A New Trend? Insurers Offering Consumers Ransomware Coverage In what may be a new trend, Mercury Insurance is now offering individuals $50,000 of ransomware insurance in case your cat videos get encrypted. The good news is that the insurance may help you get your data back in case of an attack. The bad news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Facebook/Cambridge Analytica Suit Moves Forward Facebook tried to convince a judge that when users share information privately on Facebook they have no expectation of privacy. The judge didn’t buy it and the suit against Facebook moves forward. Source: Law.com (registration required) Equifax Quietly Added More Hoops for you to get your $0.21 Yes, if everyone […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers Hack WPA 3 Again The WiFi Alliance has always keep their documents secret. The only way that you even get a copy of the specs is to become a member and that will cost you $5k-$20k a year, depending on your role. The same team that reported the bugs called Dragonblood found these new […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FBI and DHS Raid State Driver’s License Database Photos The FBI and DHS/ICE have been obtaining millions of photos from state DMV driver’s license databases. The FBI and DHS have do not feel that they have ask permission to do this. The FBI conducts 4,000 facial recognition searches a month. While the searches might be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is What Spies Do It has come out that western (read one or more of the five eyes countries) inserted malware into Yandex (Russia’s equivalent of Google) in order to steal administrative credentials. The purpose was, apparently, to read emails of interest to the western spies. We need to understand that we do it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]