Tumgik
#cyber security laws
casefoxinc · 1 year
Link
As law firms continue to digitize their operations, cyber security risks become more significant than ever. Legal professionals must ensure that their clients' confidential information is secure, and the firm's reputation remains intact. Our comprehensive guide to Cyber Security for Law Firms outlines everything legal professionals need to know to protect their clients' sensitive data from cyber threats. From the latest security best practices to the essential tools and techniques to secure your systems, this guide has it all. Don't take any chances with your clients' privacy – learn how to safeguard their data with our expert advice on Cyber Security for Law Firms.
3 notes · View notes
rightnewshindi · 15 days
Text
शातिरों ने 'कौन बनेगा करोड़पति' के नाम पर युवक से ठगे 11 लाख रुपए, फेसबुक लिंक से वारदात को दिया अंजाम
Hamirpur News: हिमाचल प्रदेश के हमीरपुर (Hamirpur) में एक युवक के साथ बेहद शातिर अंदाज में ठगी कर ली गई. यह मामला ख्याह गांव का है. यहां युवक से ‘कौन बनेगा करोड़पति’ में साढ़े आठ लाख के कैश प्राइज के नाम पर 11 लाख की ठगी हो गई. इस मामले की शिकायत पीड़ित ने पुलिस से की. पुलिस ने केस दर्ज कर मामले की जांच शुरू कर दी है. जानकारी के अनुसार, पीड़ित युवक हमीरपुर के ख्याह गांव का रहने वाला है, जो…
0 notes
jcmarchi · 2 months
Text
SEC charges against SolarWinds largely dismissed - CyberTalk
New Post has been published on https://thedigitalinsider.com/sec-charges-against-solarwinds-largely-dismissed-cybertalk/
SEC charges against SolarWinds largely dismissed - CyberTalk
Tumblr media Tumblr media
EXECUTIVE SUMMARY:
In a landmark case, a judge dismissed most of the charges against the SolarWinds software company and its CISO, Timothy Brown.
On July 18th, U.S. District Judge Paul Engelmayer stated that the majority of government charges against SolarWinds “impermissibly rely on hindsight and speculation.”
The singular SEC allegation that the judge considered credible concerns the failure of controls embedded in SolarWinds products.
For its part, SolarWinds has consistently maintained that the SEC’s allegations were fundamentally flawed, outside of its area of expertise, and a ‘trick’ designed to allow for a rewrite of the law.
Why it matters
For some time, the SEC has pursued new policies intended to hold businesses accountable for cyber security practices; an understandable and reasonable objective.
In this instance, the SEC said that claims made to investors in regards to cyber security practices had been misleading and false – across a three year period.
The SEC’s indictment also mentioned falsified reports on internal controls, incomplete disclosure of the cyber attack, negligence around “red flags” and existing risks, and more.
But what caught the attention of many in the cyber security community was that, in an unprecedented maneuver, the SEC aimed to hold CISO Timothy Brown personally liable.
This case has been closely watched among cyber security professionals and was widely seen as precedent-setting for future potential software supply chain attack events.
Timothy Brown’s clearance
In the end, the court ruling does not hold CISO Timothy Brown personally liable for the breach.
“Holding CISOs personally liable, especially those CISOs that do not hold a position on the executive committee, is deeply flawed and would have set a precedent that would be counterproductive and weaken the security posture of organizations,” says Fred Kwong, Ph.D, vice president and CISO of DeVry University.
Despite the fact that this court ruling may loosen some CISO constraints, “you need to be honest about your security posture,” says Kwong.
The remaining claim against the company, which will be scrutinized further in court, indicates that there is a basis on which to conclude that CISOs do have certain disclosure obligations under the federal securities laws.
Further details
The SolarWinds incident, as its come to be known, has cost SolarWinds tens of millions of dollars. In 2023, the company settled a shareholder lawsuit to the tune of $26 million.
