Thousands of Android and iPhone mobile apps use the Firebase database. The database runs in the cloud and, apparently, by default has no security. The net effect of this is that 100 million records, or more, are exposed for anyone to capture. Firebase, a database run by Google, is very popular with Apple and Android […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Elon Musk, CEO of Tesla, sent an email to all employees over the weekend telling them that the company was hacked by an employee who changed code on an internal product and sent company data outside without permission. The software, the Tesla Manufacturing Operating System, is likely used internally in the manufacturing process. The employee […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Axis Communications, the Swedish maker of high end security cameras (up to $1,000 each), announced patches to seven vulnerabilities that affect almost 400 camera models. Axis is not some cheap Chinese knockoff; these are well respected cameras used in businesses the world over. The vulnerabilities, discovered by the security firm VDOO, comes with in depth […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Maybe we should call it a dumpster fire, but whether we call it a shipwreck or a dumpster fire, it is a mess. According to pen testers, shipping industry security is where mainstream IT was years ago. The pen testers say that the attacks are TRIVIAL to execute an easy to mitigate against. These ships […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A story that seems to be repeated with way too much frequency is cryptocurrency attacks. This is because most users don’t understand how easy these attacks are. I am aware of *NO* attacks that compromised the cryptography of cryptocurrencies. Always it is the software. Sometimes on the user’s side. Other times on the exchange’s side. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AgentRun is a startup that helps independent insurance agents and brokers manage customer relationships (CRM) and they are the latest company to do the perp walk for leaving an Amazon storage bucket unprotected. Compromised were thousands of client’s sensitive data files like insurance policy documents, health data, medical data, social security and medicare cards, blank […]
Continue reading →
[DISPLAY_ACURAX_ICONS]