Category «Other»

Pete Recommends – Weekly highlights on cyber security issues, August 13, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Hospital and Drugmaker Move to Build Vast Database of New Yorkers’ DNA; Your iPhone’s deleted voicemails aren’t actually deleted; FTC Contemplates Rules to Protect Against Commercial Surveillance and Lax Data Privacy; North Korean hackers target crypto experts with fake Coinbase job offers.

Subjects: Big Data, Cryptocurrency, Cybercrime, Cybersecurity, Healthcare, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report – Hidden Harms: The Misleading Promise of Monitoring Students Online; Meta, US hospitals sued for using healthcare data to target ads; All software is guilty until proven innocent; and Twitter Faces A Surge In Account Data Requests By Governments.

Subjects: Cybercrime, Cybersecurity, E-Commerce, Health, Healthcare, Legal Research, Privacy, Social Media, Technology Trends

Surveillance is pervasive: Yes, you are being watched, even if no one is looking for you

Peter Krapp, Professor of Film & Media Studies, University of California, Irvine shares facts that we need to acknowledge. The United States has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They’re also used to screen passengers for the Transportation Security Administration. And then there are smart doorbells and other home security cameras. Importantly, Krapp highlights not only do we live in a surveillance nation, but those who surveil us do so with virtually no constraints or oversight.

Subjects: Big Data, Civil Liberties, Legal Research, Privacy, Technology Trends, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 23, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report: 47% of orgs experienced a voice phishing attack last year; Rising Cyberthreats Increase Cyber Insurance Premiums While Reducing Availability; FTC explains ‘reasonable’ cybersecurity; and Facebook has started to encrypt links to counter privacy-improving URL Stripping.

Subjects: Civil Liberties, Criminal Law, Cybercrime, Cybersecurity, Free Speech, Government Resources, Healthcare, Legal Research, Legislative, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Should we be worried about real-time facial recognition systems?; Some VPNs can’t be trusted. These are best at privacy and security; In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer; and Here’s how North Korean operatives are trying to infiltrate US crypto firms.

Subjects: AI, Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, E-Discovery, Email Security, Healthcare, Legal Research, Privacy, Search Engines, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Why more regulation of connected car technology is probably just up the road; Police sweep Google searches to find suspects. The tactic is facing its first legal challenge; Attackers are using deepfakes to snag remote IT jobs; and Free smartphone stalkerware detection tool gets dedicated hub.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Gadgets/Gizmos, Health, Human Rights, Legal Research, Privacy, Search Engines, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, July 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Vendors prep for new cyber rules of the road; USPS: It’s Up to Mailers to Comply With State Laws on Abortion Pills; Facial Recognition Technology: Federal Agencies’ Use and Related Privacy Protections; and Google Asks for Permission to Flood Inboxes With Campaign Spam.

Subjects: Big Data, Cryptocurrencies, Cybercrime, Cybersecurity, Economy, Email Security, Financial System, Legal Research, Privacy, Search Engines

2022 Link Guide to Healthcare Resources

The pandemic and long COVID health issues have created heightened awareness and a growing need for factual online health information. This guide by Marcus P. Zillman identifies sources providing access to vetted health related research, tools for tracking and monitoring emerging issues and treatments, expert analysis, search engines and bots, and alternative and complementary therapies.

Subjects: Health, Healthcare, Internet Resources, Legal Research, Search Engines

Roe overturned: What you need to know about the Supreme Court abortion decision

The ruling in Dobbs v. Jackson Women’s Health Organization – handed down on June 24, 2022 – has far-reaching consequences. Nicole Huberfeld and Linda C. McClain, health law and constitutional law experts at Boston University, explain what just happened, and what happens next.

Subjects: Health, Healthcare, Human Rights, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, June 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Browser extension lets you remove specific sites from search results; Best VPN services 2022 — Today’s top picks; DOJ ramps up efforts to curb digital stalking and abuse; and Report: Adobe Reader is blocking antivirus tools from scanning loaded PDF documents.

Subjects: Cybercrime, Cybersecurity, E-Commerce, Internet Trends, Privacy, Search Engines, Search Strategies