If you run a point of sale system (POS) in your business you are probably nervous. And with good reason. There have been way too many breaches starting with Target (actually, that wasn’t the start of POS breaches, but it certainly is well known). Here are some ideas for things that you can do in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A Michigan woman is suing a police officer who used the baby monitor app on her fiance’s cell phone that he confiscated when the fiance was arrested, to spy on her while she was nude and breastfeeding her son. Note that nothing has been proved yet, so this is only claims and allegations, but it points […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I have never been a fan of shortened URLs like http://bity.ly/1cxcx66u , but mostly for security reasons. If I click on that link, I have no idea what web site I am going to – whether it is malware laced or contains inappropriate content. Now there is another reason – privacy. Researchers at Cornell Tech, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Android community is slowly beginning to understand that they are going to have to step up to the plate and deal with security like Apple has done from the beginning. The challenge is that unlike Apple, where there is one master in control, the Android community is fractured. The only one who has any […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Businesses have always outsourced work. It used to be plumbers and what were referred to as “the trades”. Now it is programmers and manufacturing. What is different now is the degree of connectedness that those suppliers have. A couple of examples: Target uses HVAC contractors to maintain the refrigeration in their stores. It used to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Senate, on Tuesday, passed their version of CISA, the Cybersecurity Information Sharing Act. The House passed their own version of it months ago. The stated purpose of the act is to allow private companies to share “threat” information with the government and have immunity from being sued by their users for doing this. Because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]