Category «Other»

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues January 19 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trick for turning your iPhone and AirPods into live spy mic goes viral; .gov security falters during U.S. shutdown; Countering Russian disinformation the Baltic nations’ way; and Why the US Government Is Terrified of Hobbyist Drones.

Subjects: Court Resources, Cybersecurity, E-Government, Privacy, Spyware

Pete Recommends – Weekly highlights on cyber security issues January 12 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. four highlights from this week: The Privacy Risks of Public Location (Meta)Data; Western companies send old servers full of sensitive info to foreign countries; NSA to release a free reverse engineering tool; and Protecting Consumers and Businesses from Fraudulent Robocalls.

Subjects: Civil Liberties, Cybersecurity, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 29 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – five significant highlights of this week’s column: Why you should be worried about getting hacked in 2019; Robocalls and Spoofing: The Spam Call Surge Explained; Batcaves, Bulletproof Shutters, Laser Curtains: High-End Home Security Is Crazier Than You Think; Teaching Cybersecurity Law and Policy: Revised 62-Page Syllabus/Primer; and Is 2019 the year you should finally quit Facebook?

Subjects: Cybercrime, Cyberlaw, Cybersecurity, Education, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – five significant highlights of this week’s column: Market volatility: Fake news spooks trading algorithms; Hackers Find a Way to Bypass Gmail Two-Factor Authentication; It’s Time for a Bill of Data Rights; Turning Off Facebook Location Services Doesn’t Stop Tracking; and Russia and 2016: Troll group sought to recruit ‘assets’ through social media, Senate told.

Subjects: AI, Cybercrime, Cybersecurity, Economy, Email, Financial System, Privacy, Social Media

The Bullshit Algorithm

Jason Voiovich goes directly to the heart of the matter with his statements that are a lessons learned guide that no researcher can afford to ignore – “Wasn’t the promise of data-driven, search engine and social media algorithms that they would amplify the truth and protect us from misinformation by tapping the wisdom of crowds? The fact is that they do not. And cannot. Because that is not what they are designed to do. At the heart of every social media algorithm is a fatal flaw that values persuasion over facts. Social media platforms (as well as search engines) are not designed for truth. They are designed for popularity. They are bullshit engines.”

Subjects: Internet Resources, KM, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues December 15 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: House Cmte Investigation Issues Scathing Report on Equifax Breach; How HTTPS Everywhere Keeps Protecting Users On An Increasingly Encrypted Web; CBP Officers Aren’t Deleting Data After Warrantless Device Searches, IG Says; and just in time for gift giving season, How to Stop Package Thieves!

Subjects: Civil Liberties, Congress, Cybercrime, Cybersecurity, E-Commerce, Financial System, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues December 9 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.Note – four significant highlights of this week’s column: The web really isn’t worldwide – every country has different access; Measuring the “Filter Bubble”: How Google is influencing what you click; Grandparents Increasingly Targeted By Impostors Who Know ‘Everything’ About Them; Who lives with you? Facebook seeks to patent software to figure out profiles of households.

Subjects: Big Data, Cybercrime, Cybersecurity, Freedom of Information, Internet Filtering, KM, Legal Research, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues December 1 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: Protecting Against Identity Theft; Half of all Phishing Sites Now Have the Padlock; How to Protect Yourself From Cellphone Phishing Attacks; and CPAP breathing machines – insight into how your sleeping data is subject to surveillance as well as discussion on insurance pricing schemes.

Subjects: Cybersecurity, Financial System, Privacy

Pete Recommends – Weekly highlights on cyber security issues November 24 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: Do technology giants deserve public trust; Passwords Aren’t Enough. The Key to Online Security Is a Key; USPS finally fixes website flaw that exposed 60 million users’ data; and How to Tell if Your Account Has Been Hacked.

Subjects: Cybercrime, Cybersecurity, Gadgets/Gizmos, Privacy