Passwords

News & Analysis as of

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

LinkedIn admits that 2012 data breach in fact affected 177 million users’ data

A LinkedIn data breach in 2012 supposedly exposed 6.5 million LinkedIn users’ hashed passwords. LinkedIn announced yesterday (May 18, 2016) that in fact, it impacted more than 177 million user accounts, and that the...more

Trusts and Estates Group News: Estate Planning Enters the Digital Age

One reality of modern life is our increasing reliance on digital information and services. It’s difficult to take and then order prints of photographs, accumulate travel rewards, book travel, sort through financial records,...more

The Proof Is in the Password!

Consider this scenario: A young couple entrusts you, an experienced real estate attorney, to assist them in the purchase of their first home. Days before closing, your unsecured email account gets hacked and your client...more

Estate Planning, Wills and Trusts: Importance of Considering the Internet and “Digital Assets” in Estate Planning

“Forgot your ID or password?” Everyone using the Internet has probably been asked and answered “Yes” to this question. That usually means having to take the time to answer more questions or search for...more

Stolen user credentials account for over half of all data breaches in 2015

Verizon recently released its yearly Data Breach Investigations Report and as always, the report is a very informative read. The report gathered information from more than 64,000 security incidents worldwide in 2015, 2,260 of...more

Privacy Tip #30 – Protect yourself and your co-workers: please don’t sell your company credentials

I am on a lot of privacy and security list-serves and keep up with surveys relating to data privacy and security. I was most distressed this week to download SailPoint’s 2016 Market Pulse Survey. Not that it isn’t well...more

Keying into your digital assets: Revise your estate plan to account for online documents

In the not-so-distant past, one likely kept copies of vital estate planning documents locked in a fire-resistant vault or file cabinet, with copies at an attorney’s office. However, in this digital age, it’s more likely that...more

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Challenging the Conventional Wisdom on Mandatory Password Changes

Very interesting thought piece from the FTC’s Chief Technologist. Do mandatory password resets actually make us less secure? ...more

Check Your Password and Touch ID If You’re Divorcing

Generally speaking, when you’re involved in marital conflict (divorce, separation, etc.), you should immediately change the password to your email, work computer, tablet and of course your phone. We also discussed this in...more

MFA – Multi-Factor Authentication

Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more

Weak Baby Monitor Security Subject of FTC Internet of Things Study

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices tested did not have basic security procedures in place. The FTC warned that such...more

Oklahoma and Virginia become newest states to consider social media legislation

The list of states that have passed social media legislation is getting longer. Early next week, Oklahoma will become the newest state to consider social media legislation (along with approximately 23 others) to prohibit...more

FTC warns, connected baby monitors are more susceptible to hackers

At the PrivacyCon event held by the Federal Trade Commission (FTC) last week in Washington, D.C., the FTC warned that several brands of baby monitors lack basic security features like complex passwords and data encryption,...more

Password authentications should become more obsolete

The username/password method of authentication is dying, albeit slower than many of us would like. In 2016, we should see a continued trend of replacing password authentication as the primary method for navigating through...more

Privacy Tip #15 – Protecting your privacy during holiday travel

The holiday season means traveling to see family and friends, and is a wonderful time of year. That travel includes planes, trains and automobiles. Although that movie was hilarious, travel can be hazardous to the protection...more

Public-private team of security experts disrupt Dorkbot malware

This is how it should be—private companies working with law enforcement to disrupt evil doers on the Internet. Late last week, Microsoft announced that it teamed up with the Department of Homeland Security, Europol, the FBI,...more

Anonymous hacks login information of Paris climate summit attendees

In what has been described as a response to the arrests of protesters on a climate march in Paris this past Sunday in the midst of the United Nations Framework Convention on Climate Change (UNFCC), the hactivist organization...more

Game of Phones: Employer-Issued Smartphones and Employee Fifth Amendment Protections

A recent court decision holding that employees can claim the Fifth Amendment and refuse to unlock password-protected smartphones, even though the phones were issued by their employer for company business, demonstrates the...more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

Is It Ever Okay to Share Passwords?

If you’ve ever let your kids sign into your Netflix or HBO Go account, or given your marketing department access to your Twitter feed, you may be committing a federal crime, depending on how the Ninth Circuit rules on a case...more

Alert: Estate Planning for Digital Assets

Do you have a personal laptop computer, iPad, iPhone or other personal electronic device requiring an access password? Who, besides you, has that information? If something happens to you, how will your information be...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Nosal Update: Ninth Circuit Hears Oral Arguments on Password Sharing and Scope of Computer Fraud and Abuse Act

On October 20, 2015, a Ninth Circuit panel consisting of Chief Judge Sidney Thomas and Judges M. Margaret McKeown and Stephen Reinhardt heard oral argument from the U.S. Department of Justice and counsel for David Nosal on...more

264 Results
|
View per page
Page: of 11
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×