Thursday, February 24, 2022

In modern wars, not everything goes “Boom!” Some things go silent. How long could you tolerate being unable to access online services? What if you bank was offline for a month?

https://www.cnn.com/2022/02/23/europe/ukraine-government-commercial-organizations-data-wiping-hack/index.html

Key Ukrainian government websites hit by series of cyberattacks

The websites of the Ukrainian Cabinet of Ministers, and those of the ministries of foreign affairs, infrastructure, education and others, were experiencing disruptions.

In a separate and potentially more serious hacking incident hours earlier, a data-wiping tool was found on hundreds of computers in Ukraine, according to cybersecurity researchers, raising concerns that a destructive cyberattack was unfolding amid Russia's military escalation.

US officials have warned that Russia will very likely use cyber operations in conjunction with military action in Ukraine. President Joe Biden said last month the US could respond with cyberoperations of its own if Russia conducts additional cyberattacks in Ukraine.

The website disruptions early Thursday in Ukraine followed news Wednesday afternoon of a cyberattack that temporarily knocked offline the websites of the Ukrainian parliament, Security Service and Cabinet of Ministers.



Perspective. Rather eye opening.

https://surfshark.com/cost-of-data-breaches

The Estimated Cost of the Most Expensive Data Breaches

And the cost to the company that was breached? According to IBM, businesses face four substantial bills in the aftermath of a data hack:

  • Detection and escalation. Including investigations and crisis management.

  • Notification. Communicating with customers, regulators, and lawyers.

  • Lost business. Downtime, dropped stock prices, lost customers, and damaged reputation.

  • Post-breach response. Restoring and improving security, legal expenses, fines, and compensation.

To create their annual “Cost of Data Breach Study,” IBM applied activity-based costing to these four categories for thefts of up to 101,000 records. For larger ‘mega-breaches,’ IBM has used the algorithm-based Monte Carlo Simulation. This method has revealed that a breach of 50-65 million records costs a company $401 million on average.

Key Findings

  • The biggest data breach of the past two years was the Advanced Info Service (AIS) hack, which may have cost $58,103,238,250 ($58 billion) to resolve.

  • America’s biggest data breach of the 2020s so far was at ‘big data’ analysis firm BlueKai, where two billion records were exposed at a potential cost of $13.94bn.

  • The Microsoft leak in December 2019 may have cost as much as $1,742,500,000 to rectify.



Crooks are dishonest? Whoda thunk it?

https://www.databreaches.net/ransomware-extortion-doesnt-stop-after-paying-the-ransom/

Ransomware extortion doesn’t stop after paying the ransom

Who would have thought that criminals might lie? Where’s my shocked face?

Bill Toulas reports on findings from a survey by Venafi. Here is some of what they found:

  • 83% of all ransomware victims who paid the requested amount were extorted again, twice, or even three times.
  • 18% of victims who paid the ransom still had their data exposed on the dark web.
  • 8% refused to pay the ransom, and the attackers tried to extort their customers.
  • 35% of victims paid the ransom but were still unable to retrieve their data.

Read more at BleepingComputer.



How will they prosper using their current strategy?

https://www.insideprivacy.com/united-states/litigation/court-rejects-dismissal-of-illinois-biometric-information-privacy-act-against-clearview-ai-in-pending-multidistrict-litigation/

Court Rejects Dismissal of Illinois Biometric Information Privacy Act Against Clearview AI in Pending Multidistrict Litigation

An Illinois federal district court recently rejected dismissal of Illinois Biometric Information Privacy Act (“BIPA”) claims in In re Clearview AI, Inc., Consumer Privacy Litigation, No. 21-cv-135 (N.D. Ill.). The Clearview plaintiffs alleged that Clearview violated their privacy rights without their knowledge and consent by scraping more than three billion photographs of facial images from the internet and using artificial intelligence algorithms on the images to harvest individuals’ unique facial biometric identifiers and corresponding biometric information. Clearview sought dismissal of the BIPA claims under the First Amendment, extraterritoriality doctrine, dormant commerce clause, and BIPA’s express exemption for photographs. The court rejected these grounds, and declined to dismiss the BIPA claims.



History, such as it is…

https://www.makeuseof.com/evolution-of-facebook/

The Evolution of Facebook: From 2004 to Meta



A resource?

https://www.theverge.com/22944579/crypto-bitcoin-internet-law-nft-tiktok-dances-tonya-evans-interview?scrolla=5eb6d68b7fedc32c19ef33b4

CAN THE LAW KEEP UP WITH CRYPTO?

… So, today, I’m talking to Tonya Evans, a law professor at Penn State Dickinson Law. She teaches IP law, copyright, and blockchain. She also hosts the Tech Intersect podcast,

[ https://techintersectpodcast.com/ ] where she covers how law and technology intersect She has spent a lot of time thinking about crypto assets and how they interact with the law. Tonya’s point of view is that we shouldn’t just abandon many of the legal frameworks we have today — she just wants them to adapt to this new internet.


No comments: