UPDATE August 19, 2015 – As I predicted, there are now web sites which allow you to search the Ashley Madison data. Check this Wired article for links: http://www.wired.com/2015/08/check-loved-one-exposed-ashley-madison-hack/ . The hackers who broke into the Ashley Madison web site last month threatened to make the data that they stole public if Ashley Madison’s parent […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
GM Says that they have fixed the vulnerability that allowed a hacker to take over the GM Onstar Remotelink software. Once the hacker has taken over the software, she can do anything the owner can do – remote unlock, remote start, etc. The attack worked because GM was not validating the SSL certificates […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I have talked about before, the PNI division of Staples provides digital photo kiosks and online printing to the likes of Costco, Walgreens, CVS and Walmart and announced they had been breached in July of this year. This resulted in all of these customers taking their photo processing sites off line. Costco had previously […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lenovo has stopped installing software which allows them to overwrite system files with their version of those files, even if you wipe the disk. They have released a patch for it and recommend that users install the fixes, especially on laptops, quickly. How they do it is quite amazing. Lenovo has built, into the firmware […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Another day, another car hack. Computerworld reported that hackers at the Usenix Security Conference demonstrated taking over a Corvette by remotely accessing a telematics device that plugs into the on board diagnostics port (OBD-II). These devices are often used by insurance companies to collect data on driving habits to figure out what insurance rates should […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When I talk to some people, their first comment is “we are no one special, who would want to steal our stuff?” The news today is an example of who and why. The Justice Department announced charges against 9 defendants for breaking into several press release services and stealing information before it became public. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]