An Article last week in the Pittsburgh Post-Gazette written by the law firm of Meyer, Unkovic & Scott LLP, stated what I would think is obvious, but apparently not. 78 percent of global dealmakers report that cybersecurity isn’t a part of the due diligence process before mergers and acquisitions. And why, you ask, is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to multiple news reports (like BBC, Forbes, and Computerworld), Sony has been hacked again. This time they were hacked by the GOP (no, not that GOP, the Guardians of Peace). So, here is what Sony’s office looked like yesterday – and your’s might if you get hacked. Employees came into the office yesterday, turned […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ars technica reported yesterday on a very sophisticated trojan that has been around, they say, since 2008, went dark in 2011 and came back in 2013. The trojan is comprised of 5 stages, all but the first of which is encrypted and is serially decrypted to avoid detection. The interesting part about it is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many of us try hard not to use our credit cards. As a result, we tend to use our debit cards frequently. Many debit cards carry either a Visa or Mastercard logo, which allows you to use the card as either a debit card or a credit card. No matter which option you choose, the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to articles on ZDNet and ABC, NSA chief Admiral Mike Rogers said in testimony before the US House Intelligence Committee that China and probably one or two other countries could shut down critical computer networks that could force U.S. power and water grids, aviation systems and financial systems offline. Let that sink in for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There was an interesting article in Wired that “outed” Verizon’s use of perma-cookies. Simply explained, perma-cookies are cookies that identify the user that are added by the carrier between the user’s browser and the receiving web site. The effect of this is an ID that will follow the user, potentially across devices, silently, with no […]
Continue reading →
[DISPLAY_ACURAX_ICONS]