720-891-1663

It’s Going to be Painful, And It’s Going to Cost Money

These are the words right out of the mouth of Katie Arrington, The Pentagon’s Chief Information Security Officer for the acquistion policy office.  Katie reports up to Kevin Fahey, the Assistant Defense Secretary for Acquisition.  He is the guy who is responsible making sure that the Pentagon spends those hundreds of billions of dollars a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Sextortion Botnet Spreads 30,000 Emails an Hour

Most of you have probably seen or heard of the threatening email that starts with “Hi, I know one of your passwords is: xxxxx“.  The email goes on to say that the email writer has infected the recipient’s PC, including access to the recipient’s webcam. The attacker claims, by virtue of installing the malware on […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 25, 2019

Database Leaked 179 GB of Personal Data of military personnel, officials and hotel customers. I wish this was a new story.  Autoclerk, a Best Western service that manages reservations, revenue, loyalty programs, payment processing and other functions for the hotel chain. left an elastic search database exposed. Hundreds of thousands of guest reservations were exposed […]

Continue reading → [DISPLAY_ACURAX_ICONS]

As SIMJacking Increases, So Do Lawsuits

SIMJacking, the attack where a hacker replaces the SIM card that is associated with your phone in the carrier’s database with the attacker’s SIM card number and then has access to all of your phone calls and text messages, is becoming more popular – because it is profitable. At this point, the carriers have not […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 18, 2019

Less Than Half of Mississippi State Agencies Even Have a Cybersecurity Policy In Mississippi’s first ever state cybersecurity audit, the state auditor reported dismal results.   54 state agencies did not respond to the audit.   38% of those responding did not encrypt sensitive data.  22 agencies had not conducted a third party security risk assessment.  11 […]

Continue reading → [DISPLAY_ACURAX_ICONS]