The short answer is we don’t know. That should scare you a bit. In fact, it is likely that I have a better handle on the cybersecurity of my drinking water than many public water systems do. Here are some stats. A MAJORITY of the 52,000 drinking water supply systems in the United States have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mobile finance apps are very popular, but are they safe? A report by security company Intertrust says that 88% of the apps tested failed at least one of the cryptographic tests, meaning that the encryption can be broken, resulting in loss of privacy and possibly loss of your money. Some of the other findings from […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security Company Founder Charged with Hacking Georgia Hospital An indictment unsealed this week in a Northern District of Georgia court accuses Vikas Singla, 45, with 18 separate counts of aiding and abetting a 2018 cyber attack against the Gwinnett Medical Center in Georgia. According to his LinkedIn profile, he is (or maybe now was) the COO of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Attackers have figured out that x-rated phishing attacks are very successful. The number of attacks are up almost by a factor of 10. In part, it is designed to shock people. If you open an email or visit a web site and when you do, some x-rated content, most people freak out. THAT IS EXACTLY […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As more police departments are being hit by ransomware attacks, there are several issues to consider. Unfortunately, there is not a simple fix to the problem. First, if the hackers steal data as part of the ransomware attack and then sell or publish it, it could compromise investigations or expose witnesses to physical harm if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Teslas can be Hacked via a DRONE Without any Owner Interaction Researchers have shown how they can hack a Tesla from a done without the owner even being aware that he or she is being attacked and particularly, without the owner being involved in the takeover of the car. The attack, called TBONE, was reported […]
Continue reading →
[DISPLAY_ACURAX_ICONS]