Apple is dealing today with something that Microsoft or Google is used to dealing with. Hackers attacked a weak link in Apple’s universe – the developer community. Apparently, the performance of Apple’s web site is poor in China, so developers often download software from alternative web sites. These hackers convinced enough developers to download a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
D-Link makes a variety of network equipment, both for home and business users. They release the software for this equipment, for the most part, as open source software. This allows techie users to review the code to see if it does anything bad and since the software is useless unless you bought the hardware, there […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the Ashley Madison breach, everyone sighed a breath of relief because the passwords were encrypted with bcrypt. Bcrypt, as used by Ashley Madison, hashed the password 4,096 times. That calculation meant that even with fast computers it would take centuries to crack all of them. Until a group of hobbyists – yes hobbyists, not professional […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As researchers continue to review the data dumps from the Ashley Madison breach, there are lessons to be learned from what has been found. While Ashley Madison claimed to have good security, the evidence does not support that. For example, the VPN password from the Internet to their servers was Pass1234, according to one article […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is the week for car hacks – because it is the week before the hacker conference Defcon. In this case, for about $100, a researcher has created a black box that, while no where as dramatic as the Jeep hack, is still unnerving. The black box is a WiFi hotspot. It intercepts the communications […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: The details are out. The issue is that under certain circumstances, a hacker could get OpenSSL to accept an HTTPS certificate that is fraudulent. This does not affect the major browsers, but rather the second and third tier software that uses SSL behind the scenes. Likely, you don’t even know all the places that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]