TLS Certificate Lifetimes Will Officially Reduce to 47 Days If you are responsible for a website, this applies to you. TLS certificates, the tech behind making HTTPS:// work on your website, has been changing over the years. A website owner used to be able to buy a certificate and it would be valid for 10 years. But […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have seen multiple attacks in the last few years on municipal water supplies. The good news is that none of them killed anyone. Mostly, that was just because we were lucky. A bug in a TLS certificate (used to implement HTTPS) allowed researchers to view the water system control panel in hundreds of public […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Fake Social Security Emails Trick Users into Installing Remote Access SW Cybersecurity experts have uncovered ongoing schemes where criminals are exploiting the US Social Security Administration (SSA) to trick people into installing a dangerous Remote Access Trojan (RAT). This program gives the attackers complete remote control, allowing them to steal personal information and install more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You may disregard my opinion about this but what about the opinion of a Retired US Army Lt. General and a very smart CSIO who used to be an Air Force Intelligence Officer? Retired Lt. Gen H.R. McMaster, who served as the US National Security Advisor during 2017 and 2018 and who had roles in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I understand that the government needs to save money. There probably is enough waste to fund a small country. Or many a bigger one. But are we doing that wisely? CISA, which is the key agency to protect civilian government agencies, especially now with all of the layoffs and which is also the agency directed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lazy Passwords Still Prevail A new study of over 19 billion newly exposed passwords manifests a widespread weak password reuse crisis. Lazy keyboard patterns, such as 123456, still reign supreme, and 94% of passwords are reused or duplicated, data leaks from 2024-2025 reveal. Names like Ana rank as the second most popular component. Only 6 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]