We are definitely starting with a bang. First Apple patched a flaw that affects the system integrity of macOS. Using a third-party kernel extension Microsoft discovered a vulnerability in Apple’s System Integrity Protection, a feature that if functioning correctly, will reduce the risk from operations that affect system integrity. The flaw could enable hackers to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware as a Chaos Mechanism This version of ransomware doesn’t require much skill. Rather than encrypting files and demanding a ransom, they are just deleting as many files as possible and watching the chaos with some popcorn and beer. Even if the company has good backups, and many don’t, it can still cause downtime, supply […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The US has been trying to reign in China’s thefts of intellectual property and other bad behavior by putting tech sanctions on them. The next president wants to increase sanctions on China. Will it work? Huawei, China’s leading phone maker was seriously impacted over the last 2-3 years over the restriction of US made chips. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Can Vendors Enforce License Agreements for Kids on Parents? Ed Tech vendors (those companies that sell tech to schools for use by their students) apparently sell your kid’s data and think that because the school agreed to some terms that implicitly binds the parents. In one case, the court said no. I didn’t know that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
NSA Cyber Director Rob Joyce to Retire After 34 Years Now that is a career in public service. Joyce was the Cyber Director at NSA since 2021 and was at the NSA during the days that it was affectionately called “No Such Agency” for its secretiveness. It comes at a time when cyber threats are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FCC Bans Robocalls Using AI-Generated Voices This comes after someone generated thousands of robocalls pretending to be Joe Biden telling people not to vote. Unless they get express permission from the recipient of the call, which would, of course, defeat the purpose of the call. The FCC wrote the rule in a way that allows […]
Continue reading →
[DISPLAY_ACURAX_ICONS]