Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Pete Recommends – Weekly highlights on cyber security issues July 13, 2019

Pete Recommends – Weekly highlights on cyber security issues July 13, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Fake News Could Lead to Real War; Researchers detail privacy-related legal, ethical challenges with satellite data Firefox 68 arrives with darker reader view, recommended extensions, IT customizations; ICE, FBI use state driver’s license photos for facial-recognition scans; and Google tracks all Gmail account purchases, even if emails are deleted.

Pete Recommends – Weekly highlights on cyber security issues July 7, 2019

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues July 7, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Will California’s New Bot Law Strengthen Democracy?

The New Yorker – “When you ask experts how bots influence politics—that is, what specifically these bits of computer code that purport to be human can accomplish during an election—they will give you a list: bots can smear the opposition through personal attacks; they can exaggerate voters’ fears and anger by repeating short simple slogans;… Continue Reading

Cyber Resilience – The 6 Biggest Threats Right Now for Legal

British Legal Technology Forum 2020: “Cyber resilience – the ability to withstand both attacks on your computer network and attempts to steal valuable client data – is a business priority which an increasing number of legal firms in London and UK depend on us for year after year. The threat constantly evolves and grows –… Continue Reading

Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

Pro Publica – “As ransomware attacks crippled businesses and law enforcement agencies, two U.S. data recovery firms claimed to offer an ethical way out. Instead, they typically paid the ransom and charged victims extra… The payments underscore the lack of other options for individuals and businesses devastated by ransomware, the failure of law enforcement to catch… Continue Reading

MIT Technology Review – 35 Innovators Under 35 2019

“As part of our ethos that technology can and should be a force for good. Our annual list of 35 innovators under 35 is a way of putting faces on that idea. In these profiles you’ll find people employing innovative methods to treat disease, to fight online harassment, and to create the next big battery… Continue Reading

A hacker assault left mobile carriers open to network shutdown

CNET: “Hackers have quietly infiltrated more than a dozen mobile carriers around the world, gaining complete control of networks behind the companies’ backs. The attackers have been using that access over the last seven years to steal sensitive data, but have so much control they could shut down communications at a moment’s notice, according to… Continue Reading

DC Court of Appeals rules OPM responsible for hacking of 22 million personnel records

Washington Post: “A federal appeals court has revived the chances of monetary awards being paid to federal employees and others whose personal information was exposed in hacks of two government databases that were revealed in 2015. The ruling criticized the Office of Personnel Management for failing to safeguard that information despite having been the target… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues June 22, 2019

Via LLRX – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish… Continue Reading

This is how Google’s Chrome lets the cookies track you, imagined in real life

A Washington Post video story – This is how Google’s Chrome lets the cookies track you, imagined in real life  – “Chrome has become like spyware for the company, allowing more tracker cookies than any other browser. The Post’s Geoffrey A. Fowler imagines how that might feel in real life, and gives advice for more… Continue Reading

Google is the biggest snoop of all on your computer or cell phone

The Philadelphia Inquirer – “You open your browser to look at the Web. Do you know who is looking back at you? Over a recent week of Web surfing, I peered under the hood of Google Chrome and found it brought along a few thousand friends. Shopping, news and even government sites quietly tagged my browser… Continue Reading