All of us are used to using the Internet, right? What if you moved into your new home and after you paid for it and moved in you found out there was no Internet service available? One business in New York was told that Charter Communications, the local cable provider, would be happy to connect […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While I have written about this in general before, this item is specific to the Land Rover and its “Discovery” model. If this is a surprise to you, it should not be. If you buy a used Land Rover, it is possible (likely) that the previous owner can still control your car through the Land […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Enterprise Resource Planning (ERP) systems are quickly becoming a popular target of hackers. It used to be that these systems were on private networks behind firewalls, but as companies move to the cloud and include their vendors and subcontractors in their ERP systems, the systems are becoming more public. More public means easier to hack. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I wrote last week, LabCorp, the mega medical lab testing company (mega as in revenue around $10 billion last year) was breached and they have provided some interesting insights as they have been forced to detail to the SEC some of what happened last week when they had to shut down large parts of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells. Backdoors are unauthorized ways to get into these systems in a way that bypasses security. Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week I started a series on steps to comply with both the E.U.’s General Data Protection Regulation or GDPR and California’s new privacy law, the California Consumer Protection Act or CCPA. To find Step 1, go to this post: https://cybercecurity-mitch-tanenbaum-blog.com/complying-with-gdpr-and-californias-new-privacy-law-ccpa-step-1/ . This week, on to Step 2 – CREATE A VENDOR CYBER RISK MANAGEMENT PROGRAM […]
Continue reading →
[DISPLAY_ACURAX_ICONS]