by UpTime Development | Jul 19, 2016 | Managed Security
A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones. The attack works against phones that have the Google Now, or Apple Siri voice...
by UpTime Development | Jul 8, 2016 | Managed Security
When does being older give you an advantage besides a discount at Denny’s? When it comes to being targeted by hackers. A recent UK study shows people in the UK aged 30 years, or younger, are the most targeted by hackers for identity fraud. In 2015, there was a 52%...
by UpTime Development | Jul 8, 2016 | Managed Security
When is a breach not a breach? When there are too many unanswered questions, apparently. Have I Been pwned (HIBP), the database of breaches, is owned and operated by Troy Hunt who performs due diligence on each breach before adding it to HIBP. A recent supposed...
by UpTime Development | Jul 8, 2016 | Call Center & Unified Communications, Managed Security
The U.S. Court of Appeals for the Ninth Circuit has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act (CFAA), when he and other former employees...
by UpTime Development | Jul 8, 2016 | Managed Security
Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network. The malware, dubbed Backdoor.MAC.Eleanor by the folks at Bitdefender, is distributed as a file converter application through...