720-891-1663

Why The Software Supply Chain is The Rhinoceros Head in the Corner

As if Yahoo didn’t have enough trouble, it apparently was using a third party software library called ImageMagick which had a serious security bug in it. The library which is used to manipulate images is very widely used.  Or at least, it was.  Some people say that it has not aged well. Security researcher Chris […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Booz | Allen | Hamilton Can’t Catch A Break

In 2013 Booz employee and NSA contractor Edward Snowden flew to Hong Kong after leaking huge quantities of highly classified NSA documents, proving that even the NSA is challenged to keep secrets under wraps.  Those documents are still being dribbled out today. Earlier this year, when the FBI was trying to track down the Shadow […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Guess How Long It Takes For Thieves to Use Stolen Data?

The FTC recently did an experiment to see how quickly thieves used stolen data after it was posted on the dark web. They created 100 fictitious consumers and gave them credit cards or bitcoin wallets.  Each fictitious consumer had a name, email and passwords as well. They posted the data twice – first on April […]

Continue reading → [DISPLAY_ACURAX_ICONS]