text
stringlengths 0
118
|
---|
http://www.huffingtonpost.com/aran- |
khanna/venmo-money_b_8418130.html. |
60. |
See, e.g., Steve Ranger, IoT Security Crackdown: Stop Using Default Passwords and |
Guarantee |
Updates, |
Tech |
Companies |
Told, |
ZD |
Net, |
(May |
1, |
2019), |
https://www.zdnet.com/article/iot-security-crackdown-stop-using-default-passwords-and- |
guarantee-updates-tech-companies-told/; Sue Poremba, Will Weak Passwords Doom the |
Internet |
of |
Things |
(IoT)?, |
Security |
Intelligence, |
(Feb. |
13, |
2020), |
https://securityintelligence.com/articles/will-weak-passwords-doom-the-internet-of-things- |
iot/;Careful Connections: Keeping the Internet of Things Secure, FTC, https://www.ftc.gov/tips- |
advice/business-center/guidance/careful-connections-keeping-internet-things-secure; |
Thomas |
Pahl, Stick with Security: Require Secure Passwords and Authentication, FTC, (Aug. 11, 2017), |
https://www.ftc.gov/news-events/blogs/business-blog/2017/08/stick-security-require-secure- |
passwords-authentication. |
61. |
Herley, So long, supra. |
62. |
See, e.g., John Spacey, 3 Examples of Mutual Authentication, Simplicable, (Nov. 4, 2016) |
https://simplicable.com/new/mutual-authentication. |
63. |
For an in-depth analysis of the problems with a certain approach to password complexity, see |
David Thaw, Cybersecurity Stovepiping, 96 Neb. L. Rev. 339, 349 (2017). |
64. |
See Parmet, supra. |
65. |
Hartzog, supra. |
66. |
Introduction to HTTPS, The HTTPS-Only Standard, https://https.cio.gov/faq/ (last visited June |
8, 2016); HTTPS Everywhere, Electronic Frontier Found. (last visited June 8, 2016) |
https://www.eff.org/https-everywhere. |
67. |
Hartzog, supra. |
68. |
See FTC v. D-Link Corp., Complaint for Permanent Injunction and Other Equitable Relief, |
Claim FTC File No. |
132 3157, https://www.ftc.gov/system/files/documents/cases/d- |
link_complaint_for_permanent_injunction_and_other_equitable_relief_unredacted_version_sea |
l_lifted_-_3-20-17.pdf. |
69. |
See Guide Concerning Use of the Word “Free” and Similar Representations, 16 CFR Part 251; |
Gut Check: A Reference Guide for Media on Spotting False Weight Loss Claims, FTC, |
https://www.ftc.gov/tips-advice/business-center/guidance/gut-check-reference-guide-media- |
spotting-false-weight-loss. |
70. |
Kat Krol & Matthew Moroz et al., Don’t Work. Can’t Work? Why it’s Time to Rethink Security |
Warnings, IEEE, (2012), https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6378951. |
71. |
People Disregard Security Warnings on Computers Because They Come at Bad Times, Study |
Finds, |
ScienceDaily, |
(Aug. |
17, |
2016), |
https://www.sciencedaily.com/releases/2016/08/160817142911.htm. |
72. |
Lujo Bauer & Christian Bravo-Lillo et al., Warning Design Guidelines, CyLab, (Feb. 5, 2013), |
https://www.cylab.cmu.edu/_files/pdfs/tech_reports/CMUCyLab13002.pdf. |
CHAPTER 9 |
1. |
In the Matter of Microsoft Corp., No. 012-3240 (FTC 2002); In re Guess.com, Inc., No. 022- |
3260 (FTC 2003). |
INDEX |
For the benefit of digital users, indexed terms that span two pages (e.g., 52–53) may, on occasion, |
appear on only one of those pages. |
Figures and tables are indicated by f and t following the page number. |
accountability. See responsibility and accountability |
Acquisti, Alessandro, 120 |
ad networks, 89 |
Adobe, 24, 53 |
Amazon, 85–86, 92, 93 |
American Medical Collection Agency (AMCA), 28 |
amplifiers, 93–99 |
Big Data companies, 98–99 |
consumer reporting agencies, 93–98 |
defined, 83 |
overview, 93 |
Anonymous, 20, 21, 26–27 |
Anthem data breach, 59 |
Apache Struts, 93–94 |
Apple, 19 |
FBI’s efforts to force creation of decryption software, 102 |
Opperman v. Path, 91–92 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.