Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

15 more default privacy settings you should change now on your TV, cellphone plan and more

The Post’s tech columnist is back with Round 2 of his clickable guide to improving your privacy on all sorts of devices and online services.

“It’s not just Google and Facebook that are spying on you. Your TV, your cellphone provider and even your LinkedIn account have side hustles in your data. But, in many cases, you can opt out — if you know where to look. I dug into a bunch of popular products and services you might not think of as data vacuums or security risks and found their default privacy settings often aren’t very private. So I collected here some common settings you can change to stop giving away so much. The following links will let you skip ahead to clickable instructions for televisions, LinkedIn, Twitter, Yahoo, cellphone carriers and WiFi routers. Two weeks ago, I offered similar suggestions on the worst default settings for Facebook, Google, Amazon, Microsoft and Apple. Thousands of you told me about your experiences trying to protect your privacy and asked about how to go further…”

These dogs sniff out cybercrime

This story appears in the summer 2018 edition of CNET Magazine: “Harley darts into a decrepit room in Connecticut. She’s searching for evidence. There are plenty of potential distractions in the room: Wires hang from the ceiling. Warped wood paneling buckles away from the walls. Faded yellow cabinets look like someone kicked a hole in… Continue Reading

The What, Why, and How of Digital Forensics

Law Technology Today: “Digital forensics is a branch of forensic science focused on recovery and investigation of artifacts found on digital devices. Any devices that store data (e.g. computers, laptops, smartphones, thumb drives, memory cards or external hard drives) are within the ambit of digital forensics. Given the proliferation of digital devices, there has been… Continue Reading

Check if you have an account that has been compromised in a data breach

In all likelihood, regardless of how careful you are and how many email addresses you employ, all of them have been compromised many times over as a result of a multitude of breaches of sites and services that range from Tickefly to Adobe. You may want to check in with Have I Been Pwned (HIBP)… Continue Reading

AP – US expects fallout from Snowden leaks for years to come

AP: “National Security Agency contractor Edward Snowden blew the lid off U.S. government surveillance methods five years ago, but intelligence chiefs complain that revelations from the trove of classified documents he disclosed are still trickling out. That includes recent reporting on a mass surveillance program run by close U.S. ally Japan and on how the… Continue Reading

Law Firm Data is Catnip for Hackers

Security Boulevard: “Dig into a law firm, and you’ll find secrets. Sometimes these secrets are mundane, like who’s getting divorced, or who’s getting cut out of the will. Sometimes, however, these secrets can shake nations and economies.  Huge companies are merging and getting acquired, national leaders are hiding graft in numbered accounts, and you might… Continue Reading

Federal Cybersecurity Risk Determination Report and Action Plan

NextGov: “Many federal agencies don’t know how hackers are targeting them, can’t tell when hackers steal large amounts of their data and aren’t efficiently spending the cybersecurity money they have, according to a report and action plan released last week. Roughly three-quarters of federal agencies’ cybersecurity programs are currently “at risk” or “at high risk,”… Continue Reading

FBI Requests We All Reboot our Routers – But Will This Be Enough?

The New York Times – F.B.I.’s Urgent Request: Reboot Your Router to Stop Russia-Linked Malware: “Hoping to thwart a sophisticated malware system linked to Russia that has infected hundreds of thousands of internet routers, the F.B.I. has made an urgent request to anybody with one of the devices: Turn it off, and then turn it… Continue Reading

Modern Bank Heists: Cybersecurity Threats Facing the Financial Sector

Carbon Black: “Despite investing heavily in security, financial institutions continue to experience cyber attacks at a rapid pace. Conducted primarily for the purpose of yielding illicit financial gain, cyber attacks against the financial services industry are increasing in sophistication and are often undetectable, global and instantaneous. This will be one of the themes of this… Continue Reading

UK – Internet Safety Strategy green paper

“The Internet Safety Strategy looks at how we can ensure Britain is the safest place in the world to be online. The Strategy considers the responsibilities of companies to their users, the use of technical solutions to prevent online harms and government’s role in supporting users. The consultation covered various aspects of online safety including:… Continue Reading

Study – Google and Internet Archive Are Top Choices for ISIS Propaganda

Fortune: “While the Islamic State has been largely wiped off the physical battlefield, the terrorist group continues to maintain a steady presence on popular websites despite an increased push by tech companies to purge them. On Tuesday, the cybersecurity firm Flashpoint released a new report that lists the most popular sources of ISIS propaganda over… Continue Reading

What You Need to Know About E-Fail and the PGP Flaw

EFF: “…you should stop using PGP for encrypted email and switch to a different secure communications method for now. A group of researchers released a paper today that describes a new class of serious vulnerabilities in PGP (including GPG), the most popular email encryption standard. The new paper includes a proof-of-concept exploit that can allow… Continue Reading