Attackers have figured out that x-rated phishing attacks are very successful. The number of attacks are up almost by a factor of 10. In part, it is designed to shock people. If you open an email or visit a web site and when you do, some x-rated content, most people freak out. THAT IS EXACTLY […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As more police departments are being hit by ransomware attacks, there are several issues to consider. Unfortunately, there is not a simple fix to the problem. First, if the hackers steal data as part of the ransomware attack and then sell or publish it, it could compromise investigations or expose witnesses to physical harm if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Teslas can be Hacked via a DRONE Without any Owner Interaction Researchers have shown how they can hack a Tesla from a done without the owner even being aware that he or she is being attacked and particularly, without the owner being involved in the takeover of the car. The attack, called TBONE, was reported […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I don’t think it is just me. The number of alerts I have been getting over the last few weeks regarding vulnerabilities in very mainstream industrial control system components seems to be out of control. Here are just a few: April 20th – CISA releases 10 Industrial control system (ICS) advisories. This includes Hitachi/ABB, Rockwell, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What could go wrong? As we rush headlong to deploy billions of Internet of Things devices with no regard to security, that doesn’t make security problems go away. Security researchers today disclosed nine vulnerabilities affecting implementations of the Domain Name System protocol in popular TCP/IP network communication stacks running on at least 100 million devices. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well that is certainly not a comforting thought. Last month the public water supply in a small town in Florida was hacked. Only PURE DUMB LUCK protected those citizens. Did the hacker use exotic unknown vulnerabilities to compromise the system? No. The city didn’t even have a firewall, was using software that was no longer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]