Category «Email Security»

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Cybersecurity scholar Scott Shackelford discusses how the FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing attacks on corporate networks running Microsoft Exchange software, and it’s an unprecedented intrusion that’s raising legal questions about just how far the government can go.

Subjects: Communications Law, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Legal Ethics, Legal Research, Legal Technology, Privacy

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

Pete Recommends Weekly highlights on cyber security issues, February 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.

Subjects: AI, Cybercrime, Cybersecurity, Data Mining, Economy, Education, Email Security, Financial System, Government Resources, Legal Research, Privacy, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, January 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: You can actually make that old laptop last longer; Law Enforcement and Technology: Using Social Media; Google Drive accounted for the most malware downloads from cloud storage sites in 2021; and The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts.

Subjects: Big Data, Competitive Intelligence, CRS Reports, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, December 26, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: These 6 tips will help you spot misinformation online; Synthetic identity fraud: What is it, and why is it harmful?; Trafficking and Money Laundering: Strategies Used by Criminal Groups and Terrorists and Federal Efforts to Combat Them; Cyber insurance trends; and Verizon wants your browsing history so bad, it created a new program and opted you in.

Subjects: Big Data, Business Research, Cybercrime, Cybersecurity, Data Mining, Economy, Email Security, Financial System, Healthcare, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 4, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: You Should Opt-Out of Verizon’s Data-Collection Scheme Right Now; Crowd-Sourced Suspicion Apps Are Out of Control; Who owns our health data — and why we should care; and the White House Readies Plan to Boost Cybersecurity of Water Supply.

Subjects: Courts & Technology, Cybercrime, Cybersecurity, Email Security, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, November 28, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: An introduction to U.S. data compliance laws; Companies ditching VPNs for zero trust architectures to secure hybrid workplaces; Research finds US adults have context-specific views on biometric technology use; Apple iOS privacy settings to change now; and Mozilla has released a new platform for privacy-focused email communications.

Subjects: Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Commerce, Economy, Email Security, Healthcare, Information Architecture, Information Management, Privacy, Securities Law, Shopping, Social Media, Technology Trends

Cybercrime and Digital Transformation

Cybercrime is on the rise all around the world. As more companies adopt technology such as artificial intelligence (AI), big data, and cloud computing, they become more vulnerable to hackers who want to gain access to the valuable information stored on their systems. It is estimated that cybercrime costs companies over £3.1 billion in 2020 alone on a global level. Imran Zaman, an expert on Digital Disruption with Fortune 500 companies, advises regardless of whether you are a large corporation or a small business, cybercrime is something everyone needs to be concerned about in the Age of Digital Transformation.

Subjects: AI, Big Data, Blockchain, Computer Security, Cybercrime, Cybersecurity, Email, Email Security, Firewalls, Privacy, Software, Spyware