• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Tag Archives: Hacking

Check Your Facebook Data and Settings.

29 Thursday Mar 2018

Posted by Celia C. Elwell, RP in Internet, Internet Safety, Marketing, Social Media

≈ Comments Off on Check Your Facebook Data and Settings.

Tags

Facebook, Hacking, PCWorld, Roman Loyola

How to Download Your Facebook Data, by Roman Loyola, Senior Editor, PCWorld

https://bit.ly/2pIYmGC

How can I download a copy of my Facebook data? posted by Facebook Help

https://www.facebook.com/help/302796099745838

Do you use Facebook personally or as a marketing tool? Unless you have lived under a rock, you have heard about the Facebook/Cambridge Analytica scandal. If not, just Google it. You will find plenty of recent posts. It will make you think twice about taking all those personality tests you find frequently on Facebook.

This is not the only Facebook glitch, if glitch is the proper word. Hacked lately? By that I mean, has someone sent posts to your “friends” pretending to be you?

Hopefully, you have checked your safety settings. That will help, but the type of data you share online may negate your efforts.

Hopefully, you do not share that you plan to attend an event (a feature Facebook provides), photos of your vacation while you are on vacation, or post that you are – at that very moment – at a specific location away from home.

Hopefully, you do not post photographs of your children with your child wearing a school t-shirt or jersey, the front of your house with the house number, or a photo with your vehicle’s tag number in the background.

You get the idea. If you want to use Facebook, whether for personal or business use, Facebook – and others – I suspect you already know they know more about you than you realize.

It will not hurt to look at your Facebook data and re-check your Safety Settings at https://bit.ly/1j7xk0x. I recommend another Google search (yes, search engines, news media, and other social media are tracking you, too) to find more ways to update your Facebook settings. Please look at the date of whatever you find. You want the newest version. The newer, the better. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Law Offices Targeted By Hackers.

26 Tuesday Jan 2016

Posted by Celia C. Elwell, RP in Cybersecurity, Disaster Preparedness, Law Office Management, Legal Technology, Passwords, Technology

≈ Comments Off on Law Offices Targeted By Hackers.

Tags

Cybersecurity, Hacking, Karen Conroy, Lawyerist.com©, Passwords

The Lawyers’ Guide to Hacking Threats, by Karen Conroy, Lawyerist.com

http://bit.ly/1POLdz2

International security authorities spent close to two years pursuing a criminal site called Darkode, where hackers could buy and sell malware meant to steal information. On the international site, which could only be accessed with a referral and a password, hackers advertised and sold their homemade software. Criminals who bought it could steal anything from Facebook follower lists to database account passwords.

*        *        *

Law firms are especially tempting to cyber criminals because of the value of the sensitive information stored on their networks. A majority of law firms have experienced some sort of hacking, with law firms that handle government contracts and international business being targeted most often. About 80% of the largest 100 law firms have experienced some sort of violation. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Problems With Automobile Security and Privacy Vulnerabilities.

11 Wednesday Feb 2015

Posted by Celia C. Elwell, RP in Cybersecurity, Litigation, Motor Vehicle, Product Liability

≈ Comments Off on Problems With Automobile Security and Privacy Vulnerabilities.

Tags

Automobile Manufacturers, Cyber Attacks, Hacking, Motor Vehicles, Privacy, Security, Technology, Tracking

Markey Report Reveals Automobile Security and Privacy Vulnerabilities, by Sabrina I. Pacifici, BeSpacific Blog

http://www.bespacific.com/markey-report-reveals-automobile-security-privacy-vulnerabilities/

