720-891-1663

Is Your Mobile Phone App Secure? Probably Not!

More than three-fourths of mobile banking vulnerabilities can be exploited without physical access to the phone. A new report from Positive Technologies has a number of sobering facts: 100 percent of mobile banking apps contain code vulnerabilities due to a lack of code obfuscation. NONE of the mobile banking apps tested had an acceptable level […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Ripple20 Vulnerability Affects 100s of Millions of IoT/IIoT and Medical Devices

If that headline doesn’t scare you, it should. Ripple20 is a family of 19 vulnerabilities that are part of a library that is used in medical devices, home automation devices, oil & gas controls, networking devices and other industrial control devices. The bugs are in a library that was developed in the 1990s and is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Your Cybersecurity is Likely Better Than the CIA’s Was. Or is?

The Vault 7 leak, in which Wikileaks posted information about a large number of CIA hacking tools was possibly the worst national security compromise the Agency has ever seen. Not only did it reveal our techniques for hacking foreign systems but the hackers repurposed those tools and hacked American and other friendly companies and governments. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Who Wants to Hear Fiction About System Recovery Time

A survey of small and medium size businesses asked executives about their Recovery Time Objectives or RTOs. A company’s RTO represents the amount of time a system, such as a web site, can be down after an incident. The incident could be a software error, hardware failure, ransomware attack or many other things. Here are […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Internet of Trouble (IoT)

As IoT devices proliferate, a lot of them don’t get updated. Ever. Some IoT devices automatically update themselves, but a lot of them do not have the smarts to do that. Hopefully all of them talk to their controller over HTTTPS – encrypted traffic. But there is a problem with that. HTTPS certificates expire and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Ransomware Groups Turn into Cartels

As the Maze ransomware group continues to hit new targets like banks and defense contractors, among many others, those companies, in many cases, decide to restore their systems from backups and not pay the ransom. So Maze decided to nuance their crime and steal (or exfiltrate) the data before encrypting it. That way, if the […]

Continue reading → [DISPLAY_ACURAX_ICONS]