Category «Spyware»

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 5 cybersecurity predictions for 2023; Cops Can Extract Data From 10,000 Different Car Models’ Infotainment Systems; A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet; and Thinking about taking your computer to the repair shop? Be very afraid.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, Email, Email Security, KM, Privacy, Search Engines, Search Strategies, Social Media, Spyware, Travel

Pete Recommends – Weekly highlights on cyber security issues, November 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google Settles 40 States’ Location Data Suit for $392 Million; FBI Alert: Watch Out for Subscription Renewal Scams; GAO Science & Tech Spotlight: Zero Trust Architecture; and Employee tracking: From your keystrokes to your emails, here’s what your employer can see.

Subjects: Civil Liberties, Communications, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email, Freedom of Information, Legal Research, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, September 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why your organization should plan for deepfake fraud before it happens; FTC Sues Broker Kochava Over Geolocation Data Sales; Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content; and Chrome extensions with 1.4 million installs steal browsing data.

Subjects: Computer Security, Cybercrime, Cybersecurity, Financial System, Internet Trends, Legal Research, Privacy, Search Engines, Social Media, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Face Search Engine Anyone Can Use Is Alarmingly Accurate; Cybercriminals target metaverse investors with phishing scams; Tech Experts Urge Congress to Fight Crypto Influence; and Cybersecurity Initiative to Give Consumers New Digital Security Tools.

Subjects: Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, Privacy, Search Engines, Search Strategies, Spyware

How QR codes work and what makes them dangerous – a computer scientist explains

Scott Ruoti, Assistant Professor of Computer Science, University of Tennessee discusses security issues respective to QR codes. He states that these codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.

Subjects: Cybercrime, Cybersecurity, Privacy, Spyware

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

Pete Recommends Weekly highlights on cyber security issues, February 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.

Subjects: AI, Cybercrime, Cybersecurity, Data Mining, Economy, Education, Email Security, Financial System, Government Resources, Legal Research, Privacy, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, E-Government, Government Resources, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends Weekly highlights on cyber security issues, January 2, 2022

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The dangers of dark data: How to manage it and mitigate the risks; US Still Lacks Federal Cyber Strategy After Decades of Attempts; The Worst Scams of 2021; and Tips for providing digital security benefits to employees.

Subjects: Comparative/Foreign Law, Congress, Copyright, Cybercrime, Cyberlaw, Cybersecurity, KM, Legal Research, Privacy, Social Media, Spyware, Technology Trends