Category «Computer Security»

Pete Recommends – Weekly highlights on cyber security issues, September 20, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Blur Your House in Google Maps’ Street View; USPS Phishing Texts Are Flooding Phones Across The Country; Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene; and Weather Apps Continue To Share Data With Third Parties.

Subjects: Computer Security, Cybercrime, Cybersecurity, Economy, Email Security, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, July 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Your Genetic Data Isn’t Safe; Sustaining large-scale, long-term remote telework security; Issue with Cloudflare’s DNS service shuts down half the web; and Most Dedicated VPN IP-addresses Are Not Anonymous.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, Health, KM, Military, Privacy, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues, July 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Sued for Allegedly Tracking App Users After They Opt Out; Twitter hack reveals national security threat as election approaches; EFF Launches Searchable Database of Police Agencies and the Tech Tools They Use to Spy on Communities; Utility company calling? Don’t fall for it.

Subjects: AI, Business Research, Computer Security, Cybercrime, Cybersecurity, Email Security, Healthcare, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends Weekly highlights on cyber security issues June 6, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to take back the information you’ve given to all your favorite apps and websites; More Cyber Training Does Not Mean Fewer Data Breaches; Google faces $5 billion lawsuit in U.S. for tracking ‘private’ internet use; and COVID-19 Complicates Already Challenged FDA Foreign Inspection Program.

Subjects: AI, Computer Security, Cybercrime, Cybersecurity, Encryption, Energy, Government Resources, Health, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media

Pete Recommends Weekly highlights on cyber security issues May 24, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Foreign Hackers Swipe Millions in Unemployment Benefits; An Apple whistleblower has publicly slammed the company, claiming it violated ‘fundamental rights’ after Siri recorded users’ intimate moments without consent; Google censored search results after bogus copyright claims; and COVID-19 data sharing with law enforcement sparks concern.

Subjects: Competitive Intelligence, Computer Security, Copyright, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Financial System, Health, Healthcare, Legal Research, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues February 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 2019 Internet Crime Report Released; The silent threat of the coronavirus: America’s dependence on Chinese pharmaceuticals; Equifax breach: How Chinese army hackers allegedly stole personal info; and How to Share Files Securely Online: Dropbox, Firefox Send, and More.

Subjects: AI, Big Data, Civil Liberties, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Economy, Education, Financial System, Government Resources, Health, Internet Trends, Privacy

Pete Recommends – Weekly highlights on cyber security issues January 12, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: FBI, Homeland Security warn of Iranian terror and cyber threat in new intelligence bulletin; Police are buying hidden cameras disguised as rocks, trees, tombstones; ‘Shattered’: Inside the secret battle to save America’s undercover spies in the digital age; and Cities, states face costly cybersecurity landscape after attacks spiked in 2019.

Subjects: Computer Security, Cybercrime, Cybersecurity, Government Resources, Military

Converging Paths: A Librarian’s Journey to Becoming a Privacy Professional

After receiving her MLIS Stephanie Davis worked in the field of knowledge management (KM) where she sourced, documented, categorized, and shared information about her consulting firm’s people and project experiences. Davis designed webpages, delivered training programs on information access and disclosure, and administered communications and awareness campaigns. She also tracked metrics and presented reports to senior management to demonstrate the KM program was delivering against our strategy and mandate. Davis became interested in keeping data secure and maintaining confidentiality while also focusing on how to make information as accessible as possible so her clients could achieve their objectives – and this article discusses her role as a privacy professional.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, KM, Law Librarians, Leadership, Libraries & Librarians, Privacy