Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

8 habits of highly secure remote workers

ZDNet: “The pandemic permanently transformed many aspects of our everyday lives, including the workplace. Working remotely has become more commonplace than ever before, with nearly 58% of Americans having the option to work remotely, according to a McKinsey report. Working remotely has its many perks including working from a location of your choice, being able to… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, May 7, 2023

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, May 7, 2023 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Google Announces 8 New Top Level Domains Including One For Lawyers

Search Engine Journal: “Google announced the release of eight new top level domains (TLDs), including one which may have a high commercial potential for law firms, others that are useful for academics and two top level domains that are based on file extensions, which might be problematic from a security standpoint..” Continue Reading

How to Check if You’ve Installed Apple’s Rapid Security Response Upd

MakeUseOf: “Apple regularly updates its operating systems across the board, which are provided as major updates or point updates. However, the company also has special updates called Rapid Security Response updates.These updates are meant to fix critical bugs that malicious actors could exploit. It’s, therefore, essential to update your device as soon as you get… Continue Reading

You Can’t Trust Your Browser’s ‘Lock’ to Tell You a Website Is Safe

Lifehacker – “Google is doing away with the lock, because it never meant what you thought it meant. When you browse the internet, you probably notice a small lock icon that appears in the URL bar. It’s common internet security advice to look for this lock whenever visiting a new site, to make sure your… Continue Reading

How to Finally Use Google Authenticator Without Your Phone

Lifehacker: “Ever since it came out, Google Authenticator has been a popular choice for generating two-factor authentication codes on the fly. The service is reliable and secure, but has always had one glaring issue: the inability to sync authentication codes between devices, leaving you at risk of losing access to all of your 2FA accounts.… Continue Reading

Personalized AI-Written Spam May Soon Be Flooding Your Inbox

Gizmodo: “…Now, the arms race between spam blockers and spam senders is about to escalate with the emergence of a new weapon: generative artificial intelligence. With recent advances in AI made famous by ChatGPT, spammers could have new tools to evade filters, grab people’s attention and convince them to click, buy or give up personal… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, April 22, 2023

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, April 22, 2023 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Proton launches an end-to-end encrypted password manager

The Verge: “Proton, the company behind Proton Mail, has announced the launch of a new password manager: Proton Pass [beta]. While the service will eventually become free for everyone to use, it’s currently only available as a beta to Proton’s Lifetime and Visionary users for now. As is the case with Proton’s other products, Proton… Continue Reading

How to set up two-factor authentication on your online services

The Verge: “…Authentication apps generate one-time numerical passcodes that change approximately every minute. When you log in to your service or app, it will ask for your authenticator code; you just open up the app to find the randomly generated code required to get past security. Popular options include Authy, Google Authenticator, and Microsoft Authenticator.… Continue Reading

Digital Privacy Legislation is Civil Rights Legislation

EFF: “As Congress ponders legislation to reform “big tech,” it must view comprehensive digital privacy legislation as desperately needed civil rights legislation, because data abuses often disproportionately harm communities already bearing the brunt of other inequalities. Harvesting and monetizing personal data whenever anyone uses social media or even vital online services has become ubiquitous, yet… Continue Reading