Category «AI»

Pete Recommends – Weekly highlights on cyber security issues, July 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Should we be worried about real-time facial recognition systems?; Some VPNs can’t be trusted. These are best at privacy and security; In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer; and Here’s how North Korean operatives are trying to infiltrate US crypto firms.

Subjects: AI, Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, E-Discovery, Email Security, Healthcare, Legal Research, Privacy, Search Engines, United States Law

Language matters when Googling controversial people

Ahmed Al-Rawi, Assistant Professor, News, Social Media, and Public Communication, Simon Fraser University – identifies and explains how features of search engine autocomplete functions enables users to find fast answers to their questions or queries. However, autocomplete search functions are based on ambiguous algorithms that have been widely criticized because they often provide biased and racist results.

Subjects: AI, KM, News Resources, Search Engines, Search Strategies, Social Media

Pete Recommends – Weekly highlights on cyber security issues, May 21, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. – Four highlights from this week: How Often Do Ads Share Your Data Every Day? Hundreds of Times; Threat actors compromising US business online checkout pages to steal credit card information; Your Bosses Could Have a File on You, and They May Misinterpret It; and Hackers are Hijacking Phone Numbers to Empty Crypto Accounts.

Subjects: AI, Criminal Law, Cybercrime, Cybersecurity, Economy, Financial System, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, May 14, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Survey: 93% of Americans Fear Cyberwarfare Against U.S.; ICE Has Assembled a ‘Surveillance Dragnet’ with Facial Recognition and Data, Report Says; Thousands of Popular Websites See What You Type—Before You Hit Submit; EV Infrastructure Vulnerabilities Put Cars, the Grid at Risk; and What exactly is Web3?

Subjects: AI, Big Data, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, April 23, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report Finds Identity Fraud Up 167% In USPS Change Of Address Requests; Cell carriers can use your web history for ads; The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?; and Microsoft Teams Adds an Emergency Call Alert.

Subjects: AI, Conferencing Software, Cybercrime, Cybersecurity, Data Mining, Federal Legislative Research, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, April 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Data From Friends and Strangers Show Where You Are; TSA’s Terrorist Watch List Comes for Amtrak Passengers; Facial recognition not required as tax ID – yet. But the tech spreads; You’re muted… or are you? Videoconferencing apps may listen even when mic is off; and Mismanaged Cloud Services Put User Data at Risk.

Subjects: AI, Big Data, Criminal Law, Cybercrime, Cybersecurity, Economy, Financial System, Privacy, Social Media, Travel

Pete Recommends – Weekly highlights on cyber security issues, April 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Blockchain can power up government processes, GAO says; How QR codes work and what makes them dangerous – a computer scientist explains; Thieves hit on a new scam: Synthetic identity fraud; and Report: One in four employees who made security mistakes lost their job.

Subjects: AI, Blockchain, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Legal Research, Privacy, Search Engines

The Russian invasion shows how digital technologies have become involved in all aspects of war

Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.

Subjects: AI, Communications, KM, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, March 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to secure your home and office network: FBI: Americans lost $7B in 2021 to Internet crime; The best DNS blockers and firewalls; Bank’s Machine Learning Systems Are Ripe for Sabotage; Blockchain: Financial and Non-Financial Uses and Challenges; and DHS seeks to automate video surveillance on ‘soft targets’ like transit systems, schools.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, Economy, Privacy, Technology Trends

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software