Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

hacker tag

Drill down on hacker search:

25 result(s) displayed for hacker (1 - 25 of 43):

The Scary Apple Pay Takeover iconectiv Helps Stop

Personally Identifiable Information or PII is leaking out of companies faster than ever. Equifax had two major hacks in a matter of months, Yahoo had three-billion emails stolen and so on. We could devote this entire post to various hacks...

Intermedia Anti-Phishing Tools for Small Business

Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor...

The Long Tail of Cybersecurity

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.The online world...

Tempered Networks Boosts Trust with Identity-Defined Networks

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with...

Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam...

Malicious Email of the Day

This is the best malicious e-mail I have seen in a while. It disguises itself with a From line: Microsoft OneDrive <noreply@icloud.com>. It looks legit until you realize iCloud competes with Microsoft and its Onedrive. Looking at it quickly -...

ITEXPO Attendee Cap'n Crunch Needs Your Help

I first met John Draper or Cap'n Crunch at ITEXPO in Los Angeles as he was looking to connect with Asterisk Creator and Digium founder Mark Spencer. I still remember how mystified people at the conference were when they learned...

Methbot: These ARE the Russian Cybercriminals We're Looking For

We have heard that Russian hacking caused Hillary Clinton the election for the last few weeks. But some surmise that pushing this narrative was done expressly to sway electors. Now that the vote is behind us - perhaps the Russian...

Ransomware Fog Rolls over SanFran Muni, SFMTA

We’ve known ransomware costs for a small- to medium-sized business can be $99,000, per Kapersky Labs. This includes lost business data, productivity and perhaps trade secrets or proprietary information, as well as increased spending on IT security. A new...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal...

You need a Flip Phone for Your Data Center

The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason? They are...

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...

9 Shocking Facts about the Nasdaq Breach by Russia

In October 2010, the FBI determined malware, most likely from an intelligence agency of another country had snuck into the Nasdaq’s central servers. The following facts are the most shocking: Several different groups were operating freely on Nasdaq computers, some...

Will Target CEO Removal Help Boost IT Security?

Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they...

Anonymous May Have Just Taken Down Go Daddy and Related Sites

After spending five minutes trying to access Go Daddy with zero luck I reached out to my tech team who explained the site was out. The best way to follow the outage seems to be Twitter and there are some...

Kickstarter: Sometimes the Cloud Can't Keep a Secret

Data breaches happen - a while back Moveable Type upgraded its blogging software and posts scheduled to be seen at a later date were given away by tag pages which posted immediately. In other words if a blogger wrote about...

Chinese Nortel Hack Unconfirmed by my Sources

Although reports have been swirling regarding Chinese hackers breaking into Nortel's computers for over ten years in order to steal trade secrets, I have been unable to confirm such a breach took place. I have tapped into a few high-level...

Electronic Health Records Only as Strong as Weakest Link

It is becoming commonplace to find that organizations of virtually all sizes are getting hacked and their data compromised. Sony and the CIA are just some of the latest we have heard of.Let's be clear, these are some very high-profile...

Will Future Hackers Be Short-Sellers?

If you are publicly traded in a country where shorting is allowed – you are a bigger target   One can’t help but wonder if the opportunity currently exists for hackers to find loopholes in the security of publicly traded...

iTunes and User Accounts Hacked

This past weekend I covered the hacking of the iTunes App Store and it seems user accounts now have been compromised as well. Some users have seen unauthorized spending in their accounts hit $1,400 and Apple is being slow to...

The Internet is Down, Happy 4th of July

Just moments ago I mentioned that it looks like the iTunes App Store was hacked. Now reports are surfacing that YouTube and Wikipedia have been hacked as well. Just a note that I haven't been able to duplicate any of...

Apple iTunes App Store Hacked

It appears according to a report from The Next Web that the iPhone App Store has been hacked and so have accounts. According to the article: The rankings in the books category of the US iTunes store features 40 out...

Skype Problem with your Payment Scam

TMC has been getting inundated with emails lately about problems with Skype accounts we don't own. We checked into the malicious script embedded in the emails and they appear to send you to servers in Estonia where your computer is...

New Scam: Held Up at Gunpoint in Wales

I received a desperate email from a well-spoken PR professional in the technology space this morning. His belongings were robbed at gunpoint in Wales and the local police and US embassy could not assist him. Moreover, the hotel was supposedly...
1 2 Next
Featured Events