Hackers want data. The higher quality data, the happier the hackers are. Higher quality data can be sold for more money. Or use it for more hacking. Stolen credentials for the CEO are worth more than the password for the person who works on the loading dock. Old-timers will remember network hardware pioneer Nortel Networks. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First of all you have to figure out what an NFT is. Here is what Forbes says about it: An NFT is a digital asset that represents real-world objects like art, music, in-game items and videos. They are bought and sold online, frequently with cryptocurrency, and they are generally encoded with the same underlying software as […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone, probably, has heard of the NSO Group and their wonderful software (note the sarcasm) Pegasus. Law enforcement agencies – and others – have used this software to hack into their target’s phones, quietly, and steal their data, turn on their cameras and microphones and surreptitiously do other things. The downside of Pegasus is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why PREVENTING Ransomware is the Only Option Patients of Methodist McKinney Hospital and two of its surgery centers are preparing for their data to be sold on the dark web. Healthcare is a prime target for hackers for a number of reasons. The hospital decided not to pay the ransom for 360 gigabytes of stolen […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The California legislature just passed the Age-Appropriate Design Code Act. Conceptually, the goal is to try to make sure that web sites kids visit are appropriate for kids. The problem is, how do you know who is a kid? Once Governor Newsom signs the bill, the code will require sites and apps – BOTH – […]
Continue reading →
[DISPLAY_ACURAX_ICONS]