AG Says They Unlocked Shooter’s iPhone Without Needing Apple to Hack Their Security For a couple of decades the FBI and Justice Department has been saying that software vendors need to insert backdoors into their security software to make it easier for the government to hack it if they want to. One high profile case […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Facebook/Cambridge Analytica Suit Moves Forward Facebook tried to convince a judge that when users share information privately on Facebook they have no expectation of privacy. The judge didn’t buy it and the suit against Facebook moves forward. Source: Law.com (registration required) Equifax Quietly Added More Hoops for you to get your $0.21 Yes, if everyone […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10. For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request. So yet another reminder that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
All smartphones are data collection machines; hopefully everyone understands that. There are an amazing number of sensors on the device and many apps just ask for everything. If the user grants that, then the app can harvest all that data and likely sell it, either individually or in the aggregate. Researchers took a tiny sample […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The security of all computers is dependent on three things: The Hardware The Operating System The Apps When it comes to the iPhone, Apple does a great job of making sure the hardware is secure. The Secure Enclave is the best in the industry and Apple spends a lot of money testing their hardware. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As people use their mobile devices as what one friend used to call a “pocket super computer” as opposed to something where you dial 7 digits (remember that) and talk to someone, hackers have figured out that the new attack vector is your phone. In part, this is due to the fact that finally, after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]