Wired ran a piece a few weeks ago with the title of this post. An alternative title might be “How to get yourself arrested and prosecuted“. While Wired’s heart was in the right place, they probably should have consulted an attorney before they published the article. The basic premise of the article is that you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this week Equifax, the credit reporting giant, announced that hackers wandered inside their systems between May and July of this year. 143 million records were compromised. In addition to that, credit card numbers on 200,000 people were compromised and personal identifying information on 182,000 people were also released. Information compromised includes names, Social Security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week I wrote about an incident with a vendor to the City of Chicago who left close to two million voter records exposed on Amazon and how the vendor, in spite of the initial mistake of exposing the data, handled the breach very well (see blog post). Today we have another case and, this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Web browsers have become the center of our daily Internet universe. But browsers, by themselves, are often not sufficiently powerful to do what people want them to do. Enter the world of plugins or addins or browser extensions. These little bits of code allow a browser to do something that they were not designed by […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at Bitdefender say that they have uncovered two vulnerabilities in low cost Chinese cameras. One of the cameras is used in the iDoorbell – which represents a software supply chain issue on top of it. The cameras come from Shenzen Neo Electronics. Researchers suspect that other cameras are affected as well. Using the search […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Business email compromise (BEC) attacks are relentlessly attacking businesses with no let-up in sight. BEC attacks have traditionally used CEOs and CFOs as their foils, pretending to be them and getting people to wire money to the hackers. The oil and gas industry was targeted by a single individual using old generic malware readily […]
Continue reading →
[DISPLAY_ACURAX_ICONS]