Remove tag social-media
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Today, let’s take a look back at cases related to cooperation, form of production, privilege and confidentiality disputes, social media related disputes and a key case regarding biometric security. BIOMETRIC SECURITY. SOCIAL MEDIA RELATED CASES. Perhaps you missed some of these? 37(a)(1).”.

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Named after a character from “Scooby-Doo,” the Creeper was originally intended as a security test for the U.S. As a security test, the Creeper’s effects on infected machines were minimal. Social engineering attacks soon found use in the digital space. Read More: Top Secure Email Gateway Solutions for 2022.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information.

Privacy 52