I have long complained about ads on web sites delivering malicious content in addition to ads. In fact, I have even advocated blocking ads because of it, but since most web sites exist because of the revenue generated from those ads, the ad content is only getting more invasive. There have been many incidents of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have been a strong advocate for two factor authentication and still am, but I ran across a situation yesterday that made me realize that there is something that you need to consider when you implement two factor. The situation that I encountered was a user that was using text messages for two factor authentication […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Remember a few weeks ago when Amazon said they had a solution to packages being stolen off people’s porches? It involved a remote control door lock and a security camera. Many people – not just security people – winced at the idea. After all, what could possibly go wrong? Well just a couple of weeks […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Under President Obama, the feds created this non binding policy document called the Vulnerability Equities Process. This came after Snowden disclosed a long assumed fact that the spy organizations were hoarding bugs to use against whomever they wanted to rather than telling the developers about them so that they could be fixed. Of course, we are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most of the time we feel pretty helpless when it comes to going after hackers. There is a good reason for that – for the most part, we are helpless. The hackers operate under their own rules and law enforcement really isn’t equipped to deal with them. It is hard enough for the cops to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It usually doesn’t take very long. Whether it is fooling the fingerprint reader or jailbreaking an iPhone, it often comes within hours of a new device or software release. Maybe, in this case, it says that Apple did good because it took a week to break Face ID. On the other hand, it only took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]