These are the words right out of the mouth of Katie Arrington, The Pentagon’s Chief Information Security Officer for the acquistion policy office. Katie reports up to Kevin Fahey, the Assistant Defense Secretary for Acquisition. He is the guy who is responsible making sure that the Pentagon spends those hundreds of billions of dollars a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of you have probably seen or heard of the threatening email that starts with “Hi, I know one of your passwords is: xxxxx“. The email goes on to say that the email writer has infected the recipient’s PC, including access to the recipient’s webcam. The attacker claims, by virtue of installing the malware on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Database Leaked 179 GB of Personal Data of military personnel, officials and hotel customers. I wish this was a new story. Autoclerk, a Best Western service that manages reservations, revenue, loyalty programs, payment processing and other functions for the hotel chain. left an elastic search database exposed. Hundreds of thousands of guest reservations were exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SIMJacking, the attack where a hacker replaces the SIM card that is associated with your phone in the carrier’s database with the attacker’s SIM card number and then has access to all of your phone calls and text messages, is becoming more popular – because it is profitable. At this point, the carriers have not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the FTC created a settlement with Equifax over the breach in 2017 of the data of close to 150 million people that turned out to be mostly smoke and mirrors, some of the lawsuits are now moving forward showing how bad things were at Equifax. Equifax used a default userid of admin and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Less Than Half of Mississippi State Agencies Even Have a Cybersecurity Policy In Mississippi’s first ever state cybersecurity audit, the state auditor reported dismal results. 54 state agencies did not respond to the audit. 38% of those responding did not encrypt sensitive data. 22 agencies had not conducted a third party security risk assessment. 11 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]