BBC is reporting that several of the Trump hotels point of sale systems likely have been hacked. Trump’s initial response to questions was to decline to comment. Later, after the news of the breach was published, Eric Trump, Donald’s son, said that like “virtually every other company these days” they had been alerted to suspicious […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired reported that some Hospira drug infusion pumps are vulnerable to a number of attacks. The article also says that Hospira was not receptive to the news when told of the problem and it took DHS a year to issue an alert – only after someone made the facts public. In fact, Hospira initially refused […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dell SecureWorks, the counter threat service that Dell bought in 2011, is reporting on a new outbreak of the malware family STEGOLOADER, which has a different M.O., making it hard to detect. All that persists on the machine in a small loader that downloads the core module. This can be changed easily and might even […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The SEC is investigating reports of a slightly different form of hacking – get insider trading information and use it yourself. Insider trading, of course, has been around as long as there is trading. But, what if, the insider trading was occurring from half way around the globe and no insiders were involved? FireEye, as […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yet again Flash is the means of attack by a Chinese hacking group that Fireeye has labelled APT3. The attack IS in the wild, although limited in use. The attack looks like a phishing email offering discounts on Apple computers. You can find out what version of flash you are running at http://www.adobe.com/software/flash/about/ and download the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A newly published article in The Intercept says that the NSA and GCHQ hacked anti virus vendor’s software and networks in order to “neutralize the threat” posed by that software. Based on newly released Edward Snowden documents, GCHQ obtained a warrant in 2008-2009 to have legal permission to monitor web traffic, hack email and reverse engineer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]