Checking on what Google has recorded on your phone

By now, people who are ignorant to the capabilities of mass surveillance are fatally far behind in their understanding. We’re going to go over the basics, and then we’re going to go over realistically exactly what surveillance everybody is probably under at all times nowadays.
Read more at Anonews...

Grant Christianson Legal Advisor at e4

As South Africa’s business sector continues to expand across a myriad of digital platforms, cybercrime continues to threaten this burgeoning digital sphere. “There are many victims of cybercrime, with limited recourse available in terms of current South African law. The need for tighter and more effective legislation is pressing,” says Grant Christianson, e4’s Group Legal Advisor.

wifi human detection through walls

With nothing but a smartphone and some clever computation, researchers can exploit ambient signals to track individuals in their own homes. In theory, they say, it ought to be possible to use this changing electromagnetic field to work out the position, actions, and movement of individuals.
Read more at Medium...

GDPR and the affect in South Africa

In May this year, the European Commission's (EU) General Data Protection Regulation (GDPR) came into effect. The GDPR is a new data privacy and protection framework aimed at improving Europe's data privacy laws, and which could be described as a first cousin (replacing the EU's Data Protection Directive (EU Directive)) to South Africa's POPIA, the Protection of Personal Information Act 4 of 2013.

How to protect your Facebook profile

Facebook is currently facing a scandal over the use of its data by British political research company Cambridge Analytica. Most people forget that when they download an app or sign into a website with Facebook, they are giving those companies a look into their Facebook profile. Your profile can often include your email address and phone number as well as your work history and current location, people don't realise that if you're sharing that data with friends, then apps used by those friends can see that data as well!
Read more at ILFScience...

Managing the risk of ransomware in law firms

A recent study claims that one in two South African law firms have had at least one ransomware attack in the past two years.  And if you have had a ransomware attack, you will know just how much it cost you to recover from it.  But how do you protect your systems from ransomware?

Conveyancing scam alert for South Africans

As automation improves, so does the level of property scams, and while every precaution is taken, there will always be yet another way that fraudsters discover to deceive buyers and sellers out of large sums of money, says Craig Hutchison, CEO Engel & Völkers Southern Africa.
Read more at Business Tech...

targeted cyber attacks on law firms

Corporate companies are by no means immune to cybercrime, with McAfee’s latest report1 indicating that it cost the global economy as much as $600 billion in 2017. According to Christopher Appanah, Claims Team Leader (PI and Liability) at SHA Specialist Underwriters, cybercrime is also evolving rapidly with attacks becoming more elaborate.

Darryl Bernstein

Businesses in Africa that process customer data from the European Union (EU) must ensure they are fully compliant with the EU General Data Protection Regulation (GDPR), set to become effective in May 2018.

Wiping your old PC clean before selling it

While there’s nothing to stop you selling your PC with the contents of its hard drive intact, it’s a very bad idea. Apart from the fact that you’ll be giving the new owner access to all of your files and other personal information, you’ll also be selling any software that’s still installed. Even if this was legal (which it usually isn’t), that means you won’t be able to install the same software on your new PC — not without breaking the law, anyway.
Read more at BT Home...

Mobile security

As social media continues to gain prominence among South African consumers, platforms like Instagram, Youtube, Facebook and Twitter have also become a platform where fraudsters attempt to catch unsuspecting consumers off guard.
Read more at BereaMail...

Bad Rabbit ransomware

On Tuesday, reports surfaced that a new kind of malware was spreading around Europe. The apparent ransomware which researchers are calling Bad Rabbit bubbled up in Russia and Ukraine and appears to also be affecting Turkey and Germany, though spread isn’t fully known at this time.
Read more at TechCrunch...

What is happening with Krack Wifi hack

South Africa’s mobile networks are working with device manufacturers to patch a vulnerability in the WPA2 standard. The flaw was found by security researcher Mathy Vanhoef, who said his Key Reinstallation Attacks (KRACKs) are exceptionally devastating against Linux and Android 6.0. The vulnerability allows an attacker to masquerade as a WPA2 network without its password, and decrypt traffic a device sends over the fake hotspot.
Read more at MyBroadband...

