Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

How to wipe your Android phone before selling or trading it in

The Verge: Before you give your device away, delete your personal data: “About to buy the latest Samsung phone or save a bit of money on a Google PIxel 3A? Whether you plan to trade in your old Android phone for a discount on your new phone, sell it on eBay, give it away to a friend, or drop it off for recycling, you’re going to want to wipe it of all your data first by resetting it to factory conditions. Luckily, that’s pretty easy to do.

Before you start, be aware that these instructions are for a Pixel 3 XL running Android 9, but the process for most current Android phones should be pretty much the same. Needless to say, first make sure that all of your data is transferred to your new phone, backed up, or both. Once your old phone has reset, there’s no going back…”

10 Ways for Congress to Respond to the Mueller Report

POGO – “Special Counsel Robert Mueller’s report on the Russian government’s efforts to interfere in the 2016 presidential election has been public for nearly three weeks. Since then, Members of Congress on both sides of the political aisle have debated the report’s findings, and there are many disturbing issues raised in it that Congress could… Continue Reading

Update WhatsApp after hack

Washington Post – “Global messaging app WhatsApp, which boasts over 1 billion users, was targeted by hackers last month in a breach that saw mobile devices attacked through the voice-calling functionality of the app. The security flaw potentially gave hackers access to private messages, location data and other personal user information. While WhatsApp hasn’t specifically… Continue Reading

Your most sensitive data is likely exposed online. These people try to find it.

c/net: “Justin Paine sits in a pub in Oakland, California, searching the internet for your most sensitive data. It doesn’t take him long to find a promising lead. On his laptop, he opens Shodan, a searchable index of cloud servers and other internet-connected devices. Then he types the keyword “Kibana,” which reveals more than 15,000… Continue Reading

2019 Data Breach Investigations Report

“The Verizon Data Breach Investigations Report (DBIR) provides you with crucial perspectives on threats that organizations like yours face. The 12th DBIR is built on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. Data breaches continue to make headlines… Continue Reading

7 simple ways to protect your digital privacy

The New York Times – “What little privacy people don’t give away, companies tend to take. Given this unfortunate reality, to get complete privacy you’d need to install a labyrinthine series of software tools that make the internet slow and unusable — think specialty Web browsers, encrypted email and chat; virtual private networks; and security-focused… Continue Reading

Consider this – Alexa is always listening and collecting data about you

The Daily Dot – Here’s what you need to know about the security and privacy implications of smart speakers, both the myths and the realities – 1) Smart speakers are always listening – One of the first things you’ll hear about smart speakers like echo is that they’re “always listening” to your conversations—which is technically… Continue Reading

Cloud database removed after exposing details on 80 million US households

c/net – Exclusive: The cache included information on addresses, income levels and marital status. “In a blow to consumers’ privacy, the addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found. The details included names, ages and genders as… Continue Reading

Spies, Lies, and Algorithms

Foreign Affiars – “For U.S. intelligence agencies, the twenty-first century began with a shock, when 19 al Qaeda operatives hijacked four planes and perpetrated the deadliest attack ever on U.S. soil. In the wake of the attack, the intelligence community mobilized with one overriding goal: preventing another 9/11. The CIA, the National Security Agency, and… Continue Reading

CIA now has an Instagram account

Axios: “The CIA, one of the rare government entities known for its social media savvy, is now on Instagram to give users another look into the secretive agency, Axios’ Marisa Fernandez writes. The new account is another online vehicle to “spark the curiosity of Instagram users” and find recruits, CIA press secretary Timothy Barrett said.… Continue Reading

FBI Releases the Internet Crime Complaint Center 2018 Internet Crime Report

The FBI Alerts the Public to Trends in Internet Crime and Offers Prevention Tips – “The FBI’s Internet Crime Complaint Center (IC3) 2018 Internet Crime Report includes information from 351,936 complaints of suspected Internet crime, with reported losses in excess of $2.7 billion. The top three crime types reported by victims in 2018 were non-payment/non-delivery,… Continue Reading