No, this is not a “lets beat up Twitter” post. I assume that the person who posted the fake audio selected Twitter because it would be less likely to be taken down. This is not a smear, just the reality of where the Twitter world is today. UK opposition leader Keir Starmer was smeared by […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the NSO Group went from darling to villain quickly once what they were doing became public, there are many unrelated cousins that are doing equally nasty things and are staying in the shadows. Now, one more has been exposed. The Predator Files is a collaborative investigative action by a group of journalism organizations that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After Privacy Fail, Google Tries to Secure Bard Results Google created the ability to share Bard results, but, of course, accidentally, Google is indexing those results, so if you think what you are doing is private, it might not be – but only if you intentionally create a share link. Read details here. Credit: The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is not news that the majority of breaches are not caused by sophisticated attackers figuring out how to bypass robust defenses. For example, one of the largest attacks in the U.S., the Equifax breach, was caused by Equifax failing to patch a known bug, for which there was an available patch, even after DHS […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Norway fined Meta for its targeted advertising practices and issued a temporary ban several months ago. Now Norway has gone to the European Data Protection Board (EDPB) and asked for the ban to be made permanent and EU/EEA wide. Since Facebook makes most of its money from targeted ads and untargeted ads fetch a dramatically […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
California’s privacy regulator has released draft regs covering cybersecurity audit requirements and risk assessments. While they have not started the formal rulemaking process, they are putting out bait to see what kind of comments they get. They also discussed the drafts at their last meeting. The Draft Cybersecurity Audit Regulations make both modifications and additions to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]