Hacking and Stealing Your Car From the Outside Through Your Headlight Apparently this is real. Crooks can pop off the headlight trim on some cars and get access to the cables to your “smart” headlights. From there they have access to the data bus called the CAN bus and from there they can unlock and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The False Claims Act (FCA) is a Civil War era law that both penalizes companies for lying about their cybersecurity protections and rewarding whistleblowers for turning in fraudsters. In 2021 the Justice Department created a new initiative to stem civil-cyber fraud. One of the beneficiaries of that is the Defense Department which has been plagued […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I talk all the time about third-party or supply chain breaches and there is serious impact to them. Here is one example going on now. Change Health is a healthcare payment facilitator among other services. They are used by doctors, pharmacies and hospitals to get paid. Change is owned by Optum Health which, in turn, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A large and revealing leak from China was released earlier this month. It shows how much the hacking world in China has turned into a business. The company, i-SOON, was the victim of a leak. So sad! Not! The hacker posted a collection of 500 internal documents to GitHub. The documents reveal details of China’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI touted just last week that they had taken down LockBit and replaced the servers with ones that offered free decryption keys and sunshine for all. It didn’t last long. The Russia-based hackers have reconstituted themselves and have new servers. It is true that the FBI and Europol and others did take down their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]