Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

How to Bypass Blocked Sites and Internet Restrictions

MakeUseOf: “Need to access a blocked website? Try these tips and tricks to bypass internet restrictions and view the content you want. It doesn’t matter where in the world you live; there are times when you’re going to come across blocked sites and a restricted internet. If you come across an internet block, don’t panic.… Continue Reading

Blockchain: Novel Provenance Applications

CRS Report – Blockchain: Novel Provenance Applications, April 8, 2022: “Blockchain, generally, is a database technology that records and stores information in blocks of data that are linked, or “chained,” together. Data stored on a blockchain are continually shared, replicated, and synchronized across the nodes in a network—individual computer systems or specialized hardware that communicate… Continue Reading

A glossary of terms about cyberattacks, from ransomware to DDoS

Mozilla Blog: “If you read news about technology, you’re bound to run into some jargon. Here at Mozilla, we believe that information should be as accessible as possible regardless of your level of expertise. We want to help you approach stories about technology with more curiosity and with a little less head-scratching involved. We’ll break… Continue Reading

Pete Recommends Weekly highlights on cyber security issues, April 9, 2022

Via LLRX – Pete Recommends Weekly highlights on cyber security issues, April 9, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Facial Recognition Goes to War

The New York Times – “Services that put a name to a face, including Clearview AI, are being used to identify Russian soldiers, living or dead, and to verify that travelers in Ukraine are who they claim…Identifying dead soldiers and notifying their families is part of a campaign, according to a Telegram post by the… Continue Reading

LLRX March 2022 Issue

Articles and Columns for March 2022 Libraries and the Contested Terrain of “Neutrality” – Rick Anderson is University Librarian at Brigham Young University. His commentary addresses timely, thoughtful and critical conversations and knowledge sharing around the issues of censorship, book banning, library ethics and professional responsibility across communities. Truth to Power – Robert McKay discusses his… Continue Reading

5 Reasons Why Google Drive Is a Security Risk

MakeUseOf: “Google Drive is an incredibly useful cloud storage solution that offers numerous features and benefits. With Google Drive, sharing documents and working remotely as a team has never been easier. As part of the Google Suite, Google Drive offers seamless integration with other Google services. However, there are some security risks associated with using… Continue Reading

Pete Recommends Weekly highlights on cyber security issues, April 2, 2022

Via LLRX – Pete Recommends Weekly highlights on cyber security issues, April 2, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Spring Is Here – Here’s How to Spot the Seasonal Scams

The New York Times: “Fraud is a year-round activity, but tax season brings an uptick in calculated schemes to steal money and personal information through spoofed messages and other means. Cybersecurity firms have also reported an increase in fraud attempts that exploit the conflict in Ukraine — a situation that has increased fears of potential… Continue Reading

Pete Recommends Weekly highlights on cyber security issues, March 26, 2022

Via LLRX – Pete Recommends Weekly highlights on cyber security issues, March 26, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Best encryption software 2022

TechRepublic: “Encryption is the process of securing information by translating it into a sort of computer code that is unreadable to anyone not possessing the right credentials, passwords or other authentication means to access this information. This code can theoretically be cracked or broken but strong encryption methods are nearly impervious to such manipulation. Encryption… Continue Reading