For those of you who use Bit Torrent to download pirated movies, this post is for you. Microsoft has turned every Windows 10 Home and Windows 10 Pro user into a Bit Torrent node of sorts, delivering Microsoft updates to their millions of customers. Like other Windows 10 features (WiFi Sense, for example), I am […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is the week for car hacks – because it is the week before the hacker conference Defcon. In this case, for about $100, a researcher has created a black box that, while no where as dramatic as the Jeep hack, is still unnerving. The black box is a WiFi hotspot. It intercepts the communications […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following on from yesterday’s United Airlines post, both Kaspersky and Symantec are reporting about a hacking group that is not interested in stealing credit cards. Instead, they are stealing corporate secrets for financial gain. Whether they are using them for insider trading or selling them to the highest bidder, the group, whom Kaspersky calls Wild […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
With Windows 10 (and previously, Windows 8.1 phone), Microsoft has created a way for you to share WiFi passwords without revealing them – sort of. In my opinion, and in the opinion of a lot of other security professionals, this is a complete security disaster. There are some things that you can do to mitigate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HP’s security folks tested the security features on 10 smartwatches along with their cloud and management infrastructure and the results, while not surprising to me, are disappointing. Smart watches are in their infancy; the compute power is relatively limited and, as is usually the case, features win out over security. The question to ask is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Not surprisingly, the fallout from the OPM breach continues. Here are a few new items in the news after OPM Director Archuletta was basically fired. The OPM has changed it’s privacy policy to allow investigators to probe it’s databases. This happened after the discovery of “significant entryways” for hackers in at least 3 more databases. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]