Biometric access will need improved security

The past few years have seen an increasing trend in the implementation of biometric clocking systems to monitor and control employees' access to the workplace.

Wannacry Ransomware

Businesses are still dealing with the fallout from a cyberattack that hit 200,000 victims in 150 countries, with many organizations and individuals wondering if they are at risk. WannaCry affected an exploit in the Windows XP operating system on PCs, and Microsoft shortly sent out a fix for the security flaw. But authorities such as the U.K.'s National Cyber Security Center (NCSC), warned over the weekend that as the working week begins, further cases of ransomware could come to light.
Read more at the CNBC News site...

Ransomware on the increase

Vienna - Threats to our cyber security are constantly evolving and are becoming ever more sophisticated as our homes and cities become smarter and internet technology winds itself through every area of our lives. And as our technological world grows, so too, do the threats against us with year-on-year figures for cybercrime constantly increasing. There were about 476 million attacks globally in 2016, compared to 224 million in 2015. In the first quarter of 2017 there were 2,26 billion cyber threats.
Read more at Fin24...

lawyer says crime syndicates have got into banks and mobile operators

Attorney Johan Victor said crime syndicates have infiltrated banks and mobile operators in South Africa, and are assisting in SIM-swap and online banking fraud. Victor is representing a group of people who have lost millions due to Internet banking fraud.
Read more at MyBroadband...

Recording a video for evidence

Smartphone videos dominated the headlines over the course of March 2017, most notably in an altercation at a Spur restaurant in Johannesburg and a viral video of a traffic officer swatting a phone out of a filming motorist’s hand. This begs the question, when are you allowed to legally video tape and audibly record someone in South Africa?
Read more at MyBroadband...

Secure law firm websites using ssl

SSL certificates are becoming more important and Google has made their commitment to the secure web very clear. Eventually they may not even rank non secure websites. But now that it’s been over 2 years since Google’s first SSL announcement I was curious to get an idea of how many law firms are using SSL Certificates.
Read more at Juris Digital...

data breach litigation

Mossack Fonseca. Before April 2016, most of us had never even heard of a Panamanian law firm by that name. But, after one of the largest and certainly most high-profile cyberattacks, the firm and its mountain of records evidencing shell companies, straw transactions and offshore accounts — documents that have come to be known as the “Panama Papers” — have become synonymous with one of the hottest topics in the legal industry: cybersecurity.
Read more at the Fox Rothschild website...

Conveyancer and client duped

A couple who sold their property failed to get the £98,000 proceeds because they and their solicitor were duped by a fraudster who intercepted their emails. The fraudster managed to generate fake emails posing as both parties – solicitors Powell & Co of Sutton Coldfield and their clients Max and Davinder Deluca. In doing so the fraudster managed to reassure the Delucas that the transaction had successfully completed by pretending to be their conveyancer Powell & Co. They defrauded the real bona fide conveyancers at Powell & Co by posing at the Delucas.
Read more at Mortgage Finance Gazette...

Blockchain 101 for non-tech lawyers

While widely heralded as one of the “next big things” in legal technology, blockchain technology and its potential effects remain both widely unknown and misunderstood. Now, as enterprises begin looking at the technology and its place in the legal operations process, in-house attorneys stand to benefit by building a body of knowledge around the technology that will play a part in their futures.

To help shed light on this advancement, Legaltech News spoke with two attorneys at the forefront of blockchain development...
Read more at Corporate Counsel... 

Law firm data security

Cybercrime is indeed a global problem, but law firms are especially susceptible due to the large volume of highly sensitive client data they hold on businesses and individuals; in addition to the fact that they are also cash rich. 

Emails are the chink in law firms’ armour. Due to the pervasiveness of email as the default communications tool, it’s easiest for criminals to take advantage of it for malicious proposes. Security systems may mitigate many of the issues, but nowadays it is the law firm Partnership and staff that are being targeted...
Read more at Legal IT Professionals...

The Blockchain: A Guide for Legal and Business Professionals

MIAMI, Nov. 15, 2016 /PRNewswire/ -- Holland & Knight announced today that The Blockchain: A Guide for Legal and Business Professionals, authored by three members of the firm's blockchain practice, has just been released by Thomson Reuters. It is the first-ever book on blockchain technology and the law.

