Feds Give Another Chip Maker Subsidy to Build in US Last week the feds announced a subsidy to Taiwan Semi to build multiple chip plants (fabs) in Arizona. This week the feds announced, based on last year’s CHIPS Act, a subsidy to Samsung to build multiple plants in Texas. This creates a lot of construction […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
US Emergency Alert System Has a Minor Bug Homeland Security has issued an alert that there are critical vulnerability in the Emergency Alert System encoder and decoder devices. If left unpatched, it would allow a hacker to issue fake warnings of emergencies. The EAS is the nationwide alert system that is used to warn citizens […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Third Party Risk – You Can Ignore it, But It Won’t Ignore You DataBreaches.net is reporting that a hacker claimed to have hacked an HVAC vendor and remotely accessed systems at the vendor’s customers. One of those customers is reported to be Boston Children’s Hospital. The HVAC vendor is reported to be ENE Systems in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
False Claims Act Means Big Fines I had heard about the Department of Justice going after companies for misrepresenting things in federal contracts. I remember that Cisco paid a fine of less than $10 million, so I didn’t think it really meant much. But in a press release, the DoJ says that they recovered over […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Less Than Half of Mississippi State Agencies Even Have a Cybersecurity Policy In Mississippi’s first ever state cybersecurity audit, the state auditor reported dismal results. 54 state agencies did not respond to the audit. 38% of those responding did not encrypt sensitive data. 22 agencies had not conducted a third party security risk assessment. 11 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Asus Was Not Alone I wrote about the Asus supply chain attack in March (search for Asus in the blog search box). Attackers, somehow, compromised the development environment, injected malware and allowed the system to compile, digitally sign and distribute it through the software update process. Hundreds of thousands of clients were infected as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]