Russia Arrests Some REvil Gang Members At this point we don’t know who they ticked off, but Putin’s goons arrested 14 people and seized 426 million Roubles (about $5.5 million), $600,000 USD, 500,000 euros, computers and 20 cars. These guys definitely will not be getting a Christmas card from Vlad next year. Credit: Yahoo News […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Law enforcement has been trying since at least the 1990’s when they jailed and tried to convict Phil Zimmerman for creating an open source encryption program called PGP, to put the encryption genie back in the bottle. The problem is that encryption is math and math doesn’t care about politics. If some governments were to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Sending Malware Filled USB Sticks in the Mail Old, tried and true techniques continue to work as hackers have been sending malware-filled USB sticks in the mail and UPS to defense, transportation and insurance companies, hoping someone did not do their security awareness training and plugs the drive into their computer. It just shows […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Senator Chris Van Hollen (Maryland) wrote a letter to Commerce Secretary Raimondo asking what she planned to do about this security vulnerability – the first we are hearing about it. Raimondo could ban the equipment, just like equipment made by Huawai and others. Chinese electronics maker Yealink is not a household word like Huawei, but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Don’t Copy-Paste Commands from a Web Page – You can Get Hacked People often copy-paste data from a website into some other place like a command prompt or another browser window, but a researcher has demonstrated how a malicious website could change the data in the paste buffer, causing you to execute something that you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Software released by Microsoft and other vendors is digitally signed so that users can validate that it really came from the vendor in question and that it has not been modified since the vendor created it. However, hackers have figured out how to bypass the security provided by Microsoft’s digital signature verification process, allowing them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]