720-891-1663

Security News Update for March 17th, 2023

Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Maybe OpenAI Should be Called ClosedAI

ChatGPT 3.5 was basically a beta. They got lots of people to feed data into the system, including sensitive, proprietary data (oops) in order to train it. Now that it is “more” trained, OpenAI released ChatGPT 4. Contrary to the founding principles of investors like Elon Musk, the company, which claimed that it would be […]

Continue reading → [DISPLAY_ACURAX_ICONS]

FISA Section 702 Renewal Faces Hurdles

Section 702 of the Foreign Intelligence Surveillance Act allows the government to collect intelligence from non-Americans located outside the United States without a warrant. Section 702 cannot be used to target Americans. At least some people say that Section 702 needs some reform. When Section 702 was first enacted lawmakers knew that this could spell […]

Continue reading → [DISPLAY_ACURAX_ICONS]

TSA Issues Emergency Cybersecurity Mandates for Aviation Sector

Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending March 3, 2023

Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giantĀ T-MobileĀ in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]

Continue reading → [DISPLAY_ACURAX_ICONS]