Category «Computer Security»

Pete Recommends – Weekly highlights on cyber security issues February 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 2019 Internet Crime Report Released; The silent threat of the coronavirus: America’s dependence on Chinese pharmaceuticals; Equifax breach: How Chinese army hackers allegedly stole personal info; and How to Share Files Securely Online: Dropbox, Firefox Send, and More.

Subjects: AI, Big Data, Civil Liberties, Computer Security, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Economy, Education, Financial System, Government Resources, Health, Internet Trends, Privacy

Pete Recommends – Weekly highlights on cyber security issues January 12, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: FBI, Homeland Security warn of Iranian terror and cyber threat in new intelligence bulletin; Police are buying hidden cameras disguised as rocks, trees, tombstones; ‘Shattered’: Inside the secret battle to save America’s undercover spies in the digital age; and Cities, states face costly cybersecurity landscape after attacks spiked in 2019.

Subjects: Computer Security, Cybercrime, Cybersecurity, Government Resources, Military

Converging Paths: A Librarian’s Journey to Becoming a Privacy Professional

After receiving her MLIS Stephanie Davis worked in the field of knowledge management (KM) where she sourced, documented, categorized, and shared information about her consulting firm’s people and project experiences. Davis designed webpages, delivered training programs on information access and disclosure, and administered communications and awareness campaigns. She also tracked metrics and presented reports to senior management to demonstrate the KM program was delivering against our strategy and mandate. Davis became interested in keeping data secure and maintaining confidentiality while also focusing on how to make information as accessible as possible so her clients could achieve their objectives – and this article discusses her role as a privacy professional.

Subjects: Big Data, Computer Security, Cybercrime, Cybersecurity, KM, Law Librarians, Leadership, Libraries & Librarians, Privacy

Pete Recommends – Weekly highlights on cyber security issues, November 9, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: What Would Happen If the Internet Went Down … Forever?; Resources for Measuring Cybersecurity; For Better or Worse, Blockchain Birth Certificates Are Officially Here; and Apple Warns Older iPhones May Stop Working Sunday Without Software Upgrade.

Subjects: Communications, Computer Security, Cybercrime, Cybersecurity, Economy, Financial System, Government Resources, Health, Privacy, RSS Newsfeeds

Pete Recommends – Weekly highlights on cyber security issues, October 12, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Americans and Digital Knowledge; 10 Tips to Avoid Leaving Tracks Around the Internet; Proving You’re You: How Federal Agencies Can Improve Online Verification; and New Report: “World’s First Deepfake Audit Counts Videos and Tools on the Open Web”

Subjects: Computer Security, Congress, Cybersecurity, E-Government, Privacy, Search Engines, Search Strategies, Social Media

Pete Recommends – Weekly highlights on cyber security issues May 11, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The Challenges of Implanted Cardiac Device Security; Scammers Exploit Home Rental Listings With ‘Let Yourself In’ Link; New Rules On E-Evidence Could Streamline Criminal Investigations in the EU; and a Parental Advisory: Dating Apps

Subjects: Computer Security, Congress, Cybercrime, Cybersecurity, Government Resources, Internet Dating, Legislative, Privacy

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues August 5 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the FBI Releases Article on Securing the Internet of Things and Surprising Things the Government Knows About Americans.

Subjects: Computer Security, Cybercrime, Cybersecurity, Energy, Privacy

The 6 Types Of Cyber Attacks To Protect Against In 2018

Lizzie Kardon’s article is a timely guide to the different methods by which cyber attacks are launched and the tools used to deliver them. As the goals and objectives for such attacks differ, it is critical to employ accurate and effective strategic and tactical processes to prevent and to repel attacks that are steadily increasing as the Internet of Things (IoT) expands in arenas that span work, home, government, social media, healthcare and beyond.

Subjects: Computer Security, Cybercrime, Cybersecurity

Pete Recommends – Weekly highlights on cyber security issues July 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the Supreme Court struggles to define ‘searches’ as technology changes, and how Google employees avoid phishing attempts with a $20 YubiKey security key.

Subjects: Computer Security, Cybersecurity, Email Security, Healthcare, Privacy, Social Media