Jackson County Pays $400,000 in Ransomware Following a ransomware attack on March 1st, 2019, Jackson County, Georgia decided to pay hackers a ransom of $400,000. The county population is 67,000 according to Google. While hackers may not be explicitly targeting these small municipalities, they may be. After all, small municipalities likely have poor cybersecurity practices […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Commerce Department Wants Companies to Publish Ingredients of their Software The Commerce Department is trolling around the RSA conference trying to get companies to publish the ingredients in their software – the so called bill of materials that I have written about before – so that users can understand what libraries are being loaded. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We Don’t Need Back Doors in Crypto – We Have Enough Bugs Already! Researchers have found three new bugs in the protocol design (as opposed to the implementation) in both 4G and 4G cellular networks. The design flaws can be carried out by any person with a little knowledge of cellular paging protocols. The hardware to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Over 5 Billion Records Exposed in 2018 Risk Based Security is reporting that there were 6,515 publicly reported breaches in 2018 exposing over 5 billion records. This is a couple hundred breaches less than 2017, but the final numbers are not in yet as breaches continue to be reported. The number of days between discovery […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Anybody Know What 5G Cellular Means? 5G is the next generation of cellular, promising blindingly fast service and web page loads in the blink of an eye. Unfortunately, it doesn’t really exist yet. Yes, a few carriers have set up a few cell sites in a few cities, but there are basically NO phones that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Text Messaging for Two Factor Authentication is Under Attack We have talked on occasion about a basically theoretical attack against text messages as the second factor for authentication. It is likely that the feds know more than they are telling us about that since the National Institute of Standards and Technology has deprecated the use […]
Continue reading →
[DISPLAY_ACURAX_ICONS]