vulnerability curl patch

Security Updates as Hostage Takers

Software updates are an essential part of modern technology, as they provide necessary fixes, improvements and new features to devices and software. While some software updates are designed to improve or enhance ...
Security Boulevard
Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak

Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak

Apple is considering giving third-party app stores access to its iPhones and iPads in the European Union (EU) to comply with new competition law. Will the “sideloading” of apps change Apple’s walled ...
cyberattacks, cybersecurity, MFA CISA multi-factor authentication

SIM Swap Crypto Lawsuit Goes Forward in Los Angeles

Can AT&T be held liable for identity theft resulting from SIM swapping? In June 2017, Michael Terpin, a prominent cryptocurrency trader from Puerto Rico, turned on his cell phone and found it ...
Security Boulevard
The Internet of Things (IoT) and digitally stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...

Secure Guardrails