As I wrote about the other day, service providers look like they are the new target of opportunity for hackers. Until the other day, PNI Digital Media, owned by Staples, ran kiosks in places like CVS, Walmart and Costco, where people could print their digital pictures. The place on their web site has now removed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Add UCLA to the list of health care providers that have been hacked. UCLA says they discovered the hacking last September, but it was not until May that they discovered that the hackers had gotten into the part of the system that stores patient records. Even now they are not sure if the hackers took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Ponemon Institute released a study that compares the views of about 7,000 Board members and 11,000 IT security people and the results show some interesting data. The first question is ” Our board of directors understands the security risks to the organization”. While 70% of the board members agree or strongly agree with that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Car makers are limiting the data they are sharing with Apple and Google though car entertainment systems (what the car makers call infotainment). This is not because they value your privacy, but rather because they want to be able to sell your data themselves and if they no longer own it because they gave […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yesterday was Patch Tuesday. Microsoft had 14 bulletins, 5 of which they deemed critical, covering 59 vulnerabilities. Oracle released patches covering 193 vulnerabilities, including 25 Java patches, one of which is already being exploited in the wild. 44 of these vulnerabilities came from third party components. Of the 25 Java vulnerabilities fixed, 23 of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the fallout of the Hacking Team breach (see post) continues, the Mozilla Foundation is taking the bull by the horns. Right now there are at least two Flash zero day vulnerabilities that Adobe has not patched. As people continue to go through the Hacking Team data dump, we may find more. As a result, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]