Internet & Online Privacy - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Internet & Online Privacy Category

When it comes to preventing hackers from spying on you through your webcam, the FBI has a decidedly lo-tech solution: use tape. Speaking at a conference at the Center for Strategic and International Studies on Wednesday, FBI Director James Comey suggested covering up your webcam as one of the "sensible things" the public can do to protect themselves from hackers.

Comey's comments have been met with some derision. (I mean, is tape really the best solution the FBI has for protecting America from hackers?) But it's also good advice. Here's why.

It’s one thing to have your LinkedIn or Dropbox account compromised by hackers. It’s another to have hackers break into your email account, impersonate your typo-filled writing, then convince opposing counsel to send a $63,000 settlement payment to the hacker’s offshore bank account.

Unfortunately, that’s just what happened to one Virginia attorney. The lesson: if you know your email has been compromised, clue in opposing counsel, or you could be responsible for whatever loss follows.

If you're like me (and thousands of other legal professionals), you probably got an email from Dropbox about a week ago, letting you know that you'll need to reset your password. "Huh," you thought, "I didn't even remember that I had a Dropbox account." And then you went about your day.

But that email wasn't just a friendly reminder that Dropbox still existed -- it was one of the first, oblique, acknowledgements of that Dropbox was hacked in 2012, and lost 68 million usernames, emails, and passwords as a result.

If you're tapping away on an iPhone, make sure you've got the latest updates. Otherwise, your calls, text messages, emails, and contacts could all be vulnerable to Israeli cyberspies -- or whoever buys their software.

The NSO Group, an Israeli software company that the New York Times describes as "one of the world's most evasive digital arms dealers," has released software exploiting security vulnerabilities in Apple products, allowing anyone who uses it to collect your information, steal your passwords, track your location, and even secretly record your conversations. All they have to do is send you one text.

New Black Hat Cybersecurity Buzzwords

In the pithy words of Monzy Merza at TechCrunch, the annual Black Hat briefings are an opportunity for the hoi-polloi "to drink from the firehose." While the lions' share of know-how and information will no doubt be devoured and processed by the brainiest of cybersecurity experts and hackers, the rest of us must play the part of vultures -- eating the scraps.

And that assumes we can digest what's left. Blink, and some new threat is already out there on the internet threatening your data and network. Here we'll discuss some of the recurring terms that featured at this year's Black Hat briefing.

Are Your Note-Taking Apps a Security Risk?

Note-taking apps are part of the recent trend of enabling people to document every aspect of their lives for posterity and future use. Everyone knows that with convenience comes diminished security. But what steps do you need to take to ensure your day-to-day musings aren't being hacked?

LinkedIn, the Facebook for resumes, has filed suit in the Northern District of California against 100 unnamed individuals accused of using bots to scrape information from its website. The suit accuses the Doe defendants of violating the Computer Fraud and Abuse Act, a federal anti-hacking law.

The lawsuit comes just barely a month after the Ninth Circuit expanded the reach of the CFAA, ruling in two cases that the CFAA could criminalize unauthorized password sharing and could impose civil liability for misusing a social network. The LinkedIn suit, though, could seek to push the reach of the CFAA even further.

Cops Search Computer for Defamatory Statements -- About Their Police Chief

After a blogger accused the sheriff's office in Terrebone Parish, Louisiana of improprieties, sheriff's deputies quickly seized the computers of the suspected blogger, a former sheriff's deputy himself, accusing him of criminal defamation. "If you're gonna lie about me and make it under a fictitious name, I'm gonna come after you," Terrebone Sheriff Jerry Larpenter told the local news station, WLL-TV.

Now, a Louisiana judge has issued a search warrant, allowing those deputies to take a "look-see" into the suspected defamer's computer. Ethics attorney and Loyal Law Professor Dane Ciolino described the ruling as "extraordinary," adding that "[i]t's amazing we're having this conversation in Louisiana rather than in Iran."

Has Social Media Committed International Terrorism?

A number of lawsuits are pending in federal courts these days and their legal significance cannot be overstated. At issue is whether or not the three biggest names in social media today -- Google, Facebook, and Twitter -- have committed acts of "international terrorism" under the U.S. Anti-Terrorism Act.

Tips for Handling Phishing, Social Engineering Scams

The con has been on this earth longer than civilization. It seems that somewhere, somehow, someone is trying to pull a fast one on someone else. Cons, scams and schemes come in all sorts of shapes and sizes: "snake oil,", Ponzi schemes, political promises.

Those still exist, but the latest digital scams are getting fancier, more sophisticated and more prolific. Here are a few tips that will help you dodge them.