White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google Rolls back Decision to Kill Third Party Cookies Firefox and Safari, along with some other smaller browsers already block third party cookies by default. Google said that they would do the same. Google now says that phasing out third party cookies will hurt their revenue stream, uh, will impact online advertising, so they are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The EU has proposed a bill that would require cloud providers to search for child sexual abuse material (AKA CSAM or Kiddie Porn) in all private communications, even end to end encrypted ones. EU lawmakers are divided on the wisdom of such a law, but the debate continues. Other critics of the plan are WhatsApp, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hacking and Stealing Your Car From the Outside Through Your Headlight Apparently this is real. Crooks can pop off the headlight trim on some cars and get access to the cables to your “smart” headlights. From there they have access to the data bus called the CAN bus and from there they can unlock and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Regulators Going After Crypto Firms A number of crypto firms have felt the sting of regulators recently. The most recent one is Genesis Global Trading. New York’s DFS fined them $8 million and required them to surrender their license for failure to comply with money laundering and other laws. Of course, a key purpose for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Low Code/No Code Apps Not A Security Nirvana Just because the computer is generating much of the code does not mean the software doesn’t have bugs or is secure. In fact, since many times non-developers are using the tools, the code may be less secure. Details at The Hacker News As If Twitter Doesn’t Have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]