Some of you will remember back in mid 2014 that Lenovo added some software called Visual Discovery by Superfish to hundreds of thousands of computers. The purpose of Visual Discovery is to “help” you by intercepting your browser communications and either insert ads into your web traffic or even redirect you to web sites that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Web browsers have become the center of our daily Internet universe. But browsers, by themselves, are often not sufficiently powerful to do what people want them to do. Enter the world of plugins or addins or browser extensions. These little bits of code allow a browser to do something that they were not designed by […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In what may be the first of its kind event, the FDA recalled a pacemaker from St Jude, now owned by Abbott Labs. Researchers discovered the flaws prior to Abbott’s acquisition of St. Jude and reported them to both the FDA and St. Jude. Both decided to do nothing about it until the researchers went […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the things that has always been a barrier for people who’s data was compromised during a breach is what lawyers call “Standing”. Standing derives from Article III of the U.S. Constitution. The courts have said that there are three requirements for “standing” to bring an action against another – Injury in fact, causation […]
Continue reading →
[DISPLAY_ACURAX_ICONS]