DentistryIQ, a web site for dental professionals ran a piece last week talking about dentists (and while the article didn’t talk about it, doctors as well) being a target for cyber criminals (see article). If you think about it, it makes a lot of sense. Think about all the non public personal information that a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sorry this post is so long, but we are beginning to see more information on how Stingrays work and are used. As I said the other day in my last Stingray post, the cat is kind of out of the bag (see post) and only going to be more so. Well, along those lines, Wired […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I have reported before, more law enforcement agencies are using cell phone interceptors to obtain evidence of crimes. This is not particularly surprising given how important cell phones are in our lives – they are likely just as important in the lives of bad guys. What is interesting is the secrecy surrounding them. In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Network World wrote about a company that experienced an outage with Microsoft Office 365 cloud email. Users could not get to their email from Outlook or on their phones for 24 hours and it affected users in the U.S. and overseas (see article). The company filed a claim with Microsoft for breaching the SLA but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alleged Russian hacker Validimir Drinkman, 34, was arraigned yesterday on hacking into 16 companies including The NASDAQ stock exchange, 7-11, J.C. Penney, Dow Jones, Heartland Payment Systems and others and stealing 160 million credit card numbers (see article). The attacks go as far back as 2005. Brian Krebs provides an inventory of some of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I often quote the statistic that Experian promotes that 60 percent of small and medium businesses that suffer a cyber security breach go out of business within 6 months. That is a pretty sobering number. However, First Data reports two amazing statistics – First, they say that 90 percent of the data breaches impact small […]
Continue reading →
[DISPLAY_ACURAX_ICONS]