• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: Malware

Seventh Circuit Denies Neiman Marcus’ Rehearing of Data Breach Class Action.

29 Tuesday Sep 2015

Posted by Celia C. Elwell, RP in 7th Circuit Court of Appeals, Appellate Law, Computer Forensics, Computer Virus, Cybersecurity, Identity Theft, Malware

≈ Comments Off on Seventh Circuit Denies Neiman Marcus’ Rehearing of Data Breach Class Action.

Tags

Data Breach, Hackers, Hunton and Williams, Identity Theft, Privacy, Privacy & Information Security Law Blog, Seventh Circuit Court of Appeals

Seventh Circuit Denies En Banc Review For Data Breach Class Action, Privacy & Information Security Law Blog posted by Hunton and Williams

https://www.huntonprivacyblog.com/2015/09/29/seventh-circuit-denies-en-banc-review-for-data-breach-class-action/

Plaintiffs, Neiman Marcus cardholders, brought a class action against the store for damages caused by a 2013 data breach. Hackers accessed customers’ credit and debit cards, as well as other personal information. The Northern District of Illinois, Eastern Division, ruled that the individual Plaintiffs and the class action against Neiman Marcus lacked standing under Article III of the Constitution.

Plaintiffs appealed to the United States Court of Appeals for the Seventh Circuit. The link takes you to the Seventh Circuit’s opinion explaining how Plaintiffs prevailed and why it reversed and remanded the case. Neiman Marcus filed for rehearing. The Seventh Circuit followed its usual habit, and denied it.

The Seventh Circuit’s analysis of its reasons ruling that Plaintiffs had met the three requirements for Article III standing is well worth the read. An added bonus is the link to the 2014 edition of The Practitioner’s Handbook for Appeals to the United States Court of Appeals for the Seventh Circuit, -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Wait! Don’t Click On That Link!

16 Tuesday Sep 2014

Posted by Celia C. Elwell, RP in Computer Virus, Cybersecurity, Emails, Legal Technology, Malware, Trojans

≈ Comments Off on Wait! Don’t Click On That Link!

Tags

Email, Ian Paul, Mail Merge, Malware, PC World, Spam

Three Warning Signs That Email Is Malicious, by Ian Paul, PC World

http://tinyurl.com/lsjgxv7

Email spam filtering is far better than it used to be. There was a time when nearly every scam email would land in your inbox. Thankfully that’s not the case anymore—especially if you’re a Gmail user.

But no system is perfect. Every now and then a scam message will manage to slip into your inbox. But how do you know when you’re looking at a scam or not?

Here are three basic tip-offs you can look for to figure out whether you’re looking at an email with dishonest intentions. They’re hardly an exhaustive list, but more often than not one of these tips will save you from getting suckered. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

10 Top Law-Related TED Videos.

20 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Bad Legal Writing, Computer Forensics, Computer Fraud and Abuse Act, Computer Virus, Copyright, Criminal Law, Cybersecurity, Digital Millenium Copyright Act, Discovery, Encryption, Evidence, Finance and Banking Law, Fraud, Google, Government, Identity Theft, Intellectual Property, Law Office Management, Legal Technology, Legal Writing, Legalese, Malware, Management, Patent Law, PC Computers, Plain Language, Presentations, Search Engines, Trial Tips and Techniques, Trojans, Video

≈ Comments Off on 10 Top Law-Related TED Videos.

Tags

Copyright, Crime, Eyewitness, Fashion Industry, Government, Internet, Legal Productivity Blog, Legalese, Patent Troll, Plain Language, TED, Tim Baran

Top 10 Legal TED Talks, by Tim Baran, Legal Productivity Blog

http://www.legalproductivity.com/op-ed/top-10-legal-ted-talks/

Have you heard of TED? It began in 1984 as a conference and now covers a wide range of topics in more than 100 languages.  Think of it as a massive brain trust that shares great ideas and information.

Each of the law-related TED talks listed in this article are worthwhile on their own: (1) four ways to fix a broken legal system; (2) eliminate legalese by using plain English; (3) how to beat a patent troll; (4) how the Internet will change government; (5) laws that choke creativity; (6) copyright law; (7) why eyewitnesses get it wrong; (8) how technology could make crime worse; (9) the Internet and anonymity online; and (10) how great leaders inspire. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Hole In Mobile Security Making Your Phone An Easy Target.

15 Sunday Jun 2014

Posted by Celia C. Elwell, RP in Android Phones, Cell Phones, Cybersecurity, Encryption, Fraud, Identity Theft, iPad, iPhones, Legal Technology, Malware, Tablets

≈ Comments Off on The Hole In Mobile Security Making Your Phone An Easy Target.

Tags

All Tech Considered, Apple, AT&T, Comcast, Dave Porcello, Encryption, Facebook, Google, Hackers, Internet, Mobile Phones, NPR, Pwn Plug, Sean Gallagher, Security, Starbucks, Steve Henn, Twitter, Wi-Fi, Yahoo

Here’s One Big Way Your Mobile Phone Could Be Open To Hackers, by Steve Henn, All Tech Considered, NPR

http://tinyurl.com/l2re8ll

Despite the fact that every major Internet provider has added some kind of encryption to its services over the past year, tracking your online traffic is easier than you think.

And you don’t have to be the target of the hacker or the NSA for your traffic to be intercepted. There is a hole in mobile security that could make tens of millions of Americans vulnerable.

Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even the most unsophisticated hacker capture your traffic and possibly steal your identity. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

27 Tuesday May 2014

Posted by Celia C. Elwell, RP in Cybersecurity, Law Office Management, Legal Technology, Malware, Office Procedures, Technology, Trojans, Using Social Media

≈ Comments Off on Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

Tags

Chinese, Comment Crew, Cybersecurity, e-Discovery Team®, Hackers, Ralph Loosey, Unit 61398

U.S. Employees Are Weakest Link In America’s Cybersecurity – Part One, by Ralph Loosey, e-Discovery Team®

http://tinyurl.com/kkltm9p

The Chinese army knows this vulnerability and attacks American employees every day to steal trade secrets and gain commercial advantage for Chinese businesses.

Criminal hackers can cause tremendous damage, whether trained in China or not. If a high level expert, such as any member of China’s elite Unit 61398, aka Comment Crew, gets into your system, they can seize root control, and own it. They can then plant virtually undetectable back doors into your systems. This allows them to later come and go as they please. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

19 Monday May 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Computer Virus, Confidentiality, Document Retention, Emails, Encryption, Heartbleed, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Malware, Technology, Technology, Trojans

≈ Comments Off on A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

Tags

Cybersecurity, Data Breach, e-Discovery Team®, ESI, Legal Ethics, Legal Technology, Outsourcing, Ralph Losey

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part One, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/oalblet

and,

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part Two, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/mjek896

It is worth taking the time to read the Comments for both Part One and Part Two. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

PC World’s Answer Line — Solutions to Various Computer Problems.

11 Sunday May 2014

Posted by Celia C. Elwell, RP in Computer Virus, Legal Technology, Malware, Microsoft Office, PC Computers

≈ Comments Off on PC World’s Answer Line — Solutions to Various Computer Problems.

Tags

Answer Line Solutions, Gmail, Hard Drives, IP Address, Lincoln Spector, Malware, Microsoft Office, PC Computers, PC World, Wi-Fi

Answer Line Solutions, Tips and Answers for PC Problems from Lincoln Spector, PC World

http://www.pcworld.com/column/answer-line/

You may not want or have the skills to build or fix your PC computer. But no doubt there are a few things you would like to do for yourself, such as, recovering a deleted file? What about setting — and keeping — a preferred default font in Word or recovering files after a malware attack? Even if you are tech-challenged, this site answers all types of questions in a language anyone can understand. Browse a while. You may find something that interests you. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Mashable Hit List.

13 Sunday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Clouds, Computer Virus, Disaster Preparedness, Dropbox, Emails, Encryption, Google, Heartbleed, Identity Theft, Law Firm Web Sites, Law Office Management, Legal Blogs, Legal Technology, Malware, Office Procedures, Passwords, PC Computers, Search Enginges, Technology, Using Social Media

≈ Comments Off on The Mashable Hit List.

Tags

Computer Bugs, Computer Fraud, Heartbleed, Identity Theft, Law Office Management, Password Managers, Passwords, Social media, The Mashable Team

The Heartbleed Hit List: The Passwords You Need to Change Right Now, The Mashable Team

http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/

If you wondered whether any main specific websites are affected, such as Yahoo, this list will help you.  It will also help explain the Heartbleed bug,  and why you should pay attention to what it is. If you want to know whether your specific bank was compromised, this list may not answer all your questions. So, if you’re not sure whether you should change your password, go ahead and do it.

Even better, find a password manager in this list of the best of the best from PC Magazine by Neil J. Rubenking — http://www.pcmag.com/article2/0,2817,2407168,00.asp. If you use one password for more than one website — and lots of people do — this is a good solution and a wise move regardless of the Heartbleed bug. -CCE

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

More on Heartbleed.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Chrome, Clouds, Heartbleed, Malware

≈ Comments Off on More on Heartbleed.

Tags

Computer Virus, Computers, Divorce Discourse, Hackers, Heartbleed, Lee Rosen, Malware, Passwords

Heartbleed Security Flaw Got You Worried? Good., by Lee Rosen, Divorce Discourse

http://www.divorcediscourse.com/heartblead-security-flaw-worried-good/

If I haven’t gotten your attention yet, more on Heartbleed. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Heartbleed Bug – What Is It And What To Do About It.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Chrome, Clouds, Computer Virus, Legal Technology, Malware

≈ Comments Off on The Heartbleed Bug – What Is It And What To Do About It.

Tags

Computer Security, Fraud Alert, Hackers, Heartbeat Bug, Identity Theft, Passwords, PC Magazine, PCMag, Scammers

Heartbleed: The Complete Rundown, by PCMag Staff http://tinyurl.com/muscrx5 The Heartbeat Bug was THE news this week.  Knowing that it is here, and cannot be avoided is one thing.  Knowing about to do about it is critical. Change your passwords, especially to to online banking, e-mail, apps, and other things we’ve taken for granted. -CCE

The Heartbleed bug is the big news in tech this week, an exploit that has been in the wild since 2012 and has left countless Internet users open to scammers. PCMag and the SecurityWatch team have been keeping tabs on all the news, so check out our coverage below, and check back for updates. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 454 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: