The Colonial Pipeline attack exposed what a lot of us have been saying for years – that when it comes to U.S. critical infrastructure, the emperor has no clothes. After the attack on Colonial was dealt with, TSA issued a directive very quickly that was pretty superficial. It required, among a couple of other things, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
On Friday Title industry software and consulting provider was hit by a ransomware attack. Cloudstar operates 6 data centers and supports over 40,000 customer users. Now those customers are wondering what are they going to do. Cloudstar users who close real estate sales are dependent on Cloudstar’s systems being up. Cloudstar has been down since […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When people talk about IoT – Internet of Things – these days, they are thinking of Amazon Alexa or Phillips Vue lightbulbs, but where IoT started was in factories and warehouses, decades ago. Industrial automation or IIoT is still where the biggest in IoT attacks lies. Today we learned about a critical remote code execution […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First it was California (of course). Then it was California version 2. In 2020, things were quiet and no states joined the club. Earlier this year Virginia joined the club and today Colorado became the third state to enact a California-style or Europe-style privacy law, with some significant differences. Here are some of the key […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Florida’s governor Desantis, a likely Republican presidential candidate in 2024, and his Republican dominated legislature passed a bill this year designed to punish the likes of Twitter and Facebook. Unless they were very naive, they knew this law was going to be challenged in court, and likely struck down for a number of reasons. But […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mobile finance apps are very popular, but are they safe? A report by security company Intertrust says that 88% of the apps tested failed at least one of the cryptographic tests, meaning that the encryption can be broken, resulting in loss of privacy and possibly loss of your money. Some of the other findings from […]
Continue reading →
[DISPLAY_ACURAX_ICONS]