Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Pwned Passwords

“Pwned Passwords are 551,509,767 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they’re at much greater risk of being used to take over other accounts. They’re searchable online below as well as being downloadable for use in other online systems. Read more about how HIBP protects… Continue Reading

National Archives Releases New Batch of Kavanaugh Records

Via EPIC – “In response to EPIC’s Freedom of Information Act lawsuit, the National Archives has just released thousands of records about Justice Kavanaugh work in the White House Counsel’s office after 9-11. The records include e-mails from 2002-2003, briefings, meeting memos, and correspondence, and office files about anti-terrorism legislation and access to presidential records.… Continue Reading

Internet Privacy – Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility

Internet Privacy: Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility GAO-19-52: Published: Jan 15, 2019. Publicly Released: Feb 13, 2019. “In April 2018, Facebook said that up to 87 million users’ personal data may have been improperly disclosed. This was one of many recent Internet privacy incidents. We found that there is no… Continue Reading

Study – Password Managers: Under the Hood of Secrets Management

Independent Security Evaluators: “Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file. In this paper we propose security guarantees password managers should offer and examine… Continue Reading

Consumer privacy concerns as Amazon buys Eero net routers

Consumer Reports: “Amazon’s agreement to buy the wireless router manufacturer Eero could make it easier for homeowners to manage a wide array of wireless devices, like smart thermostats and video doorbells, according to analysts and Consumer Reports’ in-house experts. But some of them expressed concern over how often high-profile startups get bought by the tech… Continue Reading

Want to Really Block the Tech Giants? Here’s How

Gizmodo: “Amazon, Facebook, Google, Microsoft, and Apple move more money than many medium-sized nations. Their extraordinary profits are won through extraordinary reach—this is not a secret. That a few companies are afforded unprecedented and shamefully unregulated access into our homes is now an unremarkable fact of living with tiny computers everywhere. When Gizmodo reporter Kashmir… Continue Reading

Study – Open-Plan Offices Are Now the Dumbest Management Fad of All Time

Inc.com – A new study from Harvard reveals that open-plan offices decrease rather than increase face-to-face collaboration: “Over the decades, a lot of really stupid management fads have come and gone, including: Six Sigma, where employees wear different colored belts (like in karate) to show they’ve been trained in the methodology. Stack Ranking, where employees… Continue Reading

Scammer groups are exploiting Gmail ‘dot accounts’ for online fraud

ZDNet: “Cyber-criminal groups are exploiting a Gmail feature to file for fraudulent unemployment benefits, file fake tax returns, and bypass trial periods for online services. The trick is an old one and has been used in the past. It refers to Gmail’s “dot accounts,” a feature of Gmail addresses that ignores dot characters inside Gmail… Continue Reading

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Wired: “When hackers breached companies like Dropbox and LinkedIn in recent years—stealing 71 million and 117 million passwords, respectively—they at least had the decency to exploit those stolen credentials in secret, or sell them for thousands of dollars on the dark web. Now, it seems, someone has cobbled together those breached databases and many more… Continue Reading

Seven Out of Every Ten Open Vulnerabilities Belong to Just Three Vendors

Computer Business Review: “Seven out of every ten open vulnerabilities observed by customers belongs to just three vendors, Oracle, Microsoft and Adobe. These are the findings of cyber security enterprise Kenna Security in their new report Prioritization to Prediction, which explores how enterprises are dealing with open vulnerabilities. In their report Kenna found that Oracle… Continue Reading

Google Cybersecurity Quiz Could Help Keep Your Email From Becoming Phishing Food

Fortune: “Has one of your accounts been hacked lately? Your email? Your Instagram? If so, you may have been the victim—and possibly an unwitting collaborator—in a phishing scam. Phishing is the most common form of cyber attack, and the goal of phishing emails is simple: to obtain your password and take over your account. Often,… Continue Reading