Interpol Recovers Over $40 Mill from Biz Email Compromise Attack INTERPOL has created a global stop-payment mechanism that it can use to recover funds. A company in Singapore thought they were paying a vendor. Instead they paid a hacker. INTERPOL’s Global Rapid Intervention of Payments or I-GRIP was able to recover $39 million out of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Myanmar Cyber Crime Bosses Handed to China You may remember that a couple of weeks ago I reported that the Myanmar government turned over control of the part of the country where Crime bosses were running various social engineering scams and human trafficking to the rebels who threatened to shut them down. Now there are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mozilla Says 18 of 25 Pregnancy Apps: Privacy Not Included Out of the 25 “reproductive health” apps and wearable devices, 18 received a “privacy not included” rating. That means that they have a problem protecting their user’s privacy. In today’s world that data could be used by private bounty hunters in states that offer that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Senate Passes Legislation to Protect Against Deep Fakes While I agree that deep fakes – photos and videos that use tech to make it look like someone is saying something or doing something that they never did – can be nasty, is that really the best use of the Senate’s time right now? In any […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Minneapolis City Web Sites Hit by Denial of Service Attacks Last Thursday, early in the morning, a number of City of Minneapolis web sites were disabled by denial of service attacks. The attacks are short lived and the city was able to restore most of the services within a few hours. It is certainly possible […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UK Proposes Weak Security Law for IoT Devices; Calls it Strong The UK is proposing a law similiar to California’s existing IoT law and calls it strong security. What makes it strong is that they call it strong, maybe? The bill requires that default passwords on IoT devices be unique (likely part of the serial […]
Continue reading →
[DISPLAY_ACURAX_ICONS]