Former WaPo columnist turned security sleuth (after the Washington Post eliminated his position because cyber security was not important) reported on several recent vishing (voice phishing) scams, two of which involved large sums of money. These are a word to the wise, both personally and for businesses. In the first case, Matt Haughey, creator of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There are people who think open source is the holy grail of software, I am not one of them. Apparently hackers agree with me. So does the Department of Defense. They have even coined a term – SCRM or Supply Chain Risk Management. Bottom line, developers need to understand that there is a war out […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The hackers seem to be winning. One solution I have advocated for over the last many years to reduce credit card fraud is a technique called credit card tokenization. When a merchant accepts a credit card, that card information is immediately tokenized and that token is all that the merchant keeps. If they need to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A security researcher has found, he thinks, years worth of customer data available on Craigslist. Not exactly the dark web. The servers were from bankrupt computer store chain NCIX. The seller had, supposedly, hundreds of servers that were in storage. The storage company owner was selling the servers after NCIX did not pay their storage […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes the gift that keeps on giving is good. Other times, it is not so good. In this case, it is not so good. You may remember the Wannacry ransomware attack last year. That virus, which took many organizations back to the stone age of computing (i.e., a pencil and paper), infected and took down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
How, Exactly, Would the Government Keep a Crypto Backdoor Secret? The Five Eyes (US, Canada, Australia, New Zealand and Great Britain) countries issued a statement last week saying that if software makers did not voluntarily give them a back door into encrypted apps they may pursue forcing them to do that by law. Australia and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]