Category «KM»

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Student Research Resources 2020

This timely and extensive guide by Marcus Zillman includes resources for students, teachers and parents who together begin this school year with most, or in many cases, all of their courses conducted via online distance learning. The guide includes a wide range of links to augment and expand your current toolkit, including: open textbooks and learning resources for all subjects; free online courses; tutorial resources; educational search engines; video lectures and talks; tools to capture and organize ideas; comparing prices on new an used textbooks; and strategies for organizing notes for comprehensive exams.

Subjects: Distance Learning, Education, Internet Resources - Web Links, KM, Open Source, Reference Resources, Search Engines, Search Strategies, Technology Trends

LLRX New Issue – July 2020

Articles and Columns for July 2020 Student Research Resources 2020 – This timely and extensive guide by Marcus Zillman includes resources for students, teachers and parents who together begin this school year with most, or in many cases, all of their courses conducted via online distance learning. The guide includes a wide range of links to …

Subjects: KM

Private browsing: What it does – and doesn’t do – to shield you from prying eyes on the web

Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.

Subjects: Civil Liberties, Competitive Intelligence, Internet Trends, KM, Legal Research, Online Legal Research Services, Privacy, Search Engines, Search Strategies, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, July 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Your Genetic Data Isn’t Safe; Sustaining large-scale, long-term remote telework security; Issue with Cloudflare’s DNS service shuts down half the web; and Most Dedicated VPN IP-addresses Are Not Anonymous.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, Health, KM, Military, Privacy, Telecommuting

Research on voting by mail says it’s safe – from fraud and disease

As millions of Americans prepare to vote in November – and in many cases, primaries and state and local elections through the summer as well – lots of people are talking about voting by mail. Prof. Edie Goldenberg explains why it is a way to protect the integrity of the country’s voting system and to limit potential exposure to the coronavirus, which continues to spread widely in the U.S.

Subjects: Civil Liberties, Constitutional Law, Education, Health, KM, Legal Research