720-891-1663

The Crypto Malware Revolution – A Thousand Fold Increase

A thousand-fold increase in crypto malware (AKA ransomware) is a pretty impressive number.  The reason is that it is like taking candy from a baby – not very hard.  Rather than having to figure out how to break into a computer, then figure out where the juicy data is, next getting it back to you without […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Encryption – The Devil Is In The Details – Listen Up Whatsapp and iMessage

Jonathan Zdziarski wrote about an implementation challenge for the security conscious among us.  While Whatsapp does delete the message when you tell it to, it leaves artifacts behind.  Whatsapp and other phone apps use the SQLLite database.  SQLLite, likely to reduce wear in your phone’s memory, doesn’t actually delete the message, but rather just marks […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Data Breach Incident Response: Questions and New Laws

As more and more breaches happen every month, businesses everywhere need to consider what would happen if their company had a breach.  Here is advice from the national law firm of Perkins Coie. Is the breach reportable?  The list of data items which, when compromised, triggers a reportable breach keeps growing.  For example, this year Illinois […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Health and Human Services Issues New Guidance on Ransomware

The U.S. Department of Health and Human Services Office of Civil Rights, the government entity that manages the privacy of health care information that you share with doctors and others, has issued new guidance on ransomware. While technically, it only applies to organizations that they regulate, in reality, almost everything they said applies equally to […]

Continue reading → [DISPLAY_ACURAX_ICONS]