In 2018 Bloomberg ran a story that claimed that China had embedded tiny microchips on Supermicro computer server processor boards in 2015. Everyone denied it – Supermicro, the intelligence community (IC), China. Supply chain attacks seem to be everywhere these days and this is another one. I don’t know if it is true, but why […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SIM swap attacks is a hacking technique where hackers socially engineer cell phone providers to steal a victim’s phone number. That means that hackers get the victim’s text messages and phone calls. While two factor authentication is not used by the majority of people, when it is used, the most common form of two factor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Beazley is one of the largest cyber risk insurance providers in the country and publishes periodic reports on claims that they see. Here is a summary of what they saw. Ransomware evolved during 2020, reaching new levels of complexity. Rather than getting an employee to click on something, they hack the network, install malware that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The average car or light truck has somewhere between 50 and 200 computers in it, depending on the model. Those computers both create data and consume data. Sometimes that fact can be quite useful. In 2017 the body of a mechanic, Ronald French, was found in a cornfield in Kalamazoo County, Michigan. For more than […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
At the beginning of the pandemic (can you remember that far back), Teams had about 32 million daily users and was trying to compete with Slack. As of December, Teams had an estimated 115 million daily users. Teams is the defacto communications and collaboration app for anyone using Office or Microsoft 365. As of December, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Of course your first answer is no. Internal systems are only visible internally. But you made changes in a hurry to deal with Covid. Here is the story of one researcher. He is the head of hackers at an ethical hacking firm, Intigriti. Companies use software like JIRA and Asana to create tickets for all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]