Home Depot reported today that it spent $43 million in it’s third quarter dealing with the fallout of it’s security breach earlier this year. Of the $43 million, $15 million will be paid for out of its $100 million cyber liability policy. From the press release: The retailer warned that it expects “to incur significant […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired reported on an interesting (yes, I know I am strange, to think that malware attacks are interesting, but they are!) malware attack. The malware, known as DarkHotel, pops up a message alerting the user to a software update as soon as they connect to the hotel’s WiFi. Of course, the update is not a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Boy, just when you thought you were doing it right! Ars Technica, Dark Reading, Security Week and others are reporting a new variant of the Citadel malware that has been around for several years. According to the articles, the new variant monitors processes and when it sees Keepass, Password Safe or neXus start up, it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft just published a critical patch for a 19 year old bug that dates back to Windows 95 and Internet Explorer 3.0. First the obvious – since it was still there after 19 years, all the testing that Microsoft and users have done on every version of windows back to and including Windows 95 did […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to the Wall Street Journal (pay link), the government (US Marshals Service) is flying “dirtboxes” in small airplanes to capture the signals from your cell phone. Basically, a dirtbox is a self contained cell tower with a strong signal. Since your cell phone will connect to the strongest signal, if the dirtbox winds up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in SC Magazine recommends that organizations apply this month’s Microsoft patches very quickly. Among the patches: One vulnerability, CVE-2014-6332, had been remotely exploitable for 18 years prior to its patch, and could be used by an attacker to circumvent Microsoft’s free anti-exploitation tool EMET and its Enhanced Protected Mode (EPM) sandbox in Internet […]
Continue reading →
[DISPLAY_ACURAX_ICONS]