Sometimes the police do some great tech work. This case does not appear to include any U.S. law enforcement agencies, but sometimes they don’t want any attention for a number of reasons. This story starts with criminals using a specially modified phone that was designed to be more secure. The phone, called an EncroChat, has […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since the early 1990s, there has been a battle going on between the federal government and privacy advocates. Privacy advocates want strong encryption. The government wants weak encryption that it can break. Except of course for the encryption that they use. They claim they need it is to hunt down terrorists, but that didn’t get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It all starts with a calendar invite, but there is a setup. The con is that your bank account has been compromised and you need to fix it. The attack starts with an email titled (like) “Fraud Detection from Message Center”. This part of the attack uses a real but compromised Office 365 account, complete […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Anonymous Gonna Rise Again. Question Mark? A hacker or hackers claiming to be affiliated the non-group Anonymous has posted a million documents coming from over 200 police departments and other law enforcement agencies. While the documents do no purport to show illegal activities, they are likely both embarrassing and also confidential. The fact that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If that headline doesn’t scare you, it should. Ripple20 is a family of 19 vulnerabilities that are part of a library that is used in medical devices, home automation devices, oil & gas controls, networking devices and other industrial control devices. The bugs are in a library that was developed in the 1990s and is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Vault 7 leak, in which Wikileaks posted information about a large number of CIA hacking tools was possibly the worst national security compromise the Agency has ever seen. Not only did it reveal our techniques for hacking foreign systems but the hackers repurposed those tools and hacked American and other friendly companies and governments. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]