Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

New on LLRX – New ABA Email Guidelines: How Can Lawyers Comply?

Via LLRX.comNew ABA Email Guidelines: How Can Lawyers Comply? Nicole Black advises lawyers on a range of applications and technology from which they can choose to establish standardized secure, encrypted email communications for all but the most extreme case-related interaction.

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRS – Cybersecurity: Legislation, Hearings, and Executive Branch Documents, Rita Tehan, Information Research Specialist. May 12, 2017. [FAS] “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic… Continue Reading

24/7 Wall St – 15 Most Famous Cyberattacks of All Time

“The WannaCry ransomware attack has affected more than 200,000 computers in over 150 nations. The attack, which targets the Microsoft Windows operating system, has been described as one of the largest cyberattacks of all time. The malware encrypts files, demanding users of affected computers pay a ransom of $300 in bitcoin. The software behind WannaCry… Continue Reading

FTC updates consumers on ransomware

You’ve probably heard about the ransomware attack affecting organizations’ computer systems around the world. It seems to affect server software on organizations’ networked computers. But ransomware can attack anybody’s computer, so now is a good time to update your own operating system and other software. And then keep them up-to-date. The ransomware in the news… Continue Reading

State of the Phish 2017

This report is compiled data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12 month period, as well as an extensive survey of our database of infosec professionals. The report also includes survey data from thousands of end users in the UK and US that measured their… Continue Reading

Vendors approve of NIST password draft security recommendations – emojis welcome

Via CSO – “Standards group recommends removing periodic password change requirements – A recently released draft of the National Institute of Standards and Technology’s (NIST’s) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies… Continue Reading

Gallup – Email Outside of Working Hours Not a Burden to US Workers

“Checking email outside of normal business hours does not appear to be a burden for U.S. workers. About six in 10 workers say they check email outside of normal business hours. Of these, few claim the amount of emails they have to respond to during off hours is unreasonable, or that it negatively affects their… Continue Reading

Secure computing for journalists

Matthew Green: “…Classical (desktop and laptop) operating systems were designed primarily to support application developers. This means they offer a lot of power to your applications. An application like Microsoft Word can typically read and write all the files available to your account. If Word becomes compromised, this is usually enough to pwn you in practice. And in many cases,… Continue Reading

Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials “Go Dark”

Stewart, Daxton, Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials “Go Dark” (April 13, 2017). Available at SSRN: https://ssrn.com/abstract= “In the early weeks of the new presidential administration, White House staffers were communicating among themselves and leaking to journalists using apps such as Signal and Confide, which… Continue Reading

States With the Most (and Least) Identity Theft

“The risk of identity theft in the United States continues to rise. The incidence of such crimes rose consistently over the  last decade, from 246,214 in 2006 to 399,225 last year. The rate of identity theft varies considerably between states. Using the Federal Trade Commission’s 2017 Consumer Sentinel Network Data Book, 24/7 Wall St. reviewed the… Continue Reading

Paper – Encryption Workarounds

Kerr, Orin S. and Schneier, Bruce, Encryption Workarounds (March 20, 2017). Available at SSRN: https://ssrn.com/abstract=2938033 or http://dx.doi.org/10.2139/ssrn.2938033 “The widespread use of encryption has triggered a new step in many criminal investigations: the encryption workaround. We define an encryption workaround as any lawful government effort to reveal an unencrypted version of a target’s data that has been concealed by… Continue Reading

Implementation of IT Reform Law and Related Initiatives Can Help Improve Acquisitions

Information Technology: Implementation of IT Reform Law and Related Initiatives Can Help Improve Acquisitions, GAO-17-494T: Published: Mar 28, 2017. Publicly Released: Mar 28, 2017. “The Federal Information Technology Acquisition Reform Act (FITARA) was enacted in December 2014 to improve federal information technology (IT) acquisitions and can help federal agencies reduce duplication and achieve cost savings.… Continue Reading