Category «Other»

Pete Recommends – Weekly highlights on cyber security issues February 9, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Microsoft Security Lead Outlines the Perils of Still Using Internet Explorer; No more robocalls: How to block unwanted calls from iPhone, Android; How your health information is sold and turned into ‘risk scores’; and The Best Websites to Find out If You’ve Been Hacked.

Subjects: Cybercrime, E-Commerce, Email Security, Health, Privacy

Pete Recommends – Weekly highlights on cyber security issues February 2, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Lawmakers warn of ‘deepfake’ videos ahead of 2020 election; Cyberattacks in Medicine: Is Radiology the Weakest Link?; Vint Cerf sees a big danger from the internet of things; and Facebook’s ‘Friendly Fraud Scandal’: What Parents Need to Know.

Subjects: Congress, Courts & Technology, Cybercrime, Cybersecurity, Email Security, Legal Research, Legislative, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues January 26 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: News outle’s email security gap; On Facebook and Twitter your privacy is at risk — even if you don’t have an account; The Smart TV Crapware Era Has Already Begun; and Mastercard Makes It Easier to Quit Free Trials.

Subjects: Cybersecurity, Email Security, Financial System, Privacy, Social Media

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues January 19 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trick for turning your iPhone and AirPods into live spy mic goes viral; .gov security falters during U.S. shutdown; Countering Russian disinformation the Baltic nations’ way; and Why the US Government Is Terrified of Hobbyist Drones.

Subjects: Court Resources, Cybersecurity, E-Government, Privacy, Spyware

Pete Recommends – Weekly highlights on cyber security issues January 12 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. four highlights from this week: The Privacy Risks of Public Location (Meta)Data; Western companies send old servers full of sensitive info to foreign countries; NSA to release a free reverse engineering tool; and Protecting Consumers and Businesses from Fraudulent Robocalls.

Subjects: Civil Liberties, Cybersecurity, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 29 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – five significant highlights of this week’s column: Why you should be worried about getting hacked in 2019; Robocalls and Spoofing: The Spam Call Surge Explained; Batcaves, Bulletproof Shutters, Laser Curtains: High-End Home Security Is Crazier Than You Think; Teaching Cybersecurity Law and Policy: Revised 62-Page Syllabus/Primer; and Is 2019 the year you should finally quit Facebook?

Subjects: Cybercrime, Cyberlaw, Cybersecurity, Education, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – five significant highlights of this week’s column: Market volatility: Fake news spooks trading algorithms; Hackers Find a Way to Bypass Gmail Two-Factor Authentication; It’s Time for a Bill of Data Rights; Turning Off Facebook Location Services Doesn’t Stop Tracking; and Russia and 2016: Troll group sought to recruit ‘assets’ through social media, Senate told.

Subjects: AI, Cybercrime, Cybersecurity, Economy, Email, Financial System, Privacy, Social Media

The Bullshit Algorithm

Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”

Subjects: Internet Resources, KM, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 15 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: House Cmte Investigation Issues Scathing Report on Equifax Breach; How HTTPS Everywhere Keeps Protecting Users On An Increasingly Encrypted Web; CBP Officers Aren’t Deleting Data After Warrantless Device Searches, IG Says; and just in time for gift giving season, How to Stop Package Thieves!

Subjects: Civil Liberties, Congress, Cybercrime, Cybersecurity, E-Commerce, Financial System, Legal Research, Privacy