If you have about $12 to spare, you can eavesdrop on many wireless USB keyboards. That means that you can capture web sites, userids, passwords, socials, credit card numbers and anything else someone might type in. The problem with the USB keyboard (and likewise USB mouse) standards is that the standard didn’t say anything about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A thousand-fold increase in crypto malware (AKA ransomware) is a pretty impressive number. The reason is that it is like taking candy from a baby – not very hard. Rather than having to figure out how to break into a computer, then figure out where the juicy data is, next getting it back to you without […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While Disney probably thinks that their 350,000 or so users who got hacked is a big thing, in the grand scheme of things, it is not so big. The Playdom site is the official forum for Starwars, Marvel and other Disney games. It is kind of surprising that there were only 350,000 names hacked. First, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Jonathan Zdziarski wrote about an implementation challenge for the security conscious among us. While Whatsapp does delete the message when you tell it to, it leaves artifacts behind. Whatsapp and other phone apps use the SQLLite database. SQLLite, likely to reduce wear in your phone’s memory, doesn’t actually delete the message, but rather just marks […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In 2013 a disgruntled Citibank employee decided to get even. Lennon Ray Brown, 38, who worked for Citi during 2012 and 2013 in the Dallas area, decided to teach the bank a lesson. On December 23, 2013, Brown sent a set of commands to 10 of the Citi global core routers. Those commands erased […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As more and more breaches happen every month, businesses everywhere need to consider what would happen if their company had a breach. Here is advice from the national law firm of Perkins Coie. Is the breach reportable? The list of data items which, when compromised, triggers a reportable breach keeps growing. For example, this year Illinois […]
Continue reading →
[DISPLAY_ACURAX_ICONS]