Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Quit Chrome. Safari and Edge Are Just Better Browsers for You and Your Computer

WSJ via DowJones/Fidelity: “…while Chrome has gobbled up 69% of the desktop-laptop browser market share, according to NetMarketShare, its competitors, all with single-digit percentages, have been laser-focused on kicking Chrome square in the blue dot. Microsoft’s new Edge browser, rolling out to Windows 10 machines this summer and available now for download on a Mac, is based on Chromium, the same underlying technology as Chrome — yet it uses less of your Windows computer’s RAM and battery. An independent, Mozilla’s Firefox, the Bernie Sanders of browsers, now puts privacy front and center. Meanwhile, Apple’s built-in Safari browser has the best blend of privacy, performance and battery to offer on Macs, and it’s only getting better this fall with MacOS Big Sur…Unsurprisingly, on Macs, it was also the built-in browser that performed the best. Companies that create the operating systems can do more to optimize for their own browsers. Both Microsoft and Apple said they work a lot on how to minimize processor and memory demands from inactive tabs.Safari used about 5% to 10% less RAM than Chrome, Firefox and Edge in my tests. Compared with Chrome, Safari kept the 13-inch MacBook Pro running an extra 1 to 2 hours on a charge. Plus, the laptop was a lot cooler and quieter, with the exception of in-browser video calls….Yes, Microsoft’s browser is great on Apple machines, too. Mind blown. But the podcast web app, like some other sites, just won’t run unless it identifies a Chrome browser. ..In the next release of Safari coming this fall in MacOS Big Sur, Apple made it easier for developers to port Chrome extensions over. Plus, the updated browser, which I’ve been testing in beta on a MacBook Pro, is faster — and has those little tab icons, aka favicons, turned on by default. Like Firefox and Edge, Safari’s also has lots of default privacy features, including tracker blocking. The forthcoming version includes a toolbar that lets you see the blocked trackers on the site you’re visiting, and a new weekly privacy report shows you all blocked trackers — even across your iPhone and iPad…”

 

NIST Kick-Starts ‘Threshold Cryptography’ Development Effort

Establishing the emerging technique’s building blocks is a near-term focus – “A new publication by cryptography experts at the National Institute of Standards and Technology (NIST) proposes the direction the technical agency will take to develop a more secure approach to encryption. This approach, called threshold cryptography, could overcome some of the limitations of conventional… Continue Reading

From the Reference Desk: Cyber Operations and International Law

FCIL Special Interest Section of AALL – Jonathan Pratter – “A student had a question: If State A doxes State B for hacking State C, what would be the result under international law? The student was in the law school class, International Law of Cyber Conflict. My immediate response was, “That is a good question.… Continue Reading

Pete Recommends Weekly highlights on cyber security issues June 21, 2020

Via LLRX – Pete Recommends Weekly highlights on cyber security issues June 21, 2020 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Digital Security Advice for Journalists Covering the Protests Against Police Violence

“This guide is an overview of digital security considerations specific to journalists covering protests. For EFF’s comprehensive guide to digital security, including advice for activists and protesters, visit ssd.eff.org. Legal advice in this post is specific to the United States. As the international protests against police killings enter their third week, the public has been… Continue Reading

New annual report from Information Security Oversight Office

2019 Report to the President – Information Security Oversight Office (ISOO), June 2020: “…Our Government’s ability to protect and share Classified National Security Information and Controlled Unclassified Information (CUI) continues to present serious challenges to our national security. While dozens of agencies now use various advanced technologies to accomplish their missions, a majority of them… Continue Reading

‘BlueLeaks’ Exposes Files from Hundreds of Police Departments

Krebs on Security – “Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals. The… Continue Reading

Massive spying on users of Google’s Chrome shows new security weakness

Reuters: “A newly discovered spyware effort attacked users through 32 million downloads of extensions to Google’s market-leading Chrome web browser, researchers at Awake Security told Reuters, highlighting the tech industry’s failure to protect browsers as they are used more for email, payroll and other sensitive functions.  Alphabet Inc’s (GOOGL.O) Google said it removed more than… Continue Reading

Top Challenges Facing Federal Agencies: COVID-19 Emergency Relief and Response Efforts

Top Challenges Facing Federal Agencies: COVID-19 Emergency Relief and Response Efforts As reported by Offices of Inspector General across government – June 17, 2020. “…Each year, OIGs identify and report on the top management and performance challenges facing their agencies. CIGIE also issues an annual report that includes a list of the top challenges faced… Continue Reading

New report identifies why enterprise security tools are failing

FedScoop: “…The latest FireEye Mandiant Security Effectiveness Report which assesses the effectiveness of security controls used at participating organizations around the world, by executing thousands of mock attacks on more than 120 market-leading security technologies deployed by those organizations. It probably won’t come as a surprise that these large-scale organizations manage between 30 to 50… Continue Reading