Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

How Russian hackers infiltrated the US government for months without being spotted

MIT Technology Review – And why it could take months more to discover how many other governments and companies have been breached – “To carry out the breach, the hackers first broke into the systems of SolarWinds, an American software company. There, they inserted a back door into Orion, one of the company’s products, which… Continue Reading

The SolarWinds cyberattack: The hack, the victims, and what we know

Bleeping Computer: “Since the SolarWinds supply chain attack was disclosed last Sunday, there has been a whirlwind of news, technical details, and analysis released about the hack. Because the amount of information that was released in such a short time is definitely overwhelming, we have published this as a roundup of this week’s SolarWinds news.… Continue Reading

All the privacy apps you should have downloaded in 2020

Mashable – “In case there were any lingering doubts, 2020 swooped in hard to remind us all that life is now mediated through devices. The ongoing pandemic, the murder of George Floyd and resultant Black Lives Matters protests, and the still-in-progress attempt to overturn the will of the American people: We’ve navigated these public health… Continue Reading

SolarWinds Attack—No Easy Fix

CRS Insight, December 15, 2020. SolarWinds Attack—No Easy Fix: “On December 13, 2020, the cybersecurity firm FireEye published research that a malicious actor was exploiting a supply chain vulnerability in SolarWinds products to hack into government and private sector information technology (IT) networks. SolarWinds confirmed the security incident.The Cybersecurity and Infrastructure Security Agency (CISA) issued… Continue Reading

U.S. Schools Are Buying Phone-Hacking Tech That the FBI Uses to Investigate Terrorists

Gizmodo: “In May 2016, a student enrolled in a high-school in Shelbyville, Texas, consented to having his phone searched by one of the district’s school resource officers. Looking for evidence of a romantic relationship between the student and a teacher, the officer plugged the phone into a Cellebrite UFED to recover deleted messages from the… Continue Reading

Gmail Will Now Let You Edit Office Documents Directly From Email Attachments

The Verge: “Google is making it even easier to work with Microsoft Office files, with the company now allowing users to directly edit attached Office files in Gmail, much like it already allows with Google Docs or Sheets files. Google Workspace (the recently rebranded G Suite, which encompasses Google Docs, Sheets, Slides, Meet, and Calendar)… Continue Reading

Never click on this kind of Zoom invite. You’ll thank us forever

Fast Company: “…According to the IT security company Check Point Software Technologies, 16,004 Zoom-related domains were registered between late April and today. Con artists are impersonating Microsoft Teams and Google Meet, too. “For people who are in this business of doing phishing schemes, it becomes the scam du jour. What’s popular now? How can I… Continue Reading

12 useful Gmail settings you didn’t know you needed

FastCompany – “…Some of Gmail’s settings are available only on the Gmail website. Others are only in the mobile apps—or sometimes just in the mobile app on one specific platform. And other Gmail settings, paradoxically, can’t even be found within Gmail at all (yes, really!). It practically requires a recurring spelunking expedition to make sure… Continue Reading

The Danger Of Deliberate Destruction Of Documents By President Donald Trump

WAMU Podcast – 1A – “President Donald Trump is known to be keen on controlling the flow of information surrounding himself and his businesses. He reportedly tears up notes or documents from White House meetings. He employs nondisclosure agreements in both his professional and personal life. And White House aides have been known to use apps… Continue Reading

Turn Off Gmail’s ‘Smart’ Features to Avoid Tracking

Lifehacker: “Google collects data on everything you do while using its products and services. Sometimes this data is sold to advertisers; sometimes it’s used to make it easier to use Google’s products. For example, Google uses data from Gmail, Chat, and Meet to make the entire Google user experience more convenient, like how it’ll learn… Continue Reading

How Do Presidential Transitions Normally Work?

LifeHacker: “The White House has seen a peaceful transitions of power between outgoing and incoming presidential administrations throughout history, regardless of any volatility gripping the nation. Passing the baton of executive power to a new presidential administration has been a hallmark of this country’s democracy; the White House is where presidential tenants temporarily reside, not… Continue Reading

Biden may have trouble unearthing Trump’s national security secrets

Politico: “From tearing up documents and hiding transcripts of calls with foreign leaders to using encrypted messaging apps and personal email accounts for government business, the Trump White House’s skirting of records preservation rules could limit the incoming Biden administration’s visibility into highly sensitive foreign policy and national security secrets….The Presidential Records Act, which requires… Continue Reading