Category «Other»

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

How to hide from a drone – the subtle art of ‘ghosting’ in the age of surveillance

Drones of all sizes are being used by environmental advocates to monitor deforestation, by conservationists to track poachers, and by journalists and activists to document large protests. As a political sociologist who studies social movements and drones, Prof. Austin Choi-Fitzpatrick documents a wide range of nonviolent and pro-social drone uses in his new book, “The Good Drone” and shows that these efforts have the potential to democratize surveillance.

Subjects: AI, Big Data, Civil Liberties, Legal Research, Privacy

Private browsing: What it does – and doesn’t do – to shield you from prying eyes on the web

Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.

Subjects: Civil Liberties, Competitive Intelligence, Internet Trends, KM, Legal Research, Online Legal Research Services, Privacy, Search Engines, Search Strategies, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues, July 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Your Genetic Data Isn’t Safe; Sustaining large-scale, long-term remote telework security; Issue with Cloudflare’s DNS service shuts down half the web; and Most Dedicated VPN IP-addresses Are Not Anonymous.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, Health, KM, Military, Privacy, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues, July 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Sued for Allegedly Tracking App Users After They Opt Out; Twitter hack reveals national security threat as election approaches; EFF Launches Searchable Database of Police Agencies and the Tech Tools They Use to Spy on Communities; Utility company calling? Don’t fall for it.

Subjects: AI, Business Research, Computer Security, Cybercrime, Cybersecurity, Email Security, Healthcare, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends Weekly highlights on cyber security issues July 12, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Your Smart Speaker Is Listening When It Shouldn’t; The U.S. is ‘looking at’ banning TikTok, cites Chinese surveillance; How Google Docs became the social media of the resistance; and Google Maps Launches New Features To Help People Navigate Coronavirus Hotspots.

Subjects: AI, Civil Liberties, Comparative/Foreign Law, Cybercrime, Cybersecurity, Health, KM, Legal Research, Privacy, Search Engines, Technology Trends

Pete Recommends Weekly highlights on cyber security issues June 27, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to make sure Google automatically deletes your data on a regular basis; Wrongfully Accused by an Algorithm; Library officials warn: Stop microwaving books to kill COVID-19; and Making .gov More Secure by Default.

Subjects: AI, Civil Liberties, Cybercrime, Cybersecurity, Education, Government Resources, Healthcare, Legal Research, Libraries & Librarians, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends Weekly highlights on cyber security issues June 21, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Zoom Finally Caves, Lets Free Users Have End-to-End Encryption; Researchers Create a Tool That Can Perfectly Depixelate Faces; North Korea Kim Jong Un cyber army more effective than nuclear weapons; Outrage over police brutality has finally convinced Amazon, Microsoft, and IBM to rule out selling facial recognition tech to law enforcement.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Health, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media