Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Verizon and AT&T will stop selling your phone’s location to data brokers

Ars Technica: “Verizon and AT&T have promised to stop selling their mobile customers’ location information to third-party data brokers following a security problem that leaked the real-time location of US cell phone users. Sen. Ron Wyden (D-Ore.) recently urged all four major carriers to stop the practice, and today he published responses he received from Verizon, AT&T, T-Mobile USA, and Sprint. Wyden’s statement praised Verizon for “taking quick action to protect its customers’ privacy and security,” but he criticized the other carriers for not making the same promise. “After my investigation and follow-up reports revealed that middlemen are selling Americans’ location to the highest bidder without their consent or making it available on insecure Web portals, Verizon did the responsible thing and promptly announced it was cutting these companies off,” Wyden said. “In contrast, AT&T, T-Mobile, and Sprint seem content to continuing to sell their customers’ private information to these shady middle men, Americans’ privacy be damned.” [Question – how can Verizon be considered praiseworthy when they were selling user data and have just “agreed” to cease doing so – where is the accountability and transparency as it pertains to all the carriers as it pertain to the privacy of customers?]

How to Keep Google Home and Chromecast From Giving Hackers Your Location

Krebs on Security: “…Craig Young, a researcher with security firm Tripwire, said he discovered an authentication weakness that leaks incredibly accurate location information about users of both the smart speaker and home assistant Google Home, and Chromecast, a small electronic device that makes it simple to stream TV shows, movies and games to a digital… Continue Reading

The National Security Archive launches New CyberWar Map

“The National Security Archive’s Cyber Vault Project is announcing the launch of the CyberWar Map. This resource is both a visualization of state-sponsored cyberattacks and an index of Cyber Vault documents related to each topic (represented as nodes on the map). Clicking on each node will reveal hyperlinks and document descriptions. In some cases where… Continue Reading

Joint Chiefs of Staff – Permanent global cyberspace superiority is not possible

Steven Aftergood – Secrecy News Blog: “Military planners should not anticipate that the United States will ever dominate cyberspace, the Joint Chiefs of Staff said in a new doctrinal publication. The kind of supremacy that might be achievable in other domains is not a realistic option in cyber operations. “Permanent global cyberspace superiority is not… Continue Reading

15 more default privacy settings you should change now on your TV, cellphone plan and more

The Post’s tech columnist is back with Round 2 of his clickable guide to improving your privacy on all sorts of devices and online services. “It’s not just Google and Facebook that are spying on you. Your TV, your cellphone provider and even your LinkedIn account have side hustles in your data. But, in many… Continue Reading

Mozilla Asked People How They Feel About Facebook. Here’s What They Said

Medium: “47,000 people responded to our survey asking how they feel about Facebook. The data is interesting and open for your exploration. Facebook has been in the news a lot lately. It started with the announcement that over 87 million Facebook users had their personal information shared with the private firm Cambridge Analytica without their… Continue Reading

These dogs sniff out cybercrime

This story appears in the summer 2018 edition of CNET Magazine: “Harley darts into a decrepit room in Connecticut. She’s searching for evidence. There are plenty of potential distractions in the room: Wires hang from the ceiling. Warped wood paneling buckles away from the walls. Faded yellow cabinets look like someone kicked a hole in… Continue Reading

The What, Why, and How of Digital Forensics

Law Technology Today: “Digital forensics is a branch of forensic science focused on recovery and investigation of artifacts found on digital devices. Any devices that store data (e.g. computers, laptops, smartphones, thumb drives, memory cards or external hard drives) are within the ambit of digital forensics. Given the proliferation of digital devices, there has been… Continue Reading

Check if you have an account that has been compromised in a data breach

In all likelihood, regardless of how careful you are and how many email addresses you employ, all of them have been compromised many times over as a result of a multitude of breaches of sites and services that range from Tickefly to Adobe. You may want to check in with Have I Been Pwned (HIBP)… Continue Reading

AP – US expects fallout from Snowden leaks for years to come

AP: “National Security Agency contractor Edward Snowden blew the lid off U.S. government surveillance methods five years ago, but intelligence chiefs complain that revelations from the trove of classified documents he disclosed are still trickling out. That includes recent reporting on a mass surveillance program run by close U.S. ally Japan and on how the… Continue Reading

Law Firm Data is Catnip for Hackers

Security Boulevard: “Dig into a law firm, and you’ll find secrets. Sometimes these secrets are mundane, like who’s getting divorced, or who’s getting cut out of the will. Sometimes, however, these secrets can shake nations and economies.  Huge companies are merging and getting acquired, national leaders are hiding graft in numbered accounts, and you might… Continue Reading

Federal Cybersecurity Risk Determination Report and Action Plan

NextGov: “Many federal agencies don’t know how hackers are targeting them, can’t tell when hackers steal large amounts of their data and aren’t efficiently spending the cybersecurity money they have, according to a report and action plan released last week. Roughly three-quarters of federal agencies’ cybersecurity programs are currently “at risk” or “at high risk,”… Continue Reading