In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells. Backdoors are unauthorized ways to get into these systems in a way that bypasses security. Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week I started a series on steps to comply with both the E.U.’s General Data Protection Regulation or GDPR and California’s new privacy law, the California Consumer Protection Act or CCPA. To find Step 1, go to this post: https://cybercecurity-mitch-tanenbaum-blog.com/complying-with-gdpr-and-californias-new-privacy-law-ccpa-step-1/ . This week, on to Step 2 – CREATE A VENDOR CYBER RISK MANAGEMENT PROGRAM […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sextortion is the act of convincing vulnerable people, often teenagers, to provide the sextortionist with sexually explicit photographs and videos under the threat of releasing other embarrassing material, such nude pictures that may already privately exist in the victim’s email, text messages or private social media. The attacker does this by convincing the victim that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This seems to be a recurring topic, but it doesn’t seem to be getting any better, so I will leap back into the fray. Last month Ticketmaster announced they had a breach and they led people to believe that it was isolated and that it had something to do with their software. According to RiskIQ, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Police think that hackers hacked the pumps at a Detroit area gas station allowing drivers to get free gas. Ten cars figured it was okay to steal gas from “The Man” to the tune of about 600 gallons. While 600 gallons of gas is not the end of the world, it does make a point. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you can’t beat them on the battlefield, beat them in cyberspace. Israel has accused Hamas of creating a fake dating app and targeting both male and female Israeli soldiers to download the app. Once installed, the app has the ability to see the soldier’s location, contact list and to use the phone as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]