720-891-1663

The Target Breach Story – How Did They Let This Out?

Krebs On Security has extensive reporting of an investigation by Verizon conducted starting a few days after the Target breach was announced. Target has refused to confirm or deny the report . One thing to consider.  We do not know how Brian (Krebs) got the report, so all we can do is speculate. This report, in […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Apple’s Turn – Major Cyber Attack

Apple is dealing today with something that Microsoft or Google is used to dealing with.  Hackers attacked a weak link in Apple’s universe – the developer community.  Apparently, the performance of Apple’s web site is poor in China, so developers often download software from alternative web sites.  These hackers convinced enough developers to download a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Password Reuse A Problem – 11 Million Ashley Madison Passwords Cracked Already

After the Ashley Madison breach, everyone sighed a breath of relief because the passwords were encrypted with bcrypt.  Bcrypt, as used by Ashley Madison, hashed the password 4,096 times.  That calculation meant that even with fast computers it would take centuries to crack all of them. Until a group of hobbyists – yes hobbyists, not professional […]

Continue reading → [DISPLAY_ACURAX_ICONS]

iStan Hacked and Killed

iStan is “the most advanced wireless patient simulator on the market, with internal robotics that mimic human cardiovascular, respiratory, and neurological systems,” according to CAE Healthcare. iStan costs about $100,000 and is regularly used by hospitals to teach medical school students how to perform procedures without murdering people. That’s nice, but here is the interesting part. […]

Continue reading → [DISPLAY_ACURAX_ICONS]