On February 15, 2018 a milestone event occurred in New York. For financial institutions licensed in New York (there are about 3,000 of them), The Chairman of the Board, CEO or some other similar executive had to personally sign a document and submit it to the State of New York. The document says that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The heads of the intelligence community – NSA, CIA, FBI and the Defense Intelligence Agency, appearing in front of the Senate Intelligence Committee, said that Chinese smartphones posed a threat to national security. Exactly why they singled out those two Chinese phones, compared to the iPhone, which is likely made in the same factory, is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am always skeptical about these lawsuits. One issue is usually “standing”, but in this case, I don’t think this will be an issue. Often, if the party being sued thinks they are going to lose, they tend to settle, quietly, with no precedent from a court decision. In this case, I predict this one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The head of the UK’s National Cyber Security Center (NCSC), Ciaran Martin, said that a major cyber-attack on the UK is a matter of when, not if. Martin said that the UK had been lucky to avoid a so-called category one (C1) attack. Luck? That’s comforting. A C1 attack is defined as an attack […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cryptocurrency is an interesting beast. Unregulated by governments. Not backed by reserves or governments. Difficult to track IF DONE RIGHT. Completely transparent if not done right. For all of these reasons, it is the target of attackers of all stripes. The first attack this week was in England. Armed robbers broke into the home of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Zyklon malware has been around since early 2016 and it is a nasty bit of business. It mostly arrives as a zip file (if you are not blocking zip attachments at your inbound mail gateway, you should do that now). Assuming it gets in and the use opens the zip file, it exploits three […]
Continue reading →
[DISPLAY_ACURAX_ICONS]