720-891-1663

New Threat From Wireless Keyboards

If you have about $12 to spare, you can eavesdrop on many wireless USB keyboards.  That means that you can capture web sites, userids, passwords, socials, credit card numbers and anything else someone might type in. The problem with the USB keyboard (and likewise USB mouse) standards is that the standard didn’t say anything about […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Data Breach Incident Response: Questions and New Laws

As more and more breaches happen every month, businesses everywhere need to consider what would happen if their company had a breach.  Here is advice from the national law firm of Perkins Coie. Is the breach reportable?  The list of data items which, when compromised, triggers a reportable breach keeps growing.  For example, this year Illinois […]

Continue reading → [DISPLAY_ACURAX_ICONS]

New Vulnerability May Affect Cell Phones, Cell Towers, Routers and Switches

A bug in a software library used in a wide variety of communications products such as cell towers, routers and switches and even the radio chips inside of cell phones was recently announced. The library in questions implements  standard known as ASN.1 and was developed by Objective Systems. While we are all used to, for […]

Continue reading → [DISPLAY_ACURAX_ICONS]