We have long reported that hackers love to break into law firms. This is in part due to the fact that many law firms do not have good cybersecurity practices, especially small firms. The other part is that breaking into a law firm is like winning the lottery. Instead of getting one customer’s data, they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are advertising a service on the encrypted, Russian, messaging app Telegram that would let you buy a full identity for between $8 and $40. In crypto. The company, USiSLookups, a play on the data broker USInfoSearch, allows you to look up virtually anyone. In just a few moments. The Telegram channel includes a small […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing theĀ U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The title comes from a folk song written by Pete Seeger in the 1950s, but apparently, software developers are not into folk music. In this case, security researchers are warning that developers are leaving security credentials in public repositories. They found these creds in repositories run by IBM, Digital Ocean, AWS, Gitlab, and others. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About a year ago Suffolk County on Long Island in New York was taken out by a ransomware attack. It took months to get back online. So what did they do wrong? Pretty much everything. First, they had to find a scapegoat, so they fired their IT director. Did he do anything wrong? No. In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]