For those of you who use Bit Torrent to download pirated movies, this post is for you. Microsoft has turned every Windows 10 Home and Windows 10 Pro user into a Bit Torrent node of sorts, delivering Microsoft updates to their millions of customers. Like other Windows 10 features (WiFi Sense, for example), I am […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HP’s security folks tested the security features on 10 smartwatches along with their cloud and management infrastructure and the results, while not surprising to me, are disappointing. Smart watches are in their infancy; the compute power is relatively limited and, as is usually the case, features win out over security. The question to ask is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Not surprisingly, the fallout from the OPM breach continues. Here are a few new items in the news after OPM Director Archuletta was basically fired. The OPM has changed it’s privacy policy to allow investigators to probe it’s databases. This happened after the discovery of “significant entryways” for hackers in at least 3 more databases. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The media has been reporting the demonstration done by two security researchers and a Wired magazine reporter where they completely controlled a Jeep, including the brakes and accelerator. To quote Wired: I WAS DRIVING 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Though I hadn’t touched the dashboard, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Add UCLA to the list of health care providers that have been hacked. UCLA says they discovered the hacking last September, but it was not until May that they discovered that the hackers had gotten into the part of the system that stores patient records. Even now they are not sure if the hackers took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Car makers are limiting the data they are sharing with Apple and Google though car entertainment systems (what the car makers call infotainment). This is not because they value your privacy, but rather because they want to be able to sell your data themselves and if they no longer own it because they gave […]
Continue reading →
[DISPLAY_ACURAX_ICONS]