Category Archives: Cyber Law

Understanding Your Slow Internet

There is very little that can be done to reverse some of the most advanced states of computer slowing and the pretense of viruses. At the end of the day you will probably experience a adverse affects of these computer happenings on one or maybe even 2 occurrences throughout the course of your life. Luckily there are several tips and tricks you can do everyday to make sure you are not the easy target you are now, and will hopefully allow your computer to run like a champion for years to come.

In order to understand what we need to know what to do we should probably start by understanding what not to do, and the high probably trouble zones when it comes to computers and your uses of them. For one you should always make sure you are going to established safe and well maintained site. Another major red flag is that you go on most Russian websites. It’s not ideal but the reality of the situation is that unless you absolutely need the information provided on a strictly Russian domain you should try to avoid them given how many cases there were last year of US computer owners experiencing infiltration into their delicate information data bases.

Another thing you need to do when you are considering what you are going to do with your computer is that you get some anti virus software and go for the more deluxe package. This is the type of thing that seems like it is appealing to skimp on because you never really see it working and you feel like you can operate without it. There is very little we know today about the state of affairs and the opportunities that surround the strengthen of cyber security but there is in many ways to this change going to be the reality that as things become more secure and we have the means to enact change and ensure security and locate threats before they can enact any harm so too will it be the case that we loose much of our cyber freedom and the ability to operate in a way that is going make us feel good about our state on security while also ensuring the ideals we value most as a people like liberty and net neutrality.

What is going to be scary is when we look at the state of cyber security when we consider the role it will play in our lives here after. In the future when we are putting all most everything onto the cloud from our heath metrics to our financial instructions and even our undivided attention through the means of VR capabilities. When we have the ability to have very convincing VR we are going to want to make sure we take care of vulnerabilities in this regard before we loose sight of what is most desired and wanted in the future. What we can see though is that even though it may not seem like it we are actually getting better in this regard, and the world is getting safer and more prosperous not less, which is what the news would have you assume if it were your only source of information.

When the Internet Acts as Judge and Jury

The Trump campaign made headlines today as usual, though this time around the case was slightly more unique and potentially much more appalling than the standard coverage. Let me save you the effort of Googling it:

Today it was released that Corey Lewandowski, Trump’s camptn rmanager, has been charged with misdemeanor battery after allegedly grabbing former Breitbart reporter Michelle Fields following a Trump event in Jupiter, Florida early this month.

The incident has been a highly Twitter-ized he-said-she-said battle ever since the incident allegedly occurred. Fields isn’t the only witness to the potential violence; Washington Post reporter Ben Teriss claims he witnessed Lewandowski’s violent act against Fields.

coreyJupiter police have stated that their arrest report was not hinged on the two’s testimonies alone but also on surveillance footage that eventually surfaced and has been also posted on the internet. The footage seems to support Field’s story of Lewandowski grabbing “Field’s left arm with his right hand, causing her to turn and step back.” This sealed the deal with the police, who then moved forward to press charges.

Or course, the Trump campaign and its supporters have yet to be convinced. That’s not too shocking for anyone who has kept an eye on Trump’s campaign, as no amount of fact-checking or evidence-finding seems to throw his supports off track. Their camp has even set in motion a new hashtag train, “#IStandWithCorey.

The Trump campaign recently released a statement reading, “Mr. Lewandowski is absolutely innocent of this charge. He will enter a plea of not guilty and looks forward to his day in court.”

Of course, Trump isn’t the only candidate under Twitter fire for dirty campaign tricks. Remember right around the South Carolina democratic primary when the hashtag #WhichHillary started trending, eliciting more than 88,000 weets by 1pm ET? The Twitter had surfaced multiple times on social media as a way of raising awareness of when Hillary Clinton had “flip-flopped” on issues that are currently acting as her selling points in the primaries.

WhichHillary#WhichHillary was all over the internet after Clinton became involved in an altercation with Black Lives Matter activist Ashley Williams at a private fundraiser in South Carolina the Wednesday before the primary. Clinton did not address the activist’s sign, which sported a quote from Hillary Clinton during her husband’s presidential time in which she describes gang members as “super-predators” and said something along the lines of that they need to be “brought to heel.”

