Enterprise Resource Planning (ERP) systems are quickly becoming a popular target of hackers. It used to be that these systems were on private networks behind firewalls, but as companies move to the cloud and include their vendors and subcontractors in their ERP systems, the systems are becoming more public. More public means easier to hack. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sextortion is the act of convincing vulnerable people, often teenagers, to provide the sextortionist with sexually explicit photographs and videos under the threat of releasing other embarrassing material, such nude pictures that may already privately exist in the victim’s email, text messages or private social media. The attacker does this by convincing the victim that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Timehop Hack Compromises 21 Million Users In a bit of good news/bad news, the social media time capsule site Timehop said that it was hacked around July 4th, but that they interrupted the hack in progress. Still the hackers got usernames, passwords, email addresses, date of birth, gender, some phone numbers and other information for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This seems to be a recurring topic, but it doesn’t seem to be getting any better, so I will leap back into the fray. Last month Ticketmaster announced they had a breach and they led people to believe that it was isolated and that it had something to do with their software. According to RiskIQ, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Police think that hackers hacked the pumps at a Detroit area gas station allowing drivers to get free gas. Ten cars figured it was okay to steal gas from “The Man” to the tune of about 600 gallons. While 600 gallons of gas is not the end of the world, it does make a point. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
People thought they were going crazy. Their air conditioner randomly turned off. The combination on their door lock changed every day. The doorbell kept ringing even though no one was there. These are all symptoms of domestic abuse where one partner understands how to use those technical toys against the other partner. And, in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]