Category «Other»

Pete Recommends – Weekly highlights on cyber security issues, September 26, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The High Privacy Cost of a “Free” Website; Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere; Cybercrime and the Law: Computer Fraud and Abuse Act and the 116th Congress; and FinCEN Files Show How Criminals Use Big-Name Banks To Manage Global Financial Corruption.

Subjects: Business Research, Competitive Intelligence, CRS Reports, Cybercrime, Cybersecurity, Economy, Government Resources, Intellectual Property, Legal Research, Privacy, Search Engines, Social Media, United States Law

Pete Recommends – Weekly highlights on cyber security issues, September 20, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Blur Your House in Google Maps’ Street View; USPS Phishing Texts Are Flooding Phones Across The Country; Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene; and Weather Apps Continue To Share Data With Third Parties.

Subjects: Computer Security, Cybercrime, Cybersecurity, Economy, Email Security, Privacy

Pete Recommends – Weekly highlights on cyber security issues, September 12, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Even a Federal Judge Agrees That the FBI and NSA Are Flouting Civil Liberty Safeguards; Chinese hackers go after UNC for COVID-19 vaccine info; COVID-19 and Emerging Global Patterns of Financial Crime; and The State Of Identity Security, 2020.

Subjects: Civil Liberties, Cybercrime, Cyberlaw, Cybersecurity, Economy, Education, Financial System, Government Resources, Health, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, September 6, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Amazon’s Alexa for Landlords Is a Privacy Nightmare in the Making; This Email Could Wreak Havoc on the 2020 Election; How can you spot a tech support scam?; and Republicans flooding internet with deceptive videos and Big Tech isn’t keeping up.

Subjects: Cybercrime, Cybersecurity, Email Security, Information Architecture, Privacy, Search Engines

Mining Data on the Internet 2020

Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.

Subjects: AI, Business Research, Competitive Intelligence, Data Mining, Economy, Financial System, Internet Resources, KM, Legal Research, Open Source

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 23, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Instagram requires government ID to verify suspicious accounts; How to Clean Up Your Social Media Accounts Without Deleting Them; CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders; and Amazon shares your private info unless you do these steps.

Subjects: Cybercrime, Cybersecurity, Information Management, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media