Supply Chain Security – Not As Easy As it Looks

The massive exploit of SolarWinds is a prime example of what is called a “supply chain” vulnerability. The vast majority of those impacted by the Russian SolarWinds attack probably had never even heard of the company SolarWinds, and did not realize th… Continue reading Supply Chain Security – Not As Easy As it Looks

Judge Orders Capitol Rioter to Unlock Laptop

Guy Reffitt traveled from his home in Wylie, Texas, to Washington, D.C., with an AR-15 rifle and a Smith & Wesson .40 caliber handgun, to participate in the riot and obstruction of Congress that occurred at the U.S. Capitol on January 6, 2021. He … Continue reading Judge Orders Capitol Rioter to Unlock Laptop

US Offers Bounty for Tips on State-Sponsored Cybercrime

Last week, the Biden administration announced a ‘new’ Rewards for Justice program offering up to $10 million USD for information relating to those who create and perpetuate ransomware attacks against U.S. infrastructure. The program, admin… Continue reading US Offers Bounty for Tips on State-Sponsored Cybercrime

What the Van Buren Case Means For Security Researchers

The federal computer crime law prohibits “computer trespass.” This includes both “accessing” a computer without authorization, and “exceeding the scope of authorization” to access a computer. If these terms seem vague and ambiguous to you, well,… Continue reading What the Van Buren Case Means For Security Researchers

Privacy Takes a Hit In the High Court

One of the earliest “privacy” laws in the United States is, surprisingly, the Fair Credit Reporting Act. Back during the Nixon Administration, Congress passed a law that gave people the right to see what was on their credit report, to contest inaccura… Continue reading Privacy Takes a Hit In the High Court

After Van Buren, are Data Scraping Cases Barred?

The federal computer crime law makes it both a criminal offense and a civil offense (you can sue for damages or loss) for someone to “access a computer without authorization” or to “exceed authorized access” to a computer, and then do certain proscrib… Continue reading After Van Buren, are Data Scraping Cases Barred?

Amazon Sidewalk, Apple AirTag and Involuntary Sharing

If you own an Amazon device (Ring, Echo, Dot, Plus, Show, Spot, Studio, Input or Flex) then starting this week, you may be sharing at least some attributes of your device with other Amazon device users. To create the kind of ubiquitous mesh network th… Continue reading Amazon Sidewalk, Apple AirTag and Involuntary Sharing

Can the Government Compel You To Produce Records That Don’t Exist Yet?

We all know that the government can get a subpoena compelling you to produce records that are in your “possession, custody or control,” provided those records are not privileged, along with a few other constraints. They can also get a search warrant a… Continue reading Can the Government Compel You To Produce Records That Don’t Exist Yet?

Why the Supreme Court’s Van Buren Case Really Matters

​ By: Mark Rasch, Cyber Law Expert On June 3, the U.S. Supreme Court issued an opinion holding that a Georgia police officer could not be prosecuted under the federal computer crime law for accessing a criminal database accessible only “for law enforcement purposes” and then selling data that he received from that database. The Court…

The post Why the Supreme Court’s Van Buren Case Really Matters appeared first on SecurityCurrent.

Continue reading Why the Supreme Court’s Van Buren Case Really Matters

The High Cost of Privacy By Default

In the ongoing “war” between Facebook and Apple over privacy, Apple’s new operating system, iOS 14.5 contains a feature that most people assumed—incorrectly—was already part of the operating system; the ability to choose which apps collected and share… Continue reading The High Cost of Privacy By Default