Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

How to Protect Yourself From Unethical or Illegal Spying

MakeUseOf: “A quick Google search for “spy software” yields over 150 million results. There is a massive interest in spying software and gadgets. Irrespective of the motivation or justification, spying is illegal. It is a gross invasion of privacy in most countries around the world. You don’t have to suffer if someone is spying on you. There are several tools that will help you find hidden spy apps and programs on your computer, smartphone, or otherwise. Here’s how to protect yourself from being spied on…”

Over half of Fortune 500 exposed to remote access hacking

Axios – “Over a two-week period, the computer networks at more than half of the Fortune 500 left a remote access protocol dangerously exposed to the internet, something many experts warn should never happen, according to new research by the security firm Expanse and 451 research…According to Coveware, more than 60% of ransomware is installed… Continue Reading

Ransomware Hit Case Management Provider TrialWorks. What Happens Next?

Victoria Hudgins, Ransomware Hit Case Management Provider TrialWorks. What Happens Next?, LegalTech News. “Add case management platform TrialWorks to the laundry list of companies and public sector agencies that were struck and paralyzed by a cyberattack this year. And unless lawyers backed up their client files to a separate storage network, they could be frozen… Continue Reading

LLRX October 2019 New articles and columns

Articles and Columns for October 2019 Blockchain: What Information Professionals Need to Know – Anna Irvin, Ph.D. and Janice E. Henderson, Esq. presented this comprehensive 64 page guide at the LLAGNY Education Committee Program on October 15, 2019. The guide is an multidisciplinary resource that includes: articles from law, business and finance journals, CLE programs/materials,… Continue Reading

Update Complete: U.S. Nuclear Weapons No Longer Need Floppy Disks

The New York Times: The Defense Department has transitioned away from a 1970s-era nuclear command and control system that relied on eight-inch floppy disks. The “modernizing” effort was quietly completed in June. “The system, called Strategic Automated Command and Control System, or SACCS, “is still in use today but no longer uses floppy disks,” David Faggard,… Continue Reading

What Would Happen If the Internet Went Down … Forever?

Popular Mechanics – “…So how long could society carry on without the internet? However implausible, it’s nonetheless a scenario that futurists, economists, and IT workers spend considerable time contemplating. “Eliminating all internet communications, even if only for a few days, would inflict huge economic costs,” says Thomas Hazlett, who served as chief economist of the… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, November 2, 2019

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, November 2, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

The Government Protects Our Food and Cars. Why Not Our Data?

The New York Times – The United States is virtually the only developed nation without a comprehensive consumer data protection law and an independent agency to enforce it – “Why are Americans protected from hazardous laptops, fitness trackers and smartphones — but not when hazardous apps on our devices expose and exploit our personal information?… Continue Reading

Resources for Measuring Cybersecurity

R Street – Kathryn Waldron, Resident Fellow, National Security & Cybersecurity – Resources for Measuring Cybersecurity – A Partial Annotated Bibliography – PDF In the field of cybersecurity, there is no well-defined system that is capable of measuring cybersecurity in an objective, quantifiable, and comparative manner. In light of this, the R Street Institute National… Continue Reading

US Dept of Interior to ground its drones over Chinese spying risk

cnet: “The US Department of the Interior is grounding its fleet of more than 800 aerial drones over concerns about Chinese spying and cyberattacks. The fleet will remain grounded until a full review is completed by Secretary David Bernhardt, the department said Thursday. However, drones being used for emergency rescues and disasters will remain in… Continue Reading

DNA database used to find Golden State Killer national security leak waiting to happen

MIT Technology Review: “A private DNA ancestry database that’s been used by police to catch criminals is a security risk from which a nation-state could steal DNA data on a million Americans, according to security researchers. Security flaws in the service, called GEDmatch, not only risk exposing people’s genetic health information but could let an… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, October 26, 2019

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, October 26, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading