ARS Technica wrote a piece on the continuing security flaw with password managers like LastPass and KeePass on Android. Technically, the problem is an Android problem, but from the user’s standpoint they don’t really care. The problem is tools like LastPass and many others use the Android clipboard to automatically log you on to a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI released a warning this week regarding the Internet of Things security, which is pretty unusual. As a result, a lot of digital ink has been used up writing about it. I will use up a little more digital ink. What is unusual is the FBI warning doesn’t mention any particular issue – it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Pierluigi Paganini, a fellow security blogger in Italy, wrote about a situation with Vodaphone where a Vodaphone employee rumaged through a journalist’s texts and phone calls to try and find the source of a story that the journalist wrote which was critical of Vodaphone’s security. The journalist, Natalie O’Brien, pictured above, described it as “creepy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the Ashley Madison breach, everyone sighed a breath of relief because the passwords were encrypted with bcrypt. Bcrypt, as used by Ashley Madison, hashed the password 4,096 times. That calculation meant that even with fast computers it would take centuries to crack all of them. Until a group of hobbyists – yes hobbyists, not professional […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As researchers continue to review the data dumps from the Ashley Madison breach, there are lessons to be learned from what has been found. While Ashley Madison claimed to have good security, the evidence does not support that. For example, the VPN password from the Internet to their servers was Pass1234, according to one article […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cancer Care Group, an Indianapolis based Oncology practice learned a lesson the hard way. They allowed an employee to have an unencrypted laptop and a server in his car, from which both computers were stolen. They discovered that the computers contained protected health information – social security numbers and insurance data for 55,000 patients. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]