A New Reason to Not Use Huawei 5G Telecom Equipment The President has been trying to get our allies to not use Huawei equipment in the buildout of their next generation cellular networks due to concerns that the Chinese government would compromise the equipment. Now the British spy agency GCHQ is saying that Huawei’s security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We’re From the Government and WE’RE HERE TO HELP YOU! Well, not really. We don’t have to worry about the gov being hacked. They just give our information away. At least in this case there is no hard evidence that the data was misused. FEMA hired a contractor to help it find temporary housing for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If privacy matters in your life, it should matter to the phone your life is on Apple is launching a major ad campaign to run during March Madness with the tagline “If privacy matters in your life, it should matter to the phone your life is on. Privacy. That’s iPhone“. Since Apple’s business model is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Jackson County Pays $400,000 in Ransomware Following a ransomware attack on March 1st, 2019, Jackson County, Georgia decided to pay hackers a ransom of $400,000. The county population is 67,000 according to Google. While hackers may not be explicitly targeting these small municipalities, they may be. After all, small municipalities likely have poor cybersecurity practices […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Commerce Department Wants Companies to Publish Ingredients of their Software The Commerce Department is trolling around the RSA conference trying to get companies to publish the ingredients in their software – the so called bill of materials that I have written about before – so that users can understand what libraries are being loaded. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We Don’t Need Back Doors in Crypto – We Have Enough Bugs Already! Researchers have found three new bugs in the protocol design (as opposed to the implementation) in both 4G and 4G cellular networks. The design flaws can be carried out by any person with a little knowledge of cellular paging protocols. The hardware to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]