If you are a crook and you want to break in, you might first try the front door. If you discover the front door is locked, you might try another door or a window. Same is true for hackers. As companies slowly improve their defenses on end user web sites, hackers discovered that the APIs […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The President is right that cellular security is a problem, but not for the reason that he thinks – although that is a problem too. Researchers at Ruhr-Universität Bochum have discovered a way to compromise 4G cellular security – the cell service that almost all of us use now. It allows them to impersonate the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Gov Warns of Ransomware Attacks on Pipeline Operations DHS’s CISA issued an alert this week to all U.S. critical infrastructure that a U.S. natural gas compressor station suffered a ransomware attack. While they claim that the attackers did not get control of the gas compression hardware, they did come damn close. The ransomware took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Say 4 Chinese Hackers Took Down Equifax The Department of Justice indicted 4 members of the Chinese People Liberation Army, saying that they were responsible for detecting the fact that Equifax did not patch their some of their servers and thus were easily hackable. This, of course, means that the hack did not require […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In one case, the answer is probably. If I want to delete one of my blog posts, I can probably do that. But not if someone copied it. Which I can’t control. Then they can upload it again. I can send a DCMA take-down notice to the hosting provider, which they might ignore if they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While I have reported about software supply chain attacks in the past, they have all been one-off and in some cases highly targeted attacks. The FBI has issued a warning about ongoing, large scale, software supply chain attacks. The attackers are using the Kwampirs malware to install a Remote Access Trojan or RAT. The FBI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]