I have been tempted, from time to time, to use cloud apps to do things like convert PDFs to Word documents or reformat videos and the like. To date, I have successfully resisted that urge. Apparently, there is some merit to that restraint. That does not mean that the cloud is evil. What it does […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Law Firm Goodwin Procter Hacked Goodwin Procter managing parnter Mark Bettencourt confirmed that some of their clients’ data was compromised. But not to worry; it only affected a small percentage of their clients. One more time, we have a “supply chain attack”. While the vendor was unnamed, I suspect it was Accellion. They suffered a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Here in Colorado we are hearing stories that are likely being played out elsewhere. A server went to file for unemployment benefits after being laid off and discovered that someone else was claiming benefits in their name. This is a rotate on the old tax refund scam where someone claims a tax refund that is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FTC recently did an experiment to see how quickly thieves used stolen data after it was posted on the dark web. They created 100 fictitious consumers and gave them credit cards or bitcoin wallets. Each fictitious consumer had a name, email and passwords as well. They posted the data twice – first on April […]
Continue reading →
[DISPLAY_ACURAX_ICONS]