Tag Archives: 2015

Car Updates to Enable Self-Driving

Rachel Maddow has a video on the self-driving car and how some cars today, already have the basic functionality, and just require the update. What isn’t covered, is how laws and law enforcement will perceive inebriated or sight impaired drivers if … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Car Updates to Enable Self-Driving

150,000 Records Accessed in Advantage Dental Breach

Compromised data included names, Social Security numbers, birthdays, phone numbers and home addresses, but not treatment or financial information. The information was accessed between Feb. 23-26, when Advantage’s internal IT specialists detected the security breach.   So far, no patients … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 150,000 Records Accessed in Advantage Dental Breach

Premera Blue Cross Breach

At the end of January, this year, Premera Blue Cross discovered they were breached. Possibly 11 million records of Personal/Medical and Financial information was exposed. After working with Mandiant and the FBI, the indicators of compromise date as far back … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Premera Blue Cross Breach

Smartphone Enabled ATMs

BMO Harris Bank is launching the U.S.’s biggest cardless ATM network that allows  customers to withdraw cash within seconds, using nothing but their smartphones! If your phone is lost or stolen, the bank can remotely remove the app. No card … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Smartphone Enabled ATMs

Free Apple Watch, Click Here!

A scam is being played out right now since Apple has re-introduced the Apple Watch. A group of scammers are creating Facebook events, littered with Apple Watch pictures, where the victim is instructed to invite 100 friends to join the … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Free Apple Watch, Click Here!

Would You Buy Your Kids A “Hello Barbie” Doll?

Most kids like to talk to their toys, it’s not uncommon. As far back as I can remember, like many children, I’d play with toys and do voices for them, or ask them questions on behalf of other toys, playing out … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Would You Buy Your Kids A “Hello Barbie” Doll?

A USB to Destroy a Computer

A blog writer named Dark Purple wrote an article on a proof of concept called USB Killer, a USB that when plugged into a computer, would charge, then discharge back into the computer, to fry circuits and burn half the computer … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on A USB to Destroy a Computer

Men who Performed the Largest Data Breaches in History: Arrested

The Department of Justice reports, three men operating from Vietnam, the Netherlands, and Canada are accused of carrying out the largest data breach of names and email addresses in the history of the Internet. Two of the hackers, Viet Quoc … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Men who Performed the Largest Data Breaches in History: Arrested

Windows Vulnerable to FREAK

Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Windows Vulnerable to FREAK

Factoring attack on RSA-EXPORT Keys (FREAK)

Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered. The ssl3_get_key_exchange function … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Factoring attack on RSA-EXPORT Keys (FREAK)