720-891-1663

Security News for the Week Ending May 22, 2020

AG Says They Unlocked Shooter’s iPhone Without Needing Apple to Hack Their Security For a couple of decades the FBI and Justice Department has been saying that software vendors need to insert backdoors into their security software to make it easier for the government to hack it if they want to. One high profile case […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 13, 2019

Facebook/Cambridge Analytica Suit Moves Forward Facebook tried to convince a judge that when users share information privately on Facebook they have no expectation of privacy.  The judge didn’t buy it and the suit against Facebook moves forward.  Source: Law.com  (registration required) Equifax Quietly Added More Hoops for you to get your $0.21 Yes, if everyone […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 6, 2019

Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10.  For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request.  So yet another reminder that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Phone Apps Collect User Data Even If You Deny Permissions

All smartphones are data collection machines; hopefully everyone understands that.  There are an amazing number of sensors on the device and many apps just ask for everything.  If the user grants that, then the app can harvest all that data and likely sell it, either individually or in the aggregate. Researchers took a tiny sample […]

Continue reading → [DISPLAY_ACURAX_ICONS]

One in Three Companies Suffered Data Breaches Due To Mobile Malware

As people use their mobile devices as what one friend used to call a “pocket super computer” as opposed to something where you dial 7 digits (remember that) and talk to someone, hackers have figured out that the new attack vector is your phone. In part, this is due to the fact that finally, after […]

Continue reading → [DISPLAY_ACURAX_ICONS]