This seems to keep coming up, so maybe spending a little time on the subject might be helpful. The security or privacy team creates this form for users to acknowledge something or approve something and then hand it off. Marketing gets in the middle of it to make it look pretty. Developers then take a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I sort of stole Brian Krebs’ blog post title and then changed it completely for the counterpoint. Brian’s actual title (nothing against Brian; I have spoken with him multiple times; he is a good guy) is WHY Paying to Delete Stolen Data is Bonkers . In concept, I don’t argue with it. Brian’s claim is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Finland-based psychotherapy group Psychotherapy Center Vastaamo may need some therapy itself. They claim that in late 2018-early 2019 hackers broke into their network. Just this month it has come out that the company, which has 20+ offices and 300 or so shrinks may have lost the data of 40,000 patients, some of whom are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Orca Security scanned more than 2,200 virtual appliance images – the same ones that your company probably uses every day. The images represented over 500 vendors. They were found on the marketplaces at Amazon, Microsoft, Google and others. They included both open source and commercial (licensed) software. Orca created a scoring system that ran from […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you know the password to your spouse’s computer? What about his or her social media accounts? His or her email accounts? Not married, just friends, maybe with benefits – what about his or her passwords? We will get to work passwords in a minute. ExpressVPN asked 1,500 American adults in an exclusive but not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI has said for years that paying a ransomware ransom was a bad idea. It encourages the bad guys and funds their bad guy activities. But last week the decision became harder when the Treasury department said that they were going to add ransomware organizations that are connected to terrorist organizations to the list […]
Continue reading →
[DISPLAY_ACURAX_ICONS]