Rackspace Tells Its 300,000 Customers That Impact of Ransomware was Limited Due to Their Great Incident Response (Not?) In what can only be called an amazing expression of tone-deafness, Rackspace says that due to their great incident response program, only their exchange users were shut down due to a ransomware attack. Needless to say, the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why PREVENTING Ransomware is the Only Option Patients of Methodist McKinney Hospital and two of its surgery centers are preparing for their data to be sold on the dark web. Healthcare is a prime target for hackers for a number of reasons. The hospital decided not to pay the ransom for 360 gigabytes of stolen […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Windows 11 May Damage Data on Some CPUs Microsoft issued a warning that computers that use the Vector AES instruction set might damage data , but they don’t say how or why. Microsoft says fixes in June and May prevent further damage but the result is that encryption is much slower after the patch. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The cloud is not magic. Nor does it fix all vulnerabilities. Cases in point. Two security vendors are accusing Microsoft of unnecessarily putting customers’ data at risk. The vendors, Orca Security and Tenable, are not bit players with a grudge, so you have to, at least, listen to them. According to the source: In a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyber Command Says Chip Shortage is a National Security Issue The head of U.S. Cyber Command, General Paul Nakasone, told Congress that China’s continued progress towards domestic chip production is a problem. If China achieves chip independence, that puts them in a position to do what they want and not worry about sanctions. For example, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Software released by Microsoft and other vendors is digitally signed so that users can validate that it really came from the vendor in question and that it has not been modified since the vendor created it. However, hackers have figured out how to bypass the security provided by Microsoft’s digital signature verification process, allowing them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]