Lenovo has stopped installing software which allows them to overwrite system files with their version of those files, even if you wipe the disk. They have released a patch for it and recommend that users install the fixes, especially on laptops, quickly. How they do it is quite amazing. Lenovo has built, into the firmware […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
People say that it is too hard to stop the bad guys. Well, you can make it a lot harder on them if you don’t just play into their hands. Ubiquiti Networks, a tech company who makes wireless equipment, is publicly traded and had revenue of $150 million in the quarter ending Sep. 30, 2014, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who use Bit Torrent to download pirated movies, this post is for you. Microsoft has turned every Windows 10 Home and Windows 10 Pro user into a Bit Torrent node of sorts, delivering Microsoft updates to their millions of customers. Like other Windows 10 features (WiFi Sense, for example), I am […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is the week for car hacks – because it is the week before the hacker conference Defcon. In this case, for about $100, a researcher has created a black box that, while no where as dramatic as the Jeep hack, is still unnerving. The black box is a WiFi hotspot. It intercepts the communications […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following on from yesterday’s United Airlines post, both Kaspersky and Symantec are reporting about a hacking group that is not interested in stealing credit cards. Instead, they are stealing corporate secrets for financial gain. Whether they are using them for insider trading or selling them to the highest bidder, the group, whom Kaspersky calls Wild […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With Windows 10 (and previously, Windows 8.1 phone), Microsoft has created a way for you to share WiFi passwords without revealing them – sort of. In my opinion, and in the opinion of a lot of other security professionals, this is a complete security disaster. There are some things that you can do to mitigate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]