Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified

Treasury Inspector General for Tax Administration – The Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified, June 20, 2017, Reference Number: 2017-40-031.”Employment-related identity theft (hereafter referred to as employment identity theft) occurs when an identity thief uses another person’s identity to gain employment. Taxpayers may first realize they are a victim when they receive an IRS notice of a discrepancy in the income they reported on their tax return. Each year, the IRS receives about 2.4 million tax returns filed using an Individual Taxpayer Identification Number (ITIN) with reported wages, an indicator of potential identity theft.”

IC3 Issues Internet Crime Report for 2016

“The Internet Crime Complaint Center (IC3) has released its 2016 Internet Crime Report, describing the numbers and types of cyber crimes reported to IC3. Business Email Compromise (BEC), ransomware attacks, tech support fraud, and extortion are all common schemes affecting people in the U.S. and around the world. US-CERT encourages users to review the 2016… Continue Reading

Unisys Security Index™ U.S.

“The Unisys Security Index measures concerns of consumers on issues related to national, personal, financial and internet security around the world. In the U.S., the greatest increase in concern since 2014 was in the area of internet security: 51%. Learn more about concerns in the other areas.” Continue Reading

2017 Online Trust Audit Released

2017 Online Trust Audit Released – What Did We Learn? Jeff Wilbur, June 20, 2017  – “Today we released the 9th annual Online Trust Audit and Honor Roll. This year’s Audit is our most comprehensive ever, assessing more than 1000 consumer-facing sites for their adoption of best practices in consumer/brand protection, site security and responsible… Continue Reading

Apple employs former intel agents to squelch product and tech leaks

William Turton, The Outline – Leaked recording: Inside Apple’s global war on leakers – Former NSA agents, secrecy members on product teams, and a screening apparatus bigger than the TSA. “A recording of an internal briefing at Apple earlier this month obtained by The Outline sheds new light on how far the most valuable company… Continue Reading

GOP Data Firm Leaks Personal Data on 61 percent of US population

Gizmodo: “Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a publicly accessible Amazon server. The data leak contains a wealth of personal information on roughly 61 percent of the US population. Along with home addresses,… Continue Reading

EFF Tips, Tools and How-tos for Safer Online Communications

“Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices. Select an article from our index to learn about a tool or issue, or check out one… Continue Reading

Questions increase over determining extent of Russia election hacking

NPR – If Voting Machines Were Hacked, Would Anyone Know? – “As new reports emerge about Russian-backed attempts to hack state and local election systems [Link], U.S. officials are increasingly worried about how vulnerable American elections really are. While the officials say they see no evidence that any votes were tampered with, no one knows… Continue Reading

GAO – DoD Actions Needed to Address Five Key Mission Challenges

Department of Defense: Actions Needed to Address Five Key Mission Challenges, GAO-17-369: Published: Jun 13, 2017. Publicly Released: Jun 13, 2017. “The Department of Defense (DOD) faces five key challenges that significantly affect the department’s ability to accomplish its mission. These include the need to (1) rebalance forces and rebuild readiness; (2) mitigate threats to cyberspace… Continue Reading

Pew – The Internet of Things Connectivity Binge: What Are the Implications?

“Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities.” “The Internet of Things (IoT) is in full flower. The expanding collection of connected things goes mostly… Continue Reading

Annual Internet Trends Presentation from Mary Meeker – 2017

Read the PDF – Internet Trends, Mary Meeker, May 31, 2017 [355 pages] “Here are a few initial takeaways via TechCrunch: Smartphone sales and Internet penetration growth are both slowing It’s not really a “shift to mobile” as much as “the addition of mobile”, since desktop usage hasn’t declined much while mobile usage has skyrocketed… Continue Reading

Paper – Attacks Landscape in the Dark Side of the Web

“The Dark Web is known as the part of the Internet operated by decentralized and anonymous-preserving protocols like Tor. To date, the research community has focused on understanding the size and characteristics of the Dark Web and the services and goods that are offered in its underground markets. However, little is still known about the… Continue Reading