I don’t know about you, but I am not inclined to believe that my cell phone provider is the best company to protect my security, but they disagree. And who knows – maybe it could work. The basis of Project Verify is that each cell phone has a unique fingerprint that allows the carrier to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes even if you try to be safe, it doesn’t work the way you want. Fiserv provides banking software to over a third of all banks. They have 24,000 employees and almost $6 billion in revenue. Many of its client banks are smaller banks and credit unions, but some large banks use Fiserv too. Apparently, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lack of Vendor Cyber Risk Management Hurts over 750 Banks TCM Bank, a company that helps hundreds of small banks issue credit cards had a problem with their third party vendor – the bank’s fourth party vendor risk. The small bank wants to issue credit cards so they hire TCM and TCM hires someone else […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco has released an advisory that a half million consumer and small business routers and growing have been infected with malware dubbed VPNFilter. The malware was detected infecting routers from: Linksys MikroTik Netgear TP-Link and QNap storage devices The researchers have not figured out a test that a consumer or small business can use to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cryptocurrency is an interesting beast. Unregulated by governments. Not backed by reserves or governments. Difficult to track IF DONE RIGHT. Completely transparent if not done right. For all of these reasons, it is the target of attackers of all stripes. The first attack this week was in England. Armed robbers broke into the home of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As if it wasn’t already a bad enough month for Intel, it just got a bit worse. This is not related to Spectre or Meltdown; this is an entirely new problem. Intel processors have a remote management engine called Active Management Technology or AMT. This allows corporate administrators to remotely take over those computers to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]