Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users. Messages, photos and personal information are easily shared with groups of friends and co-workers, or in…
Articles Posted in Cybersecurity
News of Note for the Internet-Minded – 1/31/18 – Bots, ’Bots and More Bots
Bots get purged, bots hijack the IoT, bots come to your emotional rescue and more! (There is some non-bot news, as well.) Burger King goes political (and viral) with a video weighing in on the debate over Net Neutrality. (Aaron Mak, Slate) Is Twitter in the midst of a bot…
Taking It Personally: One Lawsuit Tries to Hold Individuals Accountable for the Equifax Data Breach
As we discussed recently, the Equifax data breach has inevitably brought a great deal of scrutiny and legal action against the credit reporting agency. Amidst the numerous brewing class actions and other reactions from government agencies and state AGs, it’s worth pointing out another front on which the company—and more…
When Ripples Become Waves: The Equifax Cybersecurity Incident
Since September 7, 2017, Equifax, one of three credit rating agencies in the United States, has been dealing with the fallout from one of the largest (known) data breaches of personal information, putting 143 million Americans at risk from fraud and identity theft (roughly 44% of the U.S. population). What…
The Doxing Dilemma: A Popular Tactic of Social Activists and Cyber Bullies Alike Remains Mostly Legal
After counter-protests ended in tragedy, a small group of social media users took to Twitter to expose the identities of the white supremacists and neo-Nazis rallying in Charlottesville, Va. Since last Sunday, the @YesYoureRacist account has been calling on Twitter users to identify participants in the rally. Twitter users identified…
Executive Order 13800 – Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
President Donald J. Trump signed Executive Order 13800 titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” on May 11, 2017, his thirty-fifth executive order since taking office. Before evaluating President Trump’s cybersecurity executive order, it is worth taking a step back to look at what Candidate Trump said…
Don’t Rock the Vote: Helping State and Local Governments Fend Off Cyber Attacks
Voting in local, state and national elections could be viewed as a rudimentary form of social media, by which voters share their views and preferences via selection of a candidate or party platform. The distance between this “old school” social media and its multi-headed modern form has shrunk thanks to…
“Life Is Short. Settle with the FTC” – The Cost of Ashley Madison’s 2015 Data Breach
On December 14, 2016, operators of online extramarital dating and social networking website AshleyMadison.com came to an agreement with the Federal Trade Commission, and several States, to settle FTC and related state charges that the website deceived consumers and failed to protect 36 million users’ account and profile information. As…
FriendFinder Data Breach Exposes 400 million+ Accounts
FriendFinder Networks is a company in the adult entertainment, social networking, and online dating space. Several databases from FriendFinder Networks web sites with more than 412 million accounts, including usernames, e-mails, and passwords, have been breached and leaked. November reports of this data breach on The Verge, LeakedSource and TechCrunch,…
The FTC Offers Businesses Tips on How to Respond to a Data Breach
It seems like managing data breaches has become a part of doing business these days. From the October denial of service attack on Dyn (a company that provides core internet services to companies like Twitter, Spotify and Netflix) to the recent hacks of the Clinton campaign’s emails, data breaches are…