Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources. Rita Tehan, Information Research Specialist, September 20, 2013 “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial… Continue Reading

Phishing Activity Trends Report – 1st Qtr 2013

“The APWG Phishing Activity Trends Report [published July 23, 2013] analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website, and by e-mail submissions to [email protected]. APWG also measures the evolution, proliferation , and propagation of crimeware by drawing from the research of our member companies.… Continue Reading

NBC Reports – “How Snowden did it”

Richard Esposito and Matthew Cole, NBC News: “When Edward Snowden stole the crown jewels of the National Security Agency, he didn’t need to use any sophisticated devices or software or go around any computer firewall. All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping… Continue Reading

IRS IG – Desktop and Laptop Software License Management Is Not Being Adequately Performed

Desktop and Laptop Software License Management Is Not Being Adequately Performed, Treasury Inspector General for Tax Administration, June 25, 2013. Reference Number: 2013-20-025. “The IRS is not adequately performing software license management and is not adhering to Federal requirements and recommended industry best practices. The IRS does not have enterprisewide or local policies, procedures, and… Continue Reading

Cory Doctorow: privacy, oversharing and government surveillance

Cory Doctorow: “The European Parliament is currently involved in a wrangle over the new General Data Protection Regulation. At stake are the future rules for online privacy, data mining, big data, governmental spying (by proxy), to name a few. Hundreds of amendments and proposals are on the table, including some that speak of relaxing the… Continue Reading

Commentary – Math Advances Raise the Prospect of an Internet Security Crisis

Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years, by Tom Simonite on August 2, 2013. Technology Review.”Cryptographic schemes protect vast quantities of financial and personal information. The encryption systems used to secure online bank accounts and keep critical communications private could be undone in… Continue Reading

FTC Advises Consumers on Preventing, Identifying, and Dealing With Hacked Email or Social Networking Accounts

“The Federal Trade Commission has new tips to help people deal with email and social networking hacks, whether it’s lessening the chances of a hack in the first place, or recovering from a hack once it happens. Hacked Email, new guidance from the FTC, identifies signs an account may have been hacked such as friends… Continue Reading

CRS – Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources, Rita Tehan, Information Research Specialist. July 18, 2013 “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial… Continue Reading

Developing Online Safety Knowledge in Partnership with Parents and Schools

Parents, Schools and the Digital Divide – Developing Online Safety Knowledge in Partnership with Parents and Schools, Professor Andy Phippen, Professor of Social, Responsibility in IT, Plymouth University. July 2013 “Technology and the online world undoubtedly play a large part in the majority of young people’s lives. It is rare to encounter young people who… Continue Reading

NIST – Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations, Joint Task Force Transformation Initiative, Computer Security Division Information Technology Laboratory – National Institute of Standards and Technology. April 2013 This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational… Continue Reading

Army Releases Cybersecurity Handbook to Public

News release: “The Army published a new handbook this month to provide leaders of all levels with the information and tools needed to address today’s cybersecurity challenges, and to ensure organizations adopt the necessary practices to protect their information and the Army network. ..Currently, all Army commands are developing Information Assurance/Cybersecurity awareness training to address… Continue Reading