Ransomware infographic

Businesses who store majority of their documents and information as digital copies are at risk from cyberattacks. One of the most popular and harmful cyberattacks is ransomware. It is a malicious software that encrypts the users files, locking them down and making them inaccessible until a ransom is paid.

ADSL username and password theft

Unless you have a security-minded techie in your home, chances are that little attention is paid to your ADSL or broadband router security. Despite being the gatekeepers to our home networks, ADSL routers are low-cost devices that typically don’t see much security investment. The average user also does not maintain or update the device through its lifespan, either lacking the time or knowledge on how to do so.
Read more at MyBroadband...


It has been brought to the Cape Law Society’s attention that an email titled “The Cape Law Society Past Due Members Invoice” has been disseminated to a number of members. The email contains a link to what appears to be a pdf file (purportedly the outstanding membership fee invoice).

Email security vs employees

The ‘Nigerian Prince’ or ‘419’ email scams we’ve all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively – people are intrinsically positive about the motives of others and are not on the lookout for scammers and criminals in every email exchange.

5 steps law firms should take to protect their sensitive dataIt has become more apparent in recent years that cybercriminals looking to profit from sensitive data are zoning in on law firms and their wealth of client information. Here are five steps to help your firm comply with necessary IT requirements while also making sure to protect sensitive client data and intellectual property from malicious actors.
Read more at IPWatchdog...

information security law firmsAs the latest wave of high-profile breaches shows, all the sensitive information law firms handle makes them attractive cyberattack targets. Here's what can happen and what you should do about it.
Read more at Information Week...

david williams werksmansImagine trying to secure 400 endpoints across a network that spans four physical locations across South Africa, carrying highly sensitive data and confidential information. Now imagine the significant negative repercussions for a top legal firm if security is breached.

ransomware esetOver the last 12 months, there has been a 16% increase in ransomare attacks, a Data Breach Investigation Report by Verizon, has revealed. Ransomware is a hot topic because of the organisations being targeted and because of how prevalent it has become. The report revealed that 89% of attacks “involve financial or espionage motivations”, with the former a clear catalyst.

scam alertA new scam targeting businesses is becoming more prevalent. The Modus Operandi is that the scammer will approach a small business that is registered on the Kwazulu-Natal Government database for vendors.

business fraud in south africaBusiness fraud is the crime that is least talked about because it is not as headline grabbing as armed robberies, and more importantly many businesses do not report this type of crime because they are afraid of reputational damage should it become public knowledge.

MWR infosecurityWe hear about data breaches in the legal sector relatively infrequently, however law firms are in fact regular targets of cyber attack; a lack of publicity does not reflect a lack of hostile activity. While the motivations may not be immediately obvious, they are very real.

hack law firmsIt seems that Russian hackers are every bit as prestige-obsessed as second-year law students going through on-campus interviewing. The nearly 50 law firms targeted by cyber-criminal “Oleras” and his (or her) gang are some of Biglaw’s biggest and best names. If you take the nation’s 15 most prestigious law firms, you’ll see 13 of them on the list of targets.
Read more at Above the Law...

truecallerTruecaller announced today that its community has reported over 800.000 spam calls in South Africa, with a total of 50 000 spam and unwanted calls detected every day across the country. Truecaller’s data highlights an issue that is becoming an increasing cause for concern in South Africa as spammers become more adept at harassing and taking advantage of smartphone users in South Africa.

NordVPNWe are officially living in the era of Internet of Things, or IoT. The network of inter-connected devices is starting to make our lives more convenient, easier and more vulnerable at the same time. By 2020, about 25 billion internet-enabled devices are predicted to be on the market. Big companies like Google, Samsung and others are rushing to buy up the IoT startups. Samsung has announced that in 5 years all of its devices will be part of IoT network.

cybercrime in South africaCybercrime is any criminal act dealing with computers, networks and smart phones. Additionally, cybercrime also includes traditional crimes conducted through the Internet. Cybercrime has become a huge issue not only in South Africa but around the world.

how hackers hack your facebook accountFacebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account.
Read more at Tweak and Trick...

FacebookTwitterLinkedInRSS Feed