Ransomware as a Chaos Mechanism This version of ransomware doesn’t require much skill. Rather than encrypting files and demanding a ransom, they are just deleting as many files as possible and watching the chaos with some popcorn and beer. Even if the company has good backups, and many don’t, it can still cause downtime, supply […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The US has been trying to reign in China’s thefts of intellectual property and other bad behavior by putting tech sanctions on them. The next president wants to increase sanctions on China. Will it work? Huawei, China’s leading phone maker was seriously impacted over the last 2-3 years over the restriction of US made chips. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Can Vendors Enforce License Agreements for Kids on Parents? Ed Tech vendors (those companies that sell tech to schools for use by their students) apparently sell your kid’s data and think that because the school agreed to some terms that implicitly binds the parents. In one case, the court said no. I didn’t know that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
NSA Cyber Director Rob Joyce to Retire After 34 Years Now that is a career in public service. Joyce was the Cyber Director at NSA since 2021 and was at the NSA during the days that it was affectionately called “No Such Agency” for its secretiveness. It comes at a time when cyber threats are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FCC Bans Robocalls Using AI-Generated Voices This comes after someone generated thousands of robocalls pretending to be Joe Biden telling people not to vote. Unless they get express permission from the recipient of the call, which would, of course, defeat the purpose of the call. The FCC wrote the rule in a way that allows […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]