A spokesperson for SolarWinds has stated that the company is “pleased” with Judge Engelmayer’s decision to dismiss most of the SEC’s claims. The company plans to demonstrate why the remaining claim is “factually inaccurate” at the next opportunity. For expert insights into and analyses of the SolarWinds case, please see CyberTalk.org’s past coverage. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
0 notes
touchaheartnews · 5 months
Text
Moruf Oseni's Wema Bank in Trouble, Faces Multi-million Naira Penalties For Violating Nigerian Cyber security Laws
  A recent investigative report obtained by this Touchaheart Nigeria has shed light on WEMA Bank’s legal entanglements in 2023, with the financial institution facing penalties totaling N61.350 million for contravening seven Nigerian laws within a single year.   The revelations surfaced from WEMA Bank’s comprehensive financial statement for the fiscal year 2023, which unveiled a series of legal…
Tumblr media
View On WordPress
0 notes
arthrussell · 6 months
Text
সাইবার নিরাপত্তা আইন
P.C. – Collected from CIRT ডিজিটাল বা ইলেকট্রনিক মাধ্যমে সংঘটিত সাইবার অপরাধ (Cyber Crime) দমন ও প্রতিরোধের উদ্দেশ্যে বাংলাদেশ সরকার বহুল বিতর্কিত ডিজিটাল নিরাপত্তা আইন, ২০১৮ রদ করে সাইবার নিরাপত্তা আইন, ২০২৩ নামে একটি নতুন আইন প্রণয়ন করেন। সাইবার নিরাপত্তা আইনের সংজ্ঞানুসারে, “সাইবার নিরাপত্তা” অর্থ দ্বারা কোনো ডিজিটাল ডিভাইস, কম্পিউটার বা কম্পিউটার সিস্টেম এর নিরাপত্তাকে বোঝানো হয়েছে। সাইবার…
Tumblr media
View On WordPress
0 notes
artisticdivasworld · 7 months
Text
How to Protect Your Business From Cyber Threats
Cybersecurity is a major topic every business owner should be discussing. Here is some info from FRC that we hope helps.
Imagine we’re sitting down over a cup of coffee, and you’ve just asked me how to shield your trucking business from the ever-looming shadow of cyber threats. It’s a digital age dilemma, but I’m here to walk you through some straightforward strategies to bolster your defenses. First off, let’s talk about the elephant in the room: cyber threats. They’re not just a problem for the tech industry;…
Tumblr media
View On WordPress
0 notes
margaret-mead · 7 months
Text
The Crucial Importance of Network Traffic Classification for Optimizing Connectivity
Greetings from Solana Networks, the leading source for state-of-the-art Network Traffic Classification solutions. With the ability to discern between dangerous and benign actions, our sophisticated algorithms carefully examine data flows and provide organisations with insights never before possible. We ensure optimal performance and security by decoding complex network behaviours with our cutting-edge technologies. Solana Networks offers customised solutions that are suited to your requirements, whether your goals are seamless network management, threat detection, or compliance adherence. Put your trust in our experience to protect your digital infrastructure from changing threats, increase productivity, and streamline operations. With Solana Networks, discover the possibilities of network intelligence in the future.
Phone: 613-596-2557
0 notes
bnblegalindia · 1 year
Text
0 notes
imranirshad786 · 1 year
Text
Cybersecurity and Data Protection Laws in Pakistan
Tumblr media
Summary of the Article
Pakistan is a growing target for cyberattacks. The government is taking steps to improve cybersecurity, but there are still a number of challenges. This article discusses the current state of cybersecurity and data protection in Pakistan, and provides tips for businesses and individuals to protect themselves.
Click Here to Read Full Article
0 notes
thesecureradius · 2 years
Text
The latest ransomware attack has been aimed at a non-profit organization, the Salvation Army. The organization has confirmed that their IT systems were breached, read more
0 notes
ledxlaw · 2 years
Text
Tumblr media
Cyber law & security Course Online With Certification | LedX
Get certified in cyber security courses online and learn the skills. LedX offers a cyber security course that covers everything from basic security concepts to advanced techniques. Enroll now and get started today.
