Just a few years ago all we worried about was hackers breaking into our servers in the computer room in the office. We expanded that footprint to include servers located in a data center space that we rented (also called a colo). Those were still servers that we owned. And patched – hopefully. Then we […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI, especially generative AI from Large Language Models is THE hot item right now, but other forms of AI are also gaining rapid popularity and specifically that is AI deep fakes of images and videos. One concern that is on the mind of most politicians as we move into the 2024 election cycle is deep […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sam Bankman-Fried demonstrated what happens when you combine unfathomable amounts of money and no regulation. It isn’t pretty. Binance moves $12 billion a day and has no physical office. What could possibly go wrong? Since the SEC was asleep at the wheel when FTX collapsed, leaving a lot of customers high and dry – since […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dutch Data Protection Authorities Looking Into Alleged Tesla Data Breach Germany’s Handelsblatt reported on Thursday that Tesla (TSLA.O) had allegedly failed to adequately protect data belonging to customers, employees and business partners, citing 100 gigabytes of confidential data leaked by a whistleblower. The Dutch DPA is looking into the situation. Among the data is Elon’s Social plus […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When I say “help”, I mean that only in the kindest of terms, such as placing the company under a 20 year monitoring program, among other assistance. In this case, a company called Easy Healthcare has a free ovulation tracking app. As most of you well know, if it is free, you are the product. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI, NSA, CISA, Australia, Canada, New Zealand and the UK (AKA the US and the Five-Eyes Countries) issued a joint advisory on Chinese cyber tactics in light of the Guam critical infrastructure attack. Living off the Land means an attack that uses existing, already installed, vendor signed software to launch an attack and maintain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]