The cyber safety review board is similar to the FAA’s National Transportation Safety Board, except that they are investigating Cybersecurity crashes (breaches) rather than airplane or container ship crashes. The board is new. It was created by Executive Order 14028 in 2021. They only convene when requested to by the Secretary of Homeland Security and, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You have probably heard this expression before, but it bears repeating. If you are not paying for a service, then you are the product. Case in point. Microsoft has always offered a free email product in Windows called, very creatively, Windows mail. But it really was a pretty horrible competitor to GMail and other mail […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Item 1 – Apple is reported to be in negotiations with news companies and other publishers (like NBC and Conde Nast) to “license” their back catalog of content for their AI projects. Apple is offering, supposedly, up to $50 million to license their content, but, at least for now, the content creators were not fans […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Warns That Iran Terrorists Broke into Multiple US Water Facilities Last week I reported that the Aliquippa, Pennsylvania Water Authority fessed up to the fact that hackers successfully broke into their network, compromising a pump station, using a vulnerability in an Israeli OT network system that is repackaged by multiple vendors. Now the FBI, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Montana and Indiana TikTok Ban Stunts Unsurprisingly Fail in Court Both Indiana and Montana passed laws completely banning TikTok – both at the app store and private citizen level. Given that these laws were political stunts designed to try and impress voters, it is not surprising that they failed in court. The courts struck down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]