cThe hacker group The Dark Overlord claims to have hacked Gorilla Glue and has stolen, they claim, over 500 GB of intellectual property. As I have said many times, the theft of intellectual property is a way bigger problem than the theft of credit cards. If someone steals your credit card, you whine at the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The most recent distributed denial of service attack (DDoS) meant that most people could not get to Twitter. While that was awful and may have forced a few people to actually work instead of tweeting, for the most part, that was not a big deal. In fairness to the DYN attack, there were actually hundreds […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While most people agree that Apple’s closed ecosystem is more secure than Android’s open ecosystem, that does not mean that Apple’s world is without risk. This week Apple is removing hundreds of fake apps. These apps carried brand labels like Dillards, Nordstrom, Christian Dior and Salvatore Ferragamo. The actual brands have nothing to do with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following in the tradition of the Ruskies with the DNC, DNCC and Clinton campaign hacks, hackers in the Middle East are using a phishing technique dubbed Moonlight to catch unsuspecting users with phishing emails. What is interesting is that the tech involved is “off-the-shelf”. What they have spent time working on is the phishing emails […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One more time an open source database, MongoDB, is the source of another huge breach. But it isn’t Mongo’s fault. It wasn’t configured correctly. Human error one more time. OK, what are the details? And is it almost 60 million or 260 million? Modern Business Solutions apparently provides data storage services, although they have refused […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well, not exactly, but close. And it was not due to pictures of Kim Kardashian. Here is what happened. When you type in the name of a website to visit, say Facebook.com, the Internet needs to translate that name into an address. That address might look like 157.240.2.35 . The software that translates those names […]
Continue reading →
[DISPLAY_ACURAX_ICONS]