Transcript web site. Originally, the IRS said that hackers tried to get information for about 200,000 taxpayers and were successful in getting information for 100,000 of them.  Originally, they said the hack […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Drop 10 Gigabytes Of Ashley Madison Data

UPDATE August 19, 2015 – As I predicted, there are now web sites which allow you to search the Ashley Madison data.  Check this Wired article for links: http://www.wired.com/2015/08/check-loved-one-exposed-ashley-madison-hack/  . The hackers who broke into the Ashley Madison web site last month threatened to make the data that they stole public if Ashley Madison’s parent […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Year Of The Car Hack? GM Onstar, VW, Audi and Many Others

GM Says that they have fixed the vulnerability that allowed a hacker to take over the GM Onstar Remotelink software.   Once the hacker has taken over the software, she can do anything the owner can do – remote unlock, remote start, etc.   The attack worked because GM was not validating the SSL certificates […]

Continue reading → [DISPLAY_ACURAX_ICONS]