Pages

Monday, March 14, 2022

Marginalia Of Offense v. Defense - Cybercrime

Marginalia

 This is an independent DIY search enginethat focuses on non-commercial content, and attempts to show you sites you perhaps weren’t aware of in favor of the sort of sites you probably already knew existed. The software for this search engine is all custom-built, and all crawling and indexing is done in-house. This search engine isn’t particularly well equipped to answering queries posed like questions, instead try to imagine some text that might appear in the website you are looking for, and search for that…So it’s a search engine. It’s perhaps not the greatest at finding what you already knew was there, instead it is designed to help you find some things you didn’t even know you were looking for…”


You Need to Be Using a VPN on Your Phone CNET – “Here’s How to Set it Up in Under 10 Minutes Protecting your privacy on your phone with a VPN is essential, and it’s easier to set up than you may think…VPNs are easier to use on your phone than you may think, and most are less expensive than you might expect. Here’s how to get a VPN, or virtual private network, set up on your iPhone or Android phone — and get back to browsing safely on your mobile device — in under 10 minutes…”



  • Offense v. Defense – The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.
  • 2022 Guide to Internet Privacy Resources and Tools – The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.
  • Using News and Social Media for Finding Financial Assets – 5 Top Tips – Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.
  • International law says Putin’s war against Ukraine is illegal. Does that matter? Hurst Hannum, Professor of International Law, Fletcher School of Law & Diplomacy, Tufts University acknowledges that International laws are in place to prevent war and help protect civilians and combatants alike. But he further states that these laws are challenging to enforce and are unlikely to stop the unfolding Russia-Ukraine war.
  • Biden nominates Ketanji Brown Jackson to the Supreme Court: 7 questions answered – Alexis Karteron, constitutional law professor, Rutgers University, Newark, provides insight on what Judge Ketanji Brown Jackson, the first Black woman nominated to the Supreme Court, could mean for how that court works.
  • Putin’s claim to rid Ukraine of Nazis is especially absurd given its history – Jeffrey Veidlinger, a Holocaust historian at the University of Michigan, explains why Ukrainian history needs to be understood in terms of both past violence against Jews as well as the state’s pluralistic vision.
  • Pete Recommends – Weekly highlights on cyber security issues, February 26, 2022 – Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.
  • Pete Recommends – Weekly highlights on cyber security issues, February 19, 2022 – Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.
  • Pete Recommends – Weekly highlights on cyber security issues, February 12, 2022 – Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.
  • Pete Recommends – Weekly highlights on cyber security issues, February 5, 2022 – Five highlights from this week: The modern workplace: Will remote tech workers tolerate being monitored?; How to Protect Yourself From Common Scams; Academic Journal Claims it Fingerprints PDFs for ‘Ransomware,’ Not Surveillance; Security agency director urges governors to teach cybersecurity basics; Best Password Manager Reviews; and Democratic Lawmakers Call for Ban of Surveillance Advertising.