720-891-1663

Is your encryption secure? – Sure, just like flying pigs (keep reading)

Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth;  it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers break in to German steel mill and cause “serious damage”

BBC and others are reporting that a German steel mill was hacked.  The report came not from the news media or the mill, but rather the German Federal Office for Information Security (BSI). As a result, not a lot of details are known, but the posting are new, so perhaps more information will come out […]

Continue reading → [DISPLAY_ACURAX_ICONS]

SS7 flaws enable listening to cell phone calls and reading texts

SC Magazine is reporting that a flaw signaling System 7, the telephone industry standard for setting up, managing and tearing down phone calls allows anyone to listen in on cell phone calls, read texts and locate a user. Two separate researchers have identified the flaw and are going to demonstrate it at a hackers conference […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Is your small business safe from cyber attacks

In light of the recent cyber incidents, small and medium sized business owners should be looking at their cyber readiness and asking “Am I safe from cyber attacks?”. Unfortunately, for many businesses, the answer is no.  The Huffington Post wrote an article on the issue and I think that some of the points that they […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Healthcare Providers Need To Have An Effective Cyber Security Program

The Anchorage Community Mental Health Services (ACMHS) just agreed to pay a $150,000 fine after a 2012 breach of approximately 2,500 patients protected Health Information (PHI) due to malware on their healthcare software system according to Healthcare IT News. Apparently ACMHS had adopted the sample Security Rule policies in 2005 but didn’t bother to follow […]

Continue reading → [DISPLAY_ACURAX_ICONS]