Amazon Delays Office 365 Rollout Due to Security Concerns Depending on whether you are an optimistic or pessimist, you can assume what Amazon’s intentions are. Likely this is about trying to convince potential customers that Amazon is secure and Microsoft is not. While there is probably some truth to that, I think there is more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Passkeys are a replacement for passwords and, in general, are way more secure. They use encryption to validate who you are in a different way than HTTPS does. With passkeys, you don’t type in a password. Instead the website and your device create a digital handshake that only works from your device and with that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware as a Chaos Mechanism This version of ransomware doesn’t require much skill. Rather than encrypting files and demanding a ransom, they are just deleting as many files as possible and watching the chaos with some popcorn and beer. Even if the company has good backups, and many don’t, it can still cause downtime, supply […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
After the entire US Senate was briefed this week about the Chinese attack called Salt Typhoon on US and other telecom and Internet carriers, the feds are trying to figure out what to do. This is going to be the job of the next administration because I doubt Congress can create a solution in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Musk Admits to Making It Harder to Read News on X We only post blogs to Twitter anymore to support our current followers. Musk wants you to upload your content to Twitter so that he controls it and you never leave the platform. If you include a link in a post, it will be deprioritized. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Texas AG Sue TikTok Under SCOPE Act The Securing Children Online Through Parental Empowerment (SCOPE) Act is designed to protect kids online. The Texas AG claims that TikTok failed to comply with the parental verification requirement, unlawful sharing, disclosing or selling of a minor’s PII and failure to create and provide parental tools. While this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]