Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Verizon 2015 Data Breach Investigations Report

“Verizon’s “2015 Data Breach Investigations Report,” released today, reveals that cyberattacks are becoming increasingly sophisticated, but that many criminals still rely on decades-old techniques such as phishing and hacking. According to this year’s report, the bulk of the cyberattacks (70 percent) use a combination of these techniques and involve a secondary victim, adding complexity toContinue Reading

Financial malware explained

IBM Software Thought Leadership White Paper. Financial malware explained – Explore the lifecycle of fraudulent transactions and how to take action against emerging threats. December 2014. “Financial malware—that is, malicious software designed to enable fraudulent transactions—is a growing concern for line-of- business executives, heads of retail and commercial banking, readers of global compliance operations, andContinue Reading

H.R. 1560, Protecting Cyber Networks Act

“H.R. 1560 would establish within the Office of the Director of National Intelligence (ODNI) a center that would be responsible for analyzing and integrating information from the intelligence community related to cyber threats. In addition, the bill would require the government to establish procedures for sharing information and data on cyber threats between the federalContinue Reading

Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems

Via Great Wall of Numbers this Report by Tim Sanson, April 6, 2015 – Highlights: •”Distributed ledgers and cryptocurrency systems are fundamentally different. •The key difference involves how transactions are validated: Bitcoin uses pseudonymous and anonymous nodes to validate transactions whereas distributed ledgers require legal identities – permissioned nodes to validate transactions. •Consequently, distributed ledgersContinue Reading

New GAO Reports – Indian Housing Block Grant Program, Defense Acquisitions, FDIC Info Security, Tanker Aircraft

Data Use and Regulatory Status of the Indian Housing Block Grant Program, GAO-15-353R: Published: Mar 10, 2015. Publicly Released: Apr 9, 2015. Defense Acquisitions: Assessments of Selected Weapon Programs [Reissued on April 9, 2015], GAO-15-342SP: Published: Mar 12, 2015. Publicly Released: Mar 12, 2015. Information Security: FDIC Implemented Many Controls over Financial Systems, but OpportunitiesContinue Reading

Hearts Continue to Bleed – Heartbleed One Year Late

Venafi Labs Analysis: Hearts Continue to Bleed Heartbleed One Year Later – Vast Majority of Global 2000 Organizations Remain Vulnerable to Cyberattacks Executive Summary – “Using the recently released Venafi TrustNet certificate reputation service, the Venafi Labs team re-evaluated SSL/TLS vulnerabilities in Q1 2015 and found that most Global 2000 organizations have failed to completelyContinue Reading

CRS – Cyberwarfare and Cyberterrorism

Cyberwarfare and Cyberterrorism: In Brief, Catherine A. Theohary, Specialist in National Security, Policy and Information Operations. John W. Rollins, Specialist in Terrorism and National Security. March 27, 2015. “Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized asContinue Reading

White House Announces A New Tool Against Cyber Threats

“It’s one of the great paradoxes of our Information Age — the very technologies that empower us to do great good can also be used by adversaries to inflict great harm. The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that supportContinue Reading

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Cybersecurity and Information Sharing: Legal Challenges and Solutions, Andrew Nolan, Legislative Attorney. March 16, 2015. “Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: theContinue Reading

Even more unwanted software protection via the Safe Browsing API

Google Online Security Blog: ” Deceptive software disguised as a useful download harms your web experience by making undesired changes to your computer. Safe Browsing offers protection from such unwanted software by showing a warning in Chrome before you download these programs. In February we started showing additional warnings in Chrome before you visit aContinue Reading

Detekt – free tool that scans your Windows computer for traces of commercial surveillance spyware

Via FastCoExit: “Spyware like FinFisher contributes to a multi-billion dollar business. But until last week, activists had few ways to defend themselves, aside from the well-placed bit of duct tape over the computer camera and rigorous digital hygiene practices. That’s why Amnesty International, Privacy International, Digitale Gesellschaft, and the Electronic Frontier Foundation rolled out aContinue Reading

The Importance of Addressing Cybersecurity Risks in the Financial Sector

Sarah J. Dahlgren, executive vice president and member of the Bank’s Management Committee, head of the Financial Institution Supervision Group at the Federal Reserve Bank of New York – Remarks at the OpRisk North America Annual Conference, New York City: I am often asked about my list of “things that keep me awake at night,”Continue Reading