As the Corona Virus Covid-19 continues to do it’s thing, it has already revealed a lot of uncomfortable truths – no doubt part of the reason the market has reacted the way it has. So what are some of the things are we are seeing: Large entertainment events such as SXSW and Cochella are being […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Attorney General Barr and FBI Director Wray have been lobbying strongly for companies such as Facebook and Google to add backdoors to their cryptography so that they can eavesdrop on conversations when they need to. But there are problems with backdoors to encryption. Mostly, you cannot control who uses them. Case in point Huawei. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Let’s Encrypt Became Let’s Revoke and Then Let’s Confuse Let’s encrypt sent out an alert early this week that they were going to revoke 3 million HTTPS certificates on March 4th. That was going to happen because of a software bug on their part which meant that they possibly issued certificates when they should not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In spring 2018 Chenoa Cooper started writing addresses down on slips of paper and her friends knew that if she was running late, she couldn’t warn them. That is because she would leave her phone at home, it had become an abuse machine. Graphic sexual photos and videos of her had been posted online. Posted […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI has been tipped to a hack of around 130,000 Asus routers, details of which are available on the dark web – for sale. To incentivize the sale, the crook has scored each router as to how useful it might be to launch attacks. Access to these devices is being sold for as little […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Visser Precision, a precision parts contract manufacturer based in Denver, Colorado, has confirmed a “cybersecurity incident”. Visser makes parts for the likes of Tesla, Space X, Boeing and defense contractor Lockheed Martin. The ransomware was DoppelPaymer, is one of the Ransomware 2.0 variants that steal the data before they encrypt it. Some of that data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]