Singapore Updates Contact Tracing App Singapore is not exactly a democracy, so this isn’t a complete surprise. They are updating their contact tracing app to include foreigner’s passport number and scanning of barcodes to facilitate tracking when someone enters a store or mall or restaurant. They would like the program to run in the background, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five years after the Pentagon demanded that every weapon system include the requirement that it be able to function in the face of Russian and Chinese cyber attacks, many major weapons systems don’t even include cybersecurity as a key performance parameter, never mind actually working under those conditions. This means that all our adversaries need […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The day after Twitter fact checked two of Trump’s tweets regarding vote by mail as massively fraudulent, he issued an executive order to get even with them. What Trump would like to do is revoke Twitter and other social media sites’ protections provided by Section 230 of the Communications Decency Act, so that he and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Californians for Consumer Privacy, an advocacy group that started the push for CCPA is back again, pushing for a ballot initiative this time. You may remember that they got enough signatures two years ago and only by some amazing gymnastics did the legislature pass CCPA. The group says that they have enough signatures to get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About a year ago the Governor of New York signed the SHIELD act into law. Among other things, the law broadened the definition of a breach to include ACCESS to the data, not just stealing it. It also broadened the definition of personally identifiable information. Notice that no one talks about non-public personal information any […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AG Says They Unlocked Shooter’s iPhone Without Needing Apple to Hack Their Security For a couple of decades the FBI and Justice Department has been saying that software vendors need to insert backdoors into their security software to make it easier for the government to hack it if they want to. One high profile case […]
Continue reading →
[DISPLAY_ACURAX_ICONS]