Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

FBI Requests We All Reboot our Routers – But Will This Be Enough?

The New York Times – F.B.I.’s Urgent Request: Reboot Your Router to Stop Russia-Linked Malware: “Hoping to thwart a sophisticated malware system linked to Russia that has infected hundreds of thousands of internet routers, the F.B.I. has made an urgent request to anybody with one of the devices: Turn it off, and then turn it… Continue Reading

Exposing redirected URLs before you click

John Simek “…Frankly, I’m not a big fan of URL shorteners and an even lesser fan of QR codes. The main problem with shortened URLs is that you don’t really know where you will be redirected to if you click on it. What a great tool for the distribution of malware. There is a solution… Continue Reading

Politico – Trump reject security rules and keeps tweeting on his iPhones

‘Too inconvenient’: Trump goes rogue on phone security – The president has kept features at risk for hacking and resisted efforts by staff to inspect the phones he uses for tweeting. “President Donald Trump uses a White House cellphone that isn’t equipped with sophisticated security features designed to shield his communications, according to two senior… Continue Reading

Modern Bank Heists: Cybersecurity Threats Facing the Financial Sector

Carbon Black: “Despite investing heavily in security, financial institutions continue to experience cyber attacks at a rapid pace. Conducted primarily for the purpose of yielding illicit financial gain, cyber attacks against the financial services industry are increasing in sophistication and are often undetectable, global and instantaneous. This will be one of the themes of this… Continue Reading

UK – Internet Safety Strategy green paper

“The Internet Safety Strategy looks at how we can ensure Britain is the safest place in the world to be online. The Strategy considers the responsibilities of companies to their users, the use of technical solutions to prevent online harms and government’s role in supporting users. The consultation covered various aspects of online safety including:… Continue Reading

Study – Google and Internet Archive Are Top Choices for ISIS Propaganda

Fortune: “While the Islamic State has been largely wiped off the physical battlefield, the terrorist group continues to maintain a steady presence on popular websites despite an increased push by tech companies to purge them. On Tuesday, the cybersecurity firm Flashpoint released a new report that lists the most popular sources of ISIS propaganda over… Continue Reading

What You Need to Know About E-Fail and the PGP Flaw

EFF: “…you should stop using PGP for encrypted email and switch to a different secure communications method for now. A group of researchers released a paper today that describes a new class of serious vulnerabilities in PGP (including GPG), the most popular email encryption standard. The new paper includes a proof-of-concept exploit that can allow… Continue Reading

Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

“This update to NIST Special Publication 800-37 (Revision 2) responds to the call by the Defense Science Board, Executive Order 13800, and OMB Memorandum M-17-25 to develop the next-generation Risk Management Framework (RMF) for information systems, organizations, and individuals. There are seven major objectives for this update: Provide closer linkage and communication between the risk… Continue Reading

New on LLRX – Pete Recommends – weekly highlights on cyber security issues – May 6 2018

Via LLRX – Pete Recommends – weekly highlights on cyber security issues – May 6 2018: Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide… Continue Reading

Encryption Policy And Its International Impacts: A Framework For Understanding Extraterritorial Ripple Effects

Encryption Policy And Its International Impacts: A Framework For Understanding Extraterritorial Ripple Effects by Ryan Budish, Herbert Burkert. Urs Gasser. March 2, 2018. “This paper explores the potential international ripple effects that can occur following changes to domestic encryption policies. Whether these changes take the form of a single coherent national policy or a collection… Continue Reading

Government Leads Major Industries In Email Security

NextGov: “The federal government is now using anti-phishing security on its emails at a higher rate than any major industry sector, according to a report released Thursday. The study from the email security firm ValiMail comes roughly six months after the Homeland Security Department mandated the email security tool called DMARC for all federal agencies.… Continue Reading

New on LLRX – Pete Recommends – weekly highlights on cyber security issues – April 23 2018

Via LLRX – Pete Recommends – weekly highlights on cyber security issues – April 23 2018 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and… Continue Reading