Category «Gadgets»

Pete Recommends – Weekly highlights on cyber security issues, September 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Lens reflections may betray your secrets in Zoom video calls; Multi-factor authentication (MFA) fatigue; How Pig Butchering Scams Work; and Crypto giveaway scams continue to escalate.

Subjects: Cryptocurrency, Cybersecurity, Gadgets, Gadgets/Gizmos, Legal Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why your organization should plan for deepfake fraud before it happens; FTC Sues Broker Kochava Over Geolocation Data Sales; Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content; and Chrome extensions with 1.4 million installs steal browsing data.

Subjects: Computer Security, Cybercrime, Cybersecurity, Financial System, Internet Trends, Legal Research, Privacy, Search Engines, Social Media, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Face Search Engine Anyone Can Use Is Alarmingly Accurate; Cybercriminals target metaverse investors with phishing scams; Tech Experts Urge Congress to Fight Crypto Influence; and Cybersecurity Initiative to Give Consumers New Digital Security Tools.

Subjects: Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, Privacy, Search Engines, Search Strategies, Spyware

How QR codes work and what makes them dangerous – a computer scientist explains

Scott Ruoti, Assistant Professor of Computer Science, University of Tennessee discusses security issues respective to QR codes. He states that these codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.

Subjects: Cybercrime, Cybersecurity, Privacy, Spyware

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

Pete Recommends Weekly highlights on cyber security issues, February 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.

Subjects: AI, Cybercrime, Cybersecurity, Data Mining, Economy, Education, Email Security, Financial System, Government Resources, Legal Research, Privacy, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, E-Government, Government Resources, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends Weekly highlights on cyber security issues, January 2, 2022

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The dangers of dark data: How to manage it and mitigate the risks; US Still Lacks Federal Cyber Strategy After Decades of Attempts; The Worst Scams of 2021; and Tips for providing digital security benefits to employees.

Subjects: Comparative/Foreign Law, Congress, Copyright, Cybercrime, Cyberlaw, Cybersecurity, KM, Legal Research, Privacy, Social Media, Spyware, Technology Trends