Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

What is masked email?

PC World: “Online security used to be simple. All you needed was a good password, and in the early days, you didn’t need a ton of numbers, letters, and special characters to achieve that goal. No need for antivirus software to verify you were logging into legitimate sites, either. Privacy also wasn’t quite as fragile as it is today. Your email wasn’t constantly being lost to yet another data breach. But as hackers and criminals get more sophisticated, so have recommendations for best security practices. Currently experts recommend the use of unique, random passwords (and the more characters, the better), plus two-factor authentication as a strong baseline. But you can go further—and companies on the frontlines of cybersecurity are trying to make that easier. One such step is called masked email. (You may also hear it referred to as email masks or email masking.) It formalizes a long-available feature known as email aliases as a privacy and security measure. A randomized email address is created to hide (aka mask) your true email address for an online account. Any correspondence sent to the masked email address gets forwarded to your actual inbox. The sender doesn’t know about the email’s final destination. They’ll only find out if you accidentally reply to a message as your main account. The benefits are twofold. You get better privacy, because the more you use different masked email addresses (ideally, one per online account), the more you limit the potential fallout of the information leaking in a data breach. That email address won’t work on other websites as a login ID or for a password reset. Nor can someone take over the address like with an actual account. It’s just a forwarding address, and a disposable one at that…”

Pete Recommends – Weekly highlights on cyber security issues, June 8, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 8, 2024: Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

This Hacker Tool Extracts All the Data Collected by Windows’ New Recall AI

Wired [unpaywalled]: “When Microsoft CEO Satya Nadella revealed the new Windows AI tool that can answer questions about your web browsing and laptop use, he said one of the “magical” things about it was that the data doesn’t leave your laptop; the Windows Recall system takes screenshots of your activity every five seconds and saves… Continue Reading

Windows AI feature that screenshots everything labeled a security ‘disaster’

The Verge: “Microsoft is about to launch a new AI-powered Recall feature that screenshots everything you do on your PC. Recall is part of the new Copilot Plus PCs that are debuting on June 18th, but experts who have tested the feature are already warning that Recall could be a “disaster” for cybersecurity. Recall is… Continue Reading

Treasury Releases First Ever Non-fungible Token Illicit Finance Risk Assessment

“Today, the U.S. Department of the Treasury published a 2024 Non-fungible Token (NFT) Illicit Finance Risk Assessment. The risk assessment explores how vulnerabilities associated with NFTs and NFT platforms may be exploited by illicit actors for money laundering, terrorist financing, and proliferation financing. The assessment finds that NFTs are highly susceptible to use in fraud… Continue Reading

LLRX May 2024 Issue – Articles and Columns

Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments –  Jawad Ramal explains how using cryptocurrencies to facilitate ransom payments offers complex challenges due to their high transaction costs and regulatory ambiguities that complicate compliance efforts. Dissecting The Processes of Law Firm Strategic Planning – Patrick J. McKenna and Michael B.… Continue Reading

Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments

Via May 2024 issue of LLRX – Ransomware in the Digital Age: Multidisciplinary Legal Strategies for Minimizing Cryptocurrency Ransom Payments: The year 2023 witnessed an unprecedented escalation in ransomware attacks, affecting users from homeowners to critical infrastructure like healthcare, education, and government. With over 5,200 reported incidents—a 74% increase from the previous year—ransomware has not… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, May 31, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, May 31, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

How to find and remove spyware from your phone

ZDNET: “iPhone and Android users alike are facing more sophisticated surveillance threats than ever before, and some may be close to home. Suspect you’re being tracked? Here’s what to do.  Spyware doesn’t just impact today’s PCs, it can end up on your mobile devices, too. Spyware designed for smartphones can disguise itself as a fake… Continue Reading

Huge Google Search document leak reveals inner workings of ranking algorithm

Search Engine Land: “A trove of leaked Google documents has given us an unprecedented look inside Google Search and revealed some of the most important elements Google uses to rank content. What happened. Thousands of documents, which appear to come from Google’s internal Content API Warehouse, were released March 13 on Github by an automated… Continue Reading

Hackers Claim To Have Breached Ticketmaster Stealing Personal Data of 560M Users

HackRead: “ShinyHunters hacking group has claimed to have breached Ticketmaster, stealing the personal data of 560 million users. The 1.3 TB of stolen data also includes payment details. Learn more about this major cybersecurity incident and its implications. The notorious hacker group ShinyHunters has claimed to have breached the security of Ticketmaster-Live Nation, compromising the… Continue Reading

Google won’t comment on a potentially massive leak of its search algorithm documentation

The Verge: “Google’s search algorithm is perhaps the most consequential system on the internet, dictating what sites live and die and what content on the web looks like. But how exactly Google ranks websites has long been a mystery, pieced together by journalists, researchers, and people working in search engine optimization. Now, an explosive leak… Continue Reading