720-891-1663

Voice Hacking is on the Rise

Hacking is a moving target.  And continues to move. As banks consider using biometric authentication in the place of passwords, hackers are thinking about that too. Researchers at Black Hat demonstrated that they could synthesize your voice well enough to fool personal digital assistants. Already there are products on the market from Adobe, Baidu, Lyrebird, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Stealing Your Phone NUMBER is Profitable

Hackers have figured out that stealing people’s phone numbers is easier and more profitable than stealing their phone (in part because they don’t have to be anywhere near you or your phone in order to steal the number). Recently I wrote about a bitcoin investor (AKA speculator) who is suing AT&T for $240 million because […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why An Insider Threat Detection Program is Critical

Adams County, Wisconsin is now facing a crisis of confidence and likely some lawsuits as well. Why? On March 28, 2018, the county says, it uncovered “questionable activity” on county computer systems. Three months later, in late June, their investigation was complete. The result: 258, 120 people had their data illegally accessed. Data included protected […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researchers Find 20 Bugs in Samsung IoT Controller

In the ongoing saga of IoT security (The score is bad guys: a whole bunch, good guys: not very many), the bad guys continue to win. Researchers analyzed Samsung’s house management hub called SmartThings and found 20 problems. The researchers, part of Cisco, said that the attacks are complex and require the attackers to chain […]

Continue reading → [DISPLAY_ACURAX_ICONS]