Some of you probably remember Edward Snowden (just kidding!). Snowden was a Booz, Allen, Hamilton employee, on contract to the NSA. Well now there is another Snowden at Booz. Booz has annual revenue in excess of $5 billion and has contracts all over the federal government. Earlier this month, the feds arrested Harold Thomas Martin […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to Buzzfeed, nine days after Hillary Clinton had won big on Super Tuesday, the Russians launched their cyber attack on her campaign. The Russians sent malicious emails to all of her senior campaign staff. The emails looked like standard Google GMail emails alerting to suspicious activity on their accounts and asked them to click […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You’ve probably heard about credit card skimmers that hackers attach to everything from gas pumps to ATMs to self checkout terminals at grocery stores, all in an effort to steal your credit card info. As more stores go to chip based credit cards where stealing the information off the stripe won’t let hackers use that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Vera Bradley recently got a visit from the FBI, but it was not to purchase one of their colorful diaper bags. Instead the FBI came to tell Vera Bradley that they had been hacked. Between late July and late September, hackers were busy at work inside Vera Bradley’s 112 stores and 44 factory outlets – […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Recently, Brian Krebs (KrebsOnSecurity.com) was hit with a massive denial of service attack. The site went down – hard – and was down for days. His Internet Service Provider kicked him off, permanently. The attack threw over 600 gigabits per second of traffic at the site. There are very few web sites that could withstand […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A small New England retailer learned about ransomware the hard way. After an employee clicked on a link, that system was infected with Cryptowall. The malware encrypted, among other files, the company’s accounting software. The accounting software did not live on that user’s computer; it lived on the network, but since that user had access […]
Continue reading →
[DISPLAY_ACURAX_ICONS]