Facebook says that 50% of its employees could be working remotely in 5 years. My guess is that this could be the new normal, which is not so good if you own a lot of expensive commercial real estate in a big down town. Zuck also says that employees that move from say San Francisco […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Akamai Sees Largest DDoS Attack Ever Cloudflare says that one of its customers was hit with a 1.44 terabit per second denial of service attack. A second attack topped 500 megabits per second. The used a variety of amplification techniques that required some custom coding on Akamai’s part to control, but the client was able […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If that headline doesn’t scare you, it should. Ripple20 is a family of 19 vulnerabilities that are part of a library that is used in medical devices, home automation devices, oil & gas controls, networking devices and other industrial control devices. The bugs are in a library that was developed in the 1990s and is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Singapore Updates Contact Tracing App Singapore is not exactly a democracy, so this isn’t a complete surprise. They are updating their contact tracing app to include foreigner’s passport number and scanning of barcodes to facilitate tracking when someone enters a store or mall or restaurant. They would like the program to run in the background, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As IoT devices proliferate, a lot of them don’t get updated. Ever. Some IoT devices automatically update themselves, but a lot of them do not have the smarts to do that. Hopefully all of them talk to their controller over HTTTPS – encrypted traffic. But there is a problem with that. HTTPS certificates expire and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the Maze ransomware group continues to hit new targets like banks and defense contractors, among many others, those companies, in many cases, decide to restore their systems from backups and not pay the ransom. So Maze decided to nuance their crime and steal (or exfiltrate) the data before encrypting it. That way, if the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]