Adobe announced patches yesterday for 23 additional Flash vulnerabilities. 18 of these bugs can be used to run malicious code on the underlying computer. To see what version you are running, go to: WWW.Adobe.com/software/flash/about That web page will give you the version that you are running, the current version that you should be running and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In a classic TSA response, the TSA says that this is no big deal. First, here is what they said in 2003 when they introduced them: TSA official Ken Lauterstein described them as part of the agency’s efforts to develop “practical solutions that contribute toward our goal of providing world-class security and world-class customer service.” Now, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ARS Technica wrote a piece on the continuing security flaw with password managers like LastPass and KeePass on Android. Technically, the problem is an Android problem, but from the user’s standpoint they don’t really care. The problem is tools like LastPass and many others use the Android clipboard to automatically log you on to a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI released a warning this week regarding the Internet of Things security, which is pretty unusual. As a result, a lot of digital ink has been used up writing about it. I will use up a little more digital ink. What is unusual is the FBI warning doesn’t mention any particular issue – it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
iStan is “the most advanced wireless patient simulator on the market, with internal robotics that mimic human cardiovascular, respiratory, and neurological systems,” according to CAE Healthcare. iStan costs about $100,000 and is regularly used by hospitals to teach medical school students how to perform procedures without murdering people. That’s nice, but here is the interesting part. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE August 19, 2015 – As I predicted, there are now web sites which allow you to search the Ashley Madison data. Check this Wired article for links: http://www.wired.com/2015/08/check-loved-one-exposed-ashley-madison-hack/ . The hackers who broke into the Ashley Madison web site last month threatened to make the data that they stole public if Ashley Madison’s parent […]
Continue reading →
[DISPLAY_ACURAX_ICONS]