Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Cisco 2019 Data Privacy Benchmark Study

Cisco newsroom: “Organizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s 2019 Data Privacy Benchmark Study. The Study validates the link between good privacy practice and business benefits as respondents report shorter sales delays as well as fewer and less costly data… Continue Reading

Be safe on the internet.

An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go. – Take 10 minutes to read this article and consider applying one or more of the suggestions. I did and the applications work really well. I have been recommending one of the… Continue Reading

Google Cybersecurity Quiz Could Help Keep Your Email From Becoming Phishing Food

Fortune: “Has one of your accounts been hacked lately? Your email? Your Instagram? If so, you may have been the victim—and possibly an unwitting collaborator—in a phishing scam. Phishing is the most common form of cyber attack, and the goal of phishing emails is simple: to obtain your password and take over your account. Often,… Continue Reading

News outlet’s email security gap

Axios: “An Axios study shows that very few news organizations — around 6% of a broad sample — successfully use a critical technology that guarantees emails they send are authentic. The big picture: We’ve written before about the Department of Homeland Security’s struggle to get federal agencies and the White House to implement DMARC, a… Continue Reading

2019 National Intelligence Strategy of the United States

“This National Intelligence Strategy (NIS) provides the Intelligence Community (IC) with strategic direction from the Director of National Intelligence (DNI) for the next four years. It supports the national security priorities outlined in the National Security Strategy as well as other national strategies. In executing the NIS, all IC activities must be responsive to national… Continue Reading

Over 87GB of email addresses and passwords exposed in Collection 1 dump

ZDNet: “Almost 773 million unique email addresses and just under 22 million unique passwords were found to be hosted on cloud service MEGA. In a blog post, security researcher Troy Hunt said the collection totalled over 12,000 separate files and more than 87GB of data. The data, dubbed Collection #1, is a set of email… Continue Reading

The Federal Government Offers a Case Study in Bad Email Tracking

EFF: “The U.S. government sends a lot of emails. Like any large, modern organization, it wants to “optimize” for “user engagement” using “analytics” and “big data.” In practice, that means tracking the people it communicates with—secretly, thoroughly, and often, insecurely. Granicus is a third-party contractor that builds communication tools to help governments engage constituents online.… Continue Reading

(Don’t) Return to Sender: How to Protect Yourself From Email Tracking

EFF: “There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data, similar to page hits: enough to let the sender get a sense of how well their campaign is doing without invading users’… Continue Reading

Shutdown: Dot-gov websites vulnerable to cyberattacks, certificates expiring amid funding pause

Netcraft – .gov security falters during U.S. shutdown: “Dozens of U.S. government websites have been rendered either insecure or inaccessible during the ongoing U.S. federal shutdown. These sites include sensitive government payment portals and remote access services, affecting the likes of NASA, the U.S. Department of Justice, and the Court of Appeals.  With around 400,000… Continue Reading

Our Cellphones Aren’t Safe

Opinion | Our Cellphones Aren’t Safe – The New York Times: “Security flaws threaten our privacy and bank accounts. So why aren’t we fixing them? America’s cellular network is as vital to society as the highway system and power grids. Vulnerabilities in the mobile phone infrastructure threaten not only personal privacy and security, but also… Continue Reading

Measuring the “Filter Bubble”: How Google is influencing what you click

DuckDuckGo Blog: “Over the years, there has been considerable discussion of Google’s “filter bubble” problem. Put simply, it’s the manipulation of your search results based on your personal data. In practice this means links are moved up or down or added to your Google search results, necessitating the filtering of other search results altogether. These… Continue Reading

How to Delete Online Accounts You No Longer Need

Consumer Reports – Having too many digital accounts raises your risk of data being misused or stolen. Here’s how to clean house. By Thomas Germain. December 27, 2018 [h/t Pete Weiss] “Deleting online accounts is one of the best ways to protect your data security and privacy. The less data you have stored on corporate databases… Continue Reading