text
stringlengths
0
118
http://www.huffingtonpost.com/aran-
khanna/venmo-money_b_8418130.html.
60.
See, e.g., Steve Ranger, IoT Security Crackdown: Stop Using Default Passwords and
Guarantee
Updates,
Tech
Companies
Told,
ZD
Net,
(May
1,
2019),
https://www.zdnet.com/article/iot-security-crackdown-stop-using-default-passwords-and-
guarantee-updates-tech-companies-told/; Sue Poremba, Will Weak Passwords Doom the
Internet
of
Things
(IoT)?,
Security
Intelligence,
(Feb.
13,
2020),
https://securityintelligence.com/articles/will-weak-passwords-doom-the-internet-of-things-
iot/;Careful Connections: Keeping the Internet of Things Secure, FTC, https://www.ftc.gov/tips-
advice/business-center/guidance/careful-connections-keeping-internet-things-secure;
Thomas
Pahl, Stick with Security: Require Secure Passwords and Authentication, FTC, (Aug. 11, 2017),
https://www.ftc.gov/news-events/blogs/business-blog/2017/08/stick-security-require-secure-
passwords-authentication.
61.
Herley, So long, supra.
62.
See, e.g., John Spacey, 3 Examples of Mutual Authentication, Simplicable, (Nov. 4, 2016)
https://simplicable.com/new/mutual-authentication.
63.
For an in-depth analysis of the problems with a certain approach to password complexity, see
David Thaw, Cybersecurity Stovepiping, 96 Neb. L. Rev. 339, 349 (2017).
64.
See Parmet, supra.
65.
Hartzog, supra.
66.
Introduction to HTTPS, The HTTPS-Only Standard, https://https.cio.gov/faq/ (last visited June
8, 2016); HTTPS Everywhere, Electronic Frontier Found. (last visited June 8, 2016)
https://www.eff.org/https-everywhere.
67.
Hartzog, supra.
68.
See FTC v. D-Link Corp., Complaint for Permanent Injunction and Other Equitable Relief,
Claim FTC File No.
132 3157, https://www.ftc.gov/system/files/documents/cases/d-
link_complaint_for_permanent_injunction_and_other_equitable_relief_unredacted_version_sea
l_lifted_-_3-20-17.pdf.
69.
See Guide Concerning Use of the Word “Free” and Similar Representations, 16 CFR Part 251;
Gut Check: A Reference Guide for Media on Spotting False Weight Loss Claims, FTC,
https://www.ftc.gov/tips-advice/business-center/guidance/gut-check-reference-guide-media-
spotting-false-weight-loss.
70.
Kat Krol & Matthew Moroz et al., Don’t Work. Can’t Work? Why it’s Time to Rethink Security
Warnings, IEEE, (2012), https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6378951.
71.
People Disregard Security Warnings on Computers Because They Come at Bad Times, Study
Finds,
ScienceDaily,
(Aug.
17,
2016),
https://www.sciencedaily.com/releases/2016/08/160817142911.htm.
72.
Lujo Bauer & Christian Bravo-Lillo et al., Warning Design Guidelines, CyLab, (Feb. 5, 2013),
https://www.cylab.cmu.edu/_files/pdfs/tech_reports/CMUCyLab13002.pdf.
CHAPTER 9
1.
In the Matter of Microsoft Corp., No. 012-3240 (FTC 2002); In re Guess.com, Inc., No. 022-
3260 (FTC 2003).
INDEX
For the benefit of digital users, indexed terms that span two pages (e.g., 52–53) may, on occasion,
appear on only one of those pages.
Figures and tables are indicated by f and t following the page number.
accountability. See responsibility and accountability
Acquisti, Alessandro, 120
ad networks, 89
Adobe, 24, 53
Amazon, 85–86, 92, 93
American Medical Collection Agency (AMCA), 28
amplifiers, 93–99
Big Data companies, 98–99
consumer reporting agencies, 93–98
defined, 83
overview, 93
Anonymous, 20, 21, 26–27
Anthem data breach, 59
Apache Struts, 93–94
Apple, 19
FBI’s efforts to force creation of decryption software, 102
Opperman v. Path, 91–92