Using a badge to get you in the office (and for some companies out of the office as well) may not be as secure as you thought it was. French security services firm Quarkslab has made an eye-popping discovery: a significant backdoor in millions of contactless cards made by Shanghai Fudan Microelectronics Group, a leading […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
White House Working on Cyber Insurance Policy for Catastrophes The White House is working on a policy proposal to stabilize the economy in case of a massive cyber incident. This would require help from Congress, of course, but it is certainly possible that we could have a cyber 9/11 that would require a federal bailout. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this is far from the biggest breach of the year, it is likely the one with the most political impact. At least so far. I assume the campaigns are doubling or tripling down on their security. Last week Politico said that it received multiple emails from a leaker who said that they hacked the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
State Dept. Says UN Cybercrime Treaty Must protect Human Rights On the eve of final negotiations at the UN for a long awaited cybercrime treaty, the US says they are focused on ensuring the treaty protects human rights. The US, along with 40 other countries — not including, Surprise, Russia or China — signed off […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google Rolls back Decision to Kill Third Party Cookies Firefox and Safari, along with some other smaller browsers already block third party cookies by default. Google said that they would do the same. Google now says that phasing out third party cookies will hurt their revenue stream, uh, will impact online advertising, so they are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What we don’t know is what the long term impact of this will be. Law enforcement around the globe has been attacking the attackers. They have been successful, at least to a degree. The problem for the hackers as a result of these attacks is whether they can they trust each other. Historically, hackers have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]