Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

You Should Make Your Apple ID Recoverable Right Now

How to Geek: “Your Apple ID is an account that’s worth guarding at all costs. Here are some simple steps you can take to secure it and make sure you can quickly recover it if the worst happens. Why You Should Do This – Let’s suppose for a moment that you lose access to your Apple ID. This could be as part of a deliberate attack or due to you not having access to your password or a trusted device. Remember that two-factor authentication requires that you not only know your password but also provide a code to log in. Suddenly, you lose access to any data you depend on in iCloud. This includes your iCloud Photos, Notes, Reminders, and iCloud Drive contents. You can’t make FaceTime calls or partake in iMessage conversations if you’re unable to log in. If you use an iCloud email account then your email is also out of action. Apple has a process called Account Recovery that is designed for use by anyone who has set up two-factor authentication. The process requires a waiting period of around 72 hours and even requires that you avoid using devices connected to your Apple ID while you wait. Though there are methods that Apple can use to speed up the process (like verifying payment information), this is less than ideal particularly if you use your account for work purposes. Setting up a recovery contact or generating a recovery key offers a way to expedite or bypass this process entirely. This is enough to get you back up and running quickly if something goes wrong with your account…”

See also MakeUseOf: 3 Easy Ways to Reset Your Lost Mac Password

Pete Recommends – Weekly highlights on cyber security issues, April 20, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, April 20, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

A National Security Insider Does the Math on the Dangers of AI

Wired [unpaywalled]: “Jason Matheny is a delight to speak with, provided you’re up for a lengthy conversation about potential technological and biomedical catastrophe. Now CEO and president of Rand Corporation, Matheny has built a career out of thinking about such gloomy scenarios. An economist by training with a focus on public health, he dived into… Continue Reading

Introducing Dark Web Monitoring for credential leaks

Proton Blog: “Your email address is your online identity(new window), and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches affecting online services are increasingly common, with tens of billions… Continue Reading

AI in Finance and Banking, April 15, 2024

Via LLRX – AI in Finance and Banking, April 15, 2024 – This semi-monthly column by Sabrina I. Pacifici highlights news, government reports, NGO/IGO papers, industry white papers, academic papers, conferences and speeches on the subject of AI’s fast paced impact on the banking and finance sectors. The chronological links provided are to the primary sources,… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, April 13, 2024

Pete Recommends – Weekly highlights on cyber security issues, April 13, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex… Continue Reading

New bill would try to make tools like Zoom and Teams work together securely

The Verge: “A new proposal from Sen. Ron Wyden (D-OR) would require videoconferencing and messaging tools used by the federal government to be able to communicate with each other, even if made by different companies. It would also enforce high security standards for government collaboration tools, including end-to-end encryption. The Secure and Interoperable Government Collaboration… Continue Reading

NIST Blames ‘Growing Backlog of Vulnerabilities’ Requiring Analysis on Lack of Support

Slashdot: “It’s the world’s most widely used vulnerability database, reports SC Magazine, offering standards-based data on CVSS severity scores, impacted software and platforms, contributing weaknesses, and links to patches and additional resources. But “there is a growing backlog of vulnerabilities” submitted to America’s National Vulnerability Database and “requiring analysis”, according to a new announcement from… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, April 6, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, April 6, 202 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

LLRX March 2024 Issue

Articles and Columns for March 2024 – https://www.llrx.com 2024 Link Guide to Generative AI Resources – Marcus P. Zillman Deepfakes are still new, but 2024 could be the year they have an impact on elections – Professor Eileen Culloty AI in Banking and Finance, March 31, 2024 – This semi-monthly column by Sabrina I. Pacifici… Continue Reading

‘Law Firm’ of AI Generated Lawyers Is Sending Fake Threats as SEO Scam

404 Media: “Last week, Ernie Smith, the publisher of the website Tedium, got a “copyright infringement notice” from a law firm called Commonwealth Legal: “We’re reaching out on behalf of the Intellectual Property division of a notable entity, in relation to an image connected to our client,” it read.  I am familiar with these sorts… Continue Reading