Computer Networking & Storage - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Computer Networking & Storage Category

The Mobile Lawyer: New on the Scene, Always in Demand

There are a lot of stereotypes that seem to haunt lawyers, including an inability to adapt to the changing times. But a failure to adapt to marketplace changes can be a big business mistake, especially for the solo attorney. As times change, you should be finding that you're spending more time on your mobile device. And that has both good and bad implications.

Last Thursday, the Supreme Court announced changes to the Federal Rules of Criminal Procedure, which govern criminal prosecutions in federal courts. Those amendments would make it easier to serve summons on foreign organizations without a U.S. presence, reduce the time for responding to electronic service, and allow judges to issue warrants for remote searches of electronically stored information outside of their district.

And it's that last change which will likely have the biggest impact, removing a procedural barrier to government investigations and, critics claim, expanding the government's hacking powers.

Russian Hacker Targets Top Am Law 100 Law Firms

No one is safe from hackers today, at least not in BigLaw. Crain's Chicago Business reports that 48 top Chicago law firms -- many of which are part of the Am Law 100 rankings -- were targeted by a mysterious Russian cybercriminal who operates out of Ukraine. His goal? Top law firms' mergers and acquisitions info. With that sort of inside information, a cybercriminal could do very well for himself.

Another new week, another spate of cyber-criminal activity for firms to prepare against.

If you wanted to transfer real property in England a thousand years ago, you would have to publicly present the buyer with a clod of dirt from the land, symbolizing the transfer of title, and record the exchange in the local shire-book or church-book. One thousand years later and the clod is gone, but the rest of the process is very much the same: transfers of real property are still recorded with the local county's recorder of deeds, the modern equivalent of the shire-book. It's an effective, but not a terribly efficient, system.

Blockchain technology, some propose, can bring that antiquated system into the contemporary age. Blockchain technology could create a widely distributed, indecently verifiable, and largely incorruptible record of property ownership that bypasses the centralized system of county offices and recorders of deeds, or so the thinking goes. It's as though everyone could have their own personal, inscrutable Domesday Book.

FBI Delays Apple Hearing to Try a New iPhone Hack

For the last few weeks, conflict between the iPhone maker and the FBI has been so heated that even people who know nothing about encryption (that's most of us) have developed very spirited and views on the matter.

In a somewhat odd twist, it looks like the FBI just took a breather and said, "Fine, we don't need you," to Apple. It appears that an "outside party" just alerted the government to an alternative means to cracking Syed Farook's phone. This is all very disconcerting, particularly as there was a hearing for the debate to continue on scheduled for today.

Tips for Safeguarding Client Information

Safeguarding client information isn't as easy as you might think. In the digital age, safeguarding information is something even the most tech-savvy corporations struggle with. To ensure that your clients' information is safe, you actually have to be proactive about your security. Let's start from the beginning.

The cloud isn't just going to transform how attorneys work and compute, it already has. From endless email storage to cloud-based eDiscovery, lawyers are working on the cloud every single day.

So, what is the cloud anyway? (Besides just "someone else's computer.") And what do lawyers need to know about it? Here are FindLaw's top seven cloud-based blog posts to help keep you up to date.

Pentagon Asks Hackers to Search for Security Breaches in Pilot Project

The Pentagon just announced this week that it would invite outside hackers who'd been pre-vetted by the U.S. D.O.D. to try their best to crack the cyber-defenses of its websites.

According to Reuters, this is the first project of this kind hosted by the federal government.

If you've ever lost a file or spent hours searching for an incorrectly filed document -- and we all have -- you know that poor document management can be a major thorn in your practice's side. Not only is bad document management annoying to you, though. It wastes your staff's time and your clients' money.

Upgrading your document management system can help solve these problems. And it's not nearly as daunting (or expensive) as you might imagine. Here's how to go about it.

FireEye's 'Threat Prevention' Products Are Open to Threats

ArsTechnica just released a breakdown of Google's Project Zero Teams' discovery of a major security flaw in FireEye's coding that potentially allows attackers to infiltrate a network and export everything of yours you have on the network -- passwords, download histories, viewing history -- all by just sending that network an innocuous-looking email.

FireEye, to their credit, quickly acknowledged the weakness in their affected products and released a patch designed to address the issue. However, it's episodes like these that make the non-hacking crowd shake in their boots. Just how vulnerable are we?