Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

Pete Recommends – Weekly highlights on cyber security issues, July 18, 2021

Via LLRX – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish… Continue Reading

Ransomware attackers are growing bolder and using new extortion methods

Tech Republic – “IT and OT environments are increasing targets and threat actors are using Dark Web forums to launch cybercrimes, according to Accenture’s 2021 Cyber Threat Intelligence report. It’s hardly surprising that threat actors are pervasive and aggressive, but a new report finds in the first half of 2021, they have been testing new… Continue Reading

Don’t be that employee: How to avoid ransomware attacks at work

Washington Post -“…Ransomware, which locks down a target’s computers and data, can infect a network a few different ways, including through employee accounts. Click the wrong link, open the wrong attachment or log into the wrong website, and you could put your company in a perilous position. Depending on their roles, some employees find their… Continue Reading

The FBI will feed compromised passwords to Have I Been Pwned

Engadget: “Have I Been Pwned, the website that gives you a way to check which of your login details have been compromised by data breaches, is working with the FBI to grow its database. The partnership will give the website access to fresh passwords as they become compromised, depending on what the feds are investigating… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, May 23, 2021

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, May 23, 2021 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

How Strong is Your Password? Use These 4 Tools to Find Out

MakeUseOf: “Creating and maintaining a strong password is a modern-day necessity. Like your house keys, a password acts as the main entry point to your online identity. That’s why cybercriminals are always on the prowl, searching for weak spots to crack your password and infiltrate your digital life. If you are worried about your password security,… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, March 27, 2021

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, March 27, 2021 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

5 Common Cybercrime Attack Vectors and How to Avoid Them

MakeUseOf – “The threat landscape has significantly expanded with the proliferation of the internet and digital connectivity. As of March 2020, there were more than 677 million new malware detections. This figure by Statista indicates a growing threat of cyberattacks against individuals and businesses. Cybercriminals take advantage of cyberattack vectors to bypass your basic security… Continue Reading

Website Security: How to Secure & Protect Your Website

Law Technology Today: “With around 2 billion websites online in 2020, it’s easy to see why the internet has turned to be a goldmine for malicious actors in recent times. With tons of transactions and valuable information taking place online each day, hackers are always trying to come up with clever hacks to bypass any… Continue Reading

Post-Riot, the Capitol Hill IT Staff Faces a Security Mess

Wired – Wednesday’s insurrection could have exposed congressional data and devices in ways that have yet to be appreciated. “…the mob Wednesday had ample opportunities to steal information or gain device access if they wanted to. And while the Senate and House each build off of their own shared IT framework, ultimately each of the… Continue Reading