Category «Other»

Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Tricking antivirus solutions into deleting the wrong files on Windows; DOJ Seizes Dozens of Websites as Part of Cyberattack-for-Hire; TikTok pushes harmful content promoting eating disorders and self-harm into young users’ feeds; and FCC May Mandate Security Updates for Phones.

Subjects: Cybercrime, Cybersecurity, Food & Drug Law, Healthcare, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans; Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds; Top EU court rules Google must delete inaccurate search results; and Who Is Collecting Data from Your Car?

Subjects: Cybercrime, Cybersecurity, Data Mining, Encryption, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 5 cybersecurity predictions for 2023; Cops Can Extract Data From 10,000 Different Car Models’ Infotainment Systems; A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet; and Thinking about taking your computer to the repair shop? Be very afraid.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, Email, Email Security, KM, Privacy, Search Engines, Search Strategies, Social Media, Spyware, Travel

Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.

Subjects: AI, Big Data, Blockchain, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Employment Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, November 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google Settles 40 States’ Location Data Suit for $392 Million; FBI Alert: Watch Out for Subscription Renewal Scams; GAO Science & Tech Spotlight: Zero Trust Architecture; and Employee tracking: From your keystrokes to your emails, here’s what your employer can see.

Subjects: Civil Liberties, Communications, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Email, Freedom of Information, Legal Research, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, November 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Researchers Devise Wi-Peep Drone That Can ‘See Through Walls’; Is Cybersecurity Awareness Month Anything More Than PR?; The Fallout From the First Trial of a Corporate Executive for ‘Covering Up’ a Data Breach; and What to Do When You’ve Been Hacked.

Subjects: Cybersecurity, Education, Financial System, Gadgets/Gizmos, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, November 5, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 2023 Privacy Guide; TikTok allows employees in China to access European data; Public Entities in Nearly Every State Use Federally-Banned Foreign Tech, Report Says; and Malicious App Developer Remains on Google Play.

Subjects: Big Data, Cybersecurity, Email, Information Management, KM, Privacy, Search Engines, Search Strategies, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cybersecurity issues – October 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Thomson Reuters collected and leaked at least 3TB of sensitive data; Criminals are starting to exploit the metaverse, says Interpol. So police are heading there too; Public Entities in Nearly Every State Use Federally-Banned Foreign Tech, Report Says; and Should you log in with Facebook or Google on other sites or apps? Short answer: No!

Subjects: AI, Big Data, Criminal Law, Cybercrime, Cybersecurity, Government Resources, Healthcare, KM, Legal Research, Privacy, Social Media

2023 Privacy Guide

The fundamental concept of privacy has changed dramatically as more individuals have shifted most of their data to online platforms. There are however a wide range of personal, professional, corporate and legal issues that present significant barriers to the goal of maintaining privacy on the internet. Online privacy is not a right or even a choice when you use email, browsers and search engines, social media, ecommerce sites, online subscriptions…the list goes on and on. Trying to achieve even a modicum of online privacy now involves the use of multiple applications and services, specific software and hardware, time, due diligence, and flexibility – as the challenges continue to evolve. This pathfinder by Marcus P. Zillman will assist in your efforts to secure additional privacy when using email, conducting research, while on social media, completing online learning programs, transferring health records, shopping online, and with many other online services and system with which you interact daily. Even if you only choose to start using several applications or services that Zillman has referenced, this will establish a foundation on which you can build and execute a more effective privacy and security plan. Think about starting with choosing a new browser, search engine and email provider, and move forward from there. This is a journey, and it will take time, but it is worth the effort.

Subjects: Email, Email Security, KM, Privacy, Social Media

Will Amazon’s new ePub capability help the anti-DRM movement?

David H. Rothman has been writing about the issues inherent in publisher control of e-books and e-readers and the impact of digital rights management for many years. Whether you use personal devices or institutional devices, the issues Rothman raises here will impact you.

Subjects: Copyright, E-Books, Information Management, KM, Law Library Management, Legal Research, Libraries & Librarians, Library Software & Technology, Licensing, Software