The Uber breach saga continues. Joe Sullivan, Uber’s former CISO, was convicted of lying to the feds about a breach that happened in 2016. Hackers broke in to Uber and stole data on 57 million customers and 600,000 drivers. One of the counts he was convicted of was hiding the 2016 breach from the feds […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Businesses buy insurance and then they expect the insurance company to pay when they make a claim. Sometimes that happens but when it comes to cyber insurance, too often it does not. But, there are things you can do to improve your odds. First, make sure everyone understands all of the security requirements of your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alerts, Apple, Best Practices, Google, Hacks, iOS, Legal, News Bites, Privacy, Safety, Security Practices
Government Contractors Affected by TikTok Ban Too The White House issued a memo in February requiring the removal of TikTok from federal information systems as required by the consolidated appropriations Act of 2023. How this affects contractors is that it also includes IT “used by a contractor under a contract with the executive agency that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The law firm Baker Hostetler published its 2023 Data Security Incident Response Report. It is based on more than 1,100 cybersecurity incidents investigated by them last year. Here are some of the statistics they published: The most common actions after initial access were: While a blockchain data analysis company said that the total amount of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most people know about OpenAI’s ChatGPT, funded, in part, by a massive infusion of cash from Microsoft. People also are aware of the privacy concerns of GPT-type tools. In many cases, the damage is not intentional, but accidental. People submitting sensitive queries without thinking about it. Also, as more and more software incorporates GPT-tools under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While some people go out of their way to talk about other – non-friendly – countries conducting information warfare ops, it is useful to understand that everyone does it and that includes us. Just one example. The U.S. has many of these examples. The U.S. Army Cyber Command told defense contractors it planned to surveil […]
Continue reading →
[DISPLAY_ACURAX_ICONS]