If
everything uses the same ‘engine’ and that ‘engine’ stalls,
everyone stalls. Simple.
Gmail and
YouTube hit with massive outage that sent the internet into a panic
What’s the first thing you do when any popular
service you rely on goes down? Why you panic and take to social
media to warn everyone that the end is nigh, of course! Beginning
around 10:00 PM EST on Tuesday night, users around the world began to
notice that something wasn’t right with several Google services on
which they’ve come to rely. The first reports suggested something
was amiss with Gmail, and the volume of those reports increased
exponentially. Yes, Gmail was indeed down… but things didn’t
stop there. Google Drive would quickly follow, with users unable to
connect and access their files.
As if all that wasn’t
bad enough, YouTube soon began having issues as well. A Google Drive
outage is annoying and a Gmail outage is obviously even worst.
YouTube was the last straw, however, and users
poured into social media services like Facebook and
Twitter to vent over the fact that they watch their favorite
creators.
(Related)
Facebook
and Instagram are down, and the internet is freaking out
Facebook users are facing problems with posting to
the social sites on Wednesday, and the company has not yet said when
they could be back online.
People on Instagram and WhatsApp (which are owned
by Facebook) also saw similar errors when trying to post photos or
videos.
Not surprising. Constant training and reminders
help.
CISOMag reports on a recent survey and report,
Assessment of Employee Susceptibility to Phishing Attacks at US
Health Care Institutions, authored by Dr. William Gordon and
colleagues. Not
surprisingly, the survey found that the healthcare sector
was susceptible to phishing attacks.
How susceptible, you wonder?
William specified that when the researchers sent simulated phishing emails, nearly one in seven of the emails were clicked by employees of healthcare organizations.
The phishing simulations were conducted between
August, 2011 and April, 2018.
Read more on CISOMag.
From the report on JAMA
Network:
The final study sample included 6 anonymized US health care institutions, 95 simulated phishing campaigns, and 2 971 945 emails, 422 062 of which were clicked (14.2%).
A short paper on a topic of interest.
Understanding
the Changing Landscape of Data Protection Laws
Klinkner, Blake, Understanding the Changing
Landscape of Data Protection Laws (February 11, 2019). The Wyoming
Lawyer, February 2019, at 44-45.. Available at SSRN:
https://ssrn.com/abstract=3332687
“As businesses and other entities have sought to
collect more personal data on individuals, the public has pushed
back, and lawmakers throughout the United States and elsewhere have
responded by passing data protection laws. Recent data protection
laws passed by the European Union and by several states have already
resulted in a number of lawsuits against businesses who handle
personal data. Attorneys should become familiar with this changing
legal landscape in order to best protect their clients, practices,
and their own personal accounts. This article discusses recent
legislation addressing data protection and data privacy, including
the 2018 General Data Protection Regulation passed in the
European Union, and the California Consumer Privacy Act of
2018. This article next discusses how data protection and privacy
laws will continue to evolve in the United States and elsewhere.
This article concludes by providing recommendations for attorneys in
adapting to the changing landscape of data protection and privacy
laws.”
(Related) Nothing much new here either.
GDPR -
Improving Data Privacy and Cyber Resilience?
Law Enforcement will get this data one way or
another. It’s just too useful.
Home
DNA-testing firm will let users block FBI access to their data
One of the biggest home DNA-testing companies
seems to have bowed to a backlash over its decision to allow the FBI
access to its database, by announcing a new way for customers to stop
law-enforcement agencies accessing their data.
FamilyTreeDNA faced
criticism when BuzzFeed
News recently revealed that the company had chosen to cooperate
with the FBI without consulting customers.
Initially, the only way for individuals to deny
the FBI access was to opt
out of the firm’s DNA-matching service entirely, depriving
themselves of a tool that has become vital for many genealogists.
But on 12 March, FamilyTreeDNA told customers that
they could now retain the matching service but end access by
law-enforcement agencies.
No doubt alerts will cause some fools to run
toward the event, trying for the sui-selfie
(suicide selfie). Will this work in Denver where police and fire
radios are encrypted?
Citizen,
the real-time crime alerting app, is growing in big cities
… Using a combination of human employees and
technology, Citizen scans hundreds of public-safety radio bands
24-hours a day in the major cities where it's deployed, sometimes by
playing audio at three times the speed. It filters out what it deems
non-essential and sends the information as short, factual alerts to
everyone within a quarter mile of the incident. The app updates with
a list of details as they roll in and lets people nearby take live
video or comment with information.
Some local governments and police departments have
their own alerting apps, and sites like Nextdoor are filled with user
reports of incidents. But what makes Citizen different are its
sources, the volume and speed of its text updates. It's closer in
spirit to police
scanner apps.
"What we have done, in essence, is open up
the emergency response system from an information perspective,"
Citizen co-founder and CEO Andrew Frame told CNN Business.
… The app originally launched in New York with
the name "Vigilante" and was quickly taken down from the
Apple App Store over concerns it would encourage people to rush
toward danger. At the time, the New York City Police Department
spoke out against the app: "Crimes in progress should be handled
by the NYPD and not a vigilante with a cell phone," it said in a
statement.
Would this require the student to supply a
password?
From EPIC.org:
The Eleventh Circuit has issued a decision in Jackson v. McCurry. A student’s family filed the case after school officials searched her cell phone without probable cause. The appeals court ruled against the the student because the law limiting searches of student cell phones was not “clearly established.” EPIC filed an amicus brief, arguing that searches of student phones should be “limited to those circumstances when it is strictly necessary” after the Supreme Court’s decision in Riley v. California. EPIC wrote that “most teenagers today could not survive without a cellphone.” The court recognized the need to limit school searches of cell phones, noting that “the reasoning of Riley treats cellphone searches as especially intrusive in comparison to searches incident to arrest of personal property” and that “a search of a student’s cellphone might require a more compelling justification than that required to search a student’s other personal effects.” However, the court refused to hold that this right was “clearly established.” EPIC routinely files L[amicus briefs] in cases raising new privacy issues. EPIC has also long advocated for greater student privacy protections, including a Student Privacy Bill of Rights.
No comments:
Post a Comment