720-891-1663

News Bites for the Week Ending March 27, 2020

Hacker Sells 538 Million Weibo Accounts Karma is a B**tch. With all of the Chinese hacking efforts, someone is hacking back.  Is it us?  Not clear.  In any case, the data includes information like real names, site names, location, etc. and 172 million of the 538 million records include users’ phone numbers, but not passwords.  […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What Happens When Your Fintech Provider Gets Hacked?

Fintech is a term, that refers, loosely, to all of those companies that want to “help” you manage your financial data in the cloud and are not banks.  Examples are Mint, Chime, Credit Karma, Coinbase, Kabbage and hundreds of others.  Fintech can also include service providers to banks. Here is the problem. Fintechs are not […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Cyberspace Solarium Commission Warns of “Catastrophic Cyberattack”

The U.S. Federal Cyberspace Solarium Commission issued its long awaited report last week and warned of a “catastrophic attack that leaves the nation in tatters”.  While right now everyone is worried about Covid-19, this represents a longer term problem that won’t be fixed in a few months. The report creates a vivid hypothetical attack and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending March 13, 2020

9 Years of AMD Processors Vulnerable to 2 New Side-Channel Attacks AMD processors from as early as 2011 to 2019 carry previously undisclosed vulnerabilities that open them to two new different side-channel attacks, according to a freshly published research. Known as “Take A Way,” the new potential attack vectors leverage the L1 data (L1D) cache […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Crypto Backdoors are Good – Except When The Other Side Has Them

Attorney General Barr and FBI Director Wray have been lobbying strongly for companies such as Facebook and Google to add backdoors to their cryptography so that they can eavesdrop on conversations when they need to. But there are problems with backdoors to encryption. Mostly, you cannot control who uses them. Case in point Huawei.  The […]

Continue reading → [DISPLAY_ACURAX_ICONS]