The headline reads Hidden Backdoor Found in Chinese-Made Equipment. Nothing New! Move Along! That headline by itself should scare you. Researchers found a hidden backdoor in a Double Technology GSM gateway used by telephone companies and VoIP providers. DblTek is based in Hong Kong. According to the security firm Trustwave, there is an account called […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Great Email Hack of 2016 is becoming the Great Email Hack of Forever. It appears that Russian hackers are targeting progressive groups in the U.S., hacking their emails and threatening to release embarrassing emails if they do not pay an extortion, in bitcoin. According to Bloomberg News, at least a dozen groups have been […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It seems like the spy-guys (or is it spy-people) can’t seem to catch a break. First it was Snowden; more recently it was Martin – both Booz Allen contractors at the NSA. Now it is the CIA. Wikileaks published thousands of documents, which appear to be real, describing CIA hacking tools. This includes, supposedly, at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sounds like a low budget sci-fi thriller, but it is not. In a sneak peak of Verizon’s new data breach report, Verizon tells the story of an unnamed university that was attacked by its own vending machines. For real. The university had thousand of devices to manage, so, like many businesses, decided that connecting all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Licking County, Ohio, population 116,000, which bills itself as the 17th largest county in the state has been thrust back into the dark ages. A ransomware attack has taken down all of the county’s computers, including 911 dispatch and, they are saying, it will be a while before things are back to normal. On Tuesday […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Not only are hackers lazy but security researchers are lazy too. Researcher Simon Kenin was being lazy one day and decided to try to hack his Netgear router. Interesting definition of lazy – his, not mine. He came upon an old, known authentication vulnerability. It allowed him to recover his forgotten password without authenticating himself […]
Continue reading →
[DISPLAY_ACURAX_ICONS]