720-891-1663

Homeland Security Warns of Enterprise Systems Hacking

Enterprise Resource Planning (ERP) systems are quickly becoming a popular target of hackers.  It used to be that these systems were on private networks behind firewalls, but as companies move to the cloud and include their vendors and subcontractors in their ERP systems, the systems are becoming more public. More public means easier to hack. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Sextortionists Shift Scare Tactics

Sextortion is the act of convincing vulnerable people, often teenagers, to provide the sextortionist with sexually explicit photographs and videos under the threat of releasing other embarrassing material, such nude pictures that may already privately exist in the victim’s email, text messages or private social media. The attacker does this by convincing the victim that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for Week Ending July 13, 2018

Timehop Hack Compromises 21 Million Users In a bit of good news/bad news, the social media time capsule site Timehop said that it was hacked around July 4th, but that they interrupted the hack in progress.  Still the hackers got usernames, passwords, email addresses, date of birth, gender, some phone numbers and other information for […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Third Party (Vendor) Cyber Risk Management Rears its Ugly Head AGAIN!

This seems to be a recurring topic, but it doesn’t seem to be getting any better, so I will leap back into the fray. Last month Ticketmaster announced they had a breach and they led people to believe that it was isolated and that it had something to do with their software. According to RiskIQ, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Digital Tools of Domestic Abuse

People thought they were going crazy. Their air conditioner randomly turned off. The combination on their door lock changed every day. The doorbell kept ringing even though no one was there. These are all symptoms of domestic abuse where one partner understands how to use those technical toys against the other partner. And, in the […]

Continue reading → [DISPLAY_ACURAX_ICONS]