If privacy matters in your life, it should matter to the phone your life is on Apple is launching a major ad campaign to run during March Madness with the tagline “If privacy matters in your life, it should matter to the phone your life is on. Privacy. That’s iPhone“. Since Apple’s business model is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Israeli Researchers have disclosed two new Bluetooth attacks that only require you to be in the neighborhood to work. The attacks exploit flaws in Bluetooth Low Energy (BLE) chips made by Texas Instruments. The chips are used by companies like Cisco, Meraki and Aruba in their corporate solutions. The chips are also used in pacemakers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Data Aggregator Apollo Loses Data on 200 Million Apollo’s business model is to aggregate both publicly available data and company private data to build profiles used to market to people. Apollo’s 212 million contacts, 10 million companies and 9 billion data points are now public. In addition to names and email addresses, the company also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In June Governor Brown signed Assembly Bill 375, the California Consumer Privacy Act which is the only law in the country that offers consumers far more control over their data in the hands of third parties such as Internet based companies. Now AB 1906 is headed to Governor Brown to sign. If he does, and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the ongoing saga of IoT security (The score is bad guys: a whole bunch, good guys: not very many), the bad guys continue to win. Researchers analyzed Samsung’s house management hub called SmartThings and found 20 problems. The researchers, part of Cisco, said that the attacks are complex and require the attackers to chain […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Axis Communications, the Swedish maker of high end security cameras (up to $1,000 each), announced patches to seven vulnerabilities that affect almost 400 camera models. Axis is not some cheap Chinese knockoff; these are well respected cameras used in businesses the world over. The vulnerabilities, discovered by the security firm VDOO, comes with in depth […]
Continue reading →
[DISPLAY_ACURAX_ICONS]