720-891-1663

Microsoft Uses Customer Bandwidth To Deliver Windows 10 Updates

For those of you who use Bit Torrent to download pirated movies, this post is for you.  Microsoft has turned every Windows 10 Home and Windows 10 Pro user into a Bit Torrent node of sorts, delivering Microsoft updates to their millions of customers. Like other Windows 10 features (WiFi Sense, for example), I am […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Wild Neutrons Are Coming

Following on from yesterday’s United Airlines post, both Kaspersky and Symantec are reporting about a hacking group that is not interested in stealing credit cards.  Instead, they are stealing corporate secrets for financial gain.  Whether they are using them for insider trading or selling them to the highest bidder, the group, whom Kaspersky calls Wild […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Microsoft’s Newest Security Nightmare – WiFi Sense

With Windows 10 (and previously, Windows 8.1 phone), Microsoft has created a way for you to share WiFi passwords without revealing them – sort of.  In my opinion, and in the opinion of a lot of other security professionals, this is a complete security disaster.    There are some things that you can do to  mitigate […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Smartwatches Fail Security Test

HP’s security folks tested the security features on 10 smartwatches along with their cloud and management infrastructure and the results, while not surprising to me, are disappointing. Smart watches are in their infancy; the compute power is relatively limited and, as is usually the case, features win out over security.  The question to ask is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Fallout From OPM Breach Continues

Not surprisingly, the fallout from the OPM breach continues.  Here are a few new items in the news after OPM Director Archuletta was basically fired. The OPM has changed it’s privacy policy to allow investigators to probe it’s databases.  This happened after the discovery of “significant entryways” for hackers in at least 3 more databases. […]

Continue reading → [DISPLAY_ACURAX_ICONS]