How To Handle the Growing Flood of Leaked Data
This article is an interview by Jon Keegan with Micah Lee, author of a new book on analyzing datasets that were leaked, hacked, or just accidentally left in the open.
This article is an interview by Jon Keegan with Micah Lee, author of a new book on analyzing datasets that were leaked, hacked, or just accidentally left in the open.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Sen. Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Inside a Global Phone Spy Tool Monitoring Billions; AT&T is trying to kill all landlines in California, which would have devastating effects; and the Continued Threat to Personal Data: Key Factors Behind the 2023 Increase.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: More Police Are Using Your Cameras for Video Evidence; How to Opt Out of Comcast’s Xfinity Storing Your Sensitive Data; The worst privacy washing of 2023 and trends to expect in 2024; and Each Facebook User is Monitored by Thousands of Companies.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Swatting: The new normal in ransomware extortion tactics; EFF Unveils Its New Street Level Surveillance Hub; IRS has ‘unconscionable delays’ in helping identity theft victims, taxpayer advocate says; and Outlook is Microsoft’s new data collection service.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Delete your digital history from dozens of companies with this app; How hackers can ‘poison’ AI; Meet ‘Link History,’ Facebook’s New Way to Track the Websites You Visit; and Google Groups is ending support for Usenet to combat spam.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Worst Hacks of 2023; Think Twice Before Giving Surveillance for the Holidays; How to Check If Something Online Was Written by AI; and This ‘Pig Butchering’ Scam Has Victims on Both Sides.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google brings privacy washing to Android; Xfinity discloses data breach after recent Citrix server hack; How to Check If Something Online Was Written by AI; and Artificial intelligence can find your location, alarming privacy experts.
Fact checking is a critical component to subject matter research regardless of customer, client, user sector or discipline. With the rapidity of information exchange on social media, it is increasingly important to identify and remove errors, misinformation, disinformation and untruths from any and all research that is delivered. Marcus P. Zillman’s guide includes actionable sources for professionals and students that are even more useful with the proliferation of AI as they assist researchers to validate the authority and purpose of the sources they use.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How QR codes work and what makes them dangerous – a computer scientist explains; Without a Trace: How to Keep Your Phone Off the Grid; Your Smart TV Knows What You’re Watching; and Verizon fell for fake “search warrant,” gave victim’s phone data to stalker.
Mohamed Al Elew and Gabriel Hongsdusit describe how to turn off “automated content recognition,” the Shazam-like software on smart TVs that tracks what you’re watching.