According to Buzzfeed, nine days after Hillary Clinton had won big on Super Tuesday, the Russians launched their cyber attack on her campaign. The Russians sent malicious emails to all of her senior campaign staff. The emails looked like standard Google GMail emails alerting to suspicious activity on their accounts and asked them to click […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You’ve probably heard about credit card skimmers that hackers attach to everything from gas pumps to ATMs to self checkout terminals at grocery stores, all in an effort to steal your credit card info. As more stores go to chip based credit cards where stealing the information off the stripe won’t let hackers use that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are combining the Internet of Things with a 12 year old open source software bug and creating a potential mess. Last week tens of thousands of hacked Internet of (in-secure) Things devices created a 600 gigabit per second attack against a security blogger’s web site and just after that, these devices created a terabit […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the Cloud has an amazing number of advantages, it is important to remember that it is hard to see inside a cloud and what you can’t see could hurt you. I was recently involved in responding to a potential email compromise where the company was using cloud based email. While this cloud based email […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Recently, Brian Krebs (KrebsOnSecurity.com) was hit with a massive denial of service attack. The site went down – hard – and was down for days. His Internet Service Provider kicked him off, permanently. The attack threw over 600 gigabits per second of traffic at the site. There are very few web sites that could withstand […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A small New England retailer learned about ransomware the hard way. After an employee clicked on a link, that system was infected with Cryptowall. The malware encrypted, among other files, the company’s accounting software. The accounting software did not live on that user’s computer; it lived on the network, but since that user had access […]
Continue reading →
[DISPLAY_ACURAX_ICONS]