While 3G and 4G cell tech have their own well known security issues, so does 5G, including the recently announced 5G network slicing security issues (see here). But this is probably not the big concern for 5G security. The hype around 5G is that we can use it for everything and anything. And we probably […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Net neutrality seems to be a politically charged concept. I am not sure why. All net neutrality says is that you have to treat all content providers equally. AT&T, apparently, doesn’t like that and so they are making up stories that have nothing to do with the truth. After the Trump FCC decided that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
China Bans Military and Government from using Teslas – Due to ‘Spying’ The WSJ is reporting that the Chinese government has restricted the use of Tesla vehicles near or in sensitive installations like military and government facilities. The theory is that the cameras on Teslas could be used for spying. Tesla, of course, denies that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
That is a great name and it well describes what we are dealing with. The Solarwinds attack worked because it took advantage of a supply chain that no one understands; not even the people within it. Think back to Equifax. That happened because they did not understand a piece of software, which was vulnerable, was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since the beginning of Apple-time (or is it i-time?), Apple has always bundled security fixes into iOS upgrades. This means that a user could not install a security update without also upgrading the OS. In general, Apple has always forced users to upgrade their iPhones and other mobile devices. This tends to make Apple products […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month Homeland Security released 4 different advisories for industrial control system vulnerabilities. This comes in the wake of a successful breach of a water treatment plant in Florida. While that hack took advantage of poor cyber hygiene practices (obsolete unpatched software, shared passwords, etc.), it did call attention to the fact that our […]
Continue reading →
[DISPLAY_ACURAX_ICONS]