Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Google Quiz – Can you spot when you’re being phished?

Fortune: “…Google has a new phishing quiz you can take to test how well you can recognize malicious emails. Released by Jigsaw, a subsidiary of Google parent company Alphabet Inc., the quiz displays several samples of common phishing techniques, such as using an hyperlink with a domain name that was disguised to look like a real web address, but actually leads to a phony site. The quiz trains test-takers in a number of quick, easy ways to be more cyber-secure, such as to hover a link in an email before clicking on it or check an email address against the name displayed as the supposed sender…”

Internet Privacy – Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility

Internet Privacy: Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility GAO-19-52: Published: Jan 15, 2019. Publicly Released: Feb 13, 2019. “In April 2018, Facebook said that up to 87 million users’ personal data may have been improperly disclosed. This was one of many recent Internet privacy incidents. We found that there is no… Continue Reading

Study – Password Managers: Under the Hood of Secrets Management

Independent Security Evaluators: “Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file. In this paper we propose security guarantees password managers should offer and examine… Continue Reading

Consumer privacy concerns as Amazon buys Eero net routers

Consumer Reports: “Amazon’s agreement to buy the wireless router manufacturer Eero could make it easier for homeowners to manage a wide array of wireless devices, like smart thermostats and video doorbells, according to analysts and Consumer Reports’ in-house experts. But some of them expressed concern over how often high-profile startups get bought by the tech… Continue Reading

Want to Really Block the Tech Giants? Here’s How

Gizmodo: “Amazon, Facebook, Google, Microsoft, and Apple move more money than many medium-sized nations. Their extraordinary profits are won through extraordinary reach—this is not a secret. That a few companies are afforded unprecedented and shamefully unregulated access into our homes is now an unremarkable fact of living with tiny computers everywhere. When Gizmodo reporter Kashmir… Continue Reading

Study – Open-Plan Offices Are Now the Dumbest Management Fad of All Time

Inc.com – A new study from Harvard reveals that open-plan offices decrease rather than increase face-to-face collaboration: “Over the decades, a lot of really stupid management fads have come and gone, including: Six Sigma, where employees wear different colored belts (like in karate) to show they’ve been trained in the methodology. Stack Ranking, where employees… Continue Reading

Scammer groups are exploiting Gmail ‘dot accounts’ for online fraud

ZDNet: “Cyber-criminal groups are exploiting a Gmail feature to file for fraudulent unemployment benefits, file fake tax returns, and bypass trial periods for online services. The trick is an old one and has been used in the past. It refers to Gmail’s “dot accounts,” a feature of Gmail addresses that ignores dot characters inside Gmail… Continue Reading

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Wired: “When hackers breached companies like Dropbox and LinkedIn in recent years—stealing 71 million and 117 million passwords, respectively—they at least had the decency to exploit those stolen credentials in secret, or sell them for thousands of dollars on the dark web. Now, it seems, someone has cobbled together those breached databases and many more… Continue Reading

Seven Out of Every Ten Open Vulnerabilities Belong to Just Three Vendors

Computer Business Review: “Seven out of every ten open vulnerabilities observed by customers belongs to just three vendors, Oracle, Microsoft and Adobe. These are the findings of cyber security enterprise Kenna Security in their new report Prioritization to Prediction, which explores how enterprises are dealing with open vulnerabilities. In their report Kenna found that Oracle… Continue Reading

Google Cybersecurity Quiz Could Help Keep Your Email From Becoming Phishing Food

Fortune: “Has one of your accounts been hacked lately? Your email? Your Instagram? If so, you may have been the victim—and possibly an unwitting collaborator—in a phishing scam. Phishing is the most common form of cyber attack, and the goal of phishing emails is simple: to obtain your password and take over your account. Often,… Continue Reading

News outlet’s email security gap

Axios: “An Axios study shows that very few news organizations — around 6% of a broad sample — successfully use a critical technology that guarantees emails they send are authentic. The big picture: We’ve written before about the Department of Homeland Security’s struggle to get federal agencies and the White House to implement DMARC, a… Continue Reading

Best VPN services of 2019: Reviews and buying advice

PCWorld: “Choosing the right virtual private network (VPN) service is no simple task. A VPN should keep your internet usage private and secure, but not every service handles your data in the same way. Just look at the critiques of notable computer security experts and online pundits to understand the challenge. (Want to know more… Continue Reading