Two articles in Bloomberg BNA today point to some of the reasons. First, a panel at the ABA Business Law Section spring meeting said that boards have a fiduciary obligation to assure a reasonable information technology reporting system for cybersecurity threats and breaches. They said that this can be an issue for some companies because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A recent Network World article talks about the world of high tech auto theft. Using a $17 amplifier, thieves were able to boost the signal between your car and your key fob sitting on the kitchen table and convince your car to open up. The article has links to several other articles including one that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The International Business Times is reporting that Benjamin Lawsky, New York State’s top bank cop surveyed 40 banks and found that fewer than half regularly inspect the security systems of their outside vendors. Both the Target and Home Depot breaches were caused by compromised third party vendors. Regulators are concerned that light oversight of bank’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The PCI Council normally releases a new version of the standard which governs merchants that accept credit cards once every three years. Given that version 3.0 came out in January, everybody thought they were safe for a while. Version 3.1 was released today and even though merchants have 14 months to become compliant, there is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone talks about “The Internet Of Things” (IoT), whether it is a web accessible security camera or your internet connected refrigerator that tells you when you are low on milk. Recently, a stalker talked to a nanny while she changed the baby’s diaper. We have also seen home routers with vulnerabilities that allow a hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: (Note: this is a bit geeky) Again according to Steve Gibson, the way this malware that attacked Github and GreatFire worked is that it modified the local hosts file using vulnerabilities that were fixed but that users had not yet patched and changed the local hosts file. It created entries for connect.facebook.net and google-analytics.com […]
Continue reading →
[DISPLAY_ACURAX_ICONS]