The stakes in getting breached are definitely increasing. Historically, victims of a breach have sued the breached company claiming some potential future, but vague, damages. Often the suits get thrown out saying that these potential future damages are not sufficiently real. Independent Living Systems is a VENDOR to healthcare providers in Florida. They were breached […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AT&T lost control of data of nine million customers. T-Mobile lost data belonging to tens of almost a hundred million customers. Other carriers have too. All mobile providers collect a lot of data. Data for billing, data for profiling, data for selling ads. All kinds of data. Location data. They know every cell site that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ChatGPT 3.5 was basically a beta. They got lots of people to feed data into the system, including sensitive, proprietary data (oops) in order to train it. Now that it is “more” trained, OpenAI released ChatGPT 4. Contrary to the founding principles of investors like Elon Musk, the company, which claimed that it would be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Section 702 of the Foreign Intelligence Surveillance Act allows the government to collect intelligence from non-Americans located outside the United States without a warrant. Section 702 cannot be used to target Americans. At least some people say that Section 702 needs some reform. When Section 702 was first enacted lawmakers knew that this could spell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]
Continue reading →
[DISPLAY_ACURAX_ICONS]