Social Media and Attacks on Traditional, Investigative Journalism

Once upon a time, we received news in traditional formats from finite media sources by way of newspapers, television, and radio. And the news we received from those sources did not vary tremendously one from another. The news just seemed to be the news. As Walter Cronkite closed on his CBS nightly newscast, “And that’s the way it is” — in essence meaning, “Those are the facts.”

Times plainly have changed. There are many sources of news. People can choose a news outlet that suits their own political preferences. For example, for someone of a conservative, Republican persuasion, Fox News might be the news outlet of choice. Fox tends to present the news more in line with that end of the political spectrum. And, of course, there are other news outlets that favor the liberal, Democrat end of the political spectrum. So what are the “facts” when the reporting of the same events can be interpreted very differently?

Continue reading “Social Media and Attacks on Traditional, Investigative Journalism”

Wait, Now USB Devices May Be Unsafe Too?

Thumb drives, keyboards, and mice, oh my! That’s right, these USB devices now may be the latest “lions, tigers, and bears” to fear in our high-tech world.

According to a recent Reuters article, such USB devices possibly can be compromised to hack into personal computers in a previously unknown form of attack that supposedly can side-step current security precautions.

As reported by Reuters, Karsten Nohl, a chief scientist at SR Labs in Berlin, has stated that hackers potentially can load software onto very small and inexpensive chips that control the functions of USB devices, but which presently do not have “built-in shields” that would prevent tampering with the devices’ operative code.

Continue reading “Wait, Now USB Devices May Be Unsafe Too?”

Proposed White House Cybersecurity Incentives Could Pay Off

Cyber threats are real and they’re on the rise. In this climate, the White House is considering certain incentives for companies that follow government recommended cybersecurity measures.

While the Cyber Intelligence Sharing and Protection Act (CISPA) passed the House in April, the Obama administration’s cybersecurity program is only just taking shape, and its tentative concepts were recently unveiled.

Continue reading “Proposed White House Cybersecurity Incentives Could Pay Off”

Is Cyberwarfare Already Happening?

Are international governments already engaging in cyberwarfare by hacking into each other’s computer systems? According to recent Reuters articles, at a minimum, a war of words is brewing suggesting that this already is the case.

First, it is reported that via a flaw in Adobe software, hackers were able to target government computer systems in Europe. Apparently, the systems were not actually compromised, but the specifics of the attack are being shared with NATO member states in an effort to remain ready for potential further attacks.

Continue reading “Is Cyberwarfare Already Happening?”

© 2009- Duane Morris LLP. Duane Morris is a registered service mark of Duane Morris LLP.

The opinions expressed on this blog are those of the author and are not to be construed as legal advice.

Proudly powered by WordPress