White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The FTC has been investigating Amazon (Twitch), Meta (Facebook), YouTube, Twitter, Snapchat, TikTok, Discord, Reddit and Whatsapp (Meta). The probe began in 2020 investigating their data collection methods, how they track personal and demographic info and the impact of that on kids. FOUR YEARS into it, the FTC released a report. FTC chair Lina Khan […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The NFL wants to improve security. That is probably a good concept. As a result, they are shifting away from ID cards, which are easily forged or stolen to facial recognition. But not everyone is happy. The NFL wants all personnel, including cops providing security, to provide them with facial scans to get into sensitive […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
But everyone does it, right? The Irish Data Protection Commission asked the High Court of Ireland in Dublin to stop the social media company from using customer data to train its large language model. Twitter added a setting last month, which defaults to enabled, that allows it to use any user data to train its […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We see this problem too often. It is because web site operators don’t really understand the impact of their actions in many cases. More importantly, this may impact you and your web site. Okay, lets talk about what the Postal Service did. Magazine publisher Tech Crunch discovered that the USPS was sharing customers’ information with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Speculative Execution Raises its Ugly Head Again Speculative execution is a type of attack that exploits bugs or features in Intel, AMD and Arm processors that try to squeeze that last ounce of juice out of that processor in your computer or phone. This family of attacks has been around for years. A famous one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]