November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,644 hits
Tag Archives: 2015
Car Updates to Enable Self-Driving
Rachel Maddow has a video on the self-driving car and how some cars today, already have the basic functionality, and just require the update. What isn’t covered, is how laws and law enforcement will perceive inebriated or sight impaired drivers if … Continue reading
Posted in Security Blog
Tagged 2015, driverless cars, hacking, Progressive Insurance, Security Awareness, Snapshot
Comments Off on Car Updates to Enable Self-Driving
150,000 Records Accessed in Advantage Dental Breach
Compromised data included names, Social Security numbers, birthdays, phone numbers and home addresses, but not treatment or financial information. The information was accessed between Feb. 23-26, when Advantage’s internal IT specialists detected the security breach. So far, no patients … Continue reading
Posted in Security Blog
Tagged 2015, Advantage Dental, breach, cyber risk, cybercrime
Comments Off on 150,000 Records Accessed in Advantage Dental Breach
Premera Blue Cross Breach
At the end of January, this year, Premera Blue Cross discovered they were breached. Possibly 11 million records of Personal/Medical and Financial information was exposed. After working with Mandiant and the FBI, the indicators of compromise date as far back … Continue reading
Posted in Security Blog
Tagged 2014, 2015, Anthem, breach, credit card, cybercrime, hacked, Premera, privacy
Comments Off on Premera Blue Cross Breach
Smartphone Enabled ATMs
BMO Harris Bank is launching the U.S.’s biggest cardless ATM network that allows customers to withdraw cash within seconds, using nothing but their smartphones! If your phone is lost or stolen, the bank can remotely remove the app. No card … Continue reading
Posted in Security Blog
Tagged 2015, BMO, cardless ATMs, Reducing Fraud, two-factor
Comments Off on Smartphone Enabled ATMs
Free Apple Watch, Click Here!
A scam is being played out right now since Apple has re-introduced the Apple Watch. A group of scammers are creating Facebook events, littered with Apple Watch pictures, where the victim is instructed to invite 100 friends to join the … Continue reading
Posted in Security Blog
Tagged 2015, Apple, Apple Watch, Facebook, phishing, scammers, scamming, Security Awareness
Comments Off on Free Apple Watch, Click Here!
A USB to Destroy a Computer
A blog writer named Dark Purple wrote an article on a proof of concept called USB Killer, a USB that when plugged into a computer, would charge, then discharge back into the computer, to fry circuits and burn half the computer … Continue reading
Posted in Security Blog
Tagged 2015, computer security, Dark Purple, malware, mission impossible, usb, USB Killer
Comments Off on A USB to Destroy a Computer
Men who Performed the Largest Data Breaches in History: Arrested
The Department of Justice reports, three men operating from Vietnam, the Netherlands, and Canada are accused of carrying out the largest data breach of names and email addresses in the history of the Internet. Two of the hackers, Viet Quoc … Continue reading
Posted in Security Blog
Tagged 2015, David-Manuel Santos Da Silva, email service providers, Giang Hoang Vu, hacked, hackers, hacking, spam, Viet Quoc Nguyen
Comments Off on Men who Performed the Largest Data Breaches in History: Arrested
Windows Vulnerable to FREAK
Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading
Posted in Security Blog
Tagged 2015, Apple iPhone, FREAK, Google Android, man-in-the-middle, Microsoft Windows, mitm, openssl, rsa, ssl, tls, vulnerability
Comments Off on Windows Vulnerable to FREAK
Factoring attack on RSA-EXPORT Keys (FREAK)
Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered. The ssl3_get_key_exchange function … Continue reading
Posted in Security Blog
Tagged 2015, Apple iPhone, FREAK, Google Android, man-in-the-middle, mitm, openssl, rsa, ssl, tls, vulnerability
Comments Off on Factoring attack on RSA-EXPORT Keys (FREAK)