Last week the FTC knocked on the doors of eight mobile device makers and asked them to provide hard answers regarding their efforts to address or patch the latest security vulnerabilities afflicting your mobile device. Simultaneously, it has also opened the doors to citizens inviting comment to the following general question: "How secure is your device?"
Recently in Mobile Phones / Smartphones Category
There are a lot of stereotypes that seem to haunt lawyers, including an inability to adapt to the changing times. But a failure to adapt to marketplace changes can be a big business mistake, especially for the solo attorney. As times change, you should be finding that you're spending more time on your mobile device. And that has both good and bad implications.
Corporations, law firms, and small businesses know the mantra all too well: cybersecurity is getting hairier, bloodier, and more complicated with each passing day. The best option may be to hire a third party security firm. But we're still losing the war.
If it's not possible to keep up with all potential attacks, what's to be done? According to the State of the Endpoint Report by Ponemon Institute, many IT departments are focusing on protection after a breach occurs.
Chances are you have a tool in your possession that has fundamentally changed how law is practiced, particularly in the area of gathering evidence: your smartphone.
Cell phones and their recording abilities have completely changed the game. We no longer have to rely on dubious eyewitness accounts of what happened. Now, lawyers don't need to rely on equally dubious accident reports. If you have an auto injury case on your hands, you should be asking your client a simple question first: "Did you take pictures?"
The FBI couldn't really tell Apple how they cracked their phone, even if they wanted to. According to Reuters, the method that was used to crack the infamous Syed Farook iPhone is proprietary and owned by a group of professional hackers outside of the U.S., and certain rules may preclude the government agency from letting Apple in on the secret.
Apple has a strong interest in knowing exactly how the foreign hackers achieved their goal. Before Apple can patch up the security flaw to avoid future hacks of this kind, the company will need to know how the hack was accomplished.
Uber wasn't as lucky in its attempt to stop litigation in its tracks as it was in another lawsuit brought against the transport-app company. A US District judge has decided not to grant Uber's motion to dismiss and instead let the price-fixing issues be heard by a jury.
Uber has to do battle on two front's as its Ninth Circuit Case O'Connor et al. v. Uber Technologies has just few months left before it will be heard on the merits.
If you've never heard of ransomware, you're really behind the times. Beginning with 2015 and into 2016, the number of malware attacks on all devices -- desktops, laptops and phones -- skyrocketed to its highest percentage of cyber-shenanigans ever. And it looks like this highly profitable criminal business model is here to stay.
At the risk of sounding like a doomsayer, this writer cautions legal professionals to watch themselves and to drop the "it only happens to somebody else" mentality.
Heated debate has raged as to whether or not Apple should, or even could, assist the U.S. government in its quest to pry open his cell phone. After long resisting a court order, it looks like both Apple and the FBI won in the announcement that the FBI had broken into Syed Farook's phone. But if you really think about, the FBI won more.
If you want to protect your data, privacy, and communications from corporations, government snoops, or hackers, end-to-end encryption is a great way to start. It's the type of encryption Apple and Google added to their mobile devices and smartphones over a year ago, leading to government claims that such encryption will be used to protect terrorists and kidnappers.
But according to a new report by Harvard's Berkman Center for Internet and Society, end-to-end encryption and other data protection methods aren't enough to actually ensure that data is kept private, now and in the future. Here's why.
There are apps for monitoring your billing, apps for tracking your time, apps for invoicing clients. There are even apps that allow you to send and receive cash with the click of a button, meaning you can pay and get paid without ever having to see a bank teller again.
Such money transfer or "peer-to-peer payment" apps have exploded in the past few years as companies have moved to take advantage of a market that sees more than $1 trillion in transfers every year. Venmo, Square Cash, and others all seek to make sending and receiving money as simple as hitting a button on a smart phone. Should lawyers get on board?