You would think after all the stories about data breaches that companies would not be asking you for your personal information via email. As long as people will do it, companies will ask. After all, it is easy and when easy fights with secure, easy almost always wins. In the source article for this post […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well, not exactly, but close. And it was not due to pictures of Kim Kardashian. Here is what happened. When you type in the name of a website to visit, say Facebook.com, the Internet needs to translate that name into an address. That address might look like 157.240.2.35 . The software that translates those names […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to Buzzfeed, nine days after Hillary Clinton had won big on Super Tuesday, the Russians launched their cyber attack on her campaign. The Russians sent malicious emails to all of her senior campaign staff. The emails looked like standard Google GMail emails alerting to suspicious activity on their accounts and asked them to click […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You’ve probably heard about credit card skimmers that hackers attach to everything from gas pumps to ATMs to self checkout terminals at grocery stores, all in an effort to steal your credit card info. As more stores go to chip based credit cards where stealing the information off the stripe won’t let hackers use that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are combining the Internet of Things with a 12 year old open source software bug and creating a potential mess. Last week tens of thousands of hacked Internet of (in-secure) Things devices created a 600 gigabit per second attack against a security blogger’s web site and just after that, these devices created a terabit […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the Cloud has an amazing number of advantages, it is important to remember that it is hard to see inside a cloud and what you can’t see could hurt you. I was recently involved in responding to a potential email compromise where the company was using cloud based email. While this cloud based email […]
Continue reading →
[DISPLAY_ACURAX_ICONS]