Car Production in US Could Shut Down in Weeks Due to China Rare Earth Magnet Ban The president says he has worked this out with China – we will see how much of a squeeze China wants to put him in. Xi, as a master deal maker, could choose to squeeze the hell out of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FBI says that BADBOX 2.0 is a malware campaign that has infected over a million home Internet-connected devices. Once infected it becomes part of hacker’s attack army. It is commonly found in Chinese smart TVs (where most of them are made) and also on streaming boxes, projectors, tablets and even your smart dishwasher. Even […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am guessing that this is just the tip of the iceberg. That by itself is scary. Researchers discovered nearly 35,000 solar power systems from 42 vendors that have exposed management interfaces. This includes devices like power inverters, data loggers, monitors, etc. The researchers found nearly 50 vulnerabilities that could be exploited. Most of these […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
TLS Certificate Lifetimes Will Officially Reduce to 47 Days If you are responsible for a website, this applies to you. TLS certificates, the tech behind making HTTPS:// work on your website, has been changing over the years. A website owner used to be able to buy a certificate and it would be valid for 10 years. But […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have seen multiple attacks in the last few years on municipal water supplies. The good news is that none of them killed anyone. Mostly, that was just because we were lucky. A bug in a TLS certificate (used to implement HTTPS) allowed researchers to view the water system control panel in hundreds of public […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Fake Social Security Emails Trick Users into Installing Remote Access SW Cybersecurity experts have uncovered ongoing schemes where criminals are exploiting the US Social Security Administration (SSA) to trick people into installing a dangerous Remote Access Trojan (RAT). This program gives the attackers complete remote control, allowing them to steal personal information and install more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]