0 notes
buffaloretro · 2 years
Text
Shadow Net Series 27: All the World’s a Stage Part One: Interested in You, Interested in You, Intere-
Shadow Net Series 27: All the World’s a Stage Part One: Interested in You, Interested in You, Intere-
A website that displays all currently unprotected and open webcams across the web in real time and the database we all bunk in together already. The other day I was having a conversation with a fellow blogger about writing. I had been following their work for a couple months now and admired how honest they were about their own life experiences thus far. It seems honesty is a finite resource in…
Tumblr media
View On WordPress
1 note · View note
inhousecommunity12 · 2 years
Text
Vietnam cyber security Law – 2022 Legal Regulations
The latest current Law on cyber security of 2018 applies strict network security protection regulations, along with rules for handling violations in order to improve order maintenance and network security protection. The goal being to create a healthy and safe cyberspace for Vietnamese citizens.
What is the cyber security Law of 2018?
The Vietnam cyber security Law of 2018 consists of 7 chapters with 43 articles of law that strictly regulate national security protection activities. These are the responsibility of the relevant agencies, individuals and organizations that ensure the safety and security of society on cyberspace.
When did the cyber security Law of 2018 take effect?
On June 12, 2018, after receiving 87% of votes from the National Assembly deputies, the Law on cyber security of 2018 was passed and officially took effect on January 1, 2019.
Highlights of the Law on cyber security of 2018
Some highlights of the 2018 cyber security Law include:
Tumblr media
It is strictly forbidden to post false information
According to Article 8 of this Law, the following acts are strictly prohibited in the network environment:
Acts of violation of the law on national security, social order and safety specified in Article 18.1 of this Law;
Organizing, operating, colluding, instigating, bribing, deceiving, enticing, and training people against the State of the Socialist Republic of Vietnam;
Distorting history, denying revolutionary achievements, undermining the great national unity bloc, insulting religion, discriminating based upon gender or race;
Disseminating false information that causes confusion among the people, causes damage to socio-economic activities, causes difficulties for the operation of state agencies or those that perform official duties, infringes upon the legitimate rights and interests of the people, or the laws of other agencies, organizations and individuals;
Engaging in prostitution, social evils, or human trafficking; the posting of lewd, depraved, or criminal information; undermining the nation’s fine customs and traditions, social morality or the health of the community.
1 note · View note
phantoids · 2 years
Text
Okay fuck it I'm making this post.
So, we all know the dsmp fandom, especially on twitter, has a bit of a problem with leaktwt and often lots of controversy springing from stuff obtained by kiwifarms. I'd like to talk about this, because it's been pissing me off for months and it's getting ridiculous.
Please stop trusting information like this, or at the very least be cautious with how you interact with it, take it with a large grain of salt or maybe even a handful, don't take it at fucking face value and consider to yourself: why did they obtain this information and how did they obtain it.
Especially the how, because I've noticed the amount of illegally obtained data, from information unobtainable without some form of hacking to a lot of cases of spear phishing. Spear phishing, for those who don't know, is a targeted form of phishing against a specific person; phishing is often described as trying to obtain personal or sensitive information, and here the definition is applicable as digging through years worth of information otherwise inaccessible to the average user without purposefully searching everywhere for it, specifically information from or about a specific person.
This happens a lot, we see many cases, from the people who keep doxxing ccs, to the more recent things with certain information from Steam about Wilbur being made public despite the fact it's inaccessible without some sort of digging or manipulation, and now with (I believe, idk i've not really been looking at it for obvious reasons) the whole Tubbo thing and I believe that was leaked private messages of a friend, I could be wrong there. Either way, there's been so many cases of doxxing, leaked private messages, information inaccessible on the front end of things and it's getting to a genuinely worrying point.
