Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

How Google Is Stopping Malicious Office Docs From Targeting Gmail Users

PC Magazine: “At the RSA security conference today, Google offered a rare look into the kinds of malicious attachments hackers will send to Gmail users. It turns out Microsoft Office documents secretly rigged to download malware are in vogue. In recent weeks, about 56 percent of the malicious attachments detected and blocked by Gmail’s filters have been Microsoft Office documents, according to Google’s anti-abuse research leader, Elie Bursztein. These malicious Office documents can often contain “macros,” or series of automated commands in the file. If you enable the macros, the malicious document will be able to download and execute the hacker’s desired malware. The remaining 44 percent of the malicious documents Google will block include Adobe PDF documents, archived files, and HTML-based documents, among others. (By default, Gmail will also prevent users from attaching .exe programs and Javascript files to email messages.) …”

Artificial intelligence What Think Tanks are thinking

European Parliamentary Research Service Blog: “Artificial intelligence (AI) is usually understood as the ability for a machine to display human-like capabilities such as reasoning, learning, planning and creativity. The ‘Holy Grail’ for many governments and companies seeking to benefit from the digital revolution, the first to invent and apply true AI could achieve an enormous… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues February 22, 2020

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues February 22, 2020 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Oversight Subcommittee Seeks Information About Ring’s Agreements with Police, Local Governments

Washington, D.C. (Feb. 19, 2020)—”Today, Rep. Raja Krishnamoorthi, the Chairman of the Subcommittee on Economic and Consumer Policy, sent a letter to Amazon seeking information about its subsidiary Ring Inc.’s partnerships with city governments and local police departments, along with the company’s policies governing the data it collects. Ring sells internet-connected home surveillance equipment, such… Continue Reading

Carnegie Mellon built ‘opt-out’ system for nearby tracking devices

engadget: “It’s getting easier to control what your smart home devices share, but what about the connected devices beyond your home? Researchers at Carnegie Mellon’s CyLab think they can give you more control. They’ve developed an infrastructure and matching mobile app (for Android and iOS) that not only informs you about the data nearby Internet… Continue Reading

Ring now requires two-factor sign-ins for its home security devices

engadget: “Ring is continuing its bid to improve privacy and security after facing criticism. As of today, the Amazon brand will start requiring two-factor authentication for all users when they sign into their Ring accounts. When the feature reaches you this week, you’ll always get a six-digit code sent to either your email or (less… Continue Reading

Use these 11 critical iPhone privacy and security settings right now

Fast Company – iOS offers more tools than ever to defend yourself against hackers, nosy sites, and other intruders. Here’s why they matter and how to benefit from them. “If one object you own encapsulates who you are, how you think, and what you do, it’s your smartphone. Our phones not only contain our contacts… Continue Reading

Almost half of connected medical devices are vulnerable to hackers

ZDNet – A new report suggests that vulnerabilities in medical devices could put hospital patients at risk from hackers – but there are some simple ways to protect against these attacks: “Connected medical devices are twice as likely to be vulnerable to the BlueKeep exploit than other devices on hospital networks, putting patients and staff… Continue Reading

ABA House approves measures at Midyear Meeting to expand access to justice, voting rights

ABA news release: “The American Bar Association House of Delegates approved a resolution today that would encourage states and other jurisdictions to consider innovative approaches to expanding access to justice with the goal of improving affordability and quality of civil legal services. By voice vote, the 596-member House, which is the association’s policy-making body, overwhelmingly… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues February 15, 2020

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues February 15, 2020 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Activate This ‘Bracelet of Silence,’ and Alexa Can’t Eavesdrop

The New York Times – “…Mr. Zhao and Ms. Zheng are computer science professors at the University of Chicago, and …with the help of an assistant professor, Pedro Lopes, they designed a piece of digital armor: a “bracelet of silence” that will jam the Echo or any other microphones in the vicinity from listening in… Continue Reading