720-891-1663

Apple’s Turn – Major Cyber Attack

Apple is dealing today with something that Microsoft or Google is used to dealing with.  Hackers attacked a weak link in Apple’s universe – the developer community.  Apparently, the performance of Apple’s web site is poor in China, so developers often download software from alternative web sites.  These hackers convinced enough developers to download a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Are Software Development Process Audits Important?

D-Link makes a variety of network equipment, both for home and business users.  They release the software for this equipment, for the most part, as open source software.  This allows techie users to review the code to see if it does anything bad and since the software is useless unless you bought the hardware, there […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Password Reuse A Problem – 11 Million Ashley Madison Passwords Cracked Already

After the Ashley Madison breach, everyone sighed a breath of relief because the passwords were encrypted with bcrypt.  Bcrypt, as used by Ashley Madison, hashed the password 4,096 times.  That calculation meant that even with fast computers it would take centuries to crack all of them. Until a group of hobbyists – yes hobbyists, not professional […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Ashley Madison Hack Provides IT Pros More Hints On What Not To Do

As researchers continue to review the data dumps from the Ashley Madison breach, there are lessons to be learned from what has been found. While Ashley Madison claimed to have good security, the evidence does not support that.  For example, the VPN password from the Internet to their servers was Pass1234, according to one article […]

Continue reading → [DISPLAY_ACURAX_ICONS]

OpenSSL: Here We Go Again

UPDATE:  The details are out.  The issue is that under certain circumstances, a hacker could get OpenSSL to accept an HTTPS certificate that is fraudulent.  This does not affect the major browsers, but rather the second and third tier software that uses SSL behind the scenes.  Likely, you don’t even know all the places that […]

Continue reading → [DISPLAY_ACURAX_ICONS]