CSO Magazine is reporting on an experiment conducted by the Ponemon Institute. They sent researchers disguised as temporary employees, with temporary badges, into 43 offices belonging to 7 companies. The management was aware of the plan but the office staffs were not aware. The researchers went into the offices, wandered around, took pictures of computer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have known for a long time that the encryption on cell phone calls and text messages was relatively weak, but apparently, cracking that was more work than GCHQ, the British version of the NSA, wanted to do. People have been beating up the NSA for being, well, the NSA. I have said, whether we […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Homeland Security Today and others are reporting that three months after the State Department admitted that hackers had gotten into their unclassified email system, the hackers are still there. (see article) While it is always fun to beat up government bureaucracies, it points out that sometimes getting hackers out is a hard thing to do. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Network World wrote about a company that experienced an outage with Microsoft Office 365 cloud email. Users could not get to their email from Outlook or on their phones for 24 hours and it affected users in the U.S. and overseas (see article). The company filed a claim with Microsoft for breaching the SLA but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Marc Rogers (white hat hacker and principal security researcher for Cloudflare) wrote about an interesting problem Lenovo users have. (see article) What is not clear is how long Lenovo has been doing this. The good news is that a friend of Marc’s has created a test to see if your Lenovo laptop is infected. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Representative Will Hurd (R-TX), is the head of the House Information Technology Subcommittee and a former CIA Agent who spent 9 years in Afghanistan, Pakistan and India, working on counter terrorism and cyber security before working for the cyber security firm FusionX. He has a somewhat depressing but very accurate view of cyber security. In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]