Israeli Researchers have disclosed two new Bluetooth attacks that only require you to be in the neighborhood to work. The attacks exploit flaws in Bluetooth Low Energy (BLE) chips made by Texas Instruments. The chips are used by companies like Cisco, Meraki and Aruba in their corporate solutions. The chips are also used in pacemakers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You have probably heard about Business Email Compromise (BEC) attacks where scammers pose as company executives and ask the accounting department to wire money to them. The FBI says this is highly effective and big business. To the tune of $5 billion in losses since 2013. In fact the SEC discovered that 9 publicly traded […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Normally I would send this out as a client alert, but given the enormity of this, I think it needs wider distribution. PHP is the “P” in the LAMP web server stack as in Linux, Apache, MySql and PHP. PHP is the scripting language turned programming language that many web servers run on. January 1, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hacking is a moving target. And continues to move. As banks consider using biometric authentication in the place of passwords, hackers are thinking about that too. Researchers at Black Hat demonstrated that they could synthesize your voice well enough to fool personal digital assistants. Already there are products on the market from Adobe, Baidu, Lyrebird, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since Office 365 is the dominant office productivity suite, knocking Google on it’s butt, it is not a surprise that hackers are going after it hard. To compare, I didn’t find great numbers and Google probably does not want me to do this comparison, but Office has 120 million paid users as of 2017 and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lack of Vendor Cyber Risk Management Hurts over 750 Banks TCM Bank, a company that helps hundreds of small banks issue credit cards had a problem with their third party vendor – the bank’s fourth party vendor risk. The small bank wants to issue credit cards so they hire TCM and TCM hires someone else […]
Continue reading →
[DISPLAY_ACURAX_ICONS]