Answer: More and more of the time! If you have to comply with one of the growing number of state and country privacy laws, then a deletion request is much more than a request or hitting the delete key. While some of the details of each state’s law is different, the basics are the same. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you even know what this means? Actually, it means different things to different people, but they are all related. The first meaning is how long does it take a hacker to identify vulnerable systems after a vulnerability is disclosed? For example, when Microsoft disclosed the Windows Print Spooler attack, how long before hackers start […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyber Insurance Company Coalition Says Claims Payment Down From Last Year Cyber insurer Coalition says that it’s clients’ average claims for losses for ransomware attacks was $184,000 for the first half of this year, down 45% from the second half of last year. This, they say, is because they are doing better at negotiating ransoms. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple is about to announce a new feature. They are going to start scanning everyone’s iPhone for banned content. Seriously. It uses neural networks and machine learning, so I am sure it will be cool. According to respected cryptography professor Matthew Green, it is going to scan everyone’s devices for child porn (now referred to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Over the last few years the police have been using the large commercial DNA databases to help them find criminals. The highest profile case was their use of DNA to find the Golden State Killer (1970’s and 1980’s murders; captured in 2018). They did that by running a DNA sample against GEDMatch, one of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Following in the footsteps of the cybersecurity Executive Order, President Biden issued a National Security Memorandum last week on improving cybersecurity for critical infrastructure control systems – that is the computers that control our critical infrastructure. Like the EO, this NSM has specific details. The government has created a Industrial Control Systems Cybersecurity Initiative to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]