720-891-1663

Why Knowledge Based Authentication Is Useless

Knowledge Based Authentication – using information that only you know – used to be a very popular method for validating that you are you.  Examples of this are when a customer service agent asks you for your birth date, last four of your social or where you were born.  The credit bureaus even sell that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

UL Seal Of Approval On Your Internet Connected Device – Maybe

Underwriters labs, the folks that test most consumer electrical appliances for safety, has set up a division to certify Internet of Things devices – whatever they are.  Apparently, most people have heard of the term, but don’t know what that means.  An example of it might be your Internet connected refrigerator that texts you when […]

Continue reading → [DISPLAY_ACURAX_ICONS]

OpenSSL: Here We Go Again

UPDATE:  The details are out.  The issue is that under certain circumstances, a hacker could get OpenSSL to accept an HTTPS certificate that is fraudulent.  This does not affect the major browsers, but rather the second and third tier software that uses SSL behind the scenes.  Likely, you don’t even know all the places that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

A Lesson From The Bitstamp Bitcoin Exchange Breach

Bitstamp, a European bitcoin exchange, suffered a breach on January 4th of this year.  According to a breach report apparently prepared for Bitstamp, the breach was a result of a determined adversary and a very typical but rookie mistake on the part of a Bitstamp administrator. The breach cost Bitstamp 18,997 bitcoins worth a little over […]

Continue reading → [DISPLAY_ACURAX_ICONS]