Senator Lummis from Wyoming plans to introduce legislation in early 2022 to attempt to rein in some of the wild west of the cryptocurrency world. Stay tuned. Rumor is that it will add investor protections, rein in stablecoins and create a self-regulatory body under the SEC and the CFTC. That might be a tall order […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russian Hackers Make Millions by Stealing SEC Earning Reports A Russian hacker working for a cybersecurity company has been extradited to the U.S. for hacking into the computer networks of two SEC filing agents used by multiple companies to file their quarterly and annual SEC reports. Using that insider information, the hacker traded stock in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Chinese drone maker DJI controls nearly 70% of the commercial drone market (Credit: Hindustan Times). DroneXL says that the control 54% of the total drone market. DoneXL says that number is down 15% from last year (which could match the 70% number) . In any case, their next nearest competitor is Autel at 7% […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
So many times it seems like victims get re-victimized by the court system. Here is one case where the court did the right thing, so I think that alone makes it worth highlighting. Going back to 2013, young women responded to ads for clothed modelling, but when they showed up they were told that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Log4j is a very popular server logging package used across the Internet on Linux servers and other devices. This package is used not only in corporate software development environments, but also by very well known companies like Apple. It is also used in IoT devices and other appliances. DHS’s CISA has created a web page […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
NEW LOG4J JAVA LIBRARY ZERO-DAY IS BEING EXPLOITED IN THE WILD A proof of concept for a zero-day vulnerability in the very popular Apache Log4j Java library is being shared online. Log4j is used both in enterprises and in cloud services. Products from Apple, Amazon, Twitter and Steam, among others may be vulnerable to remote […]
Continue reading →
[DISPLAY_ACURAX_ICONS]