While goals are CURRENTLY voluntary, CISA issued guidelines for what it expects from pipelines and other critical infrastructure in light of the Colonial Pipeline attack. While it appears that the hackers were not able to take over the control systems in that attack, they did take over the control systems in the Florida and Kansas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In March of 2020 Donald Trump signed a bill requiring rural telecom companies to replace suspected vulnerable Huawei telecom equipment. The government would even pay for the replacement. For whatever reason, the Trump administration never did anything to make that happen. Finally, 18 months later (if this is really a security threat, shouldn’t something have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Geofence warrants are “requests” by law enforcement for information on everyone that was in a particular geographic area during a particular time window. Typically they use the results to come up with the usual list of suspects. The initial response usually doesn’t include names and addresses; that comes after the police mine all the data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the details of this are interesting, what is more important is thinking about all of the contracts that you sign. This is a legal battle that goes back several years. In one corner is Fiserv, the Fortune 200 +/- financial services software behemouth. In the other corner is Bessemer System Federal Credit Union, a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
LA Police Collected Social Media Account Info From People They Talked To I’m sure they were just curious. The LA police watchdog says that officers were instructed to collect civilians’ social media details when they interviewed them. An Email from the Chief dating back to 2015. He said it could be beneficial to investigations and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Signal Provides Customer IP Address to Swiss Police While police all over the world complain about the universe going dark on them, that is only true to an extent. Proton maintains no logs, but they can capture data in real time. In this case they received an order from the Swiss Federal Department of Justice, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]