In spring 2018 Chenoa Cooper started writing addresses down on slips of paper and her friends knew that if she was running late, she couldn’t warn them. That is because she would leave her phone at home, it had become an abuse machine. Graphic sexual photos and videos of her had been posted online. Posted […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russia Behind Cyberattacks on Country of Georgia Last Year The State Department and the UK say that Russia was behind the attack on over ten thousand websites in the Country of Georgia last year. They also formally attributed Sandworm (AKA Voodoo Bear, Telebots and BlackEnergy) to Russia’s GRU Unit 74455. Sandworm is the group responsible […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Gov Warns of Ransomware Attacks on Pipeline Operations DHS’s CISA issued an alert this week to all U.S. critical infrastructure that a U.S. natural gas compressor station suffered a ransomware attack. While they claim that the attackers did not get control of the gas compression hardware, they did come damn close. The ransomware took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I was interviewed by the local affiliate of a national TV network earlier today about a hack where a young lady got her bank account emptied out in a matter of seconds after she provided a caller a single 6 digit number. Hopefully this lady will eventually get her money back, but not without a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Note: If you didn’t know that I am against crypto backdoors before, let me just tell you up front, because that fact will be clear by the end. The world works in the most mysterious ways. The FBI has been trying to get phone makers (Apple especially) to install crypto backdoors into iPhones for them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Say 4 Chinese Hackers Took Down Equifax The Department of Justice indicted 4 members of the Chinese People Liberation Army, saying that they were responsible for detecting the fact that Equifax did not patch their some of their servers and thus were easily hackable. This, of course, means that the hack did not require […]
Continue reading →
[DISPLAY_ACURAX_ICONS]