Category «Viruses & Hoaxes»

Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Tricking antivirus solutions into deleting the wrong files on Windows; DOJ Seizes Dozens of Websites as Part of Cyberattack-for-Hire; TikTok pushes harmful content promoting eating disorders and self-harm into young users’ feeds; and FCC May Mandate Security Updates for Phones.

Subjects: Cybercrime, Cybersecurity, Food & Drug Law, Healthcare, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, November 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Researchers Devise Wi-Peep Drone That Can ‘See Through Walls’; Is Cybersecurity Awareness Month Anything More Than PR?; The Fallout From the First Trial of a Corporate Executive for ‘Covering Up’ a Data Breach; and What to Do When You’ve Been Hacked.

Subjects: Cybersecurity, Education, Financial System, Gadgets/Gizmos, Privacy, Social Media, Viruses & Hoaxes

Information Quality Resources 2022

Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.

Subjects: Big Data, Competitive Intelligence, Education, Information Management, Internet Resources - Web Links, KM, Libraries & Librarians, Reference Resources, Search Strategies, Social Media, Technology Trends, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, August 21, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Protect Yourself From Abuse: How to Find and Remove Stalkerware on Your Phone and PC; 10 Ways to Protect Your Personal Information; How to protect digital citizen identities through identity management; and Which Social Media Platforms Are Banning the Taliban?

Subjects: Cybercrime, Cybersecurity, Email Security, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends Weekly highlights on cyber security issues May 31, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: A flood of coronavirus apps are tracking us. Now it’s time to keep track of them; Johns Hopkins releases report on digital contact tracing to aid COVID-19 response; Coronavirus stimulus payments mistaken for junk mail; IRS issues clarification; and Reality bites: Data privacy edition.

Subjects: Cybercrime, Cyberlaw, Cybersecurity, Economy, Financial System, Government Resources, KM, Legal Research, Privacy, Technology Trends, Viruses & Hoaxes

Pete Recommends Weekly highlights on cyber security issues March 15, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Dressing for the Surveillance Age; How To Tell If Your Smart Home Security Camera Is Hacked; Digital security best practices for working remotely; and The best, and the worst, of the coronavirus dashboards.

Subjects: AI, Civil Liberties, Cybersecurity, Education, Healthcare, Internet Trends, KM, Privacy, Search Engines, Social Media, Viruses & Hoaxes

Local news outlets can fill the media trust gap – but the public needs to pony up

Recent surveys found that trust in local media is higher than for national media, yet many newsrooms are struggling financially. Damian Radcliffe, Caroline S. Chambers Professor in Journalism at the University of Oregon, suggests four ways local newsrooms can forge deeper relationships with the communities they serve.

Subjects: Business Research, Information Management, KM, News Resources, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues January 5, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The 5 Best Authenticator Apps for Protecting Your Accounts; Major US companies breached, robbed, and spied on by Chinese hackers; US Army bans soldiers from using TikTok over security worries; and 7 types of virus – a short glossary of contemporary cyberbadness.

Subjects: Communications, Cybersecurity, Gadgets/Gizmos, Government Resources, KM, Legal Research, Privacy, RSS Newsfeeds, Search Engines, Social Media, Spyware, Technology Trends, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues March 16, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Inside Facebook’s physical security that protects Zuckerberg, employees; Many Americans do not trust modern institutions to protect their personal data – even as they frequently neglect cybersecurity best practices in their own personal lives; Some beSpacific (and LLRX) Subjects (topics) in which you may have an interest; and Firefox Send – Free File Transfers while Keeping your Personal Information Private.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, KM, Legal Research, Privacy, RSS Newsfeeds, Social Media, Viruses & Hoaxes

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes