Apple Scrambles to Try and Figure Out How to Stop Stalkers From Using AirTags Their newest idea is, when you initialize a new AirTag, it will tell you that Stalking may be illegal in your country. I really, really, doubt that will have any effect. They are also shortening the time window for notifying you […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Scammers Figure out How to Fake Out Facial Biometrics Multi-factor authentication is not magic. For the most part, it is software. And if software is not well written, it can be fooled. That means that we should not be surprised if scammers try to use deep fakes and other techniques to fool automated facial recognition. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Missouri Prosecutor Wisely Decides Governor is not Tech Smart Remember when the governor got his feeling hurt after a St. Louis newspaper revealed that the education department’s website was publishing the PII of tens of thousands of teachers and asked the Highway Patrol to prosecute the reporter who embarrassed him? The PII was, as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Biden May Use China Rule on Russia if it Invades Ukraine This COULD be a bluff, but the administration may use the foreign direct product rule on Russia, like they did on Huawei, if Russia invades Ukraine. Depending on how it is used, it could have crushing implications on anything in Russia that uses microchips. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russia Arrests Some REvil Gang Members At this point we don’t know who they ticked off, but Putin’s goons arrested 14 people and seized 426 million Roubles (about $5.5 million), $600,000 USD, 500,000 euros, computers and 20 cars. These guys definitely will not be getting a Christmas card from Vlad next year. Credit: Yahoo News […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Russian Hackers Make Millions by Stealing SEC Earning Reports A Russian hacker working for a cybersecurity company has been extradited to the U.S. for hacking into the computer networks of two SEC filing agents used by multiple companies to file their quarterly and annual SEC reports. Using that insider information, the hacker traded stock in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]