Windows 11 May Damage Data on Some CPUs Microsoft issued a warning that computers that use the Vector AES instruction set might damage data , but they don’t say how or why. Microsoft says fixes in June and May prevent further damage but the result is that encryption is much slower after the patch. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Australia Proposes Law To Force Online Platforms to Disclose User Info Australia plans to introduce legislation that will force social media companies to either take down posts that people don’t like or hand over their user’s information. This isn’t law yet, but I can easily see how this will be gamed. This comes in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While goals are CURRENTLY voluntary, CISA issued guidelines for what it expects from pipelines and other critical infrastructure in light of the Colonial Pipeline attack. While it appears that the hackers were not able to take over the control systems in that attack, they did take over the control systems in the Florida and Kansas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It is interesting that this attack has captured the attention of consumers and government alike. For those of you not affected, the Colonial Pipeline company runs the major pipeline for refined petroleum products between Houston and New Jersey with many stops in between. The pipeline covers 5,500 millions and moves 100 million gallons of fuel […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Well that is not a comforting thought. Cybernews is reporting that using an Internet of Things search engine (like Shodan, but they don’t say which), they were able to scan big swaths of the Internet. In their case they were looking for exposed IoT systems. Not just any IoT, but critical infrastructure IoT. Here is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Gov Warns of Ransomware Attacks on Pipeline Operations DHS’s CISA issued an alert this week to all U.S. critical infrastructure that a U.S. natural gas compressor station suffered a ransomware attack. While they claim that the attackers did not get control of the gas compression hardware, they did come damn close. The ransomware took […]
Continue reading →
[DISPLAY_ACURAX_ICONS]