Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Climate Change Still Seen as the Top Global Threat, but Cyberattacks a Rising Concern

Worries about ISIS and North Korea persist, as fears about American power grow: “The Intergovernmental Panel on Climate Change released a report last year expressing serious concerns about the possible impacts of climate change, both in the near and distant future. Broadly speaking, people around the world agree that climate change poses a severe risk to their countries, according to a 26-nation survey conducted in the spring of 2018. In 13 of these countries, people name climate change as the top international threat. But global warming is just one of many concerns. Terrorism, specifically from the Islamic extremist group known as ISIS, and cyberattacks are also seen by many as major security threats. In eight of the countries surveyed, including Russia, France, Indonesia and Nigeria, ISIS is seen as the top threat. In four nations, including Japan and the United States, people see cyberattacks from other countries as their top international concern. One country, Poland, names Russia’s power and influence as its top threat, but few elsewhere say Russia is a major concern…These are among the findings of a Pew Research Center survey conducted among 27,612 respondents in 26 countries from May 14 to Aug. 12, 2018…”

Microsoft really doesn’t want you to use Internet Explorer anymore

The Verge: “Microsoft killed off the Internet Explorer brand nearly four years ago, choosing Edge as its modern browser for Windows 10. Internet Explorer lived on as plumbing for Windows and for business compatibility, but Microsoft isn’t supporting it with new web standards – it’s legacy code. Chris Jackson, a cybersecurity expert in Microsoft’s Windows… Continue Reading

T-Mobile, Sprint, and AT&T are selling access to their customers’ location data

and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country – via Motherboard: “…Motherboard’s investigation shows just how exposed mobile networks and the data they generate are, leaving them open to surveillance by ordinary citizens, stalkers, and criminals,… Continue Reading

There’s No Good Reason to Trust Blockchain Technology

Opinion – Wired: “…What blockchain does is shift some of the trust in people and institutions to trust in technology. You need to trust the cryptography, the protocols, the software, the computers and the network. And you need to trust them absolutely, because they’re often single points of failure. When that trust turns out to… Continue Reading

Scammer groups are exploiting Gmail ‘dot accounts’ for online fraud

ZDNet: “Cyber-criminal groups are exploiting a Gmail feature to file for fraudulent unemployment benefits, file fake tax returns, and bypass trial periods for online services. The trick is an old one and has been used in the past. It refers to Gmail’s “dot accounts,” a feature of Gmail addresses that ignores dot characters inside Gmail… Continue Reading

UN launches Cyber Policy Portal

“The United Nations Institute for Disarmament Research (UNIDIR) has just launched a Cyber Policy Portal that serves as an interactive, ‘at a glance’ tool for policymakers and experts. For the first time on a single site, users can access concise yet comprehensive cyber policy profiles of all 193 UN Member States, as well as regional and international… Continue Reading

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Wired: “When hackers breached companies like Dropbox and LinkedIn in recent years—stealing 71 million and 117 million passwords, respectively—they at least had the decency to exploit those stolen credentials in secret, or sell them for thousands of dollars on the dark web. Now, it seems, someone has cobbled together those breached databases and many more… Continue Reading

Seven Out of Every Ten Open Vulnerabilities Belong to Just Three Vendors

Computer Business Review: “Seven out of every ten open vulnerabilities observed by customers belongs to just three vendors, Oracle, Microsoft and Adobe. These are the findings of cyber security enterprise Kenna Security in their new report Prioritization to Prediction, which explores how enterprises are dealing with open vulnerabilities. In their report Kenna found that Oracle… Continue Reading

Cisco 2019 Data Privacy Benchmark Study

Cisco newsroom: “Organizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s 2019 Data Privacy Benchmark Study. The Study validates the link between good privacy practice and business benefits as respondents report shorter sales delays as well as fewer and less costly data… Continue Reading

Be safe on the internet.

An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go. – Take 10 minutes to read this article and consider applying one or more of the suggestions. I did and the applications work really well. I have been recommending one of the… Continue Reading

Google Cybersecurity Quiz Could Help Keep Your Email From Becoming Phishing Food

Fortune: “Has one of your accounts been hacked lately? Your email? Your Instagram? If so, you may have been the victim—and possibly an unwitting collaborator—in a phishing scam. Phishing is the most common form of cyber attack, and the goal of phishing emails is simple: to obtain your password and take over your account. Often,… Continue Reading

News outlet’s email security gap

Axios: “An Axios study shows that very few news organizations — around 6% of a broad sample — successfully use a critical technology that guarantees emails they send are authentic. The big picture: We’ve written before about the Department of Homeland Security’s struggle to get federal agencies and the White House to implement DMARC, a… Continue Reading