UPDATE: OPM said that 3.6 million of the 4.2 million people affected by the first breach were also in the casualty count of the second breach, so the total should be around 22 million instead of 25 million. However, they added 1.8 million fingerprints to the mix. OPM said that notifications for the second breach […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you haven’t seen the news today, the morning started with United Airlines saying that they experienced a “system-wide computer problem”. United later said that an issue with a network router “degraded network connectivity for various applications, causing this morning’s operational disruption”. The disruption meant that no United flights took off from about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The WSJ Blog had a guest post from Deloitte talking about why the U.S. electric grid is still vulnerable to attack. The short answer is that the grid is being used and managed in a way that it was never designed to operate and the utilities and manufacturers have not adjusted to that fact (see […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired wrote a piece about how Apple and Google are trying hard to kill off apps. In part, I buy what Wired says – that it is about the user experience and if you can seamlessly integrate that experience into the platform (iPhone or Android) then you don’t really care about the app. I think […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is common, if not automatic, for companies that have their information systems breached to offer credit monitoring services, and this includes medical record breaches. Consumers can also pay companies like Lifelock to provide the same services. The question is do they work and the answer is, for the most part, not really. Brian Krebs […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone talks about “The Internet Of Things” (IoT), whether it is a web accessible security camera or your internet connected refrigerator that tells you when you are low on milk. Recently, a stalker talked to a nanny while she changed the baby’s diaper. We have also seen home routers with vulnerabilities that allow a hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]