720-891-1663

New Android Trojan Hijacks Routers

Normally when hackers want to attack a router, they attempt to compromise the router directly.  They try default passwords or a list of passwords;  they look for software vulnerabilities. Maybe patches that haven’t been applied. Another approach is to compromise a device inside the network and use that device to compromise the router from the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Steal Millions in Bitcoin Using Only A Phone Number

Just after midnight on August 11th, Jered Kenna in Medellin, Columbia  was notified that two of his email accounts had their passwords reset. He tried regaining control of the accounts by getting the services to send him a text, which he never received. When he called his phone company (T-Mobile), they said that he didn’t […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Black Market Medical Record Prices Plunge; Hackers Move On

Until recently, the black market price of medical records was very high compared to stolen credit card records.  Stolen medical records are used to get health care for people who do not have insurance and to submit fraudulent insurance claims. Medical records used to go for as much as $50 for one complete record. However, […]

Continue reading → [DISPLAY_ACURAX_ICONS]