Tag Archives: 2015

Netflix Phishing

Badguys are hitting up customers in Great Britain with phishing campaigns for the popular Netflix service. They are using a similar domain name called Netfixx, hoping people don’t catch the URL. The form asks for name and card numbers. The … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Netflix Phishing

50,000 Names and Driver’s Licenses Disclosed in Uber Hack

According to Reuters, the ride company, Uber, was breached and around 50,000 names and driver’s licenses of current and former employees was disclosed. The breach happened in May of 2014 but wasn’t discovered until September 2014. Uber also filed a … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 50,000 Names and Driver’s Licenses Disclosed in Uber Hack

NSA Wants Access to Encrypted Data Too!

The director of the U.S. National Security Agency, Michael Rogers, wants access to encrypted data on computers and other devices. He’s working on developing a framework that will enhance investigations. This functionality should be enabled by software manufacturers, but hopefully … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on NSA Wants Access to Encrypted Data Too!

China Bans Security, or Wants to

China’s new counter terrorism law will require technology firms to hand over encryption keys and install security “backdoors”. Once source says “You are no longer allowed a VPN that’s secure, you are no longer able to transmit financials securely, or … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on China Bans Security, or Wants to

Net Neutrality Wins

The FCC has adopted net neutrality effectively banning “throttling”!

Posted in Security Blog | Tagged , , | Comments Off on Net Neutrality Wins

Your Life Online After you Die

Posted in Security Blog | Tagged , , | Comments Off on Your Life Online After you Die

Gemalto and the Great Sim Encryption Key Theft

Edward Snowden leaked via the Intercept, The National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) jointly hacked into the internal network of the largest Subscriber Identity Module (SIM) card creator and manufacturer, who also puts the chips into … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Gemalto and the Great Sim Encryption Key Theft

Identity Theft, of the Children

Imagine getting credit card bills and hospital bills for your children, yet they are very young and barely in school yet. This is what is happening to children throughout the United States, and will continue to happen by the millions. Since … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Identity Theft, of the Children

Lenovo Superfish

Superfish is pre-installed Lenovo adware (thanks Lenovo!), which is meant to place advertisements in your web browser. The problem is that the software also intercepts encrypted traffic, which opens up your computer to man-in-the-middle attacks. Superfish intercepts HTTPS connections. Security … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lenovo Superfish

Kapersky Reports Increase in Phishing

Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. Information as of late, that has been getting stolen, WILL be used in more phishing attacks in 2015. Here is a snippet from … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Kapersky Reports Increase in Phishing