Doxing is defined as the publishing of identifying information with malicious intent. Last week “threats” were made against 5 Denver area colleges. The colleges (Arapahoe Community, Community of Aurora and Denver, Front Range Community and Red Rocks Community) either closed their campuses and forced people to leave the campus or went into lockdown. Even though […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Remember the Equifax breach a few years ago? Almost 150 million people were affected. Now its competitor is under the microscope. The class action microscope. A class action has been filed that says that Experian did little to prevent account takeovers by bad guys. The suit, quoting Brian Krebs’ blog (yes, really), says that hackers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Emergency Alert System Has a Minor Bug Homeland Security has issued an alert that there are critical vulnerability in the Emergency Alert System encoder and decoder devices. If left unpatched, it would allow a hacker to issue fake warnings of emergencies. The EAS is the nationwide alert system that is used to warn citizens […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
TSA Updates Cybersecurity Guidelines for Pipeline Operators After the Colonial Pipeline meltdown last year, TSA, who regulates pipeline cybersecurity (don’t ask), issued a set of regulations for pipeline operators to follow. Given that TSA had less than a dozen people in their cybersecurity department and zero industrial IoT expertise, it is not a surprise that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Voyager Digital is a cryptocurrency “bank”. It isn’t regulated like a bank, which a problem for users. The have debit cards and make loans. They trade crypto. Accept deposits. They also offered insane “rewards” (12%) so they could invest in the crypto space. In order to fuel these crazy payouts, they had to make risky […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As loss payouts on cyber policies continue to increase, carriers are looking for ways to get out of paying. Since cyber insurance is a non-standard-form policy, you really have to read it carefully to understand whether you are complying. For example, in reviewing one client’s policy, we discovered that if the client did not perform […]
Continue reading →
[DISPLAY_ACURAX_ICONS]