Everyone talks about “The Internet Of Things” (IoT), whether it is a web accessible security camera or your internet connected refrigerator that tells you when you are low on milk. Recently, a stalker talked to a nanny while she changed the baby’s diaper. We have also seen home routers with vulnerabilities that allow a hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: (Note: this is a bit geeky) Again according to Steve Gibson, the way this malware that attacked Github and GreatFire worked is that it modified the local hosts file using vulnerabilities that were fixed but that users had not yet patched and changed the local hosts file. It created entries for connect.facebook.net and google-analytics.com […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CSO Magazine has an interesting article on home and small office backups (see article). Many “private cloud” backups allow you to backup your files to a device on your local network and access your backups anywhere you have access to the Internet. Sometimes, that was not even intended, but due to misconfiguration or bad default […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ad injectors are usually implemented as browser add-ins that place their own ads on web pages that you visit. These adds could replace existing ads or insert new, additional ads. The can also inject malware into your computer. Google worked with a team of researchers at the University of California at Berkeley and found 200 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: For those of you who are Mac users and laughing at the poor Windows users, this affects you too. The Rootpipe malware silently escalated its privileges to your maximum privileges to launch an attack on your system. Apple just recently fixed this, but ONLY FOR THE CURRENT VERSION OF OSx – apparently, it was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Retail Federation, in testimony before Congress (see article), said that the government should expand protections for debit card users (Federal protections for debit card users are less than for credit card users), pass a national breach notification law and boost prosecution for cyber crimes. The harder question is who is responsible for breaches. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]