Earlier this year, the Erie County Medical Center in Buffalo, New York was hit with a ransomware attack. ECMC is a level 1 trauma center, teaching hospital and regional center for a variety of medical services – including, unfortunately, ransomware. At 2 A.M. on Palm Sunday computer screens across the medical center flashed “What happened […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We usually think of Internet of Things (IoT) devices as smart light bulbs or door locks or cameras, but there are some IoT devices that are a little bigger and a lot more expensive. In this case, it is a multi-million dollar Cat Scanner that hospitals and imaging centers use to create diagnostic images. Siemens […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Voting Village was the place to be at Defcon if you are interested in the security of your vote. The sponsors of the village bought 30 voting machines – many on eBay. Full disclosure – some of these models are no longer in use, but others are still in use. One older (in use until […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lets combine all the possible cyber risk concerns into one sentence. A bug in an open source library used by major IoT vendors is raising the spectre of software supply chain/vendor risk management issues for all developers. The vendor in question is Axis Communications. Whether you know it or not, you have seen their security cameras across the country including […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the continuing saga of Vault 7 – the leaking of CIA hacking tools, Wikileaks made Mac, Linux and Unix users feel welcome. Instead of leaking Windows and Android malicious code, they leaked Mac, Linux and Unix tools instead. I guess they are equal opportunity leakers. In this case they just leaked the manuals so […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An undisclosed attack vector allowed a hacker to steal $8.4 million in Ethereum, a competitor to Bitcoin, during it’s “initial coin offering”. This is the fourth time this month Ethereum alone was attacked, not counting attacks on other cryptocurrencies (Bitcoin and Ethereum are two popular cryptocurrencies – that is, so called currencies based on […]
Continue reading →
[DISPLAY_ACURAX_ICONS]