Hackers are nothing if not creative. Combine that with businesses not paying enough attention to security and you get a mess. Researchers discovered an unprotected database with over 5 million client records belonging to Choice Hotels. The hotel says there is good news. Only 700,000 of those records were from real customers. Doesn’t that make […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone has heard about the Federal Trade Commission fining (tentatively) Facebook $5 billion for sharing your data – with Cambridge Analytica – without your permission. The FBI has sought proposals for third parties to hoover up everything that is visible on social media and build a database so the FBI can search it for information […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alarm companies like wireless alarm sensors because they cost less to install and are prettier since there are no wires. They are also remarkably less secure. It is useful to understand that you neighborhood junkie might not be able to pull off the attack, but any serious burglar would not have a problem. In this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security vendor ESet interviewed 625 business owners and executives to understand their readiness for California’s new privacy law that goes into effect on January 1, 2020. What most businesses are missing is that Nevada’s version of the law goes into effect on October 1, 2019. Most of the respondents were from small businesses, some of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
That’s kind of a loaded question, but still important. After all, you are spending a bunch of money on it; how do you know if you are getting your money’s worth? Or maybe you are not spending very much at all – in that case how do you know if you are adequately protecting your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple uses contractors to listen to Siri recordings to figure out whether Siri responded correctly. Apple says that these contractors are under non-disclosure agreements and the Siri conversations are not directly tied to the person’s iPhone or Apple credentials. Still, these people hear about: Confidential medical conversations People having sex Drug deals Other likely illegal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]