Knowledge Based Authentication – using information that only you know – used to be a very popular method for validating that you are you. Examples of this are when a customer service agent asks you for your birth date, last four of your social or where you were born. The credit bureaus even sell that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Computer hackers likely working for the Syrian regime and Hezbollah have managed to penetrate the computers of Israeli and American activists working with the Syrian opposition, exposing sensitive contacts between the sides. Al-Akhbar, a newspaper serving as Hezbollah’s mouthpiece in Lebanon, published a series of articles over the weekend purporting to divulge correspondence between Mendi […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at FireEye have uncovered another zero day Flash exploit from within the ruins of the Hacking Team data dump. Adobe says that they will patch it some time this week. Adobe also says that the flaw could cause a crash and potentially allow an attacker to take control of the affected system. Like the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you are are Firefox users, I found a tool that allows you to see what parts of your browser need updating. The tool is a web page on Mozilla’s web site. Maybe everyone else knows about it and I have been living in a cave. Maybe there is a similar one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hacking Team, an Italian company that sells hacking tools to the FBI and DEA, as well as less friendly governments such as Sudan, was hacked this week. The hackers stole about 400 gigabytes of internal emails, financial documents, source code and other goodies. The hackers quickly published the data that was hacked, presumably to embarrass […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As companies like Target and Home Depot begin to clean up their credit card protecting acts, the cyber thieves are moving on to a different class of victim. This week, Service Systems Associates acknowledged that they had been hacked and as a result, some of their clients systems were compromised. How this works is this: […]
Continue reading →
[DISPLAY_ACURAX_ICONS]