There has been a cat and mouse game between the movie studios and hackers since there were digital versions of movies. The encryption that was on the original movie DVDs, CSS (content scrambling system), was cracked in a matter of a few days. For Blu-Ray and HD DVDs, they created a new system, AACS (Advanced […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI is warning people to be wary of fake federal web sites which both take their PII and also steal money from them. The web sites rank high on the search engine page, ask for PII and collect a fee. Sometimes they ask people to send their birth certificate or other information. People are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
USAToday is reporting that the hacking of the State Department’s email went way farther than has been reporting up until now. The State Department has been fighting to get the hackers out of their unclassified email system for months now, even enlisting the help of private contractors and the NSA – to no avail. CNN […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Industrial Control Systems (ICS) run everything from waste water to nuclear power. Unfortunately, they are on pretty shaky ground. During the cold war, Ronald Reagan’s CIA convinced the Russians to use American control software to manage a gas pipeline in Siberia. Unfortunately for the Russians, the CIA placed a few time bombs in the software […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: For those of you who are Mac users and laughing at the poor Windows users, this affects you too. The Rootpipe malware silently escalated its privileges to your maximum privileges to launch an attack on your system. Apple just recently fixed this, but ONLY FOR THE CURRENT VERSION OF OSx – apparently, it was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Too many attacks to write about individually, so I am just going to write a short blurb on each with a link. Oh, My! British Airways – hackers accessed “tens of thousands” of frequent flyer accounts forcing BA to lock down the system, denying users access to the system and requesting that they change their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]