The hackers seem to be winning. One solution I have advocated for over the last many years to reduce credit card fraud is a technique called credit card tokenization. When a merchant accepts a credit card, that card information is immediately tokenized and that token is all that the merchant keeps. If they need to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A security researcher has found, he thinks, years worth of customer data available on Craigslist. Not exactly the dark web. The servers were from bankrupt computer store chain NCIX. The seller had, supposedly, hundreds of servers that were in storage. The storage company owner was selling the servers after NCIX did not pay their storage […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes the gift that keeps on giving is good. Other times, it is not so good. In this case, it is not so good. You may remember the Wannacry ransomware attack last year. That virus, which took many organizations back to the stone age of computing (i.e., a pencil and paper), infected and took down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
How, Exactly, Would the Government Keep a Crypto Backdoor Secret? The Five Eyes (US, Canada, Australia, New Zealand and Great Britain) countries issued a statement last week saying that if software makers did not voluntarily give them a back door into encrypted apps they may pursue forcing them to do that by law. Australia and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While we all know about the Equifax breach last year that compromised the data of almost 150 million people and businesses, until today we did not know about the Equifax hack two years earlier. In the earlier hack, former employees – actually Chinese spies – stole thousands of pages of documents including plans for new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers have figured out how to hack a Telsa’s key fob in under two seconds. That’s impressive. Remotely. I think in this case remotely means that they do not have to touch the fob or the car, but they have to be pretty damn close to it – in radio range of the fob. Still, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]