Thursday, March 14, 2019

If everything uses the same ‘engine’ and that ‘engine’ stalls, everyone stalls. Simple.
Gmail and YouTube hit with massive outage that sent the internet into a panic
What’s the first thing you do when any popular service you rely on goes down? Why you panic and take to social media to warn everyone that the end is nigh, of course! Beginning around 10:00 PM EST on Tuesday night, users around the world began to notice that something wasn’t right with several Google services on which they’ve come to rely. The first reports suggested something was amiss with Gmail, and the volume of those reports increased exponentially. Yes, Gmail was indeed down… but things didn’t stop there. Google Drive would quickly follow, with users unable to connect and access their files.
As if all that wasn’t bad enough, YouTube soon began having issues as well. A Google Drive outage is annoying and a Gmail outage is obviously even worst. YouTube was the last straw, however, and users poured into social media services like Facebook and Twitter to vent over the fact that they watch their favorite creators.


(Related)
Facebook and Instagram are down, and the internet is freaking out
Facebook users are facing problems with posting to the social sites on Wednesday, and the company has not yet said when they could be back online.
People on Instagram and WhatsApp (which are owned by Facebook) also saw similar errors when trying to post photos or videos.




Not surprising. Constant training and reminders help.
CISOMag reports on a recent survey and report, Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions, authored by Dr. William Gordon and colleagues. Not surprisingly, the survey found that the healthcare sector was susceptible to phishing attacks.
How susceptible, you wonder?
William specified that when the researchers sent simulated phishing emails, nearly one in seven of the emails were clicked by employees of healthcare organizations.
The phishing simulations were conducted between August, 2011 and April, 2018.
Read more on CISOMag.
From the report on JAMA Network:
The final study sample included 6 anonymized US health care institutions, 95 simulated phishing campaigns, and 2 971 945 emails, 422 062 of which were clicked (14.2%).




A short paper on a topic of interest.
Understanding the Changing Landscape of Data Protection Laws
Klinkner, Blake, Understanding the Changing Landscape of Data Protection Laws (February 11, 2019). The Wyoming Lawyer, February 2019, at 44-45.. Available at SSRN: https://ssrn.com/abstract=3332687
“As businesses and other entities have sought to collect more personal data on individuals, the public has pushed back, and lawmakers throughout the United States and elsewhere have responded by passing data protection laws. Recent data protection laws passed by the European Union and by several states have already resulted in a number of lawsuits against businesses who handle personal data. Attorneys should become familiar with this changing legal landscape in order to best protect their clients, practices, and their own personal accounts. This article discusses recent legislation addressing data protection and data privacy, including the 2018 General Data Protection Regulation passed in the European Union, and the California Consumer Privacy Act of 2018. This article next discusses how data protection and privacy laws will continue to evolve in the United States and elsewhere. This article concludes by providing recommendations for attorneys in adapting to the changing landscape of data protection and privacy laws.”


(Related) Nothing much new here either.
GDPR - Improving Data Privacy and Cyber Resilience?




Law Enforcement will get this data one way or another. It’s just too useful.
Home DNA-testing firm will let users block FBI access to their data
One of the biggest home DNA-testing companies seems to have bowed to a backlash over its decision to allow the FBI access to its database, by announcing a new way for customers to stop law-enforcement agencies accessing their data.
FamilyTreeDNA faced criticism when BuzzFeed News recently revealed that the company had chosen to cooperate with the FBI without consulting customers.
Initially, the only way for individuals to deny the FBI access was to opt out of the firm’s DNA-matching service entirely, depriving themselves of a tool that has become vital for many genealogists.
But on 12 March, FamilyTreeDNA told customers that they could now retain the matching service but end access by law-enforcement agencies.




No doubt alerts will cause some fools to run toward the event, trying for the sui-selfie (suicide selfie). Will this work in Denver where police and fire radios are encrypted?
Citizen, the real-time crime alerting app, is growing in big cities
… Using a combination of human employees and technology, Citizen scans hundreds of public-safety radio bands 24-hours a day in the major cities where it's deployed, sometimes by playing audio at three times the speed. It filters out what it deems non-essential and sends the information as short, factual alerts to everyone within a quarter mile of the incident. The app updates with a list of details as they roll in and lets people nearby take live video or comment with information.
Some local governments and police departments have their own alerting apps, and sites like Nextdoor are filled with user reports of incidents. But what makes Citizen different are its sources, the volume and speed of its text updates. It's closer in spirit to police scanner apps.
"What we have done, in essence, is open up the emergency response system from an information perspective," Citizen co-founder and CEO Andrew Frame told CNN Business.
… The app originally launched in New York with the name "Vigilante" and was quickly taken down from the Apple App Store over concerns it would encourage people to rush toward danger. At the time, the New York City Police Department spoke out against the app: "Crimes in progress should be handled by the NYPD and not a vigilante with a cell phone," it said in a statement.




Would this require the student to supply a password?
From EPIC.org:
The Eleventh Circuit has issued a decision in Jackson v. McCurry. A student’s family filed the case after school officials searched her cell phone without probable cause. The appeals court ruled against the the student because the law limiting searches of student cell phones was not “clearly established.” EPIC filed an amicus brief, arguing that searches of student phones should be “limited to those circumstances when it is strictly necessary” after the Supreme Court’s decision in Riley v. California. EPIC wrote that “most teenagers today could not survive without a cellphone.” The court recognized the need to limit school searches of cell phones, noting that “the reasoning of Riley treats cellphone searches as especially intrusive in comparison to searches incident to arrest of personal property” and that “a search of a student’s cellphone might require a more compelling justification than that required to search a student’s other personal effects.” However, the court refused to hold that this right was “clearly established.” EPIC routinely files L[amicus briefs] in cases raising new privacy issues. EPIC has also long advocated for greater student privacy protections, including a Student Privacy Bill of Rights.


No comments: