Hacking is a moving target. And continues to move. As banks consider using biometric authentication in the place of passwords, hackers are thinking about that too. Researchers at Black Hat demonstrated that they could synthesize your voice well enough to fool personal digital assistants. Already there are products on the market from Adobe, Baidu, Lyrebird, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since Office 365 is the dominant office productivity suite, knocking Google on it’s butt, it is not a surprise that hackers are going after it hard. To compare, I didn’t find great numbers and Google probably does not want me to do this comparison, but Office has 120 million paid users as of 2017 and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lack of Vendor Cyber Risk Management Hurts over 750 Banks TCM Bank, a company that helps hundreds of small banks issue credit cards had a problem with their third party vendor – the bank’s fourth party vendor risk. The small bank wants to issue credit cards so they hire TCM and TCM hires someone else […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Old Hacks Never Die Brian Krebs is reporting that state government agencies are receiving malware laced CDs in the mail, hoping that someone is curious enough to place it in their computer and infect it. This is an older version of a ploy that is still common of dropping malware infected flash drives in areas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
All of us are used to using the Internet, right? What if you moved into your new home and after you paid for it and moved in you found out there was no Internet service available? One business in New York was told that Charter Communications, the local cable provider, would be happy to connect […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the ongoing saga of IoT security (The score is bad guys: a whole bunch, good guys: not very many), the bad guys continue to win. Researchers analyzed Samsung’s house management hub called SmartThings and found 20 problems. The researchers, part of Cisco, said that the attacks are complex and require the attackers to chain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]