SIMJacking, the attack where a hacker replaces the SIM card that is associated with your phone in the carrier’s database with the attacker’s SIM card number and then has access to all of your phone calls and text messages, is becoming more popular – because it is profitable. At this point, the carriers have not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the FTC created a settlement with Equifax over the breach in 2017 of the data of close to 150 million people that turned out to be mostly smoke and mirrors, some of the lawsuits are now moving forward showing how bad things were at Equifax. Equifax used a default userid of admin and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Less Than Half of Mississippi State Agencies Even Have a Cybersecurity Policy In Mississippi’s first ever state cybersecurity audit, the state auditor reported dismal results. 54 state agencies did not respond to the audit. 38% of those responding did not encrypt sensitive data. 22 agencies had not conducted a third party security risk assessment. 11 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Note: If you are one of clients, this probably doesn’t apply to you because you have heard us beating this drum forever. It iPonemon Says Executives are not Sufficiently Engaged in Cybersecurity Strategys always nice to get validation for what we have been saying for years, though. Larry Ponemon says “There’s a clear lack of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For hundreds of years, government has been the domain of the quill pen and parchment or whatever followed on from that. But now, cities want to join the digital revolution to make life easier for their citizens and save money. However, as we have seen, that has not always worked out so well. Atlanta recently […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
British celebrity food writer Jack Monroe had her cell phone number hijacked and, after that, the hackers were able to receive her two factor authentication and access her bank and payment accounts. She was already doing more than a lot of people do security wise – she was using two factor authentication. BUT, the two […]
Continue reading →
[DISPLAY_ACURAX_ICONS]