#45 – IS YOUR PERSONAL INFORMATION SAFE? – CAROLYN TURBYFILL

Carolyn Turbyfill Ph.D.

Carolyn Turbyfill Ph.D.

In the last 6 months, I have been notified by 3 different vendors:  Adobe, Target and University of Maryland University College, of 4 data breaches.

Three of the breaches involved consumer data theft that may have or provably have compromised some of my private information:  i.e. Login credentials; credit card.   The amount of time between the breach and the notification of potentially affected parties has varied between 4 days and 7 weeks. Continue reading

#5 – QUANTIFYING CYBER ATTACKS AND CYBER WARFARE – (C) CAPERS JONES

Capers Jones pixThe advent of the computer era has brought with it several new kinds of criminal activities and also new forms of military engagements that take place over long distances and involve either disabling military equipment or stealing secret information, or both. Continue reading

#4 – QUANTIFYING CYBER ATTACKS AND CYBER WARFARE – (C) CAPERS JONES – TECHNOLOGY@RISK

The advent of the computer era has brought with it several new kinds of criminal activities and also new forms of military engagements that take place over long distances and involve either disabling military equipment or stealing secret information, or both.

There are also new laws against computer crimes including the United States Computer Fraud and Abuse Act from 1986 and the United Kingdom’s Computer Misuse Act.  There are also several laws against spyware.  However as in other fields laws do not prevent computer crimes.  Also, some computer malware such as browser hijackers and spyware may be legal if they are identified in license agreements that users accept.

Continue reading