Category «Encryption»

Pete Recommends – Weekly highlights on cyber security issues, January 27, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 7 Ways to Avoid Scammers on Social Media; Data explosion prompts agencies to look at advanced e-discovery platforms; Apple Cash, Cash App, Venmo, Zelle P2P Payment Apps Compared; and Everyone Wants Your Email Address. Think Twice Before Sharing It.

Subjects: Cybersecurity, E-Discovery, Economy, Email Security, Encryption, Privacy

Pete Recommends – Weekly highlights on cyber security issues, January 8, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Hidden Cost of Cheap TVs; Cloud email services bolster encryption against hackers; Did ChatGPT Write That? College Kid Creates AI Essay Detector; and the FBI’s Perspective on Ransomware.

Subjects: AI, Cybersecurity, Education, Email Security, Encryption, KM, Legal Research, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans; Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds; Top EU court rules Google must delete inaccurate search results; and Who Is Collecting Data from Your Car?

Subjects: Cybercrime, Cybersecurity, Data Mining, Encryption, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

2021 Guide to Internet Privacy Resources and Tools

Technology has significantly changed our concept of privacy as well as our ability to maintain it. The are a wide spectrum of tools, services and strategies available to assist you in the effort to maintain a sliding scale of privacy in an increasingly porous, insecure online environment. Whether you are browsing the internet, using email or SMS, encrypting data on PCs or mobile phones, trying to choose the best VPN, or working to secure your online services from cybercrime, hacking or surveillance, Marcus Zillman has identified a wide range of sources for you to consider. The foundational issue regarding privacy is that you must be proactive, diligent and persistent in evaluating and using multiple applications for email, search, file transfer, and social media. There is no “one size fits all” solution, and your vigilance and willingness to remain flexible in applying effective solutions are part of an ongoing process.

Subjects: Big Data, Cybercrime, Cybersecurity, Email Security, Encryption, Internet Trends, Search Engines, Search Strategies, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 12, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 8 Easy Ways to Stay Anonymous Online; Education Department Updates Rules and Criminal Penalties for Accessing Agency Data; ProtonMail Shares Activist’s IP Address With Authorities Despite Its “No Log” Claims; and As flood alerts lit up phones, did ‘warning fatigue’ set in?

Subjects: Cybercrime, Cybersecurity, Email Security, Encryption, International Legal Research, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Here’s How Amazon Third-Party Sellers Reportedly Hound Customers Who Leave Bad Reviews; Microsoft Edge’s ‘Super Duper Secure Mode’ Does What It Says; The Ethics of Data: Anonymity Vs Analytics; and Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises.

Subjects: Congress, Cybercrime, Cybersecurity, Email Security, Encryption, Information Management, KM, Legal Research, Legislative, Privacy, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues, June 19, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Senate bill boosts penalties for cyber criminals; Anti-Vaxxers Review-Bomb Bars With Vaccine Requirements; Why employees need counterespionage training; and ‘An uprising’; Youth activists bring digital rights to forefront.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Healthcare, Social Media

Pete Recommends – Weekly highlights on cyber security issues, May 30, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Password-Protect Your Google Search History and More; After Colonial attack, TSA issues new cyber regs for pipelines; European privacy groups challenge facial scan firm Clearview; and Google, Hospital Chain Cut Data Deal on Patient Records.

Subjects: AI, Criminal Law, Cybercrime, Cybersecurity, E-Commerce, Economy, Email Security, Encryption, Energy, Healthcare, Privacy, Search Engines