Probably many of you have created an incident response plan and possibly you have tested it. But likely, that plan and test of it is based on the assumption that hackers are encrypting your data. The solution to that is effective backups. The problem with that is whether your backups really good and how long […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Simple title; not necessarily a simple question. The current spotlight is on LastPass and its parent company GoTo. As we know, LastPass was compromised over the summer, but, it appears from what we know, that even though the hackers stole some of the password vaults, assuming your master password was strong, we think you are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We are now a step closer to an agreement announced in principle last year, to replace the now thrown out Privacy Shield. Privacy Shield was the (at least) second try to come up with a solution to sharing data across the pond while protecting EU citizens’ privacy. The last agreement got struck down by the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
New York Gov Signs Right to Repair Law While industry lobbyists have done their best to water down New York’s right to repair law (and they were relatively successful at it), it is a start. It goes into effect in July, 2023 and while it excludes electronics used in government and schools, has other ridiculous […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
T-Mobile recently admitted yet another data breach. This time it compromised 37 million customers. The attack used – or abused – one of T-Mobile’s APIs. Dedicated readers probably remember that I warned about the abuse of APIs last week. It is a growing problem because companies are not paying enough attention to API security. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is very useful – we all know it. But useful for whom? Apparently hackers are setting up fake websites for popular free and open source software to promote downloads through ads and search engine marketing in Google search results. What the hackers do, among other things, is create fake domains that look like the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]