The hashtag is now used to bring to light many of Hillary Clinton’s political inconsistencies, from her stance on gay marriage to mass incarceration. It goes to show how much more power internet users have to incriminate people than the standard politically active person had, say, twenty years ago. Physical protests remain powerful, but online protests and trending hashtags are now worthy of campaigner’s attention and anxiety. Just how much power they hold remains to be determined, but I’m sure in a few years we’ll have data to tell us exactly that.

In this particular case, and despite the hashtag, Clinton led Sanders in South Carolina by a fairly large margin.

4 Ways to Hack a Facebook Account

It’s not nearly as hard as it should be… you definitely don’t have to be a professional hacker to pull it off. Here’s 4 ways you can hack into someone else’s Facebook account without doing anything too strenuous or unimaginable.

The easiest way to “hack” into someone’s Facebook is more a social engineering feat than one of computer genius. Just figure out someone’s Facebook email login, then go to the Facebook login page and click “Forgotten your password?”. Type in the victim’s email and if their account comes up, click “This is my account.”

key loggerFacebook will ask if you’d like to reset the password using the victim’s emails, which obviously won’t help you an just click “No longer have access to these? It will ask How can we reach you? and you can type in an email that you have that also isn’t linked to any other Facebook account. Then it will ask you a security question. If you’re close friends with the person, you likely know the answer. If you’re not, make an educated guess and in 24 hours you can login to their account. if you can’t figure out the question, click “Recover your account with help from friends” and click three friends that are in cahoots and can give you the password or make three fake Facebook accounts and get the person to add you before any of this stuff happens. Then you’re in.

Another option? Use a keylogger, or a program that can record each stroke own the keyboard that a user makes without their knowledge. The software has to be downloaded manually on the victim’s computer and will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can then be programmed to send you a summary of all the keystrokes via email. CNET provides Free Keylogger.

If you’re afraid you might be susceptible to key logger, use fireball, install a password manager, update you software and change your passwords every so often.

Then there’s the option of phishing. It’s not for beginners because you have to design a fake Facebook login page, and if the victim logs in, the information will be sent to you instead of Facebook’s server. You’d also need a web hosting account. There are guides on how to clone a website that you can use, and detailed instructions you can follow, if you really want to do it.

internet cookieIf you don’t want to be susceptible to this trick, be sure not to click on links provided through weird emails. Also check the URL before you click on it using CheckShortUrl or unshort.me. Antivirus and web security software is also helpful here.

The final method? Steal the cookies that allow a website to store information on a user’s hard drive and retrieve it later. You can access your victim’s account by cloning those cookies and tricking Facebook into thinking the hacker’s browser is already authenticated. Fire sheep collects cookies and stores them in a tab on the side of the browser so you can get in.

Brendan Eich Takes on Ads

Branden Eich is famous for his part in rewriting the Web; his creation of JavaScript, the world’s most used programming language, ended Internet Explorer’s web browser monopoly and opened the door for other browsers to proliferate and change the way people experienced the internet.

His first browser was Mozilla Firefox, but he stepped down from his position as the CEO of Mozilla in 2014 amid loud criticisms of his donations to same-sex marriage ban initiatives in California. Now he’s working on his next browser project: Brave.

Brave is a startup dedicated to developing a browser that changes how internet ads are published and paid for. The browser would block advertisements and attempts to track user data, but replace those advertisements with ads that are less intrusive and use less of a device’s computing resources to run. Advertising revenue will go to site owners and users themselves; publishers would be getting 55 percent of the revenue generated by the ad, which trumps the percentage they get from more established advertising networks. The company advertising would then pay its own advertising network partners 15 percent and keep 15 percent for itself. The final 15 percent would flow back into the browser users’ pockets, though I don’t really get how. Users could opt out of ads altogether by donating to their favorite websites.

