As I have reported before, car manufacturers do not seem to care about whether the last owner still controls that used car that you just bought. While the issue of previous owners still having the ability to locate, unlock and even remote start some cars, car makers don’t seem to be doing anything about it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A robust incident response program and a well trained incident response team know exactly what to do and what not to do. One critical task in incident response is to preserve evidence. Evidence may need to be preserved based on specific legal requirements, such as for defense contractors. In other cases, evidence must be preserved […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes even if you try to be safe, it doesn’t work the way you want. Fiserv provides banking software to over a third of all banks. They have 24,000 employees and almost $6 billion in revenue. Many of its client banks are smaller banks and credit unions, but some large banks use Fiserv too. Apparently, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
O P I N I O N Law enforcement in general and the FBI in particular have been talking about the “going dark” problem caused by encryption on phones. Except, maybe, that isn’t the biggest problem that law enforcement is facing. The Center for Strategic and International Studies just released a study based on interviews […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers have figured out that stealing people’s phone numbers is easier and more profitable than stealing their phone (in part because they don’t have to be anywhere near you or your phone in order to steal the number). Recently I wrote about a bitcoin investor (AKA speculator) who is suing AT&T for $240 million because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Adams County, Wisconsin is now facing a crisis of confidence and likely some lawsuits as well. Why? On March 28, 2018, the county says, it uncovered “questionable activity” on county computer systems. Three months later, in late June, their investigation was complete. The result: 258, 120 people had their data illegally accessed. Data included protected […]
Continue reading →
[DISPLAY_ACURAX_ICONS]