720-891-1663

Jimmy Johns Breach Affects Others

As Brian Krebs reported late last week, the Jimmy Johns breach has a larger impact than previously reported.  In a nutshell, here are the details: The attack affected 216 Jimmy Johns stores nationwide The hackers compromised the username and password used for remote administration The POS or cash register software was created by Newtown, PA […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Oracle’s Patch – Where Does A Vendor’s Responsibility End?

According to CNN, Oracle discovered an issue in 2012 that allowed hackers to compromise Oracle systems with this weakness.  Some white hat hackers were wandering around the internet recently (in 2014) and discovered that some systems had not had this patch applied. These hackers were able to access children’s school records, arrest records, the real […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Sometimes the simple con is the best con

According to an article in Business Insider, Sharron Laverne Parrish, Jr. scammed Apple 42 times with a very simple scam.  He presented debit cards on closed accounts for purchases – apparently in the thousands of dollars each.  When the card was declined, he offered to call his bank and handle it.  Except he was not […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Russian tool grabs nude selfies from iCloud accounts

Yes, this is for real.  Russian entrepreneurs have figured out there is a market for this. According to an article in ITWorld, there is a business in hacking iCloud accounts.  Get the password by some means and then using EPPB from Elcomsoft, the hacker can grab just pictures or contact or messages – just what […]

Continue reading → [DISPLAY_ACURAX_ICONS]