Signalling System 7 or SS7 is the communication system that telephone carriers, both cellular and land line, use behind the scenes to route calls. Originally developed in 1975 – way before the Internet was popular – SS7 has virtually no security in it. It counts on securing the connections between telephone company switches, which, in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CCleaner is a very popular disk utility that allows a user to securely erase certain content from their hard drives – like deleted files and cookies, among many other things. Coming in both a free and paid version, CCleaner has been used safely by users for years. Last month, however, hackers managed to inject malware […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Update to who may be affected. On October 10th, 2017, the Guardian is reporting that while Deloitte has only admitted that they have notified six clients, sources are saying that the server that was compromised contained emails for 350 clients, the US Departments of State, Energy, Homeland Security and Defense, The US Postal Service, The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Viacom is playing down the significance of this, but that could just be damage control. One of our favorite security researchers, Chris Vickery, discovered yet another Amazon S3 storage bucket unprotected on Amazon. In this case, it did not contain non-public personal information of customers, according to Viacom. They touted this as a good thing, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the MANY lessons to be learned from the Equifax breach is how not to handle a breach. Here is just one of those lessons and it is a lesson for BOTH users and webmasters. NOTE: TO SEE A BIGGER IMAGE OF ANY OF THE PICTURES IN THIS POST, JUST CLICK ONCE ON THE […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many employees use consumer grade, unmanaged cloud services such as Dropbox and Google Drive as part of their work. This is sometimes called BYOC for Bring Your Own Cloud. It is convenient, but is it a good idea for the business? Loss/theft of intellectual property – One of the obvious risks of BYOC is the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]