What could go wrong? As we rush headlong to deploy billions of Internet of Things devices with no regard to security, that doesn’t make security problems go away. Security researchers today disclosed nine vulnerabilities affecting implementations of the Domain Name System protocol in popular TCP/IP network communication stacks running on at least 100 million devices. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well that is certainly not a comforting thought. Last month the public water supply in a small town in Florida was hacked. Only PURE DUMB LUCK protected those citizens. Did the hacker use exotic unknown vulnerabilities to compromise the system? No. The city didn’t even have a firewall, was using software that was no longer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ubiquiti All But Confirms Breach Story As the stories about Ubiquiti’s really bad attempts to save their reputation after a breach earlier this year swirled, they were completely silent, other than a very short statement. Now they have posted a statement on their user forum that says that they have no evidence that customer information […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Fitch Ratings, one of the big creditworthiness ratings firms for businesses, published an alert today regarding the impact of cyberattacks on an organization’s creditworthiness. Their ratings affect an organization’s ability to borrow money because they are worried that unexpected events like cyberattacks could pose financial and operating risks that ultimately affect an organization’s ability to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
China Bans Military and Government from using Teslas – Due to ‘Spying’ The WSJ is reporting that the Chinese government has restricted the use of Tesla vehicles near or in sensitive installations like military and government facilities. The theory is that the cameras on Teslas could be used for spying. Tesla, of course, denies that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
That is a great name and it well describes what we are dealing with. The Solarwinds attack worked because it took advantage of a supply chain that no one understands; not even the people within it. Think back to Equifax. That happened because they did not understand a piece of software, which was vulnerable, was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]