Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

How to Tell if Your Account Has Been Hacked

Motherboard – How to check if your Gmail, Facebook, Instagram, Twitter, and other accounts have been hacked. “Hackers routinely target high profile victims like politicians or wealthy cryptocurrency investors. But you could become a target too. Maybe an abusive former partner wants to stalk you, or a run-of-the-mill cybercriminal wants to get into your bank account. If you think you have been targeted, or worse, hacked, how can you even tell if someone got hold of your account? That’s actually a really hard question to answer, as different online services offer different types of data, and it’s usually not that easy to find. In this small guide, we’ll teach you the basic steps you can take to see if there’s any trace of an intrusion in your online accounts, such as Gmail, Microsoft’s email, Facebook, and Twitter. A word of caution: sometimes, you won’t be able to get a definitive answer on whether there’s been a breach. If you think there was, we suggest talking to a professional, such as your local IT store employee, or Access Now’s digital security helpline. Also, this guide only covers breaches of online services, if a hacker has broken into your computer, all these services could be compromised and the techniques described here wouldn’t necessarily help you detect that kind of breach…”

Amazon Announces a Security Change That May Help Companies Using AWS to Avoid Data Breaches

Fortune: “Amazon is finally offering a simple way for its cloud services customers to lock down data stored at its Simple Storage Service (S3) with one fell swoop. This change should help companies in the Fortune 500 and mom-and-pops down the street avoid embarrassing breaches of data. Customers of Amazon Web Services (AWS) routinely leave… Continue Reading

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

The New York Times: “…When Facebook users learned last spring that the company had compromised their privacy in its rush to expand, allowing access to the personal information of tens of millions of people to a political data firm linked to President Trump, Facebook sought to deflect blame and mask the extent of the problem.And… Continue Reading

Report – American military advantage eroded

Providing for the Common Defense – The Assessments and Recommendations of the National Defense Strategy Commission November 13, 2018 / By: National Defense Strategy Commission. “The final report of the National Defense Strategy Commission is a compilation of the assessments of the National Defense Strategy and recommendations based on its analysis related not just to… Continue Reading

Google outage pushed traffic through Russia, China and Nigeria

CNet – Traffic got rerouted Monday through ISPs in countries known for internet surveillance. “Google suffered a brief outage and slowdown on Monday, with some of its traffic being rerouted through networks in Russia, China and Nigeria. Incorrect routing instructions sent some of the search giant’s traffic to Russian network operator TransTelekom, China Telecom and… Continue Reading

File-Sharing Software on State Election Servers Could Expose Them to Intruders

ProPublica: A ProPublica analysis found election computer servers in Wisconsin and Kentucky could be susceptible to hacking. Wisconsin shut down its service in response to our inquiries. “As recently as Monday [October 29,2018], computer servers that powered Kentucky’s online voter registration and Wisconsin’s reporting of election results ran software that could potentially expose information to… Continue Reading

Days after synagogue massacre, online hate is thriving

BIRMINGHAM, Ala. (AP) — “A website popular with racists that was used by the man charged in the Pittsburgh synagogue massacre was shut down within hours of the slaughter, but it hardly mattered: Anti-Semites and racists who hang out in such havens just moved to other online forums. On Wednesday, four days after 11 people… Continue Reading

Twitter now lets you report accounts that you suspect are bots

The Verge – Part of Twitter’s broader fake account crackdown: “Twitter has updated a portion of its reporting process, specifically when you report a tweet that you think might be coming from a bot or a fake account masquerading as someone or something else. Now, when you tap the “it’s suspicious or spam” option under… Continue Reading

Americans Are Easy Marks for Russian Trolls, According to New Data

A Daily Beast analysis of Twitter data shows the Kremlin troll farm’s English-language propaganda is nine times more effective than its disinformation in Russian: “You don’t need to read the federal indictments to spot the moment Russia began targeting the United States with its army of internet trolls. Just chart the American flag emoji. Best… Continue Reading

ABA ethics opinion offers guidance on data breaches

ABA Journal: “Lawyers have to safeguard client data and notify clients of a data breach, and the ABA Standing Committee on Ethics and Professional Responsibility has issued a formal opinion that reaffirms that duty. In Formal Opinion 483, issued Tuesday, the standing committee also provided new guidance to help attorneys take reasonable steps to meet… Continue Reading

Twitter releases large data archive of potentially state-backed information operations

Twitter news release on Election Integrity: “Data archive In line with our principles of transparency and to improve public understanding of alleged foreign influence campaigns, Twitter is making publicly available archives of Tweets and media that we believe resulted from potentially state-backed information operations on our service…While this dataset is of a size that a… Continue Reading

FBI Releases Article on Defending Against Payroll Phishing Scams

US-CERT: “The Federal Bureau of Investigation (FBI) has released an article on building a digital defense against phishing scams targeting electronically deposited paychecks. In these schemes, scammers use phishing emails to direct employees to fraudulent websites and collect their work credentials. Scammers then use victims’ credentials to replace legitimate direct deposit information with their own… Continue Reading