720-891-1663

USPS Joins Many Others – Shares Customer Data with Meta and Others Without Permission

We see this problem too often. It is because web site operators don’t really understand the impact of their actions in many cases. More importantly, this may impact you and your web site. Okay, lets talk about what the Postal Service did. Magazine publisher Tech Crunch discovered that the USPS was sharing customers’ information with […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending March 15, 2024

No Honor Among Crooks – Darknet Site Extorts Vendors, Buyers I guess we should not be surprised, but darknet narcotics bazaar Incognito Market has posted a threat on its homepage that if its vendors and buyers don’t pay an extortion of between $100 and $20,000, they will publish all of their transaction and chat records. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending March 1, 2024

Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending January 19, 2024

Regulators Going After Crypto Firms A number of crypto firms have felt the sting of regulators recently. The most recent one is Genesis Global Trading. New York’s DFS fined them $8 million and required them to surrender their license for failure to comply with money laundering and other laws. Of course, a key purpose for […]

Continue reading → [DISPLAY_ACURAX_ICONS]

UK Government Accused of Being Misleading on New Encryption Bill

Governments around the world, at best, tolerate encryption. If they thought they could outlaw it, they would. Public pronouncements that it is “about the children” or other fairy tales not withstanding, it is about them not being able to snoop at will. That is something that they have been able to do pretty freely until […]

Continue reading → [DISPLAY_ACURAX_ICONS]

AI Models Cracked Open by Security Researchers

No big surprise here. Researchers have gotten full read and write access to Meta’s Bloom, Meta-Llama and Pythia large language models in a typical example of supply chain risk. If they had been hackers or a non-friendly nation, they could have poisoned the training data, stolen the models and datasets and other unfriendly things. AI […]

Continue reading → [DISPLAY_ACURAX_ICONS]