720-891-1663

The Weakest Link

According to an article at Cult Of Mac, one of Apple’s suppliers, Quanta, posted Powerpoint documents with instructions on how to log in to a database containing confidential Apple documents on new, yet to be announced products. Apparently, the document contains default credentials, which it says, the business partner should change after they log in […]

Continue reading → [DISPLAY_ACURAX_ICONS]

U.S. Central Command (Centcom) Gets Hacked

U.S. Central Command, responsible for the military’s activities in Iraq, Afghanistan, Iran, Saudi Arabia, Syria and a number of other countries in that region was the victim of a hack earlier today. Centcom’s Twitter feed and You Tube channel were compromised and defaced. Twitter quickly disabled the feed but not before some charts and contact information for […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Did You Visit The Huffington Post Web Site Last Week?

CNN is reporting that visitors to HuffPo and several other major sites last week might have caught a virus from malware infected Advertisements. The malware only infected Windows PCs and only those running Internet Explorer 8 (does anyone really use IE any more?).  Even though IE11 is the current version of IE, according to CNN, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Guilty Until Proven Innocent – Software Licensing

Lewitt, Hackman, Shapiro, Marshall and Harlan, a law firm based outside Los Angeles, has an interesting take on software licensing.  They don’t say whether they have been representing plaintiffs or defendants in software piracy lawsuits, so I don’t know if there is a bias in their blogging, but it is an interesting point of view. […]

Continue reading → [DISPLAY_ACURAX_ICONS]