FDA Will No Longer Approve Digital Medical Devices That Are Vulnerable Starting last month, the FDA will REJECT all new applications for any cyber medical device that does not include a cyberattack protection plan. Of course this won’t be perfect, but at least manufacturers will have to make an effort at it. Given that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Section 702 of the Foreign Intelligence Surveillance Act allows the government to collect intelligence from non-Americans located outside the United States without a warrant. Section 702 cannot be used to target Americans. At least some people say that Section 702 needs some reform. When Section 702 was first enacted lawmakers knew that this could spell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Even the DoJ Thinks John Deere Should Let Farmers Fix Their Tractors The “right to repair” movement has been growing for the last decade. John Deere has been leading the “its not safe for you to fix your own tractor” movement for years, saying they have made tractors too complicated for owners to fix. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As most of you probably know, TikTok is in the fight of its life. While, if Americans stop using it, that only represents a hundred million users, they are relatively speaking very wealthy and the data they represent is very useful. While TikTok says it is not sharing your data with the Chinese government, China, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]