Here’s What America Looked Like Before the EPA
When it was created, the new Agency sent photographers around the country to capture an America in environmental decline. Continue reading Here’s What America Looked Like Before the EPA
Collaborate Disseminate
When it was created, the new Agency sent photographers around the country to capture an America in environmental decline. Continue reading Here’s What America Looked Like Before the EPA
Data collected by tech companies could be used to prosecute abortion seekers, they warn.
The post Supreme Court’s Roe v. Wade reversal sparks calls for strengthening privacy appeared first on CyberScoop.
Continue reading Supreme Court’s Roe v. Wade reversal sparks calls for strengthening privacy
Lack of federal privacy protections could make abortion bans a lot more dangerous.
The post Reproductive rights at risk galvanize calls for federal privacy legislation appeared first on CyberScoop.
Continue reading Reproductive rights at risk galvanize calls for federal privacy legislation
This isn’t even the first time the court has leaked out information about Roe. Continue reading The Supreme Court Leaks All the Time
The Supreme Court issued a 6-3 ruling Thursday determining that improper use of a computer system by someone allowed to use it does not fall under the Computer Fraud and Abuse Act, the nation’s landmark hacking law. The ruling is a significant step in limiting the bounds of the law, which critics have long blasted as overly broad. It’s the first time the court has ruled on a case involving the decades-old hacking statute. The case in question involved former Georgia police officer Nathan Van Buren, who was accused of looking up license plate data in a law enforcement database in exchange for bribes. The prosecution argued that Van Buren’s use exceeded “authorized access,” putting him in violation of the Computer Fraud and Abuse Act. Such an interpretation “would attach criminal penalties to a breathtaking amount of commonplace computer activity,” Justice Amy Coney Barrett, who authored the majority opinion, wrote. […]
The post A Supreme Court ruling limits the reach of a landmark hacking law appeared first on CyberScoop.
Continue reading A Supreme Court ruling limits the reach of a landmark hacking law
Like the Kubler-Ross stages of grief, there are multiple stages of data breach. Anger, denial, blame, investigation, litigation, regulation and, ultimately, resignation. This includes possible class action litigation by consumers, banks, vendors, supp… Continue reading High Court Deals Blow to Data Privacy Regulations
Several U.S. Supreme Court justices, including some of President Donald Trump’s appointees, skeptically questioned a broad interpretation of the main federal anti-hacking law during oral arguments Monday. The hearing represented one of the final steps in the biggest case to come before the nation’s highest court involving the Computer Fraud and Abuse Act (CFAA), written in the 1980s. The case centers on when an individual “exceeds authorized access” to a computer, as defined by that law. The law has long held a contentious place in the cybersecurity world, where it’s viewed as hopelessly vague, outdated and overly punitive. One CFAA prosecution that drew particular criticism was that of Aaron Swartz, an internet activist who took his own life before he was scheduled to stand trial for allegedly downloading articles from an academic database, in a case where he faced decades in prison if convicted. The case now before the Supreme Court involves defendant Nathan […]
The post Supreme Court considers scope of federal anti-hacking law in biggest cyber case to date appeared first on CyberScoop.
Justice of the Supreme Court Ginsburg on her Mother: “What’s the difference between a bookkeeper in the garment district and a Supreme Court justice? One generation.”
The post Ruth Bader Ginsburg 1933 – 2020 appeared first on Security Boulevard… Continue reading Ruth Bader Ginsburg 1933 – 2020
Everyone knows that Bitcoin is an anonymous currency. Except when it isn’t. Bitcoin and other cryptocurrencies attempt to achieve the incompatible goals of providing strong accountability for transactions through blockchain and strong anonymity. If th… Continue reading Schrodinger’s Cryptocurrency – Both Private and Not
Cybercriminals are hunting out victims’ Office 365 credentials — by dishing out Supreme court “summons” in a phishing attack. Continue reading Supreme Court Phish Targets Office 365 Credentials