Category «Computer Security»

Pete Recommends – Weekly highlights on cyber security issues, February 6, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 30% of ‘SolarWinds’ Victims Did Not Actually Use SolarWinds Software, Feds Say; Tough to Get Help Opting Out of Data Sharing; Police in Almost All U.S. States Use Amazon’s Ring Program; and Russian hack brings changes, uncertainty to U.S. court system.

Subjects: AI, Computer Security, Courts & Technology, Cybercrime, Cybersecurity, Government Resources, Legal Research, Legislative, Privacy

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: SolarWinds Hackers Got Into More Than 3,000 DOJ Email Accounts; Sealed U.S. Court Records Exposed in SolarWinds Breach; CISA:Hackers access to federal networks without SolarWinds; and State Department Approves Creation of Cyber Bureau.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, E-Government, Email Security, KM, Legal Research, Privacy, Software, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 3, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Zoom scam alert: Never click on this kind of invite; The Most Dangerous People on the Internet in 2020; She didn’t know her kidnapper. But he was using Google Maps — and that cracked the case; and CISA updates SolarWinds guidance, tells US govt agencies to update right away.

Subjects: AI, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Disaster Planning, E-Government, Economy, Email Security, Financial System, Government Contracts, Healthcare, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, December 20, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: News of SolarWinds breach impacting federal government agencies and the private sector; Facebook ‘Secretly’ Tracks Your iPhone Location – This Is How To Stop It; Microsoft: New malware can infect over 30K Windows PCs a day; U.S. Schools Are Buying Phone-Hacking Tech That the FBI Uses to Investigate Terrorists; and All the privacy apps you should have downloaded in 2020.

Subjects: Communications, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Government Resources, Military, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 5, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Fake calls from Apple and Amazon support: What you need to know; How to wipe your old Windows PC clean before getting rid of it; How a Grad Student Found Spyware That Could Control Anybody’s iPhone from Anywhere in the World; and Artificial Intelligence in Health Care: Benefits and Challenges of Technologies to Augment Patient Care.

Subjects: AI, Computer Security, Congress, Courts & Technology, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Legal Research, Legislative, Mobile Technology, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, October 3, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: CISA Releases Telework Essentials Toolkit; A New Tool for Detecting Deepfakes Looks for What Isn’t There: an Invisible Pulse; Collection and Use of Biometrics by U.S. Citizenship and Immigration Services; and What to do when someone steals your identity.

Subjects: AI, Big Data, Civil Liberties, Computer Security, Cybercrime, Cybersecurity, Financial System, Government Resources, KM, Legal Research, Privacy, Technology Trends, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues, September 20, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Blur Your House in Google Maps’ Street View; USPS Phishing Texts Are Flooding Phones Across The Country; Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene; and Weather Apps Continue To Share Data With Third Parties.

Subjects: Computer Security, Cybercrime, Cybersecurity, Economy, Email Security, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media