720-891-1663

Google Declares War. On Ad Injectors!

Ad injectors are usually implemented as browser add-ins that place their own ads on web pages that you visit.  These adds could replace existing ads or insert new, additional ads.  The can also inject malware into your computer. Google worked with a team of researchers at the University of California at Berkeley and found 200 […]

Continue reading → [DISPLAY_ACURAX_ICONS]

News Bites 2

TrueCrypt users panicked last year when the developers of the very popular semi-open source encryption program stopped supporting the product and issued a warning to users not to trust it. An independent group solicited donations and paid for an independent audit of the source code to TrueCrypt version 7.1a. Well, the audit is in and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Rickety World of Industrial Control Systems

Industrial Control Systems (ICS) run everything from waste water to nuclear power.  Unfortunately, they are on pretty shaky ground. During the cold war, Ronald Reagan’s CIA convinced the Russians to use American control software to manage a gas pipeline in Siberia.  Unfortunately for the Russians, the CIA placed a few time bombs in the software […]

Continue reading → [DISPLAY_ACURAX_ICONS]

News Bites

In case you were wondering, Siri is not being faithful.  Apple, Microsoft and other tech companies are sharing your voice with third parties.  But before you go ballistic, they are not selling the data.  Third parties such as Walk N’ Talk get your speech from these companies so that they can validate the quality of the speech […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Administrator Accounts

UPDATE:  For those of you who are Mac users and laughing at the poor Windows users, this affects you too.  The Rootpipe malware silently escalated its privileges to your maximum privileges to launch an attack on your system.  Apple just recently fixed this, but ONLY FOR THE CURRENT VERSION OF OSx – apparently, it was […]

Continue reading → [DISPLAY_ACURAX_ICONS]