The idea behind Brave is to give more power to web users, who are just beginning to be able to make real decisions about their surfing experience based on the browser they choose. If Brave is a success, it will be the first browser to show so much respect for an internet user’s privacy. For now, every time you load a page you’re opting into whatever policies an ad network has in place. “…so we invert this power structure and have the browser be an important part of the system instead of this passive window,” explained Eich.

That said, Eich isn’t out to eliminate internet advertising by any means. He understands that the internet cannot function without its main source of funding, and that ad-blocking software could create major funding issues for a lot of websites.

“Most people aren’t ready to pay for their content,” Eich claimed. “Some aren’t well off enough to pay for subscriptions, some don’t know how or don’t want to trust their credit card to a paywall…They like free-riding, or even starting a war.”

“You may never click on an ad, but even forming an impression from a viewable ad has some small value. With enough people blocking ads, the Web’s main funding model is in jeopardy.”

Brave hopes to allow those who prefer to not see ads still support sites through donations, allowing for those websites losing out on advertising funding to be funded directly by their users. Everyone else can support sites by viewing ads that Eich hopes will be “more relevant, less intrusive, and not so creepy” as the status quo.

Brave claims that if it shares data it finds, it will always by anonymized and that it cannot be shared without the user opting in.

Apple CEO Stands Strong Against FEDs on Encryption

encryption3Last Sunday, Apple CEO Tim Cook took part in an interview on the CBS new program 60 Minutes in which he asserted the rights of tech companies to provide encryption services to their clients.

“There’s all kinds of sensitive information on smartphones today,” claimed Cook. “You should have the ability to protect it. The only way we know how to do that is to encrypt it.”

Cook noted that Apple was still willing to comply with search warrants served on it by law enforcement officials.

FBI Director James B. Comey disagrees, believing encryption is only remains a legal service because of a lag between legislators and inventors: “Unfortunately, the law hasn’t kept pace with technology, and this disconnect has created a significant public safety problem… We call it ‘Going Dark’ and what it means is this: Those charged with protecting our people aren’t always able to access the evidence we need to prosecute crime and prevent terrorism, even with lawful authority.”

“We have the legal authority to intercept and access communications and informant pursuant to court order, but we often lack the technical ability to do so,” added Comey.

Plenty of security and tech advocates take issue with Comey’s initiative to ban encryption services.

“A proposal to protect our security by weakening our security is going in the wrong direction,” asserted executive director of the Electronic Frontier Foundation Cindy Cohn.

“If the government were to suggest that no one put locks on their doors because if we were a terrorist it would be harder to get into our house, we would think that was a bad idea… This is pretty much the digital equivalent of that.”

supercompute2Cohn makes an excellent point; as large scale hacks become commonplace, government agencies are finding that sometimes not even they can keep their sensitive data under wraps. If they have access to everyone’s data, or make that data more accessible to everyone, terrorists won’t be the only users made more vulnerable.

Berin Szoka, the president of TechFreedom, claims that this issue presents a historic crossroads in American history and the history of the internet:

“This is really a binary issue. Are you going to allow end-to-end encryption by the operating system makers or not? Once you say no, you start down this road without stopping the really smart bad guys from continuing to use encryption on their devices.”

CEO of Accellion Yorgen Edholm believes the government can achieve its goals by walking a separate path: “If the government law enforcement agencies are looking for an encryption compromise, maybe they should look outside the tech sector for it… Encryption can always be broken by people who have supercomputers- the government has more supercomputers than anyone else. So the government has the resources to decrypt anything. It’s just that those resources have to be made available to local law enforcement… That compromise wouldn’t make it easier for the bad guys to get into my privacy just because the government wants to have the computer equivalent of a wiretap.”

 

UK Police Crack Down on Young Cybercriminals

The UK has made headlines for turning the heat up on young hackers.

lizard stresser“Over the past few years, the NCA [National Crime Agency] has seen the people engaging in cybercrime becoming younger and younger,” Richard Jones explained. Jones is the current head of the Prevent team at the NCA’s Cyber Crime Unit.

Jones explained that a recent online attack tool known as Lizard Stresser was actually created by 7 people under the age of 18.

The NCA’s clamping down on teenage offenders come as part of the Cyber Choices campaign, which was in turn prompted by the fact that an NCA study revealed the average age of people involved in its investigations was only 17 years of age. The study also found that very few teenagers in the UK actually understood what constituted a cybercrime and what the legal consequences were.

Cybercrimes are common among young hackers who don’t actually want to steal anything or do any horribly catastrophic harm; often viruses are created solely to see how far they spread so that the hackers behind them can reap the bragging rights. Unfortunately, in this age of more serious hacking and cyberterrorism, many governments have no sense of humor for this new form of teenage pranking.

blackshades ratThe National Crime Agency’s Cyber Crime Unit was astounded after uncovering certain information during Operation Dermic in 2014. The operation was pitted against users of a remote-access Trojan (known as a Rat) called Blackshades. After an in-depth investigation of the origin of the Blackshades Trojan, a total of 17 arrests were made. During a follow-up, the National Crime Agency’s Cyber Crime Unit underwent over 80 “cease and desist” visits to people that they had found guilty of purchasing the Blackshades Trojan. Over 500 emails and letters were additionally sent out to people found responsible for purchasing the cybercrime kit that allows for the generation of the Blakshades remote-access Trojan. To the National Crime Agency’s Cyber Crime Unit’s surprise, a large portion of the people contacted due to buying or somehow being involved with the kit were under the age of 20 and still living at home with their parents. In fact, the youngest Blackshades buyer was just 12 years old.

The issue highlights the fact that programmers and hackers are becoming younger and younger, so ill-conceived cybercrimes are being enacted by younger and younger cybercriminals, often in a more experimental than malicious mindset. Early access to computers and the internet will yield an unprecedented generation of computer users, a generation that governments are struggling to educate in terms of the law and the consequences for breaking it. At the same time, laws regarding cybercrime are still forming and lawmakers are attempting to adapt to the constant need for new legislation in a world they weren’t trained to oversee.

Understand The Important Aspects Of The Cyber Law To Get Free From Cyber Crime

In the present world people using internet to meet their needs and it is the effective platforms to find new opportunities, like it is the comfortable place for the business as well as entertainment. In general internet has many advantages as well as disadvantages. Cybercrime is one of the complex problems also it is the illegal activity committed with the online; it will lead many security risk, which will lead many problems in the large network. Currently internet also misused for various illegal activities.  Of course the criminal activities also raised, most of the terrorist also use computers to cause various problems. To avoid such a problem, now Cyber Law available to avoid the illegal activities, it provides the legal recognition to the entire framework as well as the electronic documents. Of course it helps for the ecommerce transactions by the way it provides the legal framework to execute the ecommerce plans in the perfect manner. Cyberlaw is otherwise called Internet law and it is the term which helps to avoid all the illegal issues based on the internet. It also helps to protect the software as well as the technology computer. By the way it provides more privacy to the user. The cyber law helps to deal with the cyber crimes at the same time it helps to purchase the transactions in the perfect manner.  With this law the transactions also carried out without misuse as well as fear.

\

Importance Of Cyber Law:

Overall it offers needed legal framework so it is the ideal factor to perform the legal activities, rather than it help to protect your electronic records from various issues. This also enhances the performance of the government departments like it is the safe way to create the official documents. This law helps to provide more positive aspects to the economy conditions. It is the most important aspects for the e-businesses, this support to take the legal form of the communication.  The ecommerce business carried out by using the legal infrastructure, this act support for this, in general this law also provides more opportunities to the corporate companies  the authorities also issues the digital signatures certificates based on this act. Cyber Law highly supports for the Government activities, and it is the most effective acts and most of the companies also file all the application, form and document with this act. Normally all the electronic application process also carried under the approval of the appropriate Government. It is the suitable aspects to kick out all the issues of security, with this you can  do successful electronic transactions because this act provides the legal definition of course it provides definition about the secure digital signatures. It also gives the proper prospects to take   digital transactions under the security procedure. Hence consider these important aspects to overcome all the difficulties, for more details you may log on the official site, it helps to understand all the aspects about this law by the way you can easily make the secured transaction.