A SIM is the (usually) hardware card that gives your phone its “personality”. The SIM is tied to the carrier and contains all the information that the phone needs to talk to your carrier. As users SLOOOOWLY migrate to using text messages as an extra layer of authentication for logging in to a variety of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
DoD continues to take actions that lead us to believe that they are very serious about the Cybersecurity Maturity Model Certification process. This process will require that all DoD contractors ultimately get a third party cybersecurity certification on an annual basis if they want to continue to be part of the DoD food chain. When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In an interesting turn of events, Republican US Senator Roger Wicker’s staff has written a draft federal privacy bill. It’s main goal is to overturn California’s privacy law that goes into effect in January. Of course, there are only 28 days between now and January 1, so I would be really surprised if the bill […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI says that reported losses due to Business EMail Compromise attacks reached a whopping $1.3 billion in 2018, double the losses reported in 2017. On the other hand, the number of ransomware complaints is down to levels reported in 2014. There were 20,373 Business EMail Attacks reported last year, compared to 15,690 in 2017. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week, I wrote about the Wipro hack (if you didn’t see that post, click on the search box and enter Wipro). While Wipro is being pretty close-mouthed about what happened due to the inevitable lawsuits, SLA complaints and even claims of breached contracts, it isn’t stopping the media from reporting on it. In fact, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this is still a bit like Jello (R) waiting to congeal, the Australian Assistance and Access Bill is designed to require back doors in encrypted communications like Whats App and iMessage. COMPANIES THAT DEVELOP SOFTWARE THAT USE END TO END ENCRYPTION NEED TO PAY ATTENTION TO WHAT HAPPENS SO THAT THEY CAN MAKE APPROPRIATE […]
Continue reading →
[DISPLAY_ACURAX_ICONS]