Peter S. Vogel
Posts by Peter S. Vogel
-
Technology
10 Cyber Security Tips All Employees Need To Know, Including Phishing Scams & BYOD
Employers want to blame cyberthreats on bad guys but “the threat actually originates from within when employees’ ignorance and/or negligence opens the door for cybercriminals” as reported by Kasperky in “Top 10 Tips for Educating Employees about Cybersecurity.” -
Technology
Snapchat Admits It Violated Privacy Laws
The Federal Trade Commission (FTC) announced a Final Order which was “settling charges that Snapchat deceived consumers with promises about the disappearing nature of messages sent through the service…” and “…deceived consumers over the amount of personal data it collected and the security measures taken to protect that data from misuse and unauthorized disclosure.” - Sponsored
Navigating Financial Success by Avoiding Common Pitfalls and Maximizing Firm Performance
In this CLE-eligible webinar, we’ll explore the most common accounting pitfalls and how to avoid them for your firm. -
Technology
Coming To Your Computer Soon? Ransomware Which Locks Your Files And Demands Payment
Alarms are going off around the Internet with an apparent increase of ransomware which “immediately makes its presence known by encrypting files and demanding payment for the keys to unlock them.”
-
Technology
More Bad Cybersecurity News – Top-Tier Malware Regin Used for Spying Since 2008
Symantec reported the discovery of new malware named Regin whose main purpose “is intelligence gathering and it has been implicated in data collection operations against government organizations, infrastructure operators, businesses, academics, and private individuals.” On November 24, 2014 Symantec issued a report entitled “Regin: Top-tier espionage tool enables stealthy surveillance” which is a “back door-type Trojan, …a complex piece of malware whose structure displays a degree of technical competence rarely seen” which has “been used in systematic spying campaigns against a range of international targets since at least 2008.” -
Technology
Darkhotel Cyberattacks Business Executives in Hotels
Kaspersky identifies that Darkhotel is a group of attackers that “seems to know in advance when these individuals will arrive and depart from their high-end hotels. So, the attackers lay in wait until these travelers arrive and connect to the Internet.” -
eDiscovery, Technology
LinkedIn Allegedly Violates Federal Law by Making Employment History Available
A new class action lawsuit alleges that on LinkedIn “any potential employer can anonymously dig into the employment history of any LinkedIn member, and make hiring and firing decisions based upon the information they gather, without the knowledge of the member, and without any safeguards in place as to the accuracy of the information that the potential employer has obtained.” -
Technology
40 Count Indictment Against Cybercriminal for Stealing Credit Cards and Offering Online Tutorials
A Russian cybercriminal allegedly “was a leader in the marketplace for stolen credit card numbers, and even created a website offering a tutorial on how to use stolen credit card numbers to commit crime.” -
Google / Search Engines, Technology
Privacy Policy Challenge: Google Ordered to Cease Data Profiling in Germany
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. A recent administrative order was issued for Google to “to take the necessary technical and organisational measures to guarantee that their users can decide on their own if and to what extend their data is used for profiling.” Last […] - Sponsored
Early Adopters Of Legal AI Gaining Competitive Edge In Marketplace
How to best leverage generative AI as an early adopter with ethical use. -
Technology
18+ States Rely on “Stingrays” (Fake Cell Towers) for Surveillance – Is this an Invasion of Privacy?
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. Privacy issues have been highlighted by a recent Newsweek report that “mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data“ and an earlier Florida […] -
Facebook, Technology
Two Courts Permit Defendants To Be Served on Facebook
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. When the defendants could not otherwise be located and served by paper, face-to-face, two Judges ordered service on Facebook since the defendants were in Turkey and Antigua. Since Turkey “has not specifically objected to service by email or social […] -
Cyberlaw, Technology
John Doe Can Remain Anonymous and Not Be Deposed in Pre-Litigation Discovery
Since the plaintiff did not a file a lawsuit against John Doe, the Texas trial court had no jurisdiction to allow the plaintiff to take the deposition of “Trooper,” an anonymous blogger who launched on on-line attack on the CEO of a company who lives in Houston. -
Technology
“BYOD Bill of Rights” May Help Concerns about Privacy
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. A recent survey about BYOD (“Bring Your Own Device”) resulted in the finding that “78% of employees use their own mobile devices for work” and “the use of personal technology to access corporate data can be solved by better […]
Sponsored
Sponsored
Early Adopters Of Legal AI Gaining Competitive Edge In Marketplace
How to best leverage generative AI as an early adopter with ethical use.
Sponsored
Is The Future Of Law Distributed? Lessons From The Tech Adoption Curve
The rise of remote work has dramatically reshaped the relationship between Lawyers and Law Firms, see how Scale LLP has taken the steps to get…
Sponsored
Navigating Financial Success by Avoiding Common Pitfalls and Maximizing Firm Performance
In this CLE-eligible webinar, we’ll explore the most common accounting pitfalls and how to avoid them for your firm.