The last presidential administration went hard after China – applying sanction after sanction, but with minimal success. They also seemed to give Russia a free pass. Many of the very public recent hacks are being attributed to Russia, including SolarWinds and Kaseya. When Biden met with Putin in Helsinki last month, the two agreed to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the recent series of supply chain attacks (actually going back to 2011 at least), speed is crucial. SolarWinds, Microsoft Exchange, Kayesa and others. This weekend’s attack against MSP software provider Kaysera is a perfect example of why speed is so important. Many small and medium sized companies are dependent on managed service […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
WD NAS Devices Are Being Wiped Worldwide The downside of using computers beyond their end of support is that you can get hacked and all of your data can get wiped. This is what has happened to many WD My Book owners. Western Digital stopped patching them in 2015 and hackers have figured out how […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Okay, you are probably tired of hearing me rant about software supply chain but it is a huge source of hacks. Big hacks like SolarWinds and Microsoft Exchange, but mostly small hacks that we never figure out what the source is. Reseachers looked at what developers actually do. The analyzed 13 million scans of 86,000 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Paying Ransom is Tax Deductible Under current IRS regulations, paying cyber ransom after a hack is deductible, just like losses from a robbery, but the IRS is “looking into it”. One way the government could discourage ransom payments is if the cost is borne fully by the company’s owners. They still might choose to do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mobile finance apps are very popular, but are they safe? A report by security company Intertrust says that 88% of the apps tested failed at least one of the cryptographic tests, meaning that the encryption can be broken, resulting in loss of privacy and possibly loss of your money. Some of the other findings from […]
Continue reading →
[DISPLAY_ACURAX_ICONS]