Oklahoma Government Data Left Unprotected The Oklahoma Department of Securities left data going back to at least 1999 unprotected online. Data exposed included state agency passwords and login information, data on FBI investigations, information on thousands of securities brokers and other information. The state says it was unprotected for “a limited duration”. They are investigating. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Imagine watching TV one day and hearing an alert that says that ballistic missiles were headed from North Korea to Los Angeles, Chicago and Ohio. The alert said that people had three hours to evacuate. Ignore for the moment the fact that Russian TOPOL ballistic missiles can travel at up to 15,000 MPH, so it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Homeland Security’s newly named agency – the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to executive branch agencies – many of which have personnel on furlough – regarding a DNS hijacking issue. The issue is not limited to agencies and every company and private individual that owns one or more Internet domains […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Some of the most popular business email compromise scams (BEC) target accounting and finance or human resources. The scam usually works something like this. Someone in the target department – often not too high up in the food chain – gets a email pretending to be from an executive like the CEO or CFO. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
City of Del Rio, Texas Reverts to the 1950s – Paper and Pen – After Ransomware Attack Update: The city says that it cannot issue utility bills which means that it won’t get utility revenue from residents. Del Rio, Texas, on the Texas-Mexico border was hit by a ransomware attack this week and as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Magecart malware has stolen credit card information from such high profile web sites as British Airways, Ticketmaster and Newegg. The malware works by inserting a little bit of code – usually Javascript – into the page(s) of a web site that collects credit card information. When a customer visits that page the malware collects […]
Continue reading →
[DISPLAY_ACURAX_ICONS]