Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year

EFF: “Every year, countless emails hit our inboxes telling us that our personal information was accessed, shared, or stolen in a data breach. In many cases, there is little we can do. Most of us can assume that at least our phone numbers, emails, addresses, credit card numbers, and social security numbers are all available somewhere on the internet. But some of these data breaches are more noteworthy than others, because they include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive they’re impossible to ignore. For that reason, we are introducing the Breachies, a series of tongue-in-cheek “awards” for some of the most egregious data breaches of the year. If these companies practiced a privacy first approach and focused on data minimization, only collecting and storing what they absolutely need to provide the services they promise, many data breaches would be far less harmful to the victims. But instead, companies gobble up as much as they can, store it for as long as possible, and inevitably at some point someone decides to poke in and steal that data. Once all that personal data is stolen, it can be used against the breach victims for identity theft, ransomware attacks, and to send unwanted spam. The risk of these attacks isn’t just a minor annoyance: research shows it can cause psychological injury, including anxiety, depression, and PTSD. To avoid these attacks, breach victims must spend time and money to freeze and unfreeze their credit reports, to monitor their credit reports, and to obtain identity theft prevention services.   This year we’ve got some real stinkers, ranging from private health information to—you guessed it—credit cards and social security numbers. The Winners:

Federal government discloses more than 1,700 AI use cases

FedScoop: “A consolidated list of federal artificial intelligence use cases released by the White House on Wednesday shows agencies more than doubled the amount of uses reported last year.Per the 2024 consolidated inventory, which is available on the Office of Management and Budget’s GitHub, 37 federal agencies have reported 1,757 public AI uses. A consolidated… Continue Reading

6 Gmail Mistakes That Can Get You Fired (and How to Avoid Them)

How To Geek: “Whether you’ve used email a lot in your personal life, or if your first encounter with emails is in the workplace, you need to take special care with this fundamental web communication format, or you could find yourself in hot water!” Sending Sensitive Files Without Encryption Hitting “Reply All” to a Mass… Continue Reading

US officials urge Americans to use encrypted apps amid unprecedented cyberattack

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI) and international partners published today a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, that provides best practices to protect against a People’s Republic of China (PRC)-affiliated threat actor that has compromised networks of major global telecommunications… Continue Reading

Surveillance Self-Defense Tips, Tools and How-tos for Safer Online Communications

We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying. Surveillance Self-Defense (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, November 23, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, November 23, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

How to Add Extra Security Layers to Your Phone or Tablet

The New York Times [no paywall]: “Losing a smartphone or tablet stuffed with your life’s details can be a nightmare, but your privacy may also be at risk in less obvious situations — like if you leave your unlocked phone unattended or if the children know your tablet’s passcode. While apps for financial or medical… Continue Reading

How Google Spent 15 Years Creating a Culture of Concealment

The New York Times [free article] – “Trying to avoid antitrust suits, Google systematically told employees to destroy messages, avoid certain words and copy the lawyers as often as possible…How Google developed this distrustful culture was pieced together from hundreds of documents and exhibits, as well as witness testimony, in three antitrust trials against the… Continue Reading

Use These 4 Apps and Tools to Detect Phishing Emails

MakeUseOf: “Phishing emails are no longer exclusively sent by Nigerian princes needing financial assistance. Scammers are now tech-savvy criminals who leverage state-of-the-art tools to con their victims. But it’s not like they’re the only ones with an arsenal of tools to pull from. Most phishing emails will send you attached files and links or try… Continue Reading

If You Fall for a Phishing Email, Here’s What Happens Next

MakeUseOf: “Most people receive a lot of spam emails, calls, and other messages daily. These usually represent some phishing attempt and try as you might, you’ll likely accidentally put yourself in a sketchy position eventually—it’s not your fault; it happens to everyone. If you get phished, it’s important not to worry too much. While it’s… Continue Reading