720-891-1663

Major Software & Hardware Vendors Cause Self-Inflicted Downtime

Let’s Encrypt is the free HTTPS encryption service that is used by millions of web sites. Since it started out as a good idea of two Mozilla employees in 2012, it has issued about 2 billion free TLS certificates. The history behind this organization is long and convoluted. The industry has a high bar for […]

Continue reading → [DISPLAY_ACURAX_ICONS]

CISA Issues Cyber Goals & Objectives for Critical Infrastructure Control Systems

While goals are CURRENTLY voluntary, CISA issued guidelines for what it expects from pipelines and other critical infrastructure in light of the Colonial Pipeline attack. While it appears that the hackers were not able to take over the control systems in that attack, they did take over the control systems in the Florida and Kansas […]

Continue reading → [DISPLAY_ACURAX_ICONS]

FCC is Finally Going to Help Carriers Replace Huawei Network Gear

In March of 2020 Donald Trump signed a bill requiring rural telecom companies to replace suspected vulnerable Huawei telecom equipment. The government would even pay for the replacement. For whatever reason, the Trump administration never did anything to make that happen. Finally, 18 months later (if this is really a security threat, shouldn’t something have […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 24, 2021

Detecting Hidden Cameras in Your Airbnb and Similar Rentals No one wants to think about this, but it is an issue. Especially in private home/condo rentals, owners are worried about you stealing or damaging their stuff. And some of them are just stalkers. Here is a TikTok video from well known security researcher Marcus Hutchins […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Google Says Geofence Warrants Up by 10x+

Geofence warrants are “requests” by law enforcement for information on everyone that was in a particular geographic area during a particular time window. Typically they use the results to come up with the usual list of suspects. The initial response usually doesn’t include names and addresses; that comes after the police mine all the data […]

Continue reading → [DISPLAY_ACURAX_ICONS]