Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

10 Ways for Congress to Respond to the Mueller Report

POGO – “Special Counsel Robert Mueller’s report on the Russian government’s efforts to interfere in the 2016 presidential election has been public for nearly three weeks. Since then, Members of Congress on both sides of the political aisle have debated the report’s findings, and there are many disturbing issues raised in it that Congress could continue to investigate and address legislatively. Unlike the Justice Department, Congress is uniquely positioned to conduct oversight and craft legislative solutions to ensure that our democracy, laws, elections, and citizens are better protected. The report examines violations of current laws and exposes fissures in our democratic system that our Founding Fathers and other lawmakers from the past never anticipated. The constitutional separation of powers dictates that the executive branch enforces the laws, and now it is up to Congress to consider creating or amending laws to address vulnerabilities and weaknesses in election security, foreign lobbying, campaign finance, obstruction of justice, conflicts of interest, transition team transparency, personal electronic security, and the regulations governing special counsels. Each of these issues is ripe for Congressional action…The following are ten key issues found in the special counsel’s report that Congress could look into, and where applicable, could consider strengthening existing laws…”

Update WhatsApp after hack

Washington Post – “Global messaging app WhatsApp, which boasts over 1 billion users, was targeted by hackers last month in a breach that saw mobile devices attacked through the voice-calling functionality of the app. The security flaw potentially gave hackers access to private messages, location data and other personal user information. While WhatsApp hasn’t specifically… Continue Reading

Your most sensitive data is likely exposed online. These people try to find it.

c/net: “Justin Paine sits in a pub in Oakland, California, searching the internet for your most sensitive data. It doesn’t take him long to find a promising lead. On his laptop, he opens Shodan, a searchable index of cloud servers and other internet-connected devices. Then he types the keyword “Kibana,” which reveals more than 15,000… Continue Reading

2019 Data Breach Investigations Report

“The Verizon Data Breach Investigations Report (DBIR) provides you with crucial perspectives on threats that organizations like yours face. The 12th DBIR is built on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. Data breaches continue to make headlines… Continue Reading

7 simple ways to protect your digital privacy

The New York Times – “What little privacy people don’t give away, companies tend to take. Given this unfortunate reality, to get complete privacy you’d need to install a labyrinthine series of software tools that make the internet slow and unusable — think specialty Web browsers, encrypted email and chat; virtual private networks; and security-focused… Continue Reading

Cloud database removed after exposing details on 80 million US households

c/net – Exclusive: The cache included information on addresses, income levels and marital status. “In a blow to consumers’ privacy, the addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found. The details included names, ages and genders as… Continue Reading

Spies, Lies, and Algorithms

Foreign Affiars – “For U.S. intelligence agencies, the twenty-first century began with a shock, when 19 al Qaeda operatives hijacked four planes and perpetrated the deadliest attack ever on U.S. soil. In the wake of the attack, the intelligence community mobilized with one overriding goal: preventing another 9/11. The CIA, the National Security Agency, and… Continue Reading

CIA now has an Instagram account

Axios: “The CIA, one of the rare government entities known for its social media savvy, is now on Instagram to give users another look into the secretive agency, Axios’ Marisa Fernandez writes. The new account is another online vehicle to “spark the curiosity of Instagram users” and find recruits, CIA press secretary Timothy Barrett said.… Continue Reading

FBI Releases the Internet Crime Complaint Center 2018 Internet Crime Report

The FBI Alerts the Public to Trends in Internet Crime and Offers Prevention Tips – “The FBI’s Internet Crime Complaint Center (IC3) 2018 Internet Crime Report includes information from 351,936 complaints of suspected Internet crime, with reported losses in excess of $2.7 billion. The top three crime types reported by victims in 2018 were non-payment/non-delivery,… Continue Reading

Why You Should Use a Password Manager

Fortune: “…Some popular products include LastPass, 1Password, Dashlane, RoboForm, Keeper Security, KeePass, and Sticky Password. Most of these work similarly. You use the software to generate a secure password for specific websites. That password and your username are stored in the program’s vault or database on your computer and potentially in the cloud. When you… Continue Reading

Most hacked passwords revealed in UK cyber survey

The National Cyber Security Centre’s first ‘UK cyber survey’ published alongside global password risk list NCSC’s first ‘UK Cyber Survey’ shows 42% of Brits expect to lose money to online fraud Breach analysis finds 23.2 million victim accounts worldwide used 123456 as password Global password risk list published to disclose passwords already known to hackers… Continue Reading

New on LLRX for March 2019

The 5 new articles and 5 new columns on LLRX for March 2019 US takes tentative steps toward opening up government data – At the beginning of this year, President Trump signed into law the Open, Public, Electronic and Necessary Government Data Act, requiring that nonsensitive government data be made available in machine-readable, open formats by… Continue Reading