Floppy disk containing the source code for the Morris Worm held at the Computer History Museum and Robert Morris on the right.

The Morris Worm, the First Indictment under the CFAA and Wake Up Call of a New Age

On November 2, 1988, Robert Tappan Morris, the son of a famous Bell Labs cryptographer, released and graduate student at Cornell University, released what became known as the “Morris worm” through Massachusetts Institute of Technology (MIT).  Morris stated that his intent was “to demonstrate the inadequacies of current security measures on computer networks by exploiting…

Photo of hacker and Tweet from Barack Obama.

Twitter Hacking Incidents Has Law Enforcement, Washington on Alert

On Wednesday, a hacker accessed 130 prominent Twitter accounts including that of Joe Biden, Mike Bloomberg, Jeff Bezos, Warren Buffett, Bill Gates, Kim Kardashian, Kanye West and the most followed Twitter account on the planet – Barack Obama – to promote a bitcoin scam.  This force Twitter to shut down verified Twitter users’ accounts for…

Webinar Cover

Free Webinar: Cyber Security Basics for the Work From Home Economy (4/2)

As part of the California Lawyers Association’s (CLA) Navigating COVID-19 Issues, I will be moderating a presentation entitled “Cyber Security Basics for the Work From Home Economy.”   It will be presented first as a FREE webinar Thursday, April 2nd at noon PST.  While it is free, you must first sign-up here. In addition, a video…

Digital Lines

Cyber Security Tips – Falls 2019

Since October is Cyber Security Awareness Month, below are some cyber security tips we have tweeted out over the past few months covering protecting sensitive documents, protecting against hacking and ransomware and using Public WiFi spots. Use a flash drive with fingerprint protection for your most sensitive documents. https://t.co/NfblvILaQU #cybersecurity — Internet Law Center (@InternetLawCent)…

Naomi Lefkovitz, NIST

CLA/TIP Monthly Call: An Update on NIST Privacy and Cyber Security Frameworks

An Update on NIST Privacy and Cyber Security Frameworks with Naomi Lefkovitz Senior Privacy Policy Advisor, Program Manager, Privacy Engineering National Institute of Standards and Technology, U.S. Department of Commerce Wednesday, April 10th at Noon Pacific Time Dial-in number 855-520-7605 / Passcode 1211276419# #CLATIPCall Agenda Part 1: Introduction Welcome/Introductions New Chatroom Feature – introduce yourself, comment or ask…

Cybersecurity Basics

FTC Releases Cybersecurity Basics Fact Sheets

The Federal Trade Commission has released a series of fact sheets and an introductory video on cybersecurity basics. The factsheets begin with the NIST Cybersecurity Framework which gives businesses an outline of best practices to help decide where to focus time and money for cybersecurity protection. Other topics covered are: Cybersecurity begins with strong physical security Ransomware Phishing…

Christopher Painter

CLBR #310 – Cyber Diplomacy Under Trump with Christopher Painter

Cyber Diplomacy Under Trump with Christopher Painter LISTEN VIA THESE CHANNELS     WMR iTunes Podbay Spreaker Stitcher Chris Painter is a globally recognized leader and expert on cybersecurity, cyber policy, Cyber Diplomacy and combatting cybercrime. He has been on the vanguard of US and international cyber issues for over twenty-five years—first as a leading federal prosecutor of…

Senator Mark Warner

Senator Warner Outlines Options for Regulating Big Tech

The Russian’s use of social media platforms to influence the 2016 election and the fallout from Facebook’s Cambridge Analytica scandal has triggered calls for regulation of the tech sector, but with no proposals emerging. Earlier this month, former acting-Commerce Secretary Cameron Kerry called for reviving the Obama-era Privacy Bill of Rights. Enter Senate Intelligence Committee…

Judge Gerald Tjoflat

Did the 11th Circuit Just Disarm the Nation’s Cybersecurity Cop?

Over the years, the Federal Trade Commission has emerged as the de facto traffic cop in addressing cybersecurity breaches.  Two recent cases sought to challenge the FTC’s authority in this area. The first was Wyndham Worldwide Corporation which challenged the FTC’s authority over data security only to have the Third Circuit affirm’s the FTC’s authority. The…

Secure the Village

Webinar (Thurs 5/3) – Basics of Cyber-Law

I will be part of a panel on a free webinar on the Basics of Cyber-Law for Secure the Village.  Secure the Village’s focus is turning people and organizations into Cyber Guardians having the knowledge, skills, and commitment needed to meet the ongoing challenges of cybercrime, cyber privacy and information security. WHEN: Thursday, May 3, 2018 at 10:00 a.m. SIGNUP…

Image of George Washington seeing through Election Process

No Action to Date on Secure Elections Act Legislation Discussed on 60 Minutes

CBS’ 60 Minutes yesterday aired a segment on When Russian hackers targeted the U.S. election infrastructure, that focused on the actual penetration into the Illinois Board of Elections by Russian hackers.  The segment included members of Congress expressing frustration with the Department of Homeland Security’s response to the hacking and preparations for 2018. Senator Kamala Harris (D-CA)…