Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

Airports Where You’re Most Likely To Be Hacked

Fortune: “Public Wi-Fi in airports might seen like a godsend to business travelers and weary parents. But it’s often a fast lane for hackers to access your information. Cloud security company Coronet has compiled a list of America’s most cyber insecure airports. And nowhere is worse than San Diego. Coronet looked at data from the… Continue Reading

DOJ plans to alert public to foreign operations targeting U.S. democracy

The Washington Post: “Deputy Attorney General Rod Rosenstein spoke about foreign influence campaigns on July 19 at the Aspen Security Forum. The Justice Department plans to alert the public to foreign operations targeting U.S. democracy under a new policy designed to counter hacking and disinformation campaigns such as the one Russia undertook in 2016 to… Continue Reading

A Smart Move? 24 Essentials Of A Swot Analysis Policymakers Need To Consider

Berkman Klein Center: “Regulators and policymakers are increasingly involved in making important decisions about the governance of automated vehicles (AVs). Policymakers need to design comprehensive policies to deliver the benefits of AVs and to foresee and address potential unintended consequences; however, this is not an easy task. Especially given the complexity of the technology, AVs… Continue Reading

NSO Group malware used to hack iPhones stolen by company employee

Motherboard: NSO Group Employee Allegedly Stole Company’s Powerful Spyware for Personal Profit “NSO Group sells some of the most potent, off-the-shelf malware for remotely breaking into smartphones. Some versions allow a law enforcement or intelligence agency to steal essentially all meaningful data from an iPhone with no interaction from the target. Others just require the… Continue Reading

New rule covers purchasing authority for cyber emergencies

FCW.com: “The federal government is moving to expand emergency procurement authority for purchases used to respond to or recover from a cyberattack, according to a new proposed rule in the Federal Register. The change places cyberattacks against the United States in the same category as nuclear, biological, chemical or radiological attacks. It would allow federal… Continue Reading

Database of 340 Million Customer Records Leaks onto Web

The time is long over due to cease talking about data privacy – we have none – and move forward, now, to develop and implement standards to secure our metadata from organizations that collect, aggregate, sell, buy and trade every facet of our “data” without our knowledge and consent, with ramifications that continue to remain… Continue Reading

The Biggest Digital Heist in History Isn’t Over Yet

Bloomberg: Carbanak’s suspected ringleader is under arrest, but $1.2 billion remains missing, and his malware attacks live on. “Since late 2013, this band of cybercriminals has penetrated the digital inner sanctums of more than 100 banks in 40 nations, including Germany, Russia, Ukraine, and the U.S., and stolen about $1.2 billion, according to Europol, the… Continue Reading

Artificial Intelligence: Emerging Opportunities, Challenges, and Implications for Policy and Research

Artificial Intelligence: Emerging Opportunities, Challenges, and Implications for Policy and Research; GAO-18-644T: Published: Jun 26, 2018. Publicly Released: Jun 26, 2018. “Artificial intelligence (AI) could improve human life and economic competitiveness—but it also poses new risks. The Comptroller General convened a Forum on AI to consider the policy and research implications of AI’s use in… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues for June 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Pete Recommends –… Continue Reading

Verizon and AT&T will stop selling your phone’s location to data brokers

Ars Technica: “Verizon and AT&T have promised to stop selling their mobile customers’ location information to third-party data brokers following a security problem that leaked the real-time location of US cell phone users. Sen. Ron Wyden (D-Ore.) recently urged all four major carriers to stop the practice, and today he published responses he received from… Continue Reading

How to Keep Google Home and Chromecast From Giving Hackers Your Location

Krebs on Security: “…Craig Young, a researcher with security firm Tripwire, said he discovered an authentication weakness that leaks incredibly accurate location information about users of both the smart speaker and home assistant Google Home, and Chromecast, a small electronic device that makes it simple to stream TV shows, movies and games to a digital… Continue Reading

The National Security Archive launches New CyberWar Map

“The National Security Archive’s Cyber Vault Project is announcing the launch of the CyberWar Map. This resource is both a visualization of state-sponsored cyberattacks and an index of Cyber Vault documents related to each topic (represented as nodes on the map). Clicking on each node will reveal hyperlinks and document descriptions. In some cases where… Continue Reading