Category «Computer Security»

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Cybersecurity scholar Scott Shackelford discusses how the FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing attacks on corporate networks running Microsoft Exchange software, and it’s an unprecedented intrusion that’s raising legal questions about just how far the government can go.

Subjects: Communications Law, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Legal Ethics, Legal Research, Legal Technology, Privacy

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Cybercrime and Digital Transformation

Cybercrime is on the rise all around the world. As more companies adopt technology such as artificial intelligence (AI), big data, and cloud computing, they become more vulnerable to hackers who want to gain access to the valuable information stored on their systems. It is estimated that cybercrime costs companies over £3.1 billion in 2020 alone on a global level. Imran Zaman, an expert on Digital Disruption with Fortune 500 companies, advises regardless of whether you are a large corporation or a small business, cybercrime is something everyone needs to be concerned about in the Age of Digital Transformation.

Subjects: AI, Big Data, Blockchain, Computer Security, Cybercrime, Cybersecurity, Email, Email Security, Firewalls, Privacy, Software, Spyware

Pete Recommends – Weekly highlights on cyber security issues, September 18, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Apple’s Plan to Scan Your Phone Raises the Stakes on a Key Question: Can You Trust Big Tech?; ‘Breach of trust’: Police using QR check-in data to solve crimes; Agencies may want to establish a national strategy for contact-tracing apps; and Americans have little trust in online security: AP-NORC poll.

Subjects: Big Data, Blockchain, Computer Security, Cybercrime, Cybersecurity, Data Mining, Gadgets/Gizmos, Healthcare, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, July 4, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: CISA Begins Cataloging Bad Practices that Increase Cyber Risk; Google Is Adding Support for Digital Covid-19 Vax Cards into Android; How a Burner Identity Protects Your Inbox, Phone, and Cards; and Scientist Finds Early Coronavirus Sequences That Had Been Mysteriously Deleted.

Subjects: AI, Big Data, Computer Security, Congress, Courts & Technology, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Legal Research, Legislative, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, June 19, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Senate bill boosts penalties for cyber criminals; Anti-Vaxxers Review-Bomb Bars With Vaccine Requirements; Why employees need counterespionage training; and ‘An uprising’; Youth activists bring digital rights to forefront.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Healthcare, Social Media

Pete Recommends – Weekly highlights on cyber security issues, May 23, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: US to ramp up tracking of domestic extremism on social media; Protecting agency assets begins with identity-centric security; Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness; and Cyber Attacks – A Rising Threat (Infographic).

Subjects: AI, Computer Security, Cybercrime, Cybersecurity, Data Mining, Energy, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, May 8, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Your Old Phone Number Could Get You Hacked, Researchers Say; Ransomware attack leads to shutdown of major U.S. pipeline system; Google Plans to Automatically Enroll Users In Two Factor Authentication (2FA);

Subjects: Computer Security, Cybercrime, Cybersecurity, Government Resources, Healthcare, Legal Research, Legislative, Privacy, Travel

Pete Recommends – Weekly highlights on cyber security issues, March 6, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: You Can’t Launder Bitcoins!; You got a vaccine. Walgreens got your data; NSA Pushes Zero Trust Principles to Help Prevent Sophisticated Hacks; and Accidental Wiretaps: The Implications of False Positives By Always-Listening Devices For Privacy Law & Policy.

Subjects: Business Research, Computer Security, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Privacy, Social Media