Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Internet

Reminder – New articles on LLRX

Articles for March – April 2017 on LLRX.com – https://www.llrx.com The Challenges of a Workplace Bring Your Own Device Policy The Disconnect Between Knowledge Management and Counsel Google Books is not Alexandria redux Oh Lord, please don’t let Google Book Search be misunderstood Living in the Cloud … NOT for the Technically Challenged We Need… Continue Reading

Defense Against the Dark Arts of Copyright Trolling

Sag, Matthew and Haskell, Jake, Defense Against the Dark Arts of Copyright Trolling (March 28, 2017). Iowa Law Review, Forthcoming. Available at SSRN: https://ssrn.com/abstract=2933200 “In this Article, we offer both a legal and a pragmatic framework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half… Continue Reading

24/7 Wall St – 15 Most Famous Cyberattacks of All Time

“The WannaCry ransomware attack has affected more than 200,000 computers in over 150 nations. The attack, which targets the Microsoft Windows operating system, has been described as one of the largest cyberattacks of all time. The malware encrypts files, demanding users of affected computers pay a ransom of $300 in bitcoin. The software behind WannaCry… Continue Reading

GAO – Internet of Things: Status and implications of an increasingly connected world

Technology Assessment: Internet of Things: Status and implications of an increasingly connected world, GAO-17-75: Published: May 15, 2017. Publicly Released: May 15, 2017. “The Internet of Things (IoT) refers to the technologies and devices that sense information and communicate it to the Internet or other networks and, in some cases, act on that information. These… Continue Reading

FTC updates consumers on ransomware

You’ve probably heard about the ransomware attack affecting organizations’ computer systems around the world. It seems to affect server software on organizations’ networked computers. But ransomware can attack anybody’s computer, so now is a good time to update your own operating system and other software. And then keep them up-to-date. The ransomware in the news… Continue Reading

NYT – With New Digital Tools, Even Nonexperts Can Wage Cyberattacks

The New York Times: “The ransomware tactic behind a global cyberattack on Friday was nothing new. But new digital tools mean that hackers “don’t even need to have any skills to do this anymore.” Attack May Worsen Monday, It Is Feared – “The effects of Friday’s attack could be magnified as workers return to their… Continue Reading

State of the Phish 2017

This report is compiled data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12 month period, as well as an extensive survey of our database of infosec professionals. The report also includes survey data from thousands of end users in the UK and US that measured their… Continue Reading

Paper – Happiness is Flextime

Okulicz-Kozaryn, Adam and Golden, Lonnie, Happiness is Flextime (March 2, 2017). Applied Research in Quality of Life, Forthcoming. Available at SSRN: https://ssrn.com/abstract=2965318 “We study how working schedule flexibility (flextime) affects happiness. We use a US General Social Survey (GSS) pooled dataset containing the Quality of Worklife and Work Orientations modules for 1998, 2002, 2006, 2010,… Continue Reading

Trump signs new cybersecurity executive order

Executive Order on May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure “Policy.  The executive branch operates its information technology (IT) on behalf of the American people.  Its IT and data should be secured responsibly using all United States Government capabilities.  The President will hold heads of executive… Continue Reading

Vendors approve of NIST password draft security recommendations – emojis welcome

Via CSO – “Standards group recommends removing periodic password change requirements – A recently released draft of the National Institute of Standards and Technology’s (NIST’s) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies… Continue Reading

McKinsey – What’s new with the Internet of Things?

“..Although some analysts are excited about the IoT’s potential, others have argued that it is overhyped. We take a more balanced view, based on our extensive research as well as our direct work with IoT application developers and their customers. Like the optimists, we believe that the IoT could have a significant, and possibly revolutionary,… Continue Reading

Creating more accessibility to legislative data focus of think tank Congressional testimony

“The Center for Data Innovation has submitted written testimony to the House Committee on Appropriations Subcommittee on Legislative Branch regarding ways to improve the accessibility of legislative data. The Center recommends that Congress begin publishing legislative data via application programming interface (API) in addition to publishing this data in bulk format. As the Library of Congress… Continue Reading