When I wrote a couple of weeks ago about the issues with Apple Pay security problems (see post), I didn’t really understand the scope of what I was writing about. Thanks to Brian Krebs (see his post), I now understand the problem is bigger than I thought. Let’s assume that you are a crook and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CNN is reporting a tax scam which, while quite old, is apparently still way too effective. The IRS is reporting that they are getting complaints at the rate of 10,000 to 12,000 new complaints a week. The scam goes like this. Someone calls you with a Washington, DC phone number and says you are under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dark Reading reported on Verizon’s PCI compliance assessment and I think the numbers are interesting, but not terribly unexpected (see article). The actual report, all 84 pages, is available here. Most of the time (maybe always), when a business has an assessment done by a third party assessor, that company will do an interim assessment […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Trend Micro has identified a new piece of malware (see article) that attempts to connect to your home router using default userids and passwords for a number of home router vendors. It tries userids like admin, guest, root and user and passwords like admin, password and 12345678. The malware, named VICEPASS, scans for devices and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Probably many of you saw the 60 Minutes segment on hacking your car (see video here). In the 60 Minutes segment, the researcher/hacker was able to turn on the wipers and washers, blow the horn and disable the brakes in that demonstration. Here is a link to a conversation with the guys who did the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security researchers at the International Conference On Cyber Security And Cyber Law reported that they have found a fatal security hole in a wide variety of SOHO Internet Routers. As is often the case, the researchers discovered this problem accidentally while examining the code of a router for a completely different problem (see the researcher’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]