If you didn’t know better you would think the NSA is trying to turn over a new leaf. Credit Anne Neuberger. A couple of years ago the NSA dissolved the Information Assurance Directorate – the group that helps the good guys. To me, this was an incredibly stupid move on the part of the NSA. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There are an amazing number of misconfigured Amazon S3 buckets. I have no clue why. No company should be in this boat any more. Truffle Security said that a team of there security pros STUMBLED across about 4,000 of them. What was in them? Login credentials – not great. Security keys – even worse. API […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many Cyberspace Solarium Commission Recommendations Likely to Become Law The Cyberspace Solarium Commission was a blue ribbon commission that made recommendations to Congress earlier this year on improving government cybersecurity. It appears that many of their recommendations are being added to the National Defense Authorization Act, which is “must pass” bill to fund the military. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Microsoft’s LinkedIn Sued for Abusing Clipboard Access Apple’s Universal Clipboard allows you to share data between devices. According to the lawsuit, LinkedIn reads the data without notifying the user. However, LinkedIn is not alone. More than 50 apps, apparently, do that. Now that they have been sued, they are changing their app. Credit: Reuters When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple Likely to Make Charger, Earphones Extra on Next iPhone Before everyone goes crazy, first this is a rumor – a likely accurate rumor, but a rumor, and second, it is likely aligned with the EU’s directive to reduce electronic waste. Your old charger and old earphones probably still work and if, say, 50% of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since the early 1990s, there has been a battle going on between the federal government and privacy advocates. Privacy advocates want strong encryption. The government wants weak encryption that it can break. Except of course for the encryption that they use. They claim they need it is to hunt down terrorists, but that didn’t get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]