Hacker Sells 538 Million Weibo Accounts Karma is a B**tch. With all of the Chinese hacking efforts, someone is hacking back. Is it us? Not clear. In any case, the data includes information like real names, site names, location, etc. and 172 million of the 538 million records include users’ phone numbers, but not passwords. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Fintech is a term, that refers, loosely, to all of those companies that want to “help” you manage your financial data in the cloud and are not banks. Examples are Mint, Chime, Credit Karma, Coinbase, Kabbage and hundreds of others. Fintech can also include service providers to banks. Here is the problem. Fintechs are not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Nutribullet, the company that makes those fancy blenders, has a problem. In general, the problem is not a lot different than a lot of other companies. Their website was hacked and one of the magecart family of credit card skimmers was installed. It turns out that was only the beginning of their problem. The first […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. Federal Cyberspace Solarium Commission issued its long awaited report last week and warned of a “catastrophic attack that leaves the nation in tatters”. While right now everyone is worried about Covid-19, this represents a longer term problem that won’t be fixed in a few months. The report creates a vivid hypothetical attack and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
9 Years of AMD Processors Vulnerable to 2 New Side-Channel Attacks AMD processors from as early as 2011 to 2019 carry previously undisclosed vulnerabilities that open them to two new different side-channel attacks, according to a freshly published research. Known as “Take A Way,” the new potential attack vectors leverage the L1 data (L1D) cache […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Attorney General Barr and FBI Director Wray have been lobbying strongly for companies such as Facebook and Google to add backdoors to their cryptography so that they can eavesdrop on conversations when they need to. But there are problems with backdoors to encryption. Mostly, you cannot control who uses them. Case in point Huawei. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]