Category «Email Security»

Pete Recommends – Weekly highlights on cyber security issues, September 6, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Amazon’s Alexa for Landlords Is a Privacy Nightmare in the Making; This Email Could Wreak Havoc on the 2020 Election; How can you spot a tech support scam?; and Republicans flooding internet with deceptive videos and Big Tech isn’t keeping up.

Subjects: Cybercrime, Cybersecurity, Email Security, Information Architecture, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, August 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.

Subjects: AI, Competitive Intelligence, Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Healthcare, KM, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, July 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Google Sued for Allegedly Tracking App Users After They Opt Out; Twitter hack reveals national security threat as election approaches; EFF Launches Searchable Database of Police Agencies and the Tech Tools They Use to Spy on Communities; Utility company calling? Don’t fall for it.

Subjects: AI, Business Research, Computer Security, Cybercrime, Cybersecurity, Email Security, Healthcare, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends Weekly highlights on cyber security issues April 25, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New Government Technology Could Herald Our New Normal; Zoom adds data center routing, security updates; China is experiencing a gold rush for surgical masks — more than 38,000 companies registered in 2020 to make or trade face masks. But mask quality and scams are now issues; Chinese Agents Spread Messages That Sowed Virus Panic in U.S., Officials Say; and Hackers tempt federal workers with free fast food in COVID-19 scams.

Subjects: Cybercrime, Cybersecurity, Email Security, Employment Law, Health, KM, Privacy, Technology Trends

Pete Recommends Weekly highlights on cyber security issues April 4, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to Digitize Your Most Important Documents; How to stop trolls from taking over your Zoom call; American Bar Association has posted an ABA Legal Fact Check; and The Postal Service’s Surprising Role in Surviving Doomsday.

Subjects: Cybercrime, Cybersecurity, Email Security, Government Resources, Information Management, KM, Legal Research, Privacy, Social Media, Technology Trends

Business as (Un)Usual: Library Business Continuity Amid COVID-19

Ellyssa Valenti Kroski, Director of Information Technology/Marketing, The New York Law Institute, shares proactive steps her organization took to transition to a remote workplace during the pandemic, the technology and processes they implemented, and important tips for preparing your own library.

Subjects: Email, Email Security, Healthcare, KM, Law Library Management, Legal Research, Legal Technology, Libraries & Librarians, Management, Mobile Technology, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues February 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ring Doorbell App Packed with Third-Party Trackers; How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence; Jeff Bezos Phone Hacking – WhatsApp Hack – Is WhatsApp Safe?; and 8 cities that have been crippled by cyberattacks — and what they did to fight them.

Subjects: Congress, Cybercrime, Cybersecurity, E-Discovery, Election Law, Email, Email Security, Encryption, Firewalls, Gadgets/Gizmos, Intellectual Property, Privacy

Pete Recommends – Weekly highlights on cyber security issues January 25, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Do People Decide Whether to Trust a Photo on Social Media?; Microsoft discloses security breach of customer support database; NIST Releases Privacy Framework; Apple complies with 90% of US government requests for customer data.

Subjects: AI, Cybercrime, Cybersecurity, Email, Email Security, Government Resources, Legal Research, Privacy, Social Media