Meltdown and Spectre, the twin vulnerabilities affecting Intel and many other processors, has been a moving target. Patches followed by “unpatches” when those patches caused computers to reboot randomly. Then there were the software patches that slowed down computers by from 5% to 30%. The process of mitigating these vulnerabilities has been way more complicated […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Orbitz announced today that hackers accessed customer data including credit cards submitted to one of their websites between January 2016 and June 2016 and data on an Orbitz partner web site between January 2016 and December 2017 – two years worth of data. They estimate it to be around 880,000 cards, but they, apparently, don’t […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It seems like we are seeing this again and again – a vendor sets up some Amazon storage and sticks some data in it. Sometimes the vendor forgets about it or the employee responsible for it leaves and the data is basically orphaned. In this case the data was new, so it was not orphaned. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With all the news lately about the Russians trying to change the outcome of the elections (like, I might add, the U.S. has been trying to do around the world for decades – think of the Shah in Iran, the Congo elections, Chile and many others – see here), the real question is can the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just a few years ago most people had not even heard about ransomware. Today, if you have not been hit by a ransomware attack, you certainly have heard about attack after attack. Ranging from massive attacks that affected companies like Fedex and Merck pharmaceuticals to hospitals to little mom and pop stores, ransomware is the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of the time software license agreements say “we are not responsible for anything that might happen”. In fact, most license agreements say that it is up to the user to figure out if the software is even appropriate for whatever the user plans to use it for. So what would happen if a software […]
Continue reading →
[DISPLAY_ACURAX_ICONS]