I don’t know how to say this any more clearly, but vendors represent a huge risk to every organization. Lion Air, the Indonesian parent of Malindo Air and other subsidiaries that were breached, confirmed the breach last week. Why did they confirm it? Perhaps they were being good corporate citizens. An alternative explanation is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A New Trend? Insurers Offering Consumers Ransomware Coverage In what may be a new trend, Mercury Insurance is now offering individuals $50,000 of ransomware insurance in case your cat videos get encrypted. The good news is that the insurance may help you get your data back in case of an attack. The bad news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No, not literally, but close. Researchers investigated 81 Internet of Things (IoT) devices like smart TVs or security cameras. The researchers ran 34,000+ experiments and found that 72 of those devices contacted someone other than the manufacturer. For example, almost all of the TVs contacted Netflix, even if you don’t have a Netflix account. For […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As computers and software become more integrated into every facet of our lives, and as security attacks on our infrastructure become part of the news every day, the question of software patches and upgrades need to become a factor in purchasing decisions. Whether it is a consumer Internet connected baby monitor (who’s bugs have compromised […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Back in May Microsoft released Windows 10 Build 1903, AKA the May 2019 update. Suffice it to say, Microsoft has had more than its share of problems with 1903, so if you are not there yet, I would not install it. It is quite embarrassing for Microsoft that more than 90 days after the release, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Department of Defense is probably the largest software development (and hardware development) organization in world but unlike say Microsoft or Cisco, almost all of the development is performed by third parties – the so called defense industrial base or DIB. It is also likely the number one target of nation state hackers since a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]