Category «Technology Trends»

Pete Recommends – Weekly highlights on cyber security issues, March 27, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: How to Wipe a Computer Clean of Personal Data; Phishers’ perfect targets: Employees getting back to the office; Anyone with an iPhone can now make deepfakes; Massive camera hack exposes the growing reach and intimacy of American surveillance; and Federal Government Needs to Urgently Pursue Critical Actions to Address Major Cybersecurity Challenges.

Subjects: Criminal Law, Cybercrime, Cybersecurity, E-Government, Email Security, Financial System, Government Resources, KM, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, March 21, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Please Stop Using Text Messaging to Receive Login Codes; How to poison the data that Big Tech uses to surveil you; Ulysses Group Claims It Can Track Nearly Any Car in Real-Time; and Google Can Be Sued for Tracking Users in Private Browsing Mode.

Subjects: AI, Big Data, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Healthcare, Legal Research, Legislative, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, March 14, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: A directory of direct links to delete your account from web services; Rep. Suzan DelBene’s New Bill Aims to Protect Privacy in US; Experts Find a Way to Learn What You’re Typing During Video Calls; and America, Your Privacy Settings Are All Wrong.

Subjects: Big Data, Congress, Cybersecurity, Ethics, Health, Healthcare, Legal Research, Legislative, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, February 20, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online; States Push Internet Privacy Rules in Lieu of Federal Standards; Incomplete fixes for security flaws make hackers’ job easy, Google says; and 30 popular mobile health apps vulnerable to cyberattacks, Protected Health Information exposure.

Subjects: Cybercrime, Cybersecurity, E-Commerce, Economy, Healthcare, Legal Research, Privacy, Technology Trends, Travel

Microsoft OneDrive Explained

There are many ways to store and share documents online. Box, Dropbox, ShareFile, and Google Drive are but a few of the popular products. For firms using Microsoft 365 Catherine Reach Sanders describes how you already have an online document storage tool built in – MS OneDrive. What can you do with OneDrive, what are the pros and cons, what is the difference between it and SharePoint? Sanders provides the answers!

Subjects: Case Management, KM, Legal Technology, Product Reviews, Software, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, February 13, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Paper – A First Look at Zoombombing; Google Chrome’s engineering director discusses how the company is trying to preserve digital advertising after tracking cookies are killed off; NSF pushing for agency-specific cyber-physical research; and They Stormed the Capitol. Their Apps Tracked Them.

Subjects: AI, Big Data, Congress, Cybersecurity, KM, Legal Research, Legislative, Privacy, Search Engines, Search Strategies, Technology Trends

Online Research Browsers and Data Visualization Tools 2021

This guide by Marcus P. Zillman focuses on free and feed based research browsers and data visualization tools for research and analysis. These resources can be used to support legal research, legal marketing, business and competitive intelligence research, knowledge management and knowledge discovery, and data mining.

Subjects: AI, Big Data, Communications, Competitive Intelligence, Digital Archives, KM, Legal Marketing, Legal Research, Libraries & Librarians, Search Engines, Search Strategies, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 31, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces?; Fraudulent Applicants for Paycheck Protection Program (PPP) and a Surge in Criminal Referrals from Small Business Administration; U.S. Intelligence Claims China Wants to Steal Your DNA; Microsoft Deals Blow To Chrome With A Bunch Of Exciting New Edge Features; and Apple: Keep iPhone 12 and MagSafe Away From Medical Devices.

Subjects: AI, Big Data, Civil Liberties, Cybersecurity, Government Resources, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces?

In the age of Big Tech, we need to grapple with what expectations we can and should have about who has access to our faces. The recent riot at the U.S. Capitol has put the question into the spotlight as facial recognition becomes a vital tool in identifying rioters: What is the power of facial recognition technology, and are we ready for it? Professor Wendy H. Wong discusses what are the costs and consequences of losing our faces to data, including the right to privacy and our ability to live our lives free of surveillance.

Subjects: AI, Civil Liberties, KM, Legal Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 23, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Site Published Every Face From Parler’s Capitol Riot Videos; DHS Gets Sued Over Its Social Media Surveillance Tactics; and Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes; and The risks of DDoS attacks for the public sector.

Subjects: Congress, Criminal Law, Cybercrime, Cybersecurity, Digital Archives, Financial System, KM, Privacy, Social Media, Technology Trends