Canada’s online legal magazine.

Search Results

Your search for “” has returned the following results:

Hackers Fast to Take Advantage of Fears Created by Celebrity Nude Photo Leak

This morning I got the following email, purportedly from Apple Support, telling me to take steps to update my Apple ID information (click ‘more’ to expand this post and see the screenshot):

It is a text book example of a phishing scam – the very type of scam that was likely used for tricking some of the celebrities caught in the nude photo leak into disclosing their personal account login information to hackers. (see this Verge article for a detailed timeline and explanation on how the celebrity nude photo leak likely happened.)

Wow – that didn’t take long. Here the . . . [more]

Posted in: Technology: Internet

Wipe Your Car Before You Sell It

I’m in the process of buying a new car, and realized that when we get rid of a car we should think about more than just cleaning out the glove box and taking the snowbrush out of the trunk. A list of data to clear is at the end of this post.

At one time, cars stored no personal information other than the odometer reading and radio presets.

Cars are laden with computers that control and monitor things like the engine, brakes, climate control, entertainment, tire pressure, and safety features. With this comes more data, and with more data comes . . . [more]

Posted in: Technology

Competence for the Low-Tech Lawyer

Is saying no to technology even an option for lawyers in modern practice? The Federation of Law Societies of Canada’s Model Code of Professional Content defines competence as follows:

3.1-1 1 “Competent lawyer” means a lawyer who has and applies relevant knowledge, skills and attributes in a manner appropriate to each matter undertaken on behalf of a client and the nature and terms of the lawyer’s engagement, including:

(j) pursuing appropriate professional development to maintain and enhance legal knowledge and skills; and (k) otherwise adapting to changing professional requirements, standards, techniques and practices.

If lawyers do not have certain . . . [more]

Posted in: Education & Training: CLE/PD, Practice of Law: Practice Management

Russian Hackers Amass 1.2 Billion Username/password Combinations

A New York Times story says that: “A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses…”. This was discovered by a company called Hold Security, that so far has not named the sites. I’m a bit skeptical of the news, however, when Hold Security has a paid service to find out if your site is affected by this.

This emphasizes yet again the importance of using proper passwords and taking advantage of multi-factor authentication wherever it is offered.

Since the . . . [more]

Posted in: Technology

Tips Tuesday

Here are excerpts from the most recent tips on SlawTips, the site that each week offers up useful advice, short and to the point, on technology, research and practice.

Technology

Create an if Found Lockscreen Message on Your Portable Devices
Dan Pinnington

I know your smartphone and iPad already have their device access passwords enabled (meaning anyone picking up your device can’t access the information on it without punching in a password). And if they don’t – sit down right now and turn the access password on. Otherwise the information on the device is accessible to anyone that happens . . . [more]

Posted in: Tips Tuesday

Of Woodsheds and Clients’ Social Media Habits

Here’s another post under the “social media law” umbrella—this time about what intelligible advice, if any, lawyers can bank on when it comes to directing their own clients to “clean up” social media accounts. It’s not the first time this has been canvassed here on Slaw, as John Gregory’s post from earlier this year attests, but since I recently prepared materials for a webinar on social media as evidence, and in the course of that started a trial run of X1 Social Discovery (which is what the Department of Justice, RCMP, and at least two major Canadian law firms are . . . [more]

Posted in: Legal Information: Information Management, Practice of Law: Practice Management, Technology: Office Technology

The Friday Fillip: Alpha Wolf

You have to wonder whether Stephen Wolfram was thinking of top dog when he named his . . . what shall we call it? . . . marvelous machine Wolfram|Alpha. After all, the man is not noted for his humility, though I have to say that when you look at his biography you might conclude that any immodesty on his part is merited.

I’m sure that most of you have at one time or another visited the “answer machine” that is Wolfram|Alpha. If you haven’t been there in a while, I encourage you to go again now and tour . . . [more]

Posted in: The Friday Fillip

How Law Firms Can Increase Their Online Banking Safety

Many law firms manage their trust and regular bank accounts on the Internet, and some firms have the ability to initiate various banking transactions online, including account transfers and wiring funds. While the convenience and efficiency of online banking are huge benefits, the downside is that online banking exposes you to security risks. The steps outlined below will help law firms to understand, address and reduce online banking risks – for both your firm and personal accounts.

Know and understand the terms of your banking agreements: As a starting point, carefully read your bank account and electronic banking services agreements. . . . [more]

Posted in: Technology

Are You Vulnerable to Heartbleed?

A serious flaw has been discovered in OpenSSL – the browser encryption standard used by an estimated two-thirds of the servers on the internet. This flaw has been there for a couple of years, and allows hackers to read data stored in memory. That gives hackers access to anything in memory, including security keys, user names and passwords, emails and documents. More detail is on Gigaom and Schneier on Security.

An update to OpenSSL fixes the flaw. Anyone who has a website should ask their service provider if it affects their site, and have it updated immediately.

And for . . . [more]

Posted in: Technology

LexisNexis Think Like a Lawyer 2014

In the US, Lexis has a “Think Like a Lawyer” campaign aimed at law students with the social media element #BeUnprecedented. There are some interesting terms with student use of academic passwords that are not found in Canada.

For 1Ls and 2Ls, your law school Lexis Advance® ID continues to provide access to our legal research tools all summer long. Use it to look good inside a firm, or prep for the classes to come.

The LexisNexis Canada online products terms of use at section 2.5.5 limits academic use to “that directly related to academic coursework required by the academic . . . [more]

Posted in: Education & Training, Legal Information: Libraries & Research, Practice of Law

How Law Firms Can Increase Their Online Banking Safety

Many law firms manage their trust and regular bank accounts on the Internet, and some firms have the ability to initiate various banking transactions online, including account transfers and wiring funds. While the convenience and efficiency of online banking are huge benefits, the downside is that online banking exposes you to security risks. The steps outlined below will help law firms to understand, address and reduce online banking risks – for both your firm and personal accounts.

Know and understand the terms of your banking agreements: As a starting point, carefully read your bank account and electronic banking services agreements. . . . [more]

Posted in: Technology

Would You Take the Bait in a Phishing Scam?

“Phishing” is one of the most common scams that cyber criminals use because it can produce spectacular results with very little effort or expense on the part of the hacker. Phishing involves the use of an email, text message or phone call that appears to come from a trusted source or institution, vendor or company, but is actually from a third-party impostor. Phishing messages are intended to trick you into giving cyber criminals your information by asking you to update or confirm personal or online account information. Personal information and identity theft and/or payment scams are the motives behind most . . . [more]

Posted in: Technology: Internet

3li_EnFr_Wordmark_W

This project has been made possible in part by the Government of Canada | Ce projet a été rendu possible en partie grâce au gouvernement du Canada