ZuoRAT Hijacks SOHO Routers Researchers have found a multi-stage remote access trojan (RAT) being used against a wide range of small and home office routers in Europe and North America. The RAT has been active since 2020 according to the researchers. The malware exploits known vulnerabilities (which is why patching IoT devices and making sure […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Without regard to where you stand on gun control, the events in California last week are an IT and safety failure of massive proportions with no way to remedy the failure. Three days after the media reported the breach, the California Attorney General started dribbling out incorrect information about what happened. There is still no […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While Clearview AI has billions of images for people to search against, they are expensive and fussy (to a degree) about who they sell to. On the other hand, PimEyes is free and available to anyone with a web browser. As I said, a stalker’s dream. Here is how it works. The stalker uploads a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russia Cyber Attacks Lithuania After Gov Refuses to Let Russian Coal, Steel Trains Through Apparently Russia couldn’t figure out a way to do any real damage, so they launched a denial of service attack against a bunch of Lithuanian web sites.. This includes the state tax inspector, migration department and secure national data network. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is an interesting story and we will have to watch to see where it goes. One FCC commissioner sent a letter to Apple and Google asking/telling them to remove TikTok from their app stores. The commissioner, one of the Republicans, Brendan Carr, said “it is clear that TikTok poses an unacceptable national security risk […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There have been many issues over the years with passive (keyless) entry systems, including but not limited to vehicles. In this case, researchers at the NCC Group used a “relay attack” to not only unlock a Tesla Model 3, but also start it and drive away. A relay attack works like this. You take one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]