Section 702 of the Foreign Intelligence Surveillance Act allows the government to collect intelligence from non-Americans located outside the United States without a warrant. Section 702 cannot be used to target Americans. At least some people say that Section 702 needs some reform. When Section 702 was first enacted lawmakers knew that this could spell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those not aware, Silicon Valley Bank is the go-to bank for tech startups and VCs all over the country. Until the state of California shut it down and the feds took it over. The chaos and confusion of the feds off again, on again bailout (and the sale of the UK part of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Even the DoJ Thinks John Deere Should Let Farmers Fix Their Tractors The “right to repair” movement has been growing for the last decade. John Deere has been leading the “its not safe for you to fix your own tractor” movement for years, saying they have made tractors too complicated for owners to fix. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
China has long ranked at or near the top of U.S. national security officials’ list of cyber adversaries. On Wednesday, spy agency leaders warned that China is getting even bolder and better in cyberspace. The spies say that if China believed that it was on the verge of a major conflict with us, they might launch […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]