Category «Encryption»

Pete Recommends – Weekly highlights on cyber security issues, October 18, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Amazon’s Latest Gimmicks Are Pushing the Limits of Privacy; Data Security: Recent K-12 Data Breaches Show That Students Are Vulnerable to Harm; How to Implement implement zero trust without impacting productivity; and ‘So hard to prove you exist’: Flawed fraud protections deny unemployment to millions.

Subjects: Congress, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Commerce, Education, Email Security, Encryption, Legal Research, Legal Technology, Privacy, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues, August 29, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Smartphone Location Tracking Works, and What You Can Do About It; Deep Fakes and National Security; How Facebook and Other Sites Manipulate Your Privacy Choices; and Voice phishing attacks on the rise, CISA, FBI warn private sector.

Subjects: AI, Civil Liberties, Cybercrime, Education, Email Security, Encryption, Gadgets/Gizmos, Health, KM, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS acting secretary, top deputy were appointed illegally; Strengthening Privacy Protections in COVID-19 Mobile Phone–Enhanced Surveillance Programs; U.S. Postal Service Counters Trump Attacks On Mail-In Voting With A New Blockchain Patent; and Data Security & Privacy Gaps in Video Doorbells.

Subjects: Big Data, Computer Security, Congress, Criminal Law, Cybercrime, Cybersecurity, Encryption, Government Resources, Leadership, Legal Research, Privacy, United States Law

Pete Recommends Weekly Highlights on Cyber security Issues July 5, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Industry Calls on Government to Invest Billions for Developing Secure 5G Networks; Enterprise IT concerns – quarantined workers breaking company policy could expose enterprise systems and data; What is a credit bureau?; and Key questions about enforcement of California’s privacy law.

Subjects: Business Research, Competitive Intelligence, Cybercrime, Cybersecurity, E-Commerce, Economy, Encryption, Energy, Health, Healthcare, KM, Legal Research, Technology Trends

Pete Recommends Weekly highlights on cyber security issues June 6, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How to take back the information you’ve given to all your favorite apps and websites; More Cyber Training Does Not Mean Fewer Data Breaches; Google faces $5 billion lawsuit in U.S. for tracking ‘private’ internet use; and COVID-19 Complicates Already Challenged FDA Foreign Inspection Program.

Subjects: AI, Computer Security, Cybercrime, Cybersecurity, Encryption, Energy, Government Resources, Health, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues February 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ring Doorbell App Packed with Third-Party Trackers; How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence; Jeff Bezos Phone Hacking – WhatsApp Hack – Is WhatsApp Safe?; and 8 cities that have been crippled by cyberattacks — and what they did to fight them.

Subjects: Congress, Cybercrime, Cybersecurity, E-Discovery, Election Law, Email, Email Security, Encryption, Firewalls, Gadgets/Gizmos, Intellectual Property, Privacy

Pete Recommends – Weekly highlights on cyber security issues March 9, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: IRS Urges Taxpayers to Watch Out for Erroneous Refunds; Beware of Fake Calls to Return Money to a Collection Agency; Phishing Scams: Is Your Financial Institution Helping Cyberthieves? Guess what? Facebook still tracks you on Android apps (even if you don’t have a Facebook account); and – Phone numbers are the new Social Security numbers.

Subjects: Big Data, Congress, Cybersecurity, Economy, Encryption, Financial System, Government Resources, Privacy, Social Media

Deep Web Research and Discovery Resources 2019

How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.

Subjects: Big Data, Business Research, Competitive Intelligence, Discovery, Encryption, Privacy, Search Engines, Search Strategies

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes