720-891-1663

Beware How You Use Password Managers

ARS Technica wrote a piece on the continuing security flaw with password managers like LastPass and KeePass on Android.  Technically, the problem is an Android problem, but from the user’s standpoint they don’t really care. The problem is tools like LastPass and many others use the Android clipboard to automatically log you on to a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Assumption Of Privacy – NOT!

Pierluigi Paganini, a fellow security blogger in Italy, wrote about a situation with Vodaphone where a Vodaphone employee rumaged through a journalist’s texts and phone calls to try and find the source of a story that the journalist wrote which was critical of Vodaphone’s security. The journalist, Natalie O’Brien, pictured above, described it as “creepy […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Password Reuse A Problem – 11 Million Ashley Madison Passwords Cracked Already

After the Ashley Madison breach, everyone sighed a breath of relief because the passwords were encrypted with bcrypt.  Bcrypt, as used by Ashley Madison, hashed the password 4,096 times.  That calculation meant that even with fast computers it would take centuries to crack all of them. Until a group of hobbyists – yes hobbyists, not professional […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Ashley Madison Hack Provides IT Pros More Hints On What Not To Do

As researchers continue to review the data dumps from the Ashley Madison breach, there are lessons to be learned from what has been found. While Ashley Madison claimed to have good security, the evidence does not support that.  For example, the VPN password from the Internet to their servers was Pass1234, according to one article […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Cost Of Not Following The HIPAA Rules For One Firm – $750,000

Cancer Care Group, an Indianapolis based Oncology practice learned a lesson the hard way. They allowed an employee to have an unencrypted laptop and a server in his car, from which both computers were stolen. They discovered that the computers contained protected health information – social security numbers and insurance data for 55,000 patients. The […]

Continue reading → [DISPLAY_ACURAX_ICONS]