Minneapolis City Web Sites Hit by Denial of Service Attacks Last Thursday, early in the morning, a number of City of Minneapolis web sites were disabled by denial of service attacks. The attacks are short lived and the city was able to restore most of the services within a few hours. It is certainly possible […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given that over 40 million Americans filed for unemployment in the last two months, they are likely a fair number of resumes being emailed around. For those people who have been affected by the virus, many of them likely had to fill out medical leave forms. So how can a hacker take advantage of this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I keep saying that ransomware is morphing; that the ransomware that we have known for the last many years is no more. It used to be that the hackers could get people to pay by encrypting their data, so people started doing better with backups. Not necessarily great, but better. So last year one hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Have Access to iOS 14 Months Before You Will Apple gives developers early prototypes of their new software so that Apple doesn’t have a disaster on its hands when the new software is released and user’s applications no longer work. Unfortunately, some developers sell those phones – or at least access to them – […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About a year ago the Governor of New York signed the SHIELD act into law. Among other things, the law broadened the definition of a breach to include ACCESS to the data, not just stealing it. It also broadened the definition of personally identifiable information. Notice that no one talks about non-public personal information any […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AG Says They Unlocked Shooter’s iPhone Without Needing Apple to Hack Their Security For a couple of decades the FBI and Justice Department has been saying that software vendors need to insert backdoors into their security software to make it easier for the government to hack it if they want to. One high profile case […]
Continue reading →
[DISPLAY_ACURAX_ICONS]