The FTC recently did an experiment to see how quickly thieves used stolen data after it was posted on the dark web. They created 100 fictitious consumers and gave them credit cards or bitcoin wallets. Each fictitious consumer had a name, email and passwords as well. They posted the data twice – first on April […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who are not familiar with the OWASP Top 10, it is a great set of vulnerabilities to check your web application for. If your software QA team, in addition to the normal functional stuff that they check for can also check for these exposures, that will likely catch a number of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Is it possible that North Korea used stolen NSA hacking tools to infect medical devices at U.S. hospitals? Forbes says, yes it is. When the WannaCry ransomware spread out of control last week infecting 48 hospital trusts in the UK and unnamed medical facilities in the U.S. for the most part U.S. businesses were not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Chipolte seems to be challenged to catch a break. After the E.coli outbreak in 2015 and shareholder lawsuits, Chipolte tried to make a comeback. Last month the announced that they had been hacked and credit cards compromised. Chipolte hasn’t said which restaurants were affected or how many cards were compromised, but they have announced the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You have likely been subjected to websites that use so called “out of wallet” questions to validate that you are who you say you are. Sometimes those questions are used to allow you to reset your password and other times those questions are used when you set up your account in the first place. Examples […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the breaches at Target, the IRS, Chipolte and others made the news during 2017, small business breaches were up over 40% between 2015 and 2016 and doesn’t show any signs of letting up. Given that, here are some reasons why small businesses should have cyber risk insurance. #1 – Small businesses do not have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]