Category «Blockchain»

Policing Reimagined

The thesis of Albert Chang’s paper is the metaverse presents a unique opportunity for effective police reforms. Developers, data scientists, and legal sector experts working within the metaverse may be able to implement changes more efficiently than Congress as they are not subject to constitutional constraints. Chang advocates a position that the federal government should strongly consider the adoption of immersive technology to demonstrate that a more effective method of policing is possible. This paper is especially significant in light of the fact that last week Congress passed the CHIPS and Science Act which will bolster research with $290 billion in new funding.

Subjects: Blockchain, Constitutional Law, Criminal Law, Cryptocurrencies, Education, Health, Human Rights, Legal Research, Social Media, Technology Trends, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Should we be worried about real-time facial recognition systems?; Some VPNs can’t be trusted. These are best at privacy and security; In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer; and Here’s how North Korean operatives are trying to infiltrate US crypto firms.

Subjects: AI, Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, E-Discovery, Email Security, Healthcare, Legal Research, Privacy, Search Engines, United States Law

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Face Search Engine Anyone Can Use Is Alarmingly Accurate; Cybercriminals target metaverse investors with phishing scams; Tech Experts Urge Congress to Fight Crypto Influence; and Cybersecurity Initiative to Give Consumers New Digital Security Tools.

Subjects: Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, Privacy, Search Engines, Search Strategies, Spyware

Pete Recommends – Weekly highlights on cyber security issues, May 8, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Supreme Court privacy vs. your right to privacy; NIST updates guidance for defending against supply-chain attacks; SafeGraph Will Stop Selling Planned Parenthood Location Data; and Be Smart. Shop Safe. We created this guide to help you shop for safe, secure connected products.

Subjects: Big Data, Blockchain, Courts & Technology, Criminal Law, Cybercrime, Cybersecurity, E-Commerce, Healthcare, Intellectual Property, Privacy

Pete Recommends – Weekly highlights on cyber security issues, April 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Amazon Workers Can Now Keep Cell Phones at Work; Best Reverse Image Search Tool: Google, Bing, Pixsy, Tineye; Google adds more ways to remove yourself from Search results; and Shut Stalkers Out of Your Tech.

Subjects: Blockchain, Civil Liberties, Communications, Cybersecurity, Economy, Privacy, Reference Resources, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues, April 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Blockchain can power up government processes, GAO says; How QR codes work and what makes them dangerous – a computer scientist explains; Thieves hit on a new scam: Synthetic identity fraud; and Report: One in four employees who made security mistakes lost their job.

Subjects: AI, Blockchain, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Legal Research, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, March 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to secure your home and office network: FBI: Americans lost $7B in 2021 to Internet crime; The best DNS blockers and firewalls; Bank’s Machine Learning Systems Are Ripe for Sabotage; Blockchain: Financial and Non-Financial Uses and Challenges; and DHS seeks to automate video surveillance on ‘soft targets’ like transit systems, schools.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, Economy, Privacy, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, March 20, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report: Cybersecurity teams need nearly 100 days to develop threat defenses; Russian General Killed After Using Unsecured Phone; A sustainable look at secure device destruction; and Ukraine reportedly adopts Clearview AI to track Russian invaders.

Subjects: Blockchain, Business Research, Cybersecurity, Economy, Financial System, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 2022 Guide to Internet Privacy Resources and Tools; Russia creates its own TLS certificate authority to bypass sanctions; Twitter quietly launches Tor service in the face of Russian censorship; Decentralized identity using blockchain.

Subjects: Blockchain, Cybersecurity, Economy, Financial System, Health, Healthcare, Legal Research, Privacy, Social Media

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software