720-891-1663

Researchers Discover Flaws That Allow Eavesdropping Of Cell Calls

Signalling System 7 or SS7 has long known to be vulnerable to hackers.  SS7 is the control system protocol that telephone companies use to route and transfer calls between companies and, in the cellular world, between towers. Since SS7 was designed in the early 1980s, no one was terribly concerned about security.  Hackers – or […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Congress Working Hard To Kill American Software and Hardware Business

UPDATE:  This is bill is apparently worse than I thought. The Register says that a petition calling for the bill to be withdrawn has gathered 43,000 signatures in less than 24 hours. Other comments include that the bill is so poorly written that it would outlaw the NSA’s encryption, unless they add a backdoor to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

CIA Chief’s Personal Email Hacked – Are You Surprised?

Wired and other media are reporting the the head of the CIA, John Brennan, had his personal email account hacked.  The hacker, a teenager, talked to Wired about how he did it.  It points to general weaknesses in commercial online services security that you should understand. It is less of a surprise that Brennan’s commercial, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Cost Of A Data Breach – T-Mobile May Fire Experian

T-Mobile and Experian both announced that an Experian database containing credit application data for prospective T-Mobile customers (people who applied to finance a new phone or new phone service) between September 2013 and September 2015 was accessed by hackers.  T-Mobile outsources their credit application process to Experian, which is typical, and that is where the […]

Continue reading → [DISPLAY_ACURAX_ICONS]