by ray | Aug 3, 2019 | Security
IBM took nearly a million photos from Flickr, used them to figure out how to train facial recognition programs, and shared them with outside researchers. But as NBC points out, the people photographed on Flickr didn’t consent to having their photos used to...
by ray | May 29, 2019 | Security, Security Breach
Following revelations yesterday regarding the use of session replay tech among big-name travel apps that recode iPhone users’ screens, Apple is now telling developers to either remove the code responsible or disclose it to users, according to a new report...
by ray | May 28, 2019 | Security
Ubuntu is a very popular Linux distribution for servers, clouds, and the desktop. So, when parent company Canonical announces it is moving Ubuntu 18.04, the latest long term support (LTS) edition, to a new Linux kernel, it’s time to pay attention...
by ray | Feb 1, 2019 | Cloud Security
Palo Alto Networks Inc. today announced that it has agreed to buy RedLock Inc., a competitor focused on securing cloud environments, in an all-cash deal worth $173 million. The purchase is the latest in a series of nine-figure acquisitions that the network protection...
by ray | Feb 1, 2019 | Security Breach
This morning Bloomberg is reporting a bombshell for hardware security. Companies like Amazon and Apple have found a malicious chip on their server motherboards. These are not counterfeit chips. They are not part of the motherboard design. These were added by the...