I am certain we will see a number of people comment on what Sony shoulda/coulda/oughta have done and there is likely some truth in all of them. Here is one and my thoughts on it, from Data Breach Today. This is from a blog post by Matthew Schwartz. He makes 7 points, which I mostly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth; it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
BBC and others are reporting that a German steel mill was hacked. The report came not from the news media or the mill, but rather the German Federal Office for Information Security (BSI). As a result, not a lot of details are known, but the posting are new, so perhaps more information will come out […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SC Magazine is reporting that a flaw signaling System 7, the telephone industry standard for setting up, managing and tearing down phone calls allows anyone to listen in on cell phone calls, read texts and locate a user. Two separate researchers have identified the flaw and are going to demonstrate it at a hackers conference […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the recent cyber incidents, small and medium sized business owners should be looking at their cyber readiness and asking “Am I safe from cyber attacks?”. Unfortunately, for many businesses, the answer is no. The Huffington Post wrote an article on the issue and I think that some of the points that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Anchorage Community Mental Health Services (ACMHS) just agreed to pay a $150,000 fine after a 2012 breach of approximately 2,500 patients protected Health Information (PHI) due to malware on their healthcare software system according to Healthcare IT News. Apparently ACMHS had adopted the sample Security Rule policies in 2005 but didn’t bother to follow […]
Continue reading →
[DISPLAY_ACURAX_ICONS]