Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Follow the Crypto

“The cryptocurrency industry has been throwing money into politics unlike ever before, and that’s even after political donations from the industry skyrocketed in the 2022 election cycle. Despite the relatively small size of the industry, it has become one of the biggest spenders in the upcoming elections in the United States. Cryptocurrency companies have raised hundreds of millions of dollars to put towards buying crypto-friendly politicians and ousting those who have spoken up for stricter regulations to protect consumers in an industry that is fraught with hacks, scams, and fraud. Although parts of the industry have tried to portray this as a grassroots effort, the reality is that a very small number of crypto companies, and the billionaire executives and venture capitalists behind them, are spending millions with a singular goal: to obtain favorable crypto policy, no matter the cost. This website shines a much-needed spotlight on this spending, without the veneer of press releases in which these companies and executives still try to claim to be “apolitical” or “non-partisan”. Most of the money in the war chests amassed by cryptocurrency-focused PACs has yet to be deployed, and this project will give you a real-time view into where it’s being spent, by whom, and for whom. Join me in following the crypto…Follow the Crypto is a project by Molly White, an independent technology writer, researcher, and software engineer. She is also the force behind Web3 is Going Just Great, where she documents only some of the many disasters in the cryptocurrency and web3 industries. She writes about crypto and about technology much more broadly in the Citation Needed newsletter.”

Pete Recommends – Weekly highlights on cyber security issues, July 13, 2024

Pete Recommends – Weekly highlights on cyber security issues, July 13, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex… Continue Reading

Even Disinformation Experts Don’t Know How to Stop It

The New York Times – “Researchers have learned plenty about misinformation and how it spreads. But they’re still struggling to figure out how to stop it…Holding the line against misinformation and disinformation is demoralizing and sometimes dangerous work, requiring an unusual degree of optimism and doggedness. Increasingly, however, even the most committed warriors are feeling… Continue Reading

Every Phone Can ID Your Router – Here’s How to Stop It

PC Mag: “Your smartphone constantly checks available Wi-Fi nodes, looking to reconnect with any that you’ve used before. You can see it happening, and it’s very convenient (though vulnerable to spoofing and “evil twin” attacks). What you don’t see is that your smartphone also uploads identifying details about your router to giant databases maintained by… Continue Reading

When implementing AI, first train your managers

ZDNET: “Businesses are rushing into GenAI before establishing adequate systems of governance, which could result in serious issues with quality and compliance down the road. Dropping artificial intelligence into an organization requires more than a working knowledge of AI — this is only the first step. A recent survey shows most organizations and their IT… Continue Reading

10 billion passwords leaked in the largest compilation of all time

“The Cybernews research team believes the leak poses severe dangers to users prone to reusing passwords. The king is dead. Long live the king. Cybernews researchers discovered what appears to be the largest password compilation with a staggering 9,948,575,739 unique plaintext passwords. The file with the data, titled rockyou2024.txt, was posted on July 4th by… Continue Reading

LLRX June 2024 Issue

Articles and Columns for June 2024 – https://www/llrx.com Protecting the Vulnerable: Navigating Online Risks for Minors – Veronica Garrick’s paper is an insightful, factual and timely discussion of how in today’s digital age, minors are exposed to technology at a young age, presenting both great opportunities and risks. PowerPoint Has Its Problems – Jerry Lawson… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, July 6, 2024

Pete Recommends – Weekly highlights on cyber security issues, July 6, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss, highlights articles and information that focus on the increasingly complex… Continue Reading

Google: AI Potentially Breaking Reality Is a Feature Not a Bug

404 media: “Generative AI could “distort collective understanding of socio-political reality or scientific consensus,” and in many cases is already doing that, according to a new research paper from Google, one of the biggest companies in the world building, deploying, and promoting generative AI.  The paper, “Generative AI Misuse: A Taxonomy of Tactics and Insights from… Continue Reading

FTC – Who’s who in scams: a spring roundup

FTC: “Scammers are all about spinning lies, but they still operate in the real world. Many scammers pretend to be well-known businesses to gain trust and make their stories seem more believable. And scammers use real-world methods to contact people and to get paid. Reports to the FTC’s Consumer Sentinel Network point to some of… Continue Reading

384,000 sites pull code from sketchy code library recently bought by Chinese firm

Ars Technica: “More than 384,000 websites are linking to a site that was caught last week performing a supply-chain attack that redirected visitors to malicious sites, researchers said. For years, the JavaScript code, hosted at polyfill[.]com, was a legitimate open source project that allowed older browsers to handle advanced functions that weren’t natively supported. By… Continue Reading