Experian Users Say Their Account Has Been Hacked Brian Krebs is reporting that two users have written to him in the last month saying that their accounts at Equifax was hacked. Both users claim to have used strong, unique passwords with password managers. Equifax does not offer MFA (shocking! Actually not, this is Equifax that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Without delving into the politics of Roe v. Wade, the decision and the laws that are happening as a result of the recent Supreme Court decision, bring up some very challenging privacy issues. Automated license plate readers can be found in many places. There is an entire network of tow truck owners that collect license […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Reverse search warrants are warrants that police get when they do not know who they are looking for. There is a case in Denver right now that could, possibly, shed some light on the answer to this question. In this case, two teens burned down a house because, if I remember correctly, they were pissed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ZuoRAT Hijacks SOHO Routers Researchers have found a multi-stage remote access trojan (RAT) being used against a wide range of small and home office routers in Europe and North America. The RAT has been active since 2020 according to the researchers. The malware exploits known vulnerabilities (which is why patching IoT devices and making sure […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Without regard to where you stand on gun control, the events in California last week are an IT and safety failure of massive proportions with no way to remedy the failure. Three days after the media reported the breach, the California Attorney General started dribbling out incorrect information about what happened. There is still no […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While Clearview AI has billions of images for people to search against, they are expensive and fussy (to a degree) about who they sell to. On the other hand, PimEyes is free and available to anyone with a web browser. As I said, a stalker’s dream. Here is how it works. The stalker uploads a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]