The Gift That Keeps on Giving – Log4j – List of Affected Vendors First, get used to hearing about this. It will be haunting us for months, at least. Jen Easterly, current head of DHS’s CISA and formerly at NSA and a professor at the US Military Academy at West Point says this may be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
So many times it seems like victims get re-victimized by the court system. Here is one case where the court did the right thing, so I think that alone makes it worth highlighting. Going back to 2013, young women responded to ads for clothed modelling, but when they showed up they were told that they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
NEW LOG4J JAVA LIBRARY ZERO-DAY IS BEING EXPLOITED IN THE WILD A proof of concept for a zero-day vulnerability in the very popular Apache Log4j Java library is being shared online. Log4j is used both in enterprises and in cloud services. Products from Apple, Amazon, Twitter and Steam, among others may be vulnerable to remote […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Having Some Success In Going After Hackers The DoJ announced the arrest of a Ukrainian who is accused of deploying ransomware on behalf of the REvil ransomware gang. They also seized $6 million in cryptocurrency. The Ukrainian was arrested in Poland (crooks are not smart. If you are in the crosshairs of U.S. law […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Over a year ago Apple announced that they were going to make a major change in how Apple (Mac and iPhone) users interact with ads NOT served up by Apple. Web sites and apps were going to have to ASK a user’s permission to track data across web sites or for sharing with data brokers. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Smartphone Counterespionage Tips for Travellers Most people say “who would be interested in me?” but the reality is that foreign governments track Americans for a variety of reasons, both good and bad. Read this article to find some tips that could keep you below the radar and your information safer. Are Surveillance Cameras the Answer […]
Continue reading →
[DISPLAY_ACURAX_ICONS]