For some people, they don’t really care. For other people, it is a complete invasion of privacy. For both groups, it is happening every day. Apps sometimes ask for permission to read your mail. It could be to get rid of junk mail or clean your mailbox or many other reasons, but in all cases, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco released an announcement that a high severity vulnerability affecting many Cisco ASA firewalls and Firepower security appliances has a proof of concept available in the wild. This means that even amateurs can take that code, modify it a bit and successfully either force your firewall to randomly reboot or to steal credentials from that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
People thought they were going crazy. Their air conditioner randomly turned off. The combination on their door lock changed every day. The doorbell kept ringing even though no one was there. These are all symptoms of domestic abuse where one partner understands how to use those technical toys against the other partner. And, in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Thousands of Android and iPhone mobile apps use the Firebase database. The database runs in the cloud and, apparently, by default has no security. The net effect of this is that 100 million records, or more, are exposed for anyone to capture. Firebase, a database run by Google, is very popular with Apple and Android […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Maybe we should call it a dumpster fire, but whether we call it a shipwreck or a dumpster fire, it is a mess. According to pen testers, shipping industry security is where mainstream IT was years ago. The pen testers say that the attacks are TRIVIAL to execute an easy to mitigate against. These ships […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A story that seems to be repeated with way too much frequency is cryptocurrency attacks. This is because most users don’t understand how easy these attacks are. I am aware of *NO* attacks that compromised the cryptography of cryptocurrencies. Always it is the software. Sometimes on the user’s side. Other times on the exchange’s side. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]