Jackson County Pays $400,000 in Ransomware Following a ransomware attack on March 1st, 2019, Jackson County, Georgia decided to pay hackers a ransom of $400,000. The county population is 67,000 according to Google. While hackers may not be explicitly targeting these small municipalities, they may be. After all, small municipalities likely have poor cybersecurity practices […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers have figured out how to attack Office 365 and Google G-Suite accounts protected by Multi Factor Authentication (MFA). No, this is not a bug in some software and no it is not hyper-sophisticated attack. In fact, it is very old school. First, as best I understand, it is a limited attack so it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As an experiment, researchers at the University of Bonn posed as a client trying to develop software. They hired 43 freelance software developers from Freelancer.com for either 100 Euros or 200 Euros. They asked the freelancers to develop a small part of a fictitious web site, the site’s registration system. Since this was a university […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lets assume your company uses Box Enterprise – just as an example. And then assume that your employees create a file or a folder and want to share it with someone, so they create a link. In the case of Box, the link URLs can be randomly generated or created by the user. A little […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Commerce Department Wants Companies to Publish Ingredients of their Software The Commerce Department is trolling around the RSA conference trying to get companies to publish the ingredients in their software – the so called bill of materials that I have written about before – so that users can understand what libraries are being loaded. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As people use their mobile devices as what one friend used to call a “pocket super computer” as opposed to something where you dial 7 digits (remember that) and talk to someone, hackers have figured out that the new attack vector is your phone. In part, this is due to the fact that finally, after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]