Pasquotank camden ems hacking incident impacts 40000 patients
tech-realism
Ghost-gun sellers react to rule aimed to crack down on the homemade guns by offering them in separate parts rather than complete kits that now require a background check
Companies that manufacture easy-to-assemble firearms are offering products in pieces after the Biden administration rule mandates serial numbers and background checks on kits.
Officials are investigating a ransomware attack on the Los Angeles public school system over the weekend
Federal officials are investigating a cyber hack affecting the nation’s second-largest school district.
Alejandra Caraballo on Twitter
In the last 5 days, Libs of Tiktok has tweeted and retweeted 14 posts about Boston Children's Hospital. As a result, BCH providers are being inundated in death threats and harassing calls and emails. It's now affecting their services. This is stochastic terrorism, full stop. pic.twitter.com/CEMlRsX6S4— Alejandra Caraballo (@Esqueer_) August 15, 2022
Daniel Feldman on Twitter
In which a blogger finds the private key used to sign Hyundai car software updates … by googling it. They used a key pair from a popular tutorial. 😂😂😂 pic.twitter.com/ydoWfjbvsR— Daniel Feldman (@d_feldman) August 13, 2022
'Ring Nation' Is Amazon's Reality Show for Our Surveillance Dystopia
Amazon's newest effort to normalize its surveillance network will feature footage from Ring surveillance cameras and commentary from comedian Wanda Sykes.
Launch code for US nukes was 00000000 for 20 years
PALs were not the pals of Strategic Command generals.
FTC Explores Rules Cracking Down on Commercial Surveillance and Lax Data Security Practices
Note: The FTC will host a virtual news conference at 12 p.m. ET today on the ANPR announcement.
Tech, Cyber Companies Launch Security Standard to Monitor Hacking Attempts
Amazon’s AWS, Splunk, IBM and others are cooperating on a format for cyber alerts.
Former Twitter Employee Convicted of Spying for Saudi Arabia
Ahmad Abouammo was found guilty of spying and money laundering.
Buying Cyber Insurance Gets Trickier as Attacks Proliferate, Costs Rise - WSJ
Security chiefs should shop early for coverage and prepare for long questionnaires about their companies’ cyber defenses, industry professionals said.
Equifax Sent Lenders Inaccurate Credit Scores on Millions of Consumers - WSJ
During a three-week period this year, the credit reporting company sent faulty scores to lenders big and small, resulting in higher interest rates and denied applications.
A Cyberattack Illuminates the Shaky State of Student Privacy
At a moment when education technology firms are stockpiling sensitive information on millions of school children, safeguards for student data have broken down.
Free Law Project ⚖ on Twitter
We still need the facts about how PACER/CM/ECF was beached and what materials were accessed, but this is terrible news: It was hacked by "three hostile foreign actors." The only way to fix this is with a new system as defined in the Open Courts Act. We need to pass this bill. https://t.co/3ZpjZXWKnC— Free Law Project ⚖ (@FreeLawProject) July 28, 2022
TMobile fail
LMAO, anyone else remember the thread on the left? Well, here's how it turned out. pic.twitter.com/nMezrdzI2e— Jerry Aldrich (@jerryaldrichiii) July 26, 2022
SOC2: The Screenshots Will Continue Until Security Improves
We got SOC2 certified so now you have to pay us more.
A Eulogy for the CAPTCHA
Gone but not forgotten
In that sense, CAPTCHA is a tidy allegory of American government: annoying, ugly, ineffectual, predatory, nostalgic, a daily confrontation with our own idiocy. Of course it’s dying out.
Police CyberAlarm Uses Alarming Cryptography | Hacker News
First-Hand:No Damned Computer is Going to Tell Me What to DO - The Story of the Naval Tactical Data System, NTDS
This Billion-Dollar Crypto Loan Is Easy to Get, but Gone in a Flash
Flash loans can have benefits, such as helping traders capitalize on price differences between cryptocurrencies on different exchanges. But flash loans have a dark side.
How Complex Systems Fail
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code
KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times…
Towards a dynamic balance between humans and automation: authority, ability, responsibility and control in shared and cooperative control situations
Cognition, Technology & Work - Progress enables the creation of more automated and intelligent machines with increasing abilities that open up new roles between humans and machines. Only with a...
Artificial Intelligence: Too Fragile to Fight?
U.S. warns newly discovered malware could sabotage energy plants
U.S. officials announced the discovery of malware they believe was intended to cripple LNG facilities.
Pike 5 Rules of Programming
Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA | Hacker News
Developers spend most of their time figuring the system out
What does it mean when we say that developers spend most of their time figuring the system out?
Why is it important?
And how else could we look at this problem?
Principle of least privilege - Wikipedia
Hackers claim to have breached Okta systems | Hacker News