One of the biggest uses of the Internet is to sell sex. Whether it is chat rooms, pictures of naked people, whatever, it is a big money maker on the Internet. The hottest subject in town these days, even hotter than crypto, is AI. So what are Russian hackers doing? They are combining sex and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
White House Proposes Ban of Chinese, Russian Connected Vehicles and Software The Department of Commerce on Monday announced it is proposing a rule which would ban the sale or import of connected vehicles containing specific software and hardware produced by China or Russia or with a “sufficient nexus” to them. While it has national security […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cyber Insurance Prices Trending Down After insurance rates soared between 2020 and 2022, prices went down a little bit (15 percent) in 2023 due to increased competition, better vetting on the part of insurance companies and better company cybersecurity practices. It will be interesting to see where this trend goes, but we will take this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Shoddy security practices. Short of cash. Lack of personnel to deal with threats. Outdated equipment connected to the Internet. Weak passwords. CISA and the FBI say these are just some of the issues that critical infrastructure operators are facing. Anti U.S. (pro-Russian) hackers are intensifying attacks on critical infrastructure such as water, wastewater, dams, energy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Administration Announces Preliminary Agreement for New High Tech Chip Factories in Arizona As you may remember, during the pandemic the shortage of chips caused widespread product shortages for everything from phones to cars. Congress passed the CHIPS act to subsidize companies who manufactured chips in the U.S. at a higher cost rather than in less […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]