Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.
Macro Systems Blog
The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.
Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.
Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.
March 23rd, 2018, was the date when the United States Congress passed another spending bill that could reduce individual privacy protection all over the globe. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes modifications to the Stored Communications Act of 1986 and supplies unelected American officials a significant amount of power over digital privacy rights.
In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan performed near-term actions and developed a long-term game plan to intensify cybersecurity awareness and protections, protect privacy, and preserve public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.