Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Black Hat USA Report – Portrait of an Imminent Cyberthreat

July 2017 Portrait of an Imminent Cyberthreat – Cyber attacks on US enterprises and critical infrastructure are coming soon, according to some of the industry’s most experienced and highly informed security professionals. And in most cases, defenders are not prepared. “Most information security professionals believe that the US critical infrastructure will be breached by a… Continue Reading

ABA – Cloud Ethics Opinions Around the U.S.

ABA Law Practice Division – “Cloud Ethics Opinions – There’s a compelling business case for cloud computing, but can lawyers use it ethically? We’ve compiled these comparison charts to help you make the right decision for your practice. What is Cloud Computing? About This Map Broadly defined, cloud computing (or “Software as a Service”) refers to… Continue Reading

Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified

Treasury Inspector General for Tax Administration – The Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified, June 20, 2017, Reference Number: 2017-40-031.”Employment-related identity theft (hereafter referred to as employment identity theft) occurs when an identity thief uses another person’s identity to gain employment. Taxpayers may first realize they are a victim when… Continue Reading

IC3 Issues Internet Crime Report for 2016

“The Internet Crime Complaint Center (IC3) has released its 2016 Internet Crime Report, describing the numbers and types of cyber crimes reported to IC3. Business Email Compromise (BEC), ransomware attacks, tech support fraud, and extortion are all common schemes affecting people in the U.S. and around the world. US-CERT encourages users to review the 2016… Continue Reading

Unisys Security Index™ U.S.

“The Unisys Security Index measures concerns of consumers on issues related to national, personal, financial and internet security around the world. In the U.S., the greatest increase in concern since 2014 was in the area of internet security: 51%. Learn more about concerns in the other areas.” Continue Reading

2017 Online Trust Audit Released

2017 Online Trust Audit Released – What Did We Learn? Jeff Wilbur, June 20, 2017  – “Today we released the 9th annual Online Trust Audit and Honor Roll. This year’s Audit is our most comprehensive ever, assessing more than 1000 consumer-facing sites for their adoption of best practices in consumer/brand protection, site security and responsible… Continue Reading

Apple employs former intel agents to squelch product and tech leaks

William Turton, The Outline – Leaked recording: Inside Apple’s global war on leakers – Former NSA agents, secrecy members on product teams, and a screening apparatus bigger than the TSA. “A recording of an internal briefing at Apple earlier this month obtained by The Outline sheds new light on how far the most valuable company… Continue Reading

EFF Tips, Tools and How-tos for Safer Online Communications

“Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices. Select an article from our index to learn about a tool or issue, or check out one… Continue Reading

Questions increase over determining extent of Russia election hacking

NPR – If Voting Machines Were Hacked, Would Anyone Know? – “As new reports emerge about Russian-backed attempts to hack state and local election systems [Link], U.S. officials are increasingly worried about how vulnerable American elections really are. While the officials say they see no evidence that any votes were tampered with, no one knows… Continue Reading

Paper – Attacks Landscape in the Dark Side of the Web

“The Dark Web is known as the part of the Internet operated by decentralized and anonymous-preserving protocols like Tor. To date, the research community has focused on understanding the size and characteristics of the Dark Web and the services and goods that are offered in its underground markets. However, little is still known about the… Continue Reading

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist. May 12, 2017. [FAS] “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic… Continue Reading

24/7 Wall St – 15 Most Famous Cyberattacks of All Time

“The WannaCry ransomware attack has affected more than 200,000 computers in over 150 nations. The attack, which targets the Microsoft Windows operating system, has been described as one of the largest cyberattacks of all time. The malware encrypts files, demanding users of affected computers pay a ransom of $300 in bitcoin. The software behind WannaCry… Continue Reading