October 1st, 2015. Today, retailers are responsible for credit card fraud if they are not using credit card terminals that support chip credit cards. While there is a learning curve for both merchants and users, the curve is pretty small and it will reduce credit card fraud at retail stores. Gas Stations and ATMs still […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Databreaches is reporting that someone discovered a large amount of data on a public segment of Amazon Web Services. This person, described as a technology enthusiast (i.e. a geek) downloaded some of this data and discovered it contained medical claims data. The repository, which supposedly contained gigabytes of data was later identified to belong to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
D-Link makes a variety of network equipment, both for home and business users. They release the software for this equipment, for the most part, as open source software. This allows techie users to review the code to see if it does anything bad and since the software is useless unless you bought the hardware, there […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Excellus Blue Cross Blue Shield revealed that it has been hacked. Excellus did not detect it had been hacked at all. In fact, it was not until they hired Mandiant to do an audit in the wake of the other Blue Cross hacks that they found out that they had been hacked. The data of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
iStan is “the most advanced wireless patient simulator on the market, with internal robotics that mimic human cardiovascular, respiratory, and neurological systems,” according to CAE Healthcare. iStan costs about $100,000 and is regularly used by hospitals to teach medical school students how to perform procedures without murdering people. That’s nice, but here is the interesting part. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]