Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Security and Privacy Tips for People Seeking An Abortion

EFF: “Given the shifting state of the law, people seeking an abortion, or any kind of reproductive healthcare that might end with the termination of a pregnancy, may need to pay close attention to their digital privacy and security. We’ve previously covered how those involved in the abortion access movement can keep themselves and their communities safe. We’ve also laid out a principled guide for platforms to respect user privacy and rights to bodily autonomy. This post is a guide specifically for anyone seeking an abortion and worried about their digital privacy. There is a lot of crossover with the tips outlined in the previously mentioned guides; many tips bear repeating. We are not yet sure how companies may respond to law enforcement requests for any abortion related data, and you may not have much control over their choices.  But you can do a lot to control who you are giving your information to, what kind of data they get, and how it might be connected to the rest of your digital life…”

  • See also the Washington Post: “Seeking an abortion? Here’s how to avoid leaving a digital trail. Everything you should do to keep your information safe, from incognito browsing to turning off location tracking.”
  • See also Protocol: “Your data is worth more than your life to tech companies. Tech companies have created employee reimbursement programs, but they have been silent on whether they’ll protect users’ data that could put them at risk of prosecution.”

Pete Recommends – Weekly highlights on cyber security issues, June 26, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 26, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Trend Micro Cloud App Security Threat Report 2021

Trend Micro: “In this report, we highlight the notable email threats of 2021, including over 33.6 million high-risk email threats (representing a 101% increase from 2020’s numbers) that we’ve detected using the Trend Micro Cloud App Security platform. Email is an integral cog in the digital transformation machine. This was especially true in 2021, when… Continue Reading

What Makes Data Personal?

Montagnani, Maria Lillà and Verstraete, Mark, What Makes Data Personal? (June 4, 2022). UC Davis Law Review, Vol. 56, No. 3, Forthcoming 2023, Available at SSRN: https://ssrn.com/abstract=4128080 or http://dx.doi.org/10.2139/ssrn.4128080 “Personal data is an essential concept for information privacy law. Privacy’s boundaries are set by personal data: for a privacy violation to occur, personal data must… Continue Reading

Are blockchains decentralized? Unintended Centralities in Distributed Ledgers

A new Trail of Bits research report examines unintended centralities in distributed ledgers – “Blockchains can help push the boundaries of current technology in useful ways. However, to make good risk decisions involving exciting and innovative technologies, people need demonstrable facts that are arrived at through reproducible methods and open data. We believe the risks… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, June 11, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 11, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Cloud computing: Here’s the security threat you should be most worried about

ZDNet: “Poor identity, access and credential management is the biggest cybersecurity challenge for cloud computing, after the shift to remote working has redefined the workplace and changed priorities around the use of cloud applications and services, warns new research. Cloud computing is now a business essential, but keeping your data and applications secure is vital.… Continue Reading

How to Find Out if Your Passwords Are Being Sold Online

Make Use Of: “Whether you have the strongest or weakest passwords, countless scenarios can leak your password online. It could be a data breach, or you accidentally shared your credentials with a malicious actor through a phishing website. But how do you tell if your password has been hacked? And what are some of the… Continue Reading

What Litigators Should Know Now about Non-Fungible Tokens

ABA Litigation: Jurisdictional and other legal considerations in the booming NFT market. ” Many purists think decentralization is the most important promise of cryptocurrency, but to grow in popularity, non-fungible tokens (NFTs) need to guarantee rights to artists. NFTs are non-interchangeable units of data, stored on a blockchain, that can be sold and traded. NFTs… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022: Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Blockchain for Access Control Systems: NIST IR 8403

May 26, 2022 – “NIST has published NIST Internal Report (NIST IR) 8403, Blockchain for Access Control Systems. “The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and tamper-resistance, which… Continue Reading

8 reasons to ditch Chrome and switch to Firefox

PCWorld: “Chrome may be the most used browser, but it isn’t necessarily the best one out there. Alternatives exist that could better meet your needs. One such option is Firefox. It’s a rare browser not based on Chromium, the project that powers Chrome, unlike other rivals like Edge or Opera. It’s also backed by a… Continue Reading