I previously wrote about one of several recent attacks on LastPass. Now we are learning more about how it happened and this should be a warning to companies that allow BYOD or bring your own device. Note this is not a Windows or Mac issue; nor is a computer vs. phone issue. In fact, all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Senators Ask CISA to Investigate DJI Drones A bipartisan group of Senators is asking CISA to examine drones made by companies with deep ties to the Chinese government. DJI is the 800 pound gorilla in the high end consumer drone market, drones also used by businesses and government. While this makes sense, if they do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The stakes in getting breached are definitely increasing. Historically, victims of a breach have sued the breached company claiming some potential future, but vague, damages. Often the suits get thrown out saying that these potential future damages are not sufficiently real. Independent Living Systems is a VENDOR to healthcare providers in Florida. They were breached […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AT&T lost control of data of nine million customers. T-Mobile lost data belonging to tens of almost a hundred million customers. Other carriers have too. All mobile providers collect a lot of data. Data for billing, data for profiling, data for selling ads. All kinds of data. Location data. They know every cell site that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Domain Name Service (DNS) is the part of the Internet that maps web site names that you use to IP addresses that the Internet uses. DNS servers see a lot of those names and numbers. Billions of them a day, in fact. Akamai, in addition to being one of the largest content delivery services […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]