CEO of Election Software Company Arrested on Personal-Data Theft Charges Here here is one that seems to have some facts behind it. Los Angeles has charged Konnect founder Eugene Yu with theft of PII and computer hard drives. Konnect is required to keep the data on POLL WORKERS that they are storing in the United […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to a survey of 2,000 people by Consumer Reports (CR), whom I consider relatively unbiased on the media scale, people are paying attention. I think it is a combination of factors, but I will take what I can get. CR says that 88% of the people said that they use strong password (8 characters […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While there are not a lot of things Republicans and Democrats agree on, apparently they can agree about cybersecurity is a problem. the Securing Open Source Software Act is designed to improve the security of open source software. While some people would like to believe the myth that open source software is secure, the reality […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why You Should Wear Contacts While on Video Conferences Researchers in Michigan and China have demonstrated their ability to read what is on your screen while you are on a video conference with 75% accuracy with text as small as 10 mm and a relatively low resolution 720 p camera. Credit: The Register Crooks are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is actually not a unique story; it happens from time to time. Luckily, it doesn’t happen that often, but when it does, OH BOY! Casey Umetso, age 40, was a network administrator for a “prominent Hawaii-based financial services company”, the name of which, for some reason, the DoJ is trying to shield. After being […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many small businesses and a lot of large ones use third party IT service providers called MSPs or Managed Service Providers. In almost all cases, these MSPs have the keys to your IT universe. They have access to your data. They also have access to all of your access rules. If they also help you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]