Orphaned Data in the Cloud Researchers at security firm vpnMentor found an unsecured S3 bucket with passport, tax forms, background checks, job applications and other sensitive data for thousands of employees of British consultancies. Many of the firms involved are no longer in business. The researchers reported this to Amazon and the UK’s Computer Emergency […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here is the punch line. Automotive cybersecurity incidents doubled in 2018 and are up 605% since 2016. That doesn’t seem that safe to me. Here are some statistics from Upstreams 2019 automotive cybersecurity report: 330 million vehicles are already connection and top brands in the US say that they will only sell connected vehicles this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No, I am not kidding. Currently, your Social Security Number is effectively a national identifier. Except when it is not allowed to be used. In many healthcare situations, they use first and last name plus birth date. Apparently, however, that is more than a bit error prone. This has led to treatment errors and medication […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple’s Ad Tracking Crackdown Shakes Up Ad Market Two years ago Apple decided that since they don’t earn a lot of revenue from ads and Google, their competitor in the phone business, does, wouldn’t it be great to do something to hurt them. Oh, yeah, we can pretend the real reason we are doing it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Text messages, as many people know are not very secure. If you are asking where we are meeting for lunch, you probably don’t care. But many banks use text messages (technically known as SMS or Short Message Service) as a second factor to enhance login security. While it does help some, it would be a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Caller Poses as CISA Rep in Extortion Scam Homeland Security’s CISA (Cybersecurity and Infrastructure Security Agency) says that they are aware of a scam where a caller pretends to be a CISA rep and claims to have knowledge of the potential victim’s questionable behavior. The caller then attempts to extort the potential victim. CISA says […]
Continue reading →
[DISPLAY_ACURAX_ICONS]