720-891-1663

Security News for the Week Ending November 29, 2019

The Problem with Big Data is, Well, That it is Big On October 16th researchers revealed that they had found an exposed database with 4 billion records covering 1.2 billion people.  The first database contained information on 1.5 billion unique people (note these numbers do not exactly match) including work phone numbers and mobile phone […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 25, 2019

Database Leaked 179 GB of Personal Data of military personnel, officials and hotel customers. I wish this was a new story.  Autoclerk, a Best Western service that manages reservations, revenue, loyalty programs, payment processing and other functions for the hotel chain. left an elastic search database exposed. Hundreds of thousands of guest reservations were exposed […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending October 18, 2019

Less Than Half of Mississippi State Agencies Even Have a Cybersecurity Policy In Mississippi’s first ever state cybersecurity audit, the state auditor reported dismal results.   54 state agencies did not respond to the audit.   38% of those responding did not encrypt sensitive data.  22 agencies had not conducted a third party security risk assessment.  11 […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Vendor. Cyber. Risk. Management!

I don’t know how to say this any more clearly, but vendors represent a huge risk to every organization. Lion Air, the Indonesian parent of Malindo Air and other subsidiaries that were breached, confirmed the breach last week. Why did they confirm it?  Perhaps they were being good corporate citizens.  An alternative explanation is that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 6, 2019

Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10.  For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request.  So yet another reminder that […]

Continue reading → [DISPLAY_ACURAX_ICONS]