‘New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. The responses from the automobile manufacturers show a vehicle fleet that has fully adopted wireless technologies like Bluetooth and even wireless Internet access, but has not addressed the real possibilities of hacker infiltration into vehicle systems. The report also details the widespread collection of driver and vehicle information, without privacy protections for how that information is shared and used. ‘Drivers have come to rely on these new technologies, but unfortunately the automakers haven’t done their part to protect us from cyber-attacks or privacy invasions. Even as we are more connected than ever in our cars and trucks, our technology systems and data security remain largely unprotected,’ said Senator Markey, a member of the Commerce, Science and Transportation Committee. ‘We need to work with the industry and cyber-security experts to establish clear rules of the road to ensure the safety and privacy of 21st-century American drivers.’ Senator Markey posed his questions after studies showed how hackers can get into the controls of some popular vehicles, causing them to suddenly accelerate, turn, kill the brakes, activate the horn, control the headlights, and modify the speedometer and gas gauge readings. Additional concerns came from the rise of navigation and other features that record and send location or driving history information. Senator Markey wanted to know what automobile manufacturers are doing to address these issues and protect drivers.’

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is Email Between You And Your Client Safe? No, And This Is Why.

01 Monday Dec 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Clouds, Confidentiality, Emails, Encryption, iPad, iPhones, Legal Ethics, Legal Technology, Malpractice, PC Computers, Technology

≈ Comments Off on Is Email Between You And Your Client Safe? No, And This Is Why.

Tags

ABA Legal Ethics Opinion, Allen Mihecoby, Email, Encryption, Gmail, Hacking, Internet, Lawyerist Blog, Lisa Needham

How to Encrypt Attorney-Client Communications, by Lisa Needham, Lawyerist Blog (with hat tip to Allen Mihecoby, CLAS, RP!)

http://tinyurl.com/kfrpqz3

If you have decided you need to get serious about client data protection, you will need to consider encrypting both your data and your communications. We have previously covered how to encrypt your data and will focus here on how to encrypt your email communication.

What Is Encryption?

Simply by using the Internet, you are probably using some sort of encryption scheme during some activities, whether you know it or not.

Encryption is simply the act of turning your data into unreadable gibberish. If your data is intercepted or hacked, the thief now has nothing but a pile of garbage.

End-to-end encryption is a must for transferring sensitive data across the internet. In end-to-end encryption, your data is encrypted while it travels towards your intended location and the same encryption occurs on the reverse trip. Your bank (hopefully) uses end-to-end encryption. Your practice management software (hopefully) uses end-to-end encryption if it stores and syncs data remotely. This sort of encryption is done for you without any effort on your part, as it is just a standard feature of the infrastructure you are using to bank or update client data or similar activities.

Why Do You Need to Care?

A few years ago, the ABA issued a formal ethics opinion stating that if there is a significant risk that a third party might gain access to the email, attorneys have to warn clients about that risk.

This poses a problem, because unlike your bank and practice management software, email is usually unencrypted. This is true whether you are using a desktop client or a web-based email like GMail. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Target Update: Affected Customers Now 110 Million and May Still Go Up.

11 Saturday Jan 2014

Posted by Celia C. Elwell, RP in Consumer Law, Recent Links and Articles

≈ Comments Off on Target Update: Affected Customers Now 110 Million and May Still Go Up.

Tags

Credit Cards, Data Breach, Debit Cards, Emails, Hacking, Identity Theft, Katrina Lamansky, Target, Target CEO Gregg Steinhafel, WQAD.com

Target: Hacking Hit Up To 110 Million Customers, by Katrina Lamansky, WQAD.com

http://tinyurl.com/pssy2r5

People who shopped at Target following Thanksgiving have already heard that their personal information was hacked. But now it is clear that Target was actually hacked much earlier than originally reported.

This morning, the reported number of customers affected was around 40 million. Now the reported number is 100 million, and Target is not sure how high the number will go.

Target will try to contact all affected customers. Be cautious. Contacts from Target will not request any personal information. Target is also offering a program of free credit monitoring and identity theft protection. You will have three months to enroll in that program.

Target says that it does not think the thieves can access anyone’s bank account, but hacked customers are at risk for identity theft. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 455 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: