• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Tag Archives: Hackers

Who Needs Apple’s Help To Unlock Their iPhone?

23 Saturday Apr 2016

Posted by Celia C. Elwell, RP in Apple, Cell Phones, iPhones, Legal Technology

≈ Comments Off on Who Needs Apple’s Help To Unlock Their iPhone?

Tags

Apple, Hackers, iPhones, U.S. Justice Department

Feds (Once Again) Gain Access to iPhone Without Apple’s Help, by David Murphy, PC Mag.com

http://www.pcmag.com/news/343970/feds-once-again-gain-access-to-iphone-without-apples-help

Stop us if you’ve heard this one. Federal prosecutors no longer need Apple’s assistance in unlocking an iPhone in a Brooklyn drug case, as investigators have found a way to do so themselves. It’s the second major case recently where the government has attempted to demand Apple’s help but, before a judge granted the government’s request, the Justice Department managed to unlock the iPhone in question. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

“Smart” Cars and Hackers – We Should Have Seen This One Coming.

06 Wednesday Apr 2016

Posted by Celia C. Elwell, RP in Computer Forensics, Computer Fraud and Abuse Act, Cybersecurity, Identity Theft

≈ Comments Off on “Smart” Cars and Hackers – We Should Have Seen This One Coming.

Tags

Automobile Security, beSpacific Blog., Hackers, Priivacy, Sabrina I. Pacifici

Markey Report Reveals Automobile Security and Privacy Vulnerabilities, by Sabrina I. Pacifici, BeSpacific Blog

http://www.bespacific.com/markey-report-reveals-automobile-security-privacy-vulnerabilities/

New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

E-Filing Your Tax Return? Read This Before You Hit “Send.”

13 Saturday Feb 2016

Posted by Celia C. Elwell, RP in Cybersecurity, E-Filing, Encryption, Identity Theft, Internal Revenue Service, Legal Technology, Tax Law

≈ Comments Off on E-Filing Your Tax Return? Read This Before You Hit “Send.”

Tags

Angela Moscaritolo, E-Filing Taxes, Hackers, IRS, PC World, Turbo Tax

Hackers Trying to Steal Your Tax Refund With Stolen SSNs, by Angela Moscaritolo, PC World

http://bit.ly/1O8kgVv

[T]he IRS on Tuesday announced that hackers recently attempted to use some 464,000 stolen Social Security numbers and an automated bot to generate E-file PINs, which can be used to electronically file a tax return. The incident occurred last month, and the hackers were able to successfully access an E-file PIN with 101,000 of the SSNs.

*     *     *

Last year, Turbo Tax temporarily halted e-filing for state returns across the U.S. after it found ‘an increase in suspicious filings and attempts by criminals to use stolen identity information to file fraudulent state tax returns and claim tax refunds.’

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Seventh Circuit Denies Neiman Marcus’ Rehearing of Data Breach Class Action.

29 Tuesday Sep 2015

Posted by Celia C. Elwell, RP in 7th Circuit Court of Appeals, Appellate Law, Computer Forensics, Computer Virus, Cybersecurity, Identity Theft, Malware

≈ Comments Off on Seventh Circuit Denies Neiman Marcus’ Rehearing of Data Breach Class Action.

Tags

Data Breach, Hackers, Hunton and Williams, Identity Theft, Privacy, Privacy & Information Security Law Blog, Seventh Circuit Court of Appeals

Seventh Circuit Denies En Banc Review For Data Breach Class Action, Privacy & Information Security Law Blog posted by Hunton and Williams

https://www.huntonprivacyblog.com/2015/09/29/seventh-circuit-denies-en-banc-review-for-data-breach-class-action/

Plaintiffs, Neiman Marcus cardholders, brought a class action against the store for damages caused by a 2013 data breach. Hackers accessed customers’ credit and debit cards, as well as other personal information. The Northern District of Illinois, Eastern Division, ruled that the individual Plaintiffs and the class action against Neiman Marcus lacked standing under Article III of the Constitution.

Plaintiffs appealed to the United States Court of Appeals for the Seventh Circuit. The link takes you to the Seventh Circuit’s opinion explaining how Plaintiffs prevailed and why it reversed and remanded the case. Neiman Marcus filed for rehearing. The Seventh Circuit followed its usual habit, and denied it.

The Seventh Circuit’s analysis of its reasons ruling that Plaintiffs had met the three requirements for Article III standing is well worth the read. An added bonus is the link to the 2014 edition of The Practitioner’s Handbook for Appeals to the United States Court of Appeals for the Seventh Circuit, -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Another Major Hack. Checked Your Law Firm’s Cyber Security Lately?

05 Friday Jun 2015

Posted by Celia C. Elwell, RP in Computer Forensics, Confidentiality, Cybersecurity, Disaster Preparedness, Law Office Management, Legal Ethics, Legal Technology, Technology, Technology

≈ Comments Off on Another Major Hack. Checked Your Law Firm’s Cyber Security Lately?

Tags

Brian Focht, Client Confidentality, Computer Security, Hackers, Legal Ethics, The Cyber Advocate

The Real Reason You Need Cyber Liability Insurance, by Brian Focht, The Cyber Advocate

http://tinyurl.com/p8y5k2y

Another day, another hack. Yesterday brought news that four million current and former government employees may have had their personal information stolen by Chinese hackers.

Of course, this comes on the heels of what has been a staggering 18 months of hacks. Starting with the Home Depot and Target hacks, we’ve been barraged with story after story about major companies and retailers being hacked for their customers’ data. It’s not just big companies and big-box retailers, though. Law firms are increasingly the target of hackers, due to a combination of factors including relatively lax security and large quantities of organized, valuable information. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Want Stronger Passwords? Here’s How.

11 Saturday Oct 2014

Posted by Celia C. Elwell, RP in Legal Technology, Passwords

≈ Comments Off on Want Stronger Passwords? Here’s How.

Tags

Hackers, iCloud, Kerry Davis, Macworld, Passwords, PCWorld, Splashdata

Make Your Passwords Harder To Crack, by Kerry Davis, PCWorld

http://tinyurl.com/ahnpsk4

There’s nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. In this video, we go over ways to make your passwords harder to crack. [Video found at PCWorld link.-CCE]

First, don’t make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather ‘most popular passwords’ lists each year. The word ‘password’, number sequences, and other simplistic phrases or numbers fill the top spots. Also, don’t use your name, a password related to another one you might have on a different site, or a login name.

Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them.

Need help? Check out some free websites, like Strong Password Generator. This Macworld article on security in the iCloud age also has some suggestions on strong password creation.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Huge Cyberattack on JPMorgan Chase and Wall Street – How Far Does It Go?

05 Sunday Oct 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Cybersecurity, Encryption, Identity Theft, Legal Technology

≈ Comments Off on Huge Cyberattack on JPMorgan Chase and Wall Street – How Far Does It Go?

Tags

Banks, beSpacific Blog., Cyberattack, Finance, Hackers, JPMorgan Chase, New York Times, Russia, Sabrina Pacifici, Wall Street

Hackers’ Attack Cracked 10 Companies in Major Assault – NYT, by Matthew Goldstein, Nicole Perlroth, and David E. Sanger, New York Times, posted by Sabrina Pacifici, BeSpacific Blog

http://tinyurl.com/o3vf8fq

We have heard of other hacks on that stole information from credit/debit cards and other financial and personal data. This is far more serious. It was first discovered in July, and the investigation is ongoing.  Initial reports of the damage and who caused it have changed as the investigation progresses. -CCE  

‘The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse. Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said. It is unclear whether the other intrusions, at banks and brokerage firms, were as deep as the one that JPMorgan disclosed on Thursday. The identities of the other institutions could not be immediately learned. The breadth of the attacks — and the lack of clarity about whether it was an effort to steal from accounts or to demonstrate that the hackers could penetrate even the best-protected American financial institutions — has left Washington intelligence officials and policy makers far more concerned than they have let on publicly. Some American officials speculate that the breach was intended to send a message to Wall Street and the United States about the vulnerability of the digital network of one of the world’s most important banking institutions.’ . .  .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Hole In Mobile Security Making Your Phone An Easy Target.

15 Sunday Jun 2014

Posted by Celia C. Elwell, RP in Android Phones, Cell Phones, Cybersecurity, Encryption, Fraud, Identity Theft, iPad, iPhones, Legal Technology, Malware, Tablets

≈ Comments Off on The Hole In Mobile Security Making Your Phone An Easy Target.

Tags

All Tech Considered, Apple, AT&T, Comcast, Dave Porcello, Encryption, Facebook, Google, Hackers, Internet, Mobile Phones, NPR, Pwn Plug, Sean Gallagher, Security, Starbucks, Steve Henn, Twitter, Wi-Fi, Yahoo

Here’s One Big Way Your Mobile Phone Could Be Open To Hackers, by Steve Henn, All Tech Considered, NPR

http://tinyurl.com/l2re8ll

Despite the fact that every major Internet provider has added some kind of encryption to its services over the past year, tracking your online traffic is easier than you think.

And you don’t have to be the target of the hacker or the NSA for your traffic to be intercepted. There is a hole in mobile security that could make tens of millions of Americans vulnerable.

Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even the most unsophisticated hacker capture your traffic and possibly steal your identity. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

27 Tuesday May 2014

Posted by Celia C. Elwell, RP in Cybersecurity, Law Office Management, Legal Technology, Malware, Office Procedures, Technology, Trojans, Using Social Media

≈ Comments Off on Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

Tags

Chinese, Comment Crew, Cybersecurity, e-Discovery Team®, Hackers, Ralph Loosey, Unit 61398

U.S. Employees Are Weakest Link In America’s Cybersecurity – Part One, by Ralph Loosey, e-Discovery Team®

http://tinyurl.com/kkltm9p

The Chinese army knows this vulnerability and attacks American employees every day to steal trade secrets and gain commercial advantage for Chinese businesses.

Criminal hackers can cause tremendous damage, whether trained in China or not. If a high level expert, such as any member of China’s elite Unit 61398, aka Comment Crew, gets into your system, they can seize root control, and own it. They can then plant virtually undetectable back doors into your systems. This allows them to later come and go as they please. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

More on Heartbleed.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Chrome, Clouds, Heartbleed, Malware

≈ Comments Off on More on Heartbleed.

Tags

Computer Virus, Computers, Divorce Discourse, Hackers, Heartbleed, Lee Rosen, Malware, Passwords

Heartbleed Security Flaw Got You Worried? Good., by Lee Rosen, Divorce Discourse

http://www.divorcediscourse.com/heartblead-security-flaw-worried-good/

If I haven’t gotten your attention yet, more on Heartbleed. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Heartbleed Bug – What Is It And What To Do About It.

12 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Chrome, Clouds, Computer Virus, Legal Technology, Malware

≈ Comments Off on The Heartbleed Bug – What Is It And What To Do About It.

Tags

Computer Security, Fraud Alert, Hackers, Heartbeat Bug, Identity Theft, Passwords, PC Magazine, PCMag, Scammers

Heartbleed: The Complete Rundown, by PCMag Staff http://tinyurl.com/muscrx5 The Heartbeat Bug was THE news this week.  Knowing that it is here, and cannot be avoided is one thing.  Knowing about to do about it is critical. Change your passwords, especially to to online banking, e-mail, apps, and other things we’ve taken for granted. -CCE

The Heartbleed bug is the big news in tech this week, an exploit that has been in the wild since 2012 and has left countless Internet users open to scammers. PCMag and the SecurityWatch team have been keeping tabs on all the news, so check out our coverage below, and check back for updates. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

How Target Missed Malware Alarms and Blew It.

14 Friday Mar 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Consumer Law, Credit Repair, Criminal Law, Finance and Banking Law, Identity Theft

≈ Comments Off on How Target Missed Malware Alarms and Blew It.

Tags

Bangalore, Bloomberg Businessweek, FireEye, Gregg Steinhafel, Hackers, Internet Security, Jim Walter. McAfee, Malware, Nieman Marcus, Target, Technology, U.S. Department of Justice, Verizon Enterprise Solutions

Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It, by Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack, Bloomberg  Businessweek Technology

http://tinyurl.com/njsy4rm

The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores. At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers.

It’s a measure of how common these crimes have become, and how conventional the hackers’ approach in this case, that Target was prepared for such an attack. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 454 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: