Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Exploring the Ecosystem of Third-party Security Seals

Clubbing Seals – Exploring the Ecosystem of Third-party Security Seals – Tom Van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforaki in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS 2014), Scottsdale, Arizona, USA. “In the current web of distrust, malware, and server compromises, convincing an online consumer that a website is secure, can make the difference between a visitor andContinue Reading

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

CRS – Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis. N. Eric Weiss, Specialist in Financial Economics. December 11, 2014. “Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing newContinue Reading

Congress Tells DoD to Report on Leaks

Secrecy News – Steven Aftergood: For the next two years, Congress wants to receive quarterly reports from the Department of Defense on how the Pentagon is responding to leaks of classified information. The reporting requirement was included in the pending National Defense Authorization Act for FY 2015 (Sec. 1052). “Compromises of classified information cause indiscriminate andContinue Reading

Data Brokers and Your Privacy

Privacy Rights Clearinghouse, Posted September 2014, Revised September 2014: “Technological advances allow us to do many useful things and to simplify our daily tasks.  The flip-side of these advances in technology is the unprecedented ability to collect, store, manipulate, and disseminate virtually unlimited amounts of data about people.  Numerous companies known as data brokers have entered thisContinue Reading

CIGI-Ipsos Global Survey on Internet Security and Trust

“The CIGI-Ipsos Global Survey on Internet Security and Trust, undertaken by the Centre for International Governance Innovation (CIGI) and conducted by global research company Ipsos, reached 23,376 Internet users in 24 countries, and was carried out between October 7, 2014 and November 12, 2014. The countries included: Australia, Brazil, Canada, China, Egypt, France, Germany, Great Britain,Continue Reading

Unprecedented leak of Sony Pictures internal personal data

“After sifting through almost 40GB of leaked internal data, one thing is clear: Sony Pictures appears to have suffered the most embarrassing and all-encompassing hack of internal corporate data ever made public. The data dump, which was reviewed extensively by BuzzFeed News, includes employee criminal background checks, salary negotiations, and doctors’ letters explaining the medical rationaleContinue Reading

Experian Data Breach Resolution releases second annual data breach industry forecast

“Preventing and managing data breaches have become two of the highest priorities facing businesses today. To help executives plan ahead, Experian Data Breach Resolution announces the release of its second annual Data Breach Industry Forecast, a complimentary white paper outlining key issues and trends to watch for in 2015. Many evolving factors such as new threats, regulatory changesContinue Reading

WaPo – Is Uber’s rider database a sitting duck for hackers?

Craig Timberg – Washington Post: “Before #Ubergate recedes entirely from the news, let’s pause on one aspect of the story that hasn’t gotten much attention so far: the cybersecurity risk of collecting massive troves of private travel information in online databases. Imagine for a second that your job is to gather intelligence on government officials in Washington, or financiersContinue Reading

Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering

Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering – Daniel M. Zimmerman and Joseph R. Kiniry, Galois, Inc., 421 SW 6th Ave., Suite 300, Portland, OR 97204. November 7, 2014 “Abstract – In order to highlight the dangers associated with Internet voting carried out over electronic mail with PDF forms, we show that an off-the-shelf home Internet router can be easilyContinue Reading

Home Depot SEC Filing – Pretax Breach Cost $43 million

eSecurity Planet – “In a recent SEC filing, Home Depot stated that a recent data breach that exposed 56 million credit cards and 53 million email addresses cost the company $43 million in the third quarter of 2014 alone. Specifically, Home Depot says it “recorded $43 million of pretax expenses related to the data breach, partially offsetContinue Reading

Internet Security Threat Report 2014

“Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System,Continue Reading

The Miner’s Dilemma – Paper

The Miner’s Dilemma – Ittay Eya, November 26, 2014 “An open distributed system can be secured by requiring participants to present proof of work and rewarding them for participation. The Bitcoin digital currency introduced this mechanism, which is adopted by almost all contemporary digital currencies and related services.  A natural process leads participants of such systemsContinue Reading