Tomorrow is the one-year anniversary of the Colonial Pipeline attack. The government has done more to improve cybersecurity in the last year than it had done in the last 10 years. But there is still a lot more to do. Jury Finds Norton/Lifelock Infringed on Two Columbia University Patents Even in the world of cybersecurity, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cars have huge attack surfaces. And getting bigger every year. One source says the average car has 30-50 computers and luxury cars have a hundred (personally, I think that is low). Add to that 60 to 100 sensors. Some cars have a hundred million lines of code in them. How do you make that 100 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ukraine Starts Using Clearview Facial Rec to Detect Ruskies Ukraine is using Clearview’s facial recognition tech to identify Russian operatives trying to infiltrate the Ministry of Defense. Clearview has over 2 billion photos scraped from Russia’s social media service VKontakte. They are not sharing with Russia. That likely makes Clearview a high priority hacking target […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Incident and Ransomware Reporting Requirement in Just Passed Spending Bill President Biden signed a bill that requires critical infrastructure operators to report significant cyber incidents to CISA within 72 hours after they reasonably believe an incident has occurred and within 24 hours of making a ransomware payment. The ransomware reporting requirement applies even if it […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Trump is Not Happy About Launch of Twitter-Like Truth Social Apparently not happy is a bit of an understatement. He has a lot to lose if this is not successful. As part of the SPAC deal with Digital World, he has a lot of shares. If the stock, which is still going up slowly, tanks, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This should make you feel better. Especially under the current situation. Palo Alto Networks Unit 42, an extremely well known and well respected group of security researchers, tested 200,000 network connected infusion pumps used in medical facilities. 75% of the devices tested had security vulnerabilities that would allow hackers to exploit them. The purpose of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]