Only at Defcon. There was a session on hacking baby monitors. When my kids were little, a baby monitor would allow me to listen to my baby from at most a hundred feet away. Now baby monitors allow me to see and listen to my baby from anywhere on the planet where I have a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There are reports in the news that Identity Theft Guard Solutions won the contract to offer identity theft protection for the 21.5 million victims of the second OPM breach. This is 90 days after the breach was disclosed. It is unclear how long it will be before people get letters and have the ability to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Computer Emergency Response Team (CERT), a part of the Department Of Homeland Security, released an alert this week regarding yet another series of DSL routers that have hard coded userids and passwords. The routers, which likely share firmware from a common Chinese manufacturer, all have passwords of the form XXXXairocon, where XXXX are the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Wyndham Hotel chain was hacked several times going back as far as 2012. The FTC came after the hotel chain using Section 5 of the FTC Act, claiming unfair business practices. Usually what happens in these cases – and there have been a number of them – is that the company and the FTC […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While hacking credit cards for fun and profit is still a popular pastime, two additional hacking models need to be considered. The first additional model is the Anthem Blue Cross or Office Of Personnel Management model. In those cases, hackers are looking to amass vast amounts of data on as many people as possible. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]