4Chan Cesspool is Back Online 4Chan, the cesspool of a website that spews all sorts of hate and garbage, is back. Unfortunately. They have described what happened, loosely. Bottom line was that they were not maintaining their systems and, as a result, they were hacked. Their data and source code was hacked and the rest […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Administration Announces Preliminary Agreement for New High Tech Chip Factories in Arizona As you may remember, during the pandemic the shortage of chips caused widespread product shortages for everything from phones to cars. Congress passed the CHIPS act to subsidize companies who manufactured chips in the U.S. at a higher cost rather than in less […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Emergency Alert System Has a Minor Bug Homeland Security has issued an alert that there are critical vulnerability in the Emergency Alert System encoder and decoder devices. If left unpatched, it would allow a hacker to issue fake warnings of emergencies. The EAS is the nationwide alert system that is used to warn citizens […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Tesla Locks Owners Out of Cars – On Accident Hundreds of Tesla owners got locked out of their cars when a server that powers the Tesla app crashed due to load. Apparently those owners forgot there is such a thing as a car key. The outage lasted about 5 hours and Elon Musk later tweeted […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
France Says it is Going Ahead with Digital Tax France has been complaining that U.S. companies (mostly) have not been paying their fair share of French taxes since they are not selling widgets that delivered in France, so they came up with this digital tax, a 3% tax on digital services delivered in France. They […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It all starts with a calendar invite, but there is a setup. The con is that your bank account has been compromised and you need to fix it. The attack starts with an email titled (like) “Fraud Detection from Message Center”. This part of the attack uses a real but compromised Office 365 account, complete […]
Continue reading →
[DISPLAY_ACURAX_ICONS]