720-891-1663

Systema Leaves Insurance Claims Data In The Cloud – Unprotected

Databreaches is reporting that someone discovered a large amount of data on a public segment of Amazon Web Services.  This person, described as a technology enthusiast (i.e. a geek) downloaded some of this data and discovered it contained medical claims data. The repository, which supposedly contained gigabytes of data was later identified to belong to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Are Software Development Process Audits Important?

D-Link makes a variety of network equipment, both for home and business users.  They release the software for this equipment, for the most part, as open source software.  This allows techie users to review the code to see if it does anything bad and since the software is useless unless you bought the hardware, there […]

Continue reading → [DISPLAY_ACURAX_ICONS]

iStan Hacked and Killed

iStan is “the most advanced wireless patient simulator on the market, with internal robotics that mimic human cardiovascular, respiratory, and neurological systems,” according to CAE Healthcare. iStan costs about $100,000 and is regularly used by hospitals to teach medical school students how to perform procedures without murdering people. That’s nice, but here is the interesting part. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Apple iOS Quicksand Vulnerability Revealed

Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice.  Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]

Continue reading → [DISPLAY_ACURAX_ICONS]