CSO Magazine is reporting on an experiment conducted by the Ponemon Institute. They sent researchers disguised as temporary employees, with temporary badges, into 43 offices belonging to 7 companies. The management was aware of the plan but the office staffs were not aware. The researchers went into the offices, wandered around, took pictures of computer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have known for a long time that the encryption on cell phone calls and text messages was relatively weak, but apparently, cracking that was more work than GCHQ, the British version of the NSA, wanted to do. People have been beating up the NSA for being, well, the NSA. I have said, whether we […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Homeland Security Today and others are reporting that three months after the State Department admitted that hackers had gotten into their unclassified email system, the hackers are still there. (see article) While it is always fun to beat up government bureaucracies, it points out that sometimes getting hackers out is a hard thing to do. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Network World wrote about a company that experienced an outage with Microsoft Office 365 cloud email. Users could not get to their email from Outlook or on their phones for 24 hours and it affected users in the U.S. and overseas (see article). The company filed a claim with Microsoft for breaching the SLA but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Marc Rogers (white hat hacker and principal security researcher for Cloudflare) wrote about an interesting problem Lenovo users have. (see article) What is not clear is how long Lenovo has been doing this. The good news is that a friend of Marc’s has created a test to see if your Lenovo laptop is infected. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alleged Russian hacker Validimir Drinkman, 34, was arraigned yesterday on hacking into 16 companies including The NASDAQ stock exchange, 7-11, J.C. Penney, Dow Jones, Heartland Payment Systems and others and stealing 160 million credit card numbers (see article). The attacks go as far back as 2005. Brian Krebs provides an inventory of some of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]