720-891-1663

Security News for the Week Ending March 1, 2024

Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]

Continue reading → [DISPLAY_ACURAX_ICONS]

They’re Baaaack! LockBit, That Is. And they are Ticked Off

The FBI touted just last week that they had taken down LockBit and replaced the servers with ones that offered free decryption keys and sunshine for all. It didn’t last long. The Russia-based hackers have reconstituted themselves and have new servers. It is true that the FBI and Europol and others did take down their […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending February 23, 2024

NSA Cyber Director Rob Joyce to Retire After 34 Years Now that is a career in public service. Joyce was the Cyber Director at NSA since 2021 and was at the NSA during the days that it was affectionately called “No Such Agency” for its secretiveness. It comes at a time when cyber threats are […]

Continue reading → [DISPLAY_ACURAX_ICONS]

AI, Quantum Computing and Crypto – Not a Good Mix

Sorry, this is going to be a bit convoluted, so try to stay with me. First we had encryption. Things were good. Encryption was based on mathematically hard problems and computers could not do the math, even in, potentially, a hundred thousand years. Then came Quantum computing. Or at least it is coming. Or maybe […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Mobile Malware Defeats Biometrics

Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

China’s Volt Typhoon In Critical Networks for 5 Years

U.S. Intelligence agencies say that China is shifting tactics. Or, maybe just adding new ones. The NSA, CISA and FBI said, in a joint advisory, that China-backed hackers have maintained access inside U.S. critical infrastructure such as aviation, rail, mass transit, highway, maritime, pipeline, water and sewage to prepare to launch a catastrophic attack at […]

Continue reading → [DISPLAY_ACURAX_ICONS]