Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

LLRX May 2024 Issue – Articles and Columns

Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments –  Jawad Ramal explains how using cryptocurrencies to facilitate ransom payments offers complex challenges due to their high transaction costs and regulatory ambiguities that complicate compliance efforts. Dissecting The Processes of Law Firm Strategic Planning – Patrick J. McKenna and Michael B.… Continue Reading

Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments

Via May 2024 issue of LLRX – Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments: The year 2023 witnessed an unprecedented escalation in ransomware attacks, affecting users from homeowners to critical infrastructure like healthcare, education, and government. With over 5,200 reported incidents—a 74% increase from the previous year—ransomware has not… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, May 31, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, May 31, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

How to find and remove spyware from your phone

ZDNET: “iPhone and Android users alike are facing more sophisticated surveillance threats than ever before, and some may be close to home. Suspect you’re being tracked? Here’s what to do.  Spyware doesn’t just impact today’s PCs, it can end up on your mobile devices, too. Spyware designed for smartphones can disguise itself as a fake… Continue Reading

Huge Google Search document leak reveals inner workings of ranking algorithm

Search Engine Land: “A trove of leaked Google documents has given us an unprecedented look inside Google Search and revealed some of the most important elements Google uses to rank content. What happened. Thousands of documents, which appear to come from Google’s internal Content API Warehouse, were released March 13 on Github by an automated… Continue Reading

Hackers Claim To Have Breached Ticketmaster Stealing Personal Data of 560M Users

HackRead: “ShinyHunters hacking group has claimed to have breached Ticketmaster, stealing the personal data of 560 million users. The 1.3 TB of stolen data also includes payment details. Learn more about this major cybersecurity incident and its implications. The notorious hacker group ShinyHunters has claimed to have breached the security of Ticketmaster-Live Nation, compromising the… Continue Reading

Google won’t comment on a potentially massive leak of its search algorithm documentation

The Verge: “Google’s search algorithm is perhaps the most consequential system on the internet, dictating what sites live and die and what content on the web looks like. But how exactly Google ranks websites has long been a mystery, pieced together by journalists, researchers, and people working in search engine optimization. Now, an explosive leak… Continue Reading

Hacked data reveals which US gun sellers are behind Mexican cartel violence

USA TODAY exclusive: “A massive leak of Mexican military intelligence has exposed for the first time in two decades U.S. gun shops and smugglers tied to 78,000 firearms recovered south of the border – and which types of guns are being trafficked. The nuggets of information are among roughly 10 million records hacked by an… Continue Reading

Giving Windows total recall of everything a user does is a privacy minefield

The Register: “Microsoft’s Windows Recall feature is attracting controversy before even venturing out of preview. Like so many of Microsoft’s AI-infused products, Windows Recall will remain in preview while Microsoft refines it based on user feedback – or simply gives up and pretends it never happened. The principle is simple. As noted earlier, Windows takes… Continue Reading

Google – Introducing the Frontier Safety Framework

The Framework – The first version of the Framework announced today builds on our research on evaluating critical capabilities in frontier models, and follows the emerging approach of Responsible Capability Scaling. The Framework has three key components: Identifying capabilities a model may have with potential for severe harm. To do this, we research the paths… Continue Reading