How QR codes work and what makes them dangerous – a computer scientist explains

Scott Ruoti, Assistant Professor of Computer Science, University of Tennessee discusses security issues respective to QR codes. He states that these codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.

Subjects: Cybercrime, Cybersecurity, Privacy, Spyware

Pete Recommends – Weekly highlights on cyber security issues, April 23, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Report Finds Identity Fraud Up 167% In USPS Change Of Address Requests; Cell carriers can use your web history for ads; The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?; and Microsoft Teams Adds an Emergency Call Alert.

Subjects: AI, Conferencing Software, Cybercrime, Cybersecurity, Data Mining, Federal Legislative Research, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, April 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Data From Friends and Strangers Show Where You Are; TSA’s Terrorist Watch List Comes for Amtrak Passengers; Facial recognition not required as tax ID – yet. But the tech spreads; You’re muted… or are you? Videoconferencing apps may listen even when mic is off; and Mismanaged Cloud Services Put User Data at Risk.

Subjects: AI, Big Data, Criminal Law, Cybercrime, Cybersecurity, Economy, Financial System, Privacy, Social Media, Travel

Pete Recommends – Weekly highlights on cyber security issues, April 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Blockchain can power up government processes, GAO says; How QR codes work and what makes them dangerous – a computer scientist explains; Thieves hit on a new scam: Synthetic identity fraud; and Report: One in four employees who made security mistakes lost their job.

Subjects: AI, Blockchain, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Legal Research, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, April 2, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Almost 50M US Residents Lost Health Data in Breaches Last Year; FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List; Why digital ID for airport check-in is taking so long; and Hackers Are Impersonating Police to Subpoena People’s Data.

Subjects: Criminal Law, Cybercrime, Cybersecurity, Financial System, Legal Research, Open Source, Privacy, Travel

LLRX March 2022 Issue

Articles and Columns for March 2022 Libraries and the Contested Terrain of “Neutrality” – Rick Anderson is University Librarian at Brigham Young University. His commentary addresses timely, thoughtful and critical conversations and knowledge sharing around the issues of censorship, book banning, library ethics and professional responsibility across communities. Truth to Power – Robert McKay discusses his …

Subjects: KM

Truth to Power

Robert McKay discusses his appreciation of the important function of the House of Butter blog, established and run by Sean Hocking. This publication has been continuously engaged in addressing wide reaching and impactful issues concerning the environment and law, the defence and protection of rule of law and in support of those in legal practice who stand up for human rights and equality, rather than simply being focused on profit.

Subjects: KM, Legal Research, Legal Technology

The intentional law office

Legal sector analyst Jordan Furlong writes that it’s taken two years of rolling pandemic lockdowns to shake us from our torpid habit of gathering together only to work alone. Over the next decade, a Stanford professor estimates, US workers will spend a quarter of their work time at home — “the number of person-days in the office is never going back to pre-pandemic average, ever.” This has obvious ramifications for corporate office space, employee well-being, and even climate change. But the workplace itself is ground zero for this change, and there will be enormous ramifications in this regard alone. Furlong’s thought provoking essay identifies critical choices that can be made that will result in better outcomes for law firms moving forward.

Subjects: Communications, KM, Law Firm Marketing, Leadership, Management, Telecommuting

The Russian invasion shows how digital technologies have become involved in all aspects of war

Since Russia invaded Ukraine, we keep hearing that this war is like no other; because Ukrainians have cellphones and access to social media platforms, the traditional control of information and propaganda cannot work and people are able to see through the fog of war. For these communications scholars and historians, Professors Katharina Niemeyer, Dominique Trudel, Heidi J. S. Tworek, Maria Silina and Svitlana Matviyenko, it is important to add nuance to such claims. The question is not so much what is “new” in this war, but rather to understand its specific media dynamics. One important facet of this war is the interplay between old and new media — the many loops that go from Twitter to television to TikTok, and back and forth.

Subjects: AI, Communications, KM, Social Media, Technology Trends