information cybercriminals EO nation-state Developing Nations Cybercrime

Is Trafficking in Hacking Information a Crime?

Quincy Compton of Concord, North Carolina, had a wife and a pregnant girlfriend and wrote to a doctor in Washington, D.C. for information about terminating a pregnancy. The doctor, Thomas Kemp, wrote ...
Security Boulevard
generative AI security, Microsoft AI cybersecurity

Ethics in AI: The Missing Code

As part of its push toward artificial intelligence, Microsoft laid off more than 10,000 employees and spent billions on acquiring AI tech. Among those laid off were the seven-member team in their ...
Security Boulevard
FTC privacy data game baseball

Privacy Challenges Illustrated by Recent Cases

In the 1973 baseball melodrama Bang the Drum Slowly, the players, intent on scamming some rubes, play a card game called “TEGWAR.” It stands, as you later learn, for ‘The Exciting Game ...
Security Boulevard
cybersecurity insurance

Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders

Cowbell this week added a free 24/7 managed security service for organizations that take out a cyberinsurance policy to help reduce the cost of a cybersecurity breach. Manu Singh, vice president of ...
Security Boulevard
data cybersecurity software CISA ransomware cybersecurity protect data c-suite

Wading Back Into the Software Liability Cesspool

Time must be a flat circle—it seems that every couple of years, someone brings up the topic of software liability. Just stay in one place, and soon enough, the train will come ...
Security Boulevard
court Twitter privacy

The Internet’s Future at Stake (Really!) as Supreme Court Takes Up Provider Immunity

“No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Those 26 words helped create the ...
Security Boulevard
TikTok

White House Bans TikTok on Federal Devices

Federal agencies have 30 days to remove the popular Chinese social media app TikTok from federal government devices, according to a guidance memorandum issued by the White House. The memo, written by ...
Security Boulevard
API fraud Cybereason CISOs Can Boost Their Credibility

Supreme Court: Does BIlling Fraud Violate Federal ID Theft Statutes?

Simple question: Is a user ID and password similar to an identification card like a driver’s license or a key? If I use your user ID and password to log into your ...
Security Boulevard
Tile trackers

Tile Trackers Accountability Mode

One of the problems with tracking devices is that they can be used for good or for evil. When used for good, they can help you locate a stolen purse, a stolen ...
Security Boulevard
AI, cybersecurity, ChatGPT copyright robots continuous intelligence

Abuse of Copyright Law Online to Remove Dissent and Criticism

The Washington Post recently reported on a “reputation management” company called Eliminalia which purported to clean up the online reputation of its clients and customers and make negative information “disappear.” Now, there ...
Security Boulevard