In case you haven’t seen the news today, the morning started with United Airlines saying that they experienced a “system-wide computer problem”. United later said that an issue with a network router “degraded network connectivity for various applications, causing this morning’s operational disruption”. The disruption meant that no United flights took off from about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The WSJ Blog had a guest post from Deloitte talking about why the U.S. electric grid is still vulnerable to attack. The short answer is that the grid is being used and managed in a way that it was never designed to operate and the utilities and manufacturers have not adjusted to that fact (see […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired wrote a piece about how Apple and Google are trying hard to kill off apps. In part, I buy what Wired says – that it is about the user experience and if you can seamlessly integrate that experience into the platform (iPhone or Android) then you don’t really care about the app. I think […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is common, if not automatic, for companies that have their information systems breached to offer credit monitoring services, and this includes medical record breaches. Consumers can also pay companies like Lifelock to provide the same services. The question is do they work and the answer is, for the most part, not really. Brian Krebs […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone talks about “The Internet Of Things” (IoT), whether it is a web accessible security camera or your internet connected refrigerator that tells you when you are low on milk. Recently, a stalker talked to a nanny while she changed the baby’s diaper. We have also seen home routers with vulnerabilities that allow a hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ad injectors are usually implemented as browser add-ins that place their own ads on web pages that you visit. These adds could replace existing ads or insert new, additional ads. The can also inject malware into your computer. Google worked with a team of researchers at the University of California at Berkeley and found 200 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]