This should make you feel better. Especially under the current situation. Palo Alto Networks Unit 42, an extremely well known and well respected group of security researchers, tested 200,000 network connected infusion pumps used in medical facilities. 75% of the devices tested had security vulnerabilities that would allow hackers to exploit them. The purpose of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russia Arrests Some REvil Gang Members At this point we don’t know who they ticked off, but Putin’s goons arrested 14 people and seized 426 million Roubles (about $5.5 million), $600,000 USD, 500,000 euros, computers and 20 cars. These guys definitely will not be getting a Christmas card from Vlad next year. Credit: Yahoo News […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Having Some Success In Going After Hackers The DoJ announced the arrest of a Ukrainian who is accused of deploying ransomware on behalf of the REvil ransomware gang. They also seized $6 million in cryptocurrency. The Ukrainian was arrested in Poland (crooks are not smart. If you are in the crosshairs of U.S. law […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
State Acknowledges Data Breach After 10 Months I guess better late than never. Finally, the State of Illinois is admitting to a data breach, sort of. Here is what they are now saying. Check the dates below. Notice who was among the last to know – the victims. Can the state be fined for breaking […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well That Seems Like a Bit Over the Top A pharmacist in Illinois faces up to 120 years in prison for selling dozens of (I assume blank) Covid vaccine cards. The pharmacist sold 134 cards to 11 buyers for roughly $1276. He is being charged with theft of government property. That seems like a stretch, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Android Trojan Hits 140 Countries, 10,000 Victims Via Social Media Hijack Security company Zimperium says they have found a new trojan they call Flytrap that has been around since March and compromises users’ phones who side load apps from third party app stores. Once the malicious app is on the user’s phone, it uses that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]