And this isn't because I care about content creators, but I do care about upholding data privacy. Yes, even if they've said shit in the past, please don't go digging and digging because that does fall into spear phishing, and at the end of the day it is very dubiously legal at best. This is something we're taught about in fucking cyber security courses, for even further perspective on how bad it is. Not to mention, often this information is dug up by infamous leaktwt or kiwifarms, which are pretty known for bad faith digging up of shit.
These people dig it up for clout, they dig it up for attention, they do not care who gets fucking hurt and often bringing up old shit is going to harm more people than it fucking helps. It's even worse when you try to hold someone accountable for something someone else did, especially years in the past like it's their fault.
Just, please, stop supporting this, stop circulating this shit like morning gossip, because you're not only hurting people for no good reason, it's also often spreading illegally obtained information from people who commit cybercrimes on the regular. It breaks data protection laws, it breaks someone's fucking privacy.
Content creators are people. Respect their privacy, for fuck's sake, and stop egging on leaktwt/kiwifarms, because at the end of the day you're just telling them it's perfectly fine.
And their campaign of digging things up and harming people in bad faith doesn't end at your favourite cis white boy. They will harm minorities, and they already do, just for clout and fun. Stop it while you can before it gets out of hand, and make it clear they aren't welcome, because the fandom doesn't make it clear enough.
This isn't, of course, to say you cannot be critical of information found about ccs, but please don't allow a side effect to be encouraging or inadvertently making leaktwt/kiwifarms believe it's safe for them here, and that they are supported. Be critical when your fav is found to have said awful shit in the past, give them time to clarify, but also just... be a little critical about how accurate that info is, and who is supplying it. If you find yourself thinking 'now is this really legitimately obtained?' then maybe don't spread it, because it could be fake but a lot of the time it's already been addressed and is simply spread in bad faith.
And sure, they're exposing shitty stuff right now, but what happens when they doxx someone's address for fun?
Data privacy is important, it affects everyone, and even the worst people deserve to keep it. Sure, law enforcement and courts might be able to obtain this stuff, but you're not law enforcement nor a court and you're not entitled to personal data whenever.
1K notes · View notes
butchgtow · 7 months
Text
Introduction to Armchair Activism
Current feelings about the state of radblr.
Fundamentals
"Yes, Everyone on the Internet Is a Loser." Luke Smith. Sep 3, 2022. YouTube.
An activist movement can be a place to build community with like-minded people, but action is its foremost purpose, not community. To allow yourself and other activists to remain effective, you are obliged to abandon your personal dislikes of other individual activists. Disagreements are worth discussion, but interpersonal toxicity is not.
Connect with in-person community and do not unhealthily over-prioritize online community. Over-prioritization of online community is self-harm.
Luke is a loser, but his channel is teeming with entry-level digital literacy information and advice pertaining to healthy use of technology for us cyborgs.
"Surveillance Self-Defense: Tips, Tools and How-Tos For Safer Online Communication." Electronic Frontier Foundation.
Hackblossom, outdated, is discontinued. The EFF project Surveillance Self-Defense is up-to-date, comprehensive, and follows personal educational principles of simplicity and concision.
To learn more about general (not focused solely on personal action) cybersecurity, visit Cybersecurity by Codecademy and Cyber Security Tutorial by W3Schools. Both contain further segueways into other important digital literacies.
Direct recommendation: Install and set up the linux distribution Tails on a cheap flash drive.
Direct recommendation: Develop your own home network security schema.
Direct recommendation: Always enable 2FA security for Tumblr, disable active / inactive status sharing, and learn to queue reblogs and posts to protect against others' interpretations of your time zone.
Direct recommendation: It's both possible and relatively simple to host your own instance of a search engine using SearXNG.
Zero-Knowledge Architecture.
