In testimony before Congress about Chinese cyberattacks, Rob Joyce, former cybersecurity director at the NSA, told Congress that he had “grave concerns that the aggressive threats to cut U.S. government probationary employees will have a devastating impact on cybersecurity and national security.” The government already has a LOT of trouble hiring competent cybersecurity staff because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Is that person staring at you on Zoom really your boss? Or, is it a deep fake trying to get you to “gift” some hacker your company’s money? Last year that is exactly what happened to one Hong Kong company — to the tune of $25 million. iProov, a company that sells facial recognition identity […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unmanaged devices are devices that are neither owned by your company nor have your company’s security and management software on it. This includes personal phones and home computers used for work. Unfortunately, there is no simple solution to this problem. BUT, it is a huge hole in your security plan. You have no idea if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Screens at HUD Display AI Video of Donald Trump Sucking … Okay, I know that was click bait. As Department of Housing and Urban Development (HUD) employees walked into headquarters on Monday, they were greeted by large television screens showing video of the President sucking Elon Musk’s toes. Staff could not initially turn off the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
And big US players are not happy. Apple has been forced to allow users to specify non-Safari browsers as their default. Browser choice was also opened in the Android world although users could already use any browser they want to. Mostly, it is about companies like Apple, Google, TikTok and a few other mega players […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Wall Street Journal is reporting that Microsoft warned the GOP in July 2024, just before the convention, that the Chinese had been roaming around in their emails for months. If hackers use a light touch – make sure that they don’t flag emails as read when YOU haven’t read them, don’t delete any of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]