Supply Chain Attacks Roll On The Accellion File Transfer Appliance vulnerabilities have been the source of many breach notifcations over the last several months. For whatever reason, they seem to be dribbling out. The newest one is Morgan Stanley. In this case, it was a Morgan Stanley VENDOR that was using Accellion, so instead of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Flash – The Gift That Keeps on Giving Flash, that piece of garbage software that Adobe finally killed a few months ago and which, I have said, should have been killed 20 years ago, it turns out, is at the root of another supply chain hack. For many people, supply chain attacks first came to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
WD NAS Devices Are Being Wiped Worldwide The downside of using computers beyond their end of support is that you can get hacked and all of your data can get wiped. This is what has happened to many WD My Book owners. Western Digital stopped patching them in 2015 and hackers have figured out how […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Paying Ransom is Tax Deductible Under current IRS regulations, paying cyber ransom after a hack is deductible, just like losses from a robbery, but the IRS is “looking into it”. One way the government could discourage ransom payments is if the cost is borne fully by the company’s owners. They still might choose to do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The UK Might Beat Us to Regulating MSPs In the US, anyone can become a managed service provider. Unfortunately, customers may think that comes with security, but usually it does not. The UK is about to create a legally binding cybersecurity framework for managed service providers. This may be the first step at forcing businesses […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Teslas can be Hacked via a DRONE Without any Owner Interaction Researchers have shown how they can hack a Tesla from a done without the owner even being aware that he or she is being attacked and particularly, without the owner being involved in the takeover of the car. The attack, called TBONE, was reported […]
Continue reading →
[DISPLAY_ACURAX_ICONS]