Internet Privacy
-
Technology
More Bad Cybersecurity News – Top-Tier Malware Regin Used for Spying Since 2008
Symantec reported the discovery of new malware named Regin whose main purpose “is intelligence gathering and it has been implicated in data collection operations against government organizations, infrastructure operators, businesses, academics, and private individuals.” On November 24, 2014 Symantec issued a report entitled “Regin: Top-tier espionage tool enables stealthy surveillance” which is a “back door-type Trojan, …a complex piece of malware whose structure displays a degree of technical competence rarely seen” which has “been used in systematic spying campaigns against a range of international targets since at least 2008.” -
Technology
Darkhotel Cyberattacks Business Executives in Hotels
Kaspersky identifies that Darkhotel is a group of attackers that “seems to know in advance when these individuals will arrive and depart from their high-end hotels. So, the attackers lay in wait until these travelers arrive and connect to the Internet.” - Sponsored
How Generative AI Will Improve Legal Service Delivery
Learn how emerging tools will likely change and enhance the work of lawyers for years to come in this new report. -
eDiscovery, Technology
LinkedIn Allegedly Violates Federal Law by Making Employment History Available
A new class action lawsuit alleges that on LinkedIn “any potential employer can anonymously dig into the employment history of any LinkedIn member, and make hiring and firing decisions based upon the information they gather, without the knowledge of the member, and without any safeguards in place as to the accuracy of the information that the potential employer has obtained.”
-
Google / Search Engines, Technology
Privacy Policy Challenge: Google Ordered to Cease Data Profiling in Germany
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. A recent administrative order was issued for Google to “to take the necessary technical and organisational measures to guarantee that their users can decide on their own if and to what extend their data is used for profiling.” Last […] -
Technology
18+ States Rely on “Stingrays” (Fake Cell Towers) for Surveillance – Is this an Invasion of Privacy?
Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog. Privacy issues have been highlighted by a recent Newsweek report that “mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data“ and an earlier Florida […] -
Cyberlaw, Technology
John Doe Can Remain Anonymous and Not Be Deposed in Pre-Litigation Discovery
Since the plaintiff did not a file a lawsuit against John Doe, the Texas trial court had no jurisdiction to allow the plaintiff to take the deposition of “Trooper,” an anonymous blogger who launched on on-line attack on the CEO of a company who lives in Houston.
Hide This extra mobile ad.