Category «Gadgets»

Pete Recommends – Weekly highlights on cyber security issues, November 2, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Comcast Trying to Stop Google From Encrypting Browsing Histories: Report; The Ransomware Superhero of Normal, Illinois; VA Left Vets Vulnerable to Identity Theft; and US proposes cutting off funds for Chinese telecom equipment.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Health, Legal Research, Privacy, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, October 5, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: EU can force Facebook and social media platforms to remove content globally; How to Set Your Google Data to Self-Destruct; The whistleblowing process, explained; and ABA Tech Report 2019.

Subjects: Cybercrime, Cyberlaw, Cybersecurity, Gadgets/Gizmos, Government Resources, Internet Trends, Legal Research, Pornography, Privacy, WiFi

Pete Recommends – Weekly highlights on cyber security issues, August 31, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Hijacked Reviews on Amazon Can Trick Shoppers; Google finds evidence of attempted mass iPhone hack; US waged cyberattack on database used by Iran to target tankers; and Career Services urges students to use caution to avoid fraudulent job postings.

Subjects: Cybercrime, Cybersecurity, Education, Privacy, Spyware

Pete Recommends – Weekly highlights on cyber security issues August 11, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to make a VPN in under 30 minutes – and which services leak your data; How to Find Spyware Your Employer Installed on Your Computer and What to Do About It; Users can sue Facebook over facial recognition software, court rules; and When Robots Make Legal Mistakes.

Subjects: AI, Civil Liberties, Cybercrime, Cybersecurity, KM, Privacy, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues July 28, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Viral App FaceApp Now Owns Access To More Than 150 Million People’s Faces And Names; What Does Incognito Mode Actually Do? Here’s Everything You Need to Know; How vulnerable are the undersea cables that power the global internet?; and Equifax To Pay Hundreds Of Millions In Data Breach Settlement (with many caveats).

Subjects: Congress, Cybercrime, Cybersecurity, Email, Email Security, Government Resources, Internet Trends, Legal Research, Privacy, Social Media, Spyware

Harness the Melodic Robotic Voices of Our Eventual Overlords Now to Improve Your Proofreading!

As writer/editor for more than two decades, Sarah Gotschall’s article immediately piqued my interest. Gotschall writes that when she proofreads her own work product, she is doing so with what she think she wrote in mind, rather than than focusing specifically on the words on the page. The addition of Speak command to your Quick Access Toolbar in Microsoft Word will be of interest to writers, editors, researchers, librarians, InfoPros, students, and marketing folks too.

Subjects: Communication Skills, Communications, Grammar, KM, Legal Marketing, Software, Technology Trends

Is it a “Good” Case? Can You Rely on BCite, KeyCite, and Shepard’s to Tell You?

Kristina L. Niedringhaus calls our attention to a recent article by Paul Heller whose research identified 357 citing relationships that one or more of the three major citators labeled as negative. “Out of these, all three citators agree that there was negative treatment only 53 times. This means that in 85% of these citing relationships, the three citators do not agree on whether there was negative treatment.”

Subjects: Citators, KM, Legal Research, Legal Research Training, Product Reviews, United States Law

Pete Recommends – Weekly highlights on cyber security issues April 28, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: ‘They think they are above the law’: the firms that own America’s voting system; Why You Should Use a Password Manager; Cyberspies Hijacked the Internet Domains of Entire Countries; and Huawei: Chinese spies or trustworthy 5G industry partner?

Subjects: Cybersecurity, Mobile Technology, Privacy, Spyware, Technology Trends