In the wake of the Equifax Data breach and the litany of issues regarding potential insider stock sales, insecure database applications, and finger-pointing between Apache and Equifax, there are some valuable lessons we should all take heed of. Trust no one, and no entity: I hate to sound overly dire but even the old “trust, […]
Equifax Data Breach Impacts 143M Americans Lee Mathews reports in a Forbes article that Equifax discovered a breach on July 29th that could impact nearly half of the US population. The article goes on to say that personally identifiable information (“PII”) such as social security numbers, birthdates, names, addresses, and credit card numbers comprise approximately […]
A recent article in LegalTech news highlights the difficulty in applying the “plain-view” doctrine within the digital realm. The article discusses web service provider Dream Host’s issues within the scope of search warrants related to data. While the D.C. Circuit Court ruled that DreamHost had to comply with the search warrant, the arguments that DreamHost […]
Symantec’s Internet Security Threat Report: Volume 22 [pdf-embedder url=”http://blog.cybersecuritylaw.us/wp-content/uploads/securepdfs/2017/08/ISTR22_Main-FINAL-APR24.pdf”] Some of the highlights from the Symantec Report include: The use of zero-day exploits and sophisticated malware is decreasing as malevolent actors are now focusing on traditional spear-phishing attacks and leveraging existing tools (e.g. built-in OS commands/utilities) Nation-States and targeted disruptive attacks: Symantec points to the […]
DEFCON Convention: Voting Machine Hacks (Business Insider) According to an article by Sonam Sheth hackers at DEFCON were able to breach multiple voting machines within only minutes. Sheth’s article states that hackers were able to infiltrate every single one of the thirty voting machines within just moments of having physical access and that even rudimentary […]