Alarm companies like wireless alarm sensors because they cost less to install and are prettier since there are no wires. They are also remarkably less secure. It is useful to understand that you neighborhood junkie might not be able to pull off the attack, but any serious burglar would not have a problem. In this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I tend to be a bit of a dog on a bone when it comes to patching your phone. Apple helps its phone owners and usually shoves patches down your throat, whether you want them or not – as long as the phone is still supported. But when it comes to Android phones, it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security vendor ESet interviewed 625 business owners and executives to understand their readiness for California’s new privacy law that goes into effect on January 1, 2020. What most businesses are missing is that Nevada’s version of the law goes into effect on October 1, 2019. Most of the respondents were from small businesses, some of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Capital One Breached – 100+ Million Applicants Compromised Among the data compromised are 140,000 US social security numbers and 80,000 bank account numbers. Also in the mix were one million Canadian social security numbers plus names, addresses, phone numbers, birth dates and incomes. The data included applicants who applied between 2005 and 2019. Yes, 15 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Equifax Agrees to Pay UP TO $700 Million to Settle Breach Lawsuits First – the settlement hasn’t been agreed to by the court yet, so this is all speculation. Of the $700 million pot, at least $300 million is set aside to pay damages to consumers. Another $100 million plus is to pay for credit […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers have found a new piece of Android spyware that was likely developed by a Russian contractor that has been sanctioned for interfering with the 2016 U.S. Presidential elections. The spyware, called Monokle, has an amazing range of spying capabilities and can steal data, even without having root access on the phone. The spyware, distributed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]