As Brian Krebs reported late last week, the Jimmy Johns breach has a larger impact than previously reported. In a nutshell, here are the details: The attack affected 216 Jimmy Johns stores nationwide The hackers compromised the username and password used for remote administration The POS or cash register software was created by Newtown, PA […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article in ARS technica this past weekend, Home Depot has some interesting factoids in their security background. Just to be clear, this is only one side of the story, and I suspect they are neither the best nor the worst when it comes to security – but I don’t have any insider […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Home Depot released a press release today providing some more details on the recent and until now ongoing credit card breach. The good news is that the breach primarily affected self checkout stations between April and September of this year. Home Depot likely has a pretty good security department which means that this malware must […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Is your business prepared for a cyber breach? Besides the cost, there is the potential for damage to your reputation , loss of customers, distraction while dealing with it and the potential for lawsuits, which can go on for years. An article at AZCentral.com talks about the subject and the fact that hundreds of small […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article in Business Insider, Sharron Laverne Parrish, Jr. scammed Apple 42 times with a very simple scam. He presented debit cards on closed accounts for purchases – apparently in the thousands of dollars each. When the card was declined, he offered to call his bank and handle it. Except he was not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yes, this is for real. Russian entrepreneurs have figured out there is a market for this. According to an article in ITWorld, there is a business in hacking iCloud accounts. Get the password by some means and then using EPPB from Elcomsoft, the hacker can grab just pictures or contact or messages – just what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]