Privacy litigation is a new way for attorneys to make money. Based on the number and types of cases, they think they can make a lot of it. Some examples: Clearly lawyers are checking out the landscape here. Some types of claims will just go away if no one wins the cases. Others may be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We are back to pandemic level cyber fear. Security firm Proofpoint says that compared to last year, CISOs are feeling less prepared to cope with cyberattacks and more at risk. Threats are always increasing, data is being ripped off in more ways than we can count, cybersecurity budgets are not what they need to be, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Uber breach saga continues. Joe Sullivan, Uber’s former CISO, was convicted of lying to the feds about a breach that happened in 2016. Hackers broke in to Uber and stole data on 57 million customers and 600,000 drivers. One of the counts he was convicted of was hiding the 2016 breach from the feds […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Alerts, Apple, Best Practices, Google, Hacks, iOS, Legal, News Bites, Privacy, Safety, Security Practices
Government Contractors Affected by TikTok Ban Too The White House issued a memo in February requiring the removal of TikTok from federal information systems as required by the consolidated appropriations Act of 2023. How this affects contractors is that it also includes IT “used by a contractor under a contract with the executive agency that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The law firm Baker Hostetler published its 2023 Data Security Incident Response Report. It is based on more than 1,100 cybersecurity incidents investigated by them last year. Here are some of the statistics they published: The most common actions after initial access were: While a blockchain data analysis company said that the total amount of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While some people go out of their way to talk about other – non-friendly – countries conducting information warfare ops, it is useful to understand that everyone does it and that includes us. Just one example. The U.S. has many of these examples. The U.S. Army Cyber Command told defense contractors it planned to surveil […]
Continue reading →
[DISPLAY_ACURAX_ICONS]