According to an article at Cult Of Mac, one of Apple’s suppliers, Quanta, posted Powerpoint documents with instructions on how to log in to a database containing confidential Apple documents on new, yet to be announced products. Apparently, the document contains default credentials, which it says, the business partner should change after they log in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Central Command, responsible for the military’s activities in Iraq, Afghanistan, Iran, Saudi Arabia, Syria and a number of other countries in that region was the victim of a hack earlier today. Centcom’s Twitter feed and You Tube channel were compromised and defaced. Twitter quickly disabled the feed but not before some charts and contact information for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
VentureBeat wrote an interesting item pointing out some of the obvious things that Target messed up. Fixing these items won’t stop every attack, but it certainly would slow the attackers down. According to a lawsuit filed in federal court recently Target missed the ball on a few things. Of course, at this point, these are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In some sense, cyber attacks are no different that physical world attacks; in other ways, they are completely different. Let’s assume that you did not physically catch some bad guys that broke into a building. Do you know who broke in? On rare occasions they leave something behind – there have been instances so rare […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of us who are not insurance experts, the distinction may not be obvious. As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am certain we will see a number of people comment on what Sony shoulda/coulda/oughta have done and there is likely some truth in all of them. Here is one and my thoughts on it, from Data Breach Today. This is from a blog post by Matthew Schwartz. He makes 7 points, which I mostly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]