Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

hacker tag

Drill down on hacker search:

25 result(s) displayed for hacker (1 - 25 of 33):

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal...

You need a Flip Phone for Your Data Center

The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason? They are...

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...

9 Shocking Facts about the Nasdaq Breach by Russia

In October 2010, the FBI determined malware, most likely from an intelligence agency of another country had snuck into the Nasdaq’s central servers. The following facts are the most shocking: Several different groups were operating freely on Nasdaq computers, some...

Will Target CEO Removal Help Boost IT Security?

Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they...

Anonymous May Have Just Taken Down Go Daddy and Related Sites

After spending five minutes trying to access Go Daddy with zero luck I reached out to my tech team who explained the site was out. The best way to follow the outage seems to be Twitter and there are some...

Kickstarter: Sometimes the Cloud Can't Keep a Secret

Data breaches happen - a while back Moveable Type upgraded its blogging software and posts scheduled to be seen at a later date were given away by tag pages which posted immediately. In other words if a blogger wrote about...

Chinese Nortel Hack Unconfirmed by my Sources

Although reports have been swirling regarding Chinese hackers breaking into Nortel's computers for over ten years in order to steal trade secrets, I have been unable to confirm such a breach took place. I have tapped into a few high-level...

Electronic Health Records Only as Strong as Weakest Link

It is becoming commonplace to find that organizations of virtually all sizes are getting hacked and their data compromised. Sony and the CIA are just some of the latest we have heard of.Let's be clear, these are some very high-profile...

Will Future Hackers Be Short-Sellers?

If you are publicly traded in a country where shorting is allowed – you are a bigger target   One can’t help but wonder if the opportunity currently exists for hackers to find loopholes in the security of publicly traded...

iTunes and User Accounts Hacked

This past weekend I covered the hacking of the iTunes App Store and it seems user accounts now have been compromised as well. Some users have seen unauthorized spending in their accounts hit $1,400 and Apple is being slow to...

The Internet is Down, Happy 4th of July

Just moments ago I mentioned that it looks like the iTunes App Store was hacked. Now reports are surfacing that YouTube and Wikipedia have been hacked as well. Just a note that I haven't been able to duplicate any of...

Apple iTunes App Store Hacked

It appears according to a report from The Next Web that the iPhone App Store has been hacked and so have accounts. According to the article: The rankings in the books category of the US iTunes store features 40 out...

Skype Problem with your Payment Scam

TMC has been getting inundated with emails lately about problems with Skype accounts we don't own. We checked into the malicious script embedded in the emails and they appear to send you to servers in Estonia where your computer is...

New Scam: Held Up at Gunpoint in Wales

I received a desperate email from a well-spoken PR professional in the technology space this morning. His belongings were robbed at gunpoint in Wales and the local police and US embassy could not assist him. Moreover, the hotel was supposedly...

Cancelled Amazon Order Scam

 Example of frequent spam/malicious email we get frequently at TMC. Click on image to enlarge.For the last few weeks a number of my fellow team members here at TMC have been receiving confirmed and cancelled orders from most likely a...

Chinese Schools Say They Didn't Hack Google

What? Us? Do we look like hackers to you?Where is James Bond when you need him? The ongoing saga between China and a number of companies who have been hacked from the country takes yet another twist. First, Google accuses...

Will Silicon Valley go to War with China?

To protect the privacy of its users and data, will Google really pull out of the country? A major challenge for all companies doing business with china is how to you gain access to the huge market of over a...

Data Exfiltration: Defined

Data -- even if it is unclassified, can be a problem for our government or any organization-- if it gets in the wrong hands in sufficient quantities. I was reminded of this fact while reading this article from Kevin G....

Malicious Gadgets

The gadgets are coming... The (malicious) gadgets are coming. Sure we all know about gadgets/widgets and how they foster cross-site integration and the ability for users to take the best of various applications and data and meld them together in...

Major Spanish Hackers in Jail

Few things make people as happy as knowing hackers have gone to jail -- especially when the people going to jail are some of the most active hackers on the internet. While reading a story on the subject, I learned...

Facebook Security Breach

As more and more people use Facebook, it is worth noting that more hackers are looking for ways to get at this information. This article discusses the latest in successful attempts to to crack a social networking site. In this...

Fingerprint Memory Drives Flawed

One would imagine that a fingerprint reader on a memory stick or hard drive was a guarantee of security. Those of us in technology for any period of time know that security in any market is more journey than destination....

Google: One out of 1K Web pages malicious

Unfortunately, the web is becoming a much more dangerous place as 0.1% of the entire internet is malicious. Moreover, there are no safe neighborhoods... Even sites like Al Gore's An Inconvenient Truth and the Miami Dolphins have been attacked...

New VoIP Security Problem

Tom Keating alerted to me a new phone hack which is for now targeting SNOM IP phones. The big hack involves the ability of some VoIP phones to make phone calls from the Web interface using a simple web POST...
1 2 Next
Featured Events