Archives
Author Archive
for: ‘’

The Chinese spy chip scandal and supply chain security

Last month, the security world was abuzz over allegations that Chinese spy chips had affected American motherboards on a staggering scale and had compromised sensitive data. Through these spy chips, according to an October 4 investigative report in Bloomberg Businessweek, Chinese perpetrators had successfully enacted a surveillance campaign. Bloomberg’s initial reporting was met with harsh […]

Read More

Don’t forget the inside threat

Judging by the types of breaches we regularly hear about in the news, from the recent Facebook hack to China’s secret implantation of spy chips inside motherboards (which I’ll be discussing in my next article), it would seem that the biggest threats to our digital security are primarily external. Social engineering attacks such as phishing scams […]

Read More

Cyberattacks and the costs of reputational harm

A few months ago, I wrote about cyber insurance and its place in an organization’s cybersecurity plans (“Managing cyber risk: Is cyber liability insurance important for law firms?”, June B&B). In my estimation, the most valuable aspect of cyber insurance lies in applying for it. Making organizations go through the paces to evaluate their cybersecurity postures, […]

Read More

Fair elections and cybersecurity

With the November congressional elections right around the corner, many observers are revisiting a primary theme of the 2016 presidential election—security, hacking, and Russian involvement. It is certainly a contentious topic, but no matter where you fall on the political spectrum, it remains the case that elections are just as vulnerable to cyberattacks as private […]

Read More

E-discovery vs. forensics: Analyzing digital evidence

Digital evidence continues to be a growing focus of the legal community. In a very real way, digital evidence and its utilization in court can be compared to the advances in the use of DNA science that our courts saw in the last century. In a ubiquitously digital world, digital evidence has applications in almost […]

Read More

Managing Cyber Risk: Is cyber liability insurance important for law firms?

Cyber liability insurance policies are growing in popularity among organizations that store client data, but in my experience those who have them are probably just as confused about what they cover as those who decide to go without. Generally described, cyber liability insurance is meant to protect businesses and organizations from cybersecurity risks posed by […]

Read More

Social engineering: How cybercriminals capitalize on urgency

Making a request seem urgent clouds the fact that the request violates protocol or the norm.  I was recently approached by a concerned person who wanted me to scrutinize an email received a few days prior. “Does this look like a phishing email? I don’t see any grammatical errors. But it’s asking me to visit this […]

Read More

Stephen Allwine: When crime tries to cover its digital tracks

In late 2016, I was approached by the Washington County (MN) Attorney’s Office to conduct forensic analysis on a number of devices in a homicide investigation. It soon became clear that the case would be one of the most interesting of my career, involving murder-for-hire, religious convictions, insurance money, infidelity, and a distinctly modern element—the […]

Read More

Is the Internet of Things spying on you?

So is your phone spying on you? Yes, it’s possible. A few months ago, Computer Forensic Services analyst Sean Lanterman spoke to KARE 11 News about a topic that makes a lot of people nervous. “Is my phone spying on me?” may have seemed like a paranoid question at one point, but it now seems like […]

Read More

#UberFail

The recent headlines about Uber’s 2016 data breach describe yet another cyber event that left millions compromised and rightfully angry. But yet again, people by and large are not angry that the breach happened, or even necessarily about the large size of the breach, which involved approximately 57 million Uber riders and drivers. Mostly, people […]

Read More
Page 1 of 212»

Articles by Issue

Articles by Subject