US Warns That Iran Terrorists Broke into Multiple US Water Facilities Last week I reported that the Aliquippa, Pennsylvania Water Authority fessed up to the fact that hackers successfully broke into their network, compromising a pump station, using a vulnerability in an Israeli OT network system that is repackaged by multiple vendors. Now the FBI, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Real ID, a misguided effort by the feds to make everyone have a less easily fakeable driver’s license (notice I did not say a secure driver’s license) came out of the 9-11 attacks. For the last 20 years the feds have been trying to get the states to implement the law, with many states resisting […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Montana and Indiana TikTok Ban Stunts Unsurprisingly Fail in Court Both Indiana and Montana passed laws completely banning TikTok – both at the app store and private citizen level. Given that these laws were political stunts designed to try and impress voters, it is not surprising that they failed in court. The courts struck down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have long reported that hackers love to break into law firms. This is in part due to the fact that many law firms do not have good cybersecurity practices, especially small firms. The other part is that breaking into a law firm is like winning the lottery. Instead of getting one customer’s data, they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing theĀ U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]