According to multiple news reports (like BBC, Forbes, and Computerworld), Sony has been hacked again. This time they were hacked by the GOP (no, not that GOP, the Guardians of Peace). So, here is what Sony’s office looked like yesterday – and your’s might if you get hacked. Employees came into the office yesterday, turned […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired reported on an interesting (yes, I know I am strange, to think that malware attacks are interesting, but they are!) malware attack. The malware, known as DarkHotel, pops up a message alerting the user to a software update as soon as they connect to the hotel’s WiFi. Of course, the update is not a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ars technica reported yesterday on a very sophisticated trojan that has been around, they say, since 2008, went dark in 2011 and came back in 2013. The trojan is comprised of 5 stages, all but the first of which is encrypted and is serially decrypted to avoid detection. The interesting part about it is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Boy, just when you thought you were doing it right! Ars Technica, Dark Reading, Security Week and others are reporting a new variant of the Citadel malware that has been around for several years. According to the articles, the new variant monitors processes and when it sees Keepass, Password Safe or neXus start up, it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to articles on ZDNet and ABC, NSA chief Admiral Mike Rogers said in testimony before the US House Intelligence Committee that China and probably one or two other countries could shut down critical computer networks that could force U.S. power and water grids, aviation systems and financial systems offline. Let that sink in for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The US Department of Homeland Security through the Computer Emergency Readiness Team (CERT) at Carnegie Mellon issued an alert to owners of a number of Linksys routers to patch those routers ASAP. The alert referenced two vulnerabilities – the first one allowed anyone on the internet to read or modify sensitive information on the router; […]
Continue reading →
[DISPLAY_ACURAX_ICONS]