Sometimes not using best practices gets us. Other times it is fatal. Check out this article about an admin who had his (or her) entire universe fall down around his/her ankles. The article shows how, in this case, not following best practices was more than a little inconvenient. The admin was reading his email, apparently […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in the Times a week ago says that the Feds and States want banks and brokerage firms to close some gaping holes in their defenses. What is that gaping hole? OUTSIDE VENDORS! Many people are aware that the suspected source of the Target breach was a small HVAC contractor. They didn’t do anything […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I read an interesting article in USA Today recently. The FBI says that over 500 million financial records have been hacked in the last 12 months (given that the Chase hack accounts for over 80 million records alone, this number in itself is not surprising). Here are a few tidbits out of the article that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With the Snapchat and Dropbox breaches this week, the attack surface just got raised a notch. In case you are not familiar with these two breaches, I will describe them at a high level what happened. With Snapchat, users assume that their pictures will disappear quickly on the other end after they are opened. However, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Forbes and other media outlets are reporting that we may be seeing the next version of the celebrity nude picture breach (called the fappening) that leaked nude pictures of famous celebs such as Jennifer Lawrence and many others. This breach, nicknamed THE SNAPPENING, apparently came from a third party SnapChat helper app and website which […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The breaches just keep happening. The most recent breaches include KMart (the size of which is still being determined), Dairy Queen (395 stores) and MBIA. The first two are, once again, from a Point of Sale (cash register) system. The MBIA breach came from a misconfigured web server. When will it end? Not until people […]
Continue reading →
[DISPLAY_ACURAX_ICONS]