I didn’t have enough characters in the title to really explain it. Like many universities, Georgia Institute of Technology or Georgia Tech is a defense contractor. It does a variety of things like research and testing. As part of those contracts, the school has access to sensitive information, which, according law and/or contract, they are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
City of Columbus Warns Victims After Saying No Data Was Taken The city admitted that data was stolen including information in prosecutor’s database. The city says that they will help victims who are now being victimized again and whose lives may be in danger due to the city’s poor security practices. The mayor said that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is certainly a noble gesture, but one that is doomed to fail. The San Francisco city attorney is suing 16 websites that create and distribute non-consensual AI-generated pornography. This is a first of a kind lawsuit. The sites, which are not named, allow paying customers to upload photos of real people, apply AI to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Using a badge to get you in the office (and for some companies out of the office as well) may not be as secure as you thought it was. French security services firm Quarkslab has made an eye-popping discovery: a significant backdoor in millions of contactless cards made by Shanghai Fudan Microelectronics Group, a leading […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unfortunately, data breaches are with us to stay, at least for the near term. I’d like to think that they will end soon, but I don’t think that is going to happen. Today web site FlightAware warned that some customers’ information has been ‘exposed’, including social security numbers. FlightAware claims to be one of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
API Keys are an alternative to passwords for connecting to a computer or web service. Typically, API Keys are used by software applications to talk to other applications and are considered more secure than using userids and passwords to authenticate. Unfortunately, too many developers don’t treat APIkKeys like the security risk they are. API keys […]
Continue reading →
[DISPLAY_ACURAX_ICONS]