Dallas Mavericks Owner and Crypto Guru lost $1M to Scam Dallas Mavericks owner Mark Cuban, who fancies himself a crypto guru just got a crypto wallet drained of about a million bucks. He says that he may have downloaded a fake version of a crypto wallet app. Oh, well, so now instead of being a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
That doesn’t mean they will stop trying. Going back to the 1990s and the Communications Decency Act, and then the Child Online Protection Act in 1998, the Supremes keep saying that it is not the government’s role to regulate speech. Of course the government only tries to regulate speech that is unpopular, whether it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ex-NSA Director General Alexander’s Security Company (IronNet) Near Bankruptcy It just goes to show that just because you are famous and people invest $78 million in you, doesn’t mean you know how to run a business. How, exactly, do you blow almost $80 million and realize you are over the edge of the cliff before […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
73 percent of survey respondents (659 board members from companies with over 5,000 employees) fear a material cyberattack on their organization this year, up from 65 percent last year. 59 percent said that generative AI presents a high risk to their organizations because it can be used by hackers to create and deliver malware with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Want a .US Domain? Just Lie About It. The .US top level domains are a hotbed for phishing attacks. Apparently, this is due to lax oversight. In theory, the .US is managed by the US government, but the government outsources that to GoDaddy – who doesn’t have a stellar cybersecurity reputation to be polite. See […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The California Privacy Protection Agency, the government agency that enforces the California Privacy Rights Act, has released two DRAFT documents recently. They are going to discuss the drafts at their meeting tomorrow but they have not yet started the rulemaking process. The two regulations are the cybersecurity audit regulations and the cyber risk assessment regulations. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]