You’ll figure this out pretty quick. If they’ve got the email address you use for an account (found on the Dark Web) they can often find a password from a data breach (also available [...]
Our Websites
THE POSSE LIST
This Posse List is a guide to the areas of litigation and the process of discovery — electronically stored information (ESI) and otherwise — and also provides information on jobs in those areas for our members and subscribers.
InfoTech Europe
Based in Paris with satellite offices in Brussels and Zurich, our primary work involves the staffing of e-discovery document reviews involved in European-based litigations and government investigations, as well as the related data collection, processing, analysis, and hosting functions.
Project Counsel Media
Project Counsel Media covers the areas of digital technology, media, mobile technology and intellectual property. It also produces numerous videos.
From Our Blog
The math: so if I receive 10 invites, one invite will be from an outfit whose cyber security technology cannot protect me? BY: Salvatore Nicci Technology Analyst / Reporter PROJECT COUNSEL [...]
“Check out Microsoft’s average reaction time (to abuse reports). They’re the world’s best malware hoster for about a decade, due to O365.” BY: Salvatore Nicci Technology Analyst / Reporter [...]
A combination of machine learning with binary visualization to identify malware and phishing websites. Both processes involve patterns of color. BY: Salvatore Nicci Technology Analyst / [...]