As a remote activist (even if also a hybrid activist), none of your action should be taken on, using, or interfacing with non-zero-knowledge-architecture services. Tumblr is, of course, a risk in and of itself, but you should not be using services provided by companies such as Google, Microsoft, or any others based in or with servers hosted in 13-eyes agreement nations.
Search for services (email, word processor, cloud storage) which emphasize zero-knowledge architecture. Businesses whose services are structured as such cannot hand over your data and information, as they cannot access it in the first place. If they cannot access the majority of your metadata, either - all the better.
Communications for Armchair Activism
"Technical Writing." Google.
Contained within the linked page at Google Developers, the self-paced, online, pre-class material for courses Technical Writing One, Technical Writing Two, and Tech Writing for Accessibility teach activists to communicate technical concepts in plain English.
"Plain Language." U.S. General Services Administration.
Plain language is strictly defined by U.S. government agencies, which are required to communicate in it for simplicity and quick, thorough comprehension of information.
"Explore Business Law." Study.com.
Extensive courses are offered to quickly uptake principles of business law such as antitrust law, contract law, financial legislation, copyright law, etc. Legal literacy is often the difference between unethical action of a business and its inaction. Legal literacy is also often the difference between consideration and investment in your policy idea and lack thereof.
"Business Communication." Study.com.
Now that you're able to communicate your prioritized information, you may also initiate writing with bells and whistles. While other activists care most about the information itself, business communication allows you to communicate your ideas and needs to those who you must convince worthiness of investment to and win over.
Logic.
Learn it through and through. Start with fallacies if you're better at language and work your way backwards to discrete mathematics; start with discrete mathematics if you're better at maths and work your way forwards to fallacies, critical literacy, and media literacy. State that which you intend to state. Recognize empiricism and rationalism for what they are. Congratulations: you are both a mathematician and a law student.
Economic Literacy for Armchair Activism
"Microeconomics." Khan Academy.
"Macroeconomics." Khan Academy.
The globe operates on profitability. Women's unpaid labor is a massive slice of the profitability pie. While it's possible to enact change without understanding all that drives the events around you, it's impossible to direct or meaningfully manipulate the events around you beyond your scope of comprehension.
Understand economics or be a sheep to every movement you're active in and to every storm that rolls your way.
71 notes · View notes
mariacallous · 5 months
Text
You’ve been asked to serve on the jury in the first-ever criminal prosecution of a United States president. What could possibly go wrong? The answer, of course, is everything.
A juror in former president Donald Trump’s ongoing criminal trial in New York was excused on Thursday after voicing fears that she could be identified based on biographical details that she had given in court. The dismissal of Juror 2 highlights the potential dangers of participating in one of the most politicized trials in US history, especially in an age of social media frenzies, a highly partisan electorate, and a glut of readily available personal information online.
Unlike jurors in federal cases, whose identities can be kept completely anonymous, New York law allows—and can require—the personal information of jurors and potential jurors to be divulged in court. Juan Merchan, the judge overseeing Trump’s prosecution in Manhattan, last month ordered that jurors’ names and addresses would be withheld. But he could not prevent potential jurors from providing biographical details about themselves during the jury selection process, and many did. Those details were then widely reported in the press, potentially subjecting jurors and potential jurors to harassment, intimidation, and threats—possibly by Trump himself. Merchan has since blocked reporters from publishing potential jurors’ employment details.
The doxing dangers that potential jurors face became apparent on Monday, day one of the proceedings. An update in a Washington Post liveblog about Trump’s trial revealed the Manhattan neighborhood where one potential juror lived, how long he’d lived there, how many children he has, and the name of his employer. Screenshots of the liveblog update quickly circulated on social media, as people warned that the man could be doxed, or have his identity revealed publicly against his will with the intent to cause harm, based solely on that information.
“It's quite alarming how much information someone skilled in OSINT could potentially gather based on just a few publicly available details about jurors or potential jurors,” says Bob Diachenko, cyber intelligence director at data-breach research organization Security Discovery and an expert in open source intelligence research.
