This time of year, people often seek extra work opportunities to make some spare cash. Job applicants flock to websites to find employment. This also attracts scam artists who impersonate legitimate companies to hook victims. While a variety of phishing schemes use imitation to provide a look of legitimacy to the scam, one of the … Continue Reading
In 2015, the Federal Communications Commission (FCC or global Commission) issued its Open Internet Order, applying Section 222 of the federal Communications Act to broadband Internet access services (BIAS), and in doing so took jurisdiction over privacy and data security matters for Internet Service Providers (ISPs). In doing so, it declined requests by some advocacy … Continue Reading
On the fourteenth anniversary of 9-11, H.R. 3490—the Strengthening State and Local Cyber Crime Fighting Act—was introduced in the U.S. House of Representatives. On Monday, November 30, 2015, it passed with an overwhelming majority. The bill establishes the National Computer Forensics Institute (“NCFI”), to be operated by the U.S. Secret Service, to educate law enforcement … Continue Reading