According to an article at Cult Of Mac, one of Apple’s suppliers, Quanta, posted Powerpoint documents with instructions on how to log in to a database containing confidential Apple documents on new, yet to be announced products. Apparently, the document contains default credentials, which it says, the business partner should change after they log in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Lewitt, Hackman, Shapiro, Marshall and Harlan, a law firm based outside Los Angeles, has an interesting take on software licensing. They don’t say whether they have been representing plaintiffs or defendants in software piracy lawsuits, so I don’t know if there is a bias in their blogging, but it is an interesting point of view. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The media has been talking about the feds running Stingrays and Dirtboxes to gather cell phone data on potentially thousands of Americans. The government’s take on this has been that a warrant is not required. The FBI made their position known in a private briefing to the Senate Judiciary Committee last week. The result was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As has been the case for more than 10 years, California leads the way, for better or worse, for the rest of the country in protecting resident’s privacy. Their original breach law, SB 1386, is the model for laws for the rest of the country. So, what is new in 2015 – read on. If […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of us who are not insurance experts, the distinction may not be obvious. As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Law Review has a great article on board member’s responsibility in the area of cyber security. One quote from the article: a 2012 Carnegie Mellon poll of how U.S. boards are managing cyber risks found that 71% rarely or never review privacy and security budgets, 80% rarely or never review roles and responsibilities, and nearly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]