Texas AG Sue TikTok Under SCOPE Act The Securing Children Online Through Parental Empowerment (SCOPE) Act is designed to protect kids online. The Texas AG claims that TikTok failed to comply with the parental verification requirement, unlawful sharing, disclosing or selling of a minor’s PII and failure to create and provide parental tools. While this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Texas Attorney General is making big headlines and while he is not running for election this year, you can count on him bringing this up next time. Meta has agreed to pay Texas $1.4 billion or about one percent of its annual revenue (plus likely a tax deduction) for using facial recognition on Texas […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We see this problem too often. It is because web site operators don’t really understand the impact of their actions in many cases. More importantly, this may impact you and your web site. Okay, lets talk about what the Postal Service did. Magazine publisher Tech Crunch discovered that the USPS was sharing customers’ information with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No Honor Among Crooks – Darknet Site Extorts Vendors, Buyers I guess we should not be surprised, but darknet narcotics bazaar Incognito Market has posted a threat on its homepage that if its vendors and buyers don’t pay an extortion of between $100 and $20,000, they will publish all of their transaction and chat records. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]