How much does cyber crime cost us anyway? I rant about it all the time, but really, in dollars, what does it cost? Different researchers give different answers and your mileage may vary, but here are some answers: Cybercrime makes, AT LEAST, $1.5 trillion more than the drug trade Cybercrime would rank as the 13th largest economy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Johannesburg, South Africa Attacker Threatens Data Breach In what I think is going to be the way of the future, hackers compromised Joburg IT systems and threatened to publish data that they stole if the ransom is not paid. As I write this, the deadline has just passed, they have not paid the ransom, the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well it seemed like the whole damn country. Over 15,000 website have been hacked, including, not surprisingly, newspapers, government offices and TV stations. After the sites were defaced by the hackers, they were taken offline. Newspapers said it was the biggest attack in the country’s history, even bigger than the 2008 attack by Russia. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
These are the words right out of the mouth of Katie Arrington, The Pentagon’s Chief Information Security Officer for the acquistion policy office. Katie reports up to Kevin Fahey, the Assistant Defense Secretary for Acquisition. He is the guy who is responsible making sure that the Pentagon spends those hundreds of billions of dollars a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of you have probably seen or heard of the threatening email that starts with “Hi, I know one of your passwords is: xxxxx“. The email goes on to say that the email writer has infected the recipient’s PC, including access to the recipient’s webcam. The attacker claims, by virtue of installing the malware on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Database Leaked 179 GB of Personal Data of military personnel, officials and hotel customers. I wish this was a new story. Autoclerk, a Best Western service that manages reservations, revenue, loyalty programs, payment processing and other functions for the hotel chain. left an elastic search database exposed. Hundreds of thousands of guest reservations were exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]