Armed with basic personal details about jurors and certain tools and databases, “an OSINT researcher could potentially uncover a significant amount of personal information by cross-referencing all this together,” Diachenko says. “That's why it's crucial to consider the implications of publicly revealing jurors' personal information and take steps to protect their privacy during criminal trials.”
Even without special OSINT training, it can be trivial to uncover details about a juror’s life. To test the sensitivity of the information the Post published, WIRED used a common reporting tool to look up the man’s employer. From there, we were able to identify his name, home address, phone number, email address, his children’s and spouse’s identities, voter registration information, and more. The entire process took roughly two minutes. The Post added a clarification to its liveblog explaining that it now excludes the man’s personal details.
The ready availability of those details illustrates the challenges in informing the public about a highly newsworthy criminal case without interfering in the justice process, says Kathleen Bartzen Culver, the James E. Burgess Chair in Journalism Ethics and director of the School of Journalism & Mass Communication at the University of Wisconsin-Madison.
“Simply because a notable figure is on trial does not mean that a juror automatically surrenders any claim to privacy,” Bartzen Culver says. “People who have been drawn into a case that is exceptionally newsworthy are not aware that a simple statement that they make about where they work might identify them and open them up to scrutiny and possibly risk.”
The dangers to jurors or potential jurors has only increased since the first day of jury selection, which remains ongoing, in part due to the challenges of prosecuting a former US president and the presumptive Republican nominee in the 2024 US presidential election. Trump is charged with 34 counts of falsifying business records, a class E felony in New York state, for payments made ahead of the 2016 presidential election related to alleged affairs with two women, adult performer Stormy Daniels and Playboy model Karen McDougal. Trump has claimed his prosecution is a “communist show trial” and a “witch hunt” and has pleaded not guilty.
On Fox News, coverage of Trump’s trial has repeatedly focused on the potential political motivations of the jurors, bolstering the former president’s claims. Trump, in turn, has repeated the claims by the conservative news network’s hosts. In a post on Truth Social on Wednesday, Trump quoted Fox News commentator Jesse Watters claiming on air that potential jurors in Trump’s trial are “undercover liberal activists lying to the judge in order to get on the Trump jury.” This, despite a gag order that forbids Trump from “making or directing others to make public statements about any prospective juror or any juror in this criminal proceeding.”
Broader media coverage of the Trump trial jurors appears to often be the work of political reporters who are unfamiliar with the journalism ethics specific to covering a criminal trial, says UW-Madison’s Bartzen Culver. “It's like when political reporters covered Covid and science journalists lost their minds.” She adds that it’s important for any journalist covering a criminal case—Trump’s or otherwise—to “consider our role within the justice system.”
“Unethical behavior by journalists can delay trials. It can result in overturned convictions and the people having to go back and do a retrial,” Bartzen Culver says. “That all works against our system of justice.”
The New York case is one of four ongoing criminal proceedings against Trump. In Georgia, where he faces multiple felony charges for alleged attempts to interfere with the state’s electoral process in 2020, Trump supporters leaked the addresses of members of the grand jury, after their names were listed in the 98-page indictment against the former president, as required by state law. Georgia’s Fulton County Sheriff’s Office said last August that it was investigating threats against the jury members. The incident highlights the persistent dangers people can face from Trump’s supporters, both in the near term and for the rest of their lives, if they’re viewed as having acted against him.
The leaks were discovered by Advance Democracy Inc. (ADI), a nonpartisan, nonprofit research and investigations organization founded by Daniel J. Jones, a former investigator for the FBI and the US Senate Intelligence Committee. So far, Jones tells WIRED, ADI has not uncovered attempts to dox jurors in Trump’s New York trial. But it’s still early days.
“We have not yet found identifying information on the extremist forums we monitor,” Jones says. “Having said that, I share your concern that it is only a matter of time before this happens.”
41 notes · View notes