China and Russia Continue to Interfere with the Elections According the the White House, China has been targeting the US election infrastructure ahead of the election and Russia has been trying to undercut Democratic candidate Joe Biden, much like their did with Clinton in 2016. Could it be that Russia thinks that the Republican Administrations […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Dial back your wayback machine to September of last year. Capital One announced a hack of their Amazon environment by an ex-Amazon employee the previous July that was possible to due an incorrect configuration of their security settings. Fast forward to today and the feds announced an $80 million fine for bad cloud hygiene. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many Cyberspace Solarium Commission Recommendations Likely to Become Law The Cyberspace Solarium Commission was a blue ribbon commission that made recommendations to Congress earlier this year on improving government cybersecurity. It appears that many of their recommendations are being added to the National Defense Authorization Act, which is “must pass” bill to fund the military. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft’s LinkedIn Sued for Abusing Clipboard Access Apple’s Universal Clipboard allows you to share data between devices. According to the lawsuit, LinkedIn reads the data without notifying the user. However, LinkedIn is not alone. More than 50 apps, apparently, do that. Now that they have been sued, they are changing their app. Credit: Reuters When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The law firm of Bryan Cave has done some interesting analysis. On January 1, 2020, California became the first U.S. state to allow a breach victim to sue a company that was breached without having to prove they were damaged. The breach alone was proof of damage. The amount any one person can sue for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes the police do some great tech work. This case does not appear to include any U.S. law enforcement agencies, but sometimes they don’t want any attention for a number of reasons. This story starts with criminals using a specially modified phone that was designed to be more secure. The phone, called an EncroChat, has […]
Continue reading →
[DISPLAY_ACURAX_ICONS]