Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

Cyber Resilience – The 6 Biggest Threats Right Now for Legal

British Legal Technology Forum 2020: “Cyber resilience – the ability to withstand both attacks on your computer network and attempts to steal valuable client data – is a business priority which an increasing number of legal firms in London and UK depend on us for year after year. The threat constantly evolves and grows –… Continue Reading

DC Court of Appeals rules OPM responsible for hacking of 22 million personnel records

Washington Post: “A federal appeals court has revived the chances of monetary awards being paid to federal employees and others whose personal information was exposed in hacks of two government databases that were revealed in 2015. The ruling criticized the Office of Personnel Management for failing to safeguard that information despite having been the target… Continue Reading

This is how Google’s Chrome lets the cookies track you, imagined in real life

A Washington Post video story – This is how Google’s Chrome lets the cookies track you, imagined in real life  – “Chrome has become like spyware for the company, allowing more tracker cookies than any other browser. The Post’s Geoffrey A. Fowler imagines how that might feel in real life, and gives advice for more… Continue Reading

Protect your online identity now: Fight hackers with these 5 security safeguards

ZDNET – Having your identity stolen can be a nightmare, and cleaning up the mess can take months. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life. “…You don’t have to be the next victim. With a little effort (and, yes, a little expense),… Continue Reading

Pennsylvania identity theft case trends

PA Courts: “Over the last five years, Pennsylvania has seen a gradual decrease in identity theft cases. Identity theft is defined as the fraudulent use of another person’s identifying information (social security number, bank account, birth certificate etc.). The infographic below highlights key data including defendant demographics, identity theft case counts and outcomes as well… Continue Reading

You’re Not Alone When You’re on Google

The New York Times – We know that. But the “privacy paradox” means we still act like we are. “…To fully apprehend our vulnerabilities as digital creatures would require far too much time and energy. More than that: It would require an entirely new set of instincts, a radically different cognitive framework from the one… Continue Reading

Your most sensitive data is likely exposed online. These people try to find it.

c/net: “Justin Paine sits in a pub in Oakland, California, searching the internet for your most sensitive data. It doesn’t take him long to find a promising lead. On his laptop, he opens Shodan, a searchable index of cloud servers and other internet-connected devices. Then he types the keyword “Kibana,” which reveals more than 15,000… Continue Reading

Most hacked passwords revealed in UK cyber survey

The National Cyber Security Centre’s first ‘UK cyber survey’ published alongside global password risk list NCSC’s first ‘UK Cyber Survey’ shows 42% of Brits expect to lose money to online fraud Breach analysis finds 23.2 million victim accounts worldwide used 123456 as password Global password risk list published to disclose passwords already known to hackers… Continue Reading

Range of Consumer Risks Highlights Limitations of Identity Theft Services

Data Breaches: Range of Consumer Risks Highlights Limitations of Identity Theft Services, GAO-19-230: Published: Mar 27, 2019. Publicly Released: Mar 27, 2019. “Data breaches have exposed the personal data of hundreds of millions of people and put them at risk for identity theft. We looked at what you can do if you’re a victim of… Continue Reading

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Wired: “When hackers breached companies like Dropbox and LinkedIn in recent years—stealing 71 million and 117 million passwords, respectively—they at least had the decency to exploit those stolen credentials in secret, or sell them for thousands of dollars on the dark web. Now, it seems, someone has cobbled together those breached databases and many more… Continue Reading