Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Trend Micro Cloud App Security Threat Report 2021

Trend Micro: “In this report, we highlight the notable email threats of 2021, including over 33.6 million high-risk email threats (representing a 101% increase from 2020’s numbers) that we’ve detected using the Trend Micro Cloud App Security platform. Email is an integral cog in the digital transformation machine. This was especially true in 2021, when… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, June 11, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 11, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

What Is Bossware? Is It Tracking You At Home?

Make Use Of: “Whether or not remote working affects employee productivity is very much open to debate. On one side, employers argue that remote working makes it easier for people not to work. On the other, skipping the commute and focusing on work may actually improve productivity. Some employers are attempting to answer this question… Continue Reading

How to Find Out if Your Passwords Are Being Sold Online

Make Use Of: “Whether you have the strongest or weakest passwords, countless scenarios can leak your password online. It could be a data breach, or you accidentally shared your credentials with a malicious actor through a phishing website. But how do you tell if your password has been hacked? And what are some of the… Continue Reading

Trump on Trial: A Guide to the January 6 Hearings and the Question of Criminality

Brookings: “President Joe Biden legitimately won a fair and secure 2020 presidential election—and Donald Trump lost. This historical fact has been uncontroverted by any evidence since at least November 7, 2020, when major news outlets projected Biden’s victory. But Trump never conceded. Instead, both before and after Election Day, he tried to delegitimize the election… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022: Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Abortion Surveillance After Roe

Surveillance Technology Oversight Project Report, May 24, 2022: “Abortion rights will soon be a thing of the past for millions of Americans. At the time of publication, a leaked Supreme Court draft opinion shows a majority of justices are poised to strike down Roe v. Wade, Planned Parenthood v. Casey, and any federal constitutional right… Continue Reading

Capitol attack panel to hold six public hearings as it aims to show how Trump broke law

The Guardian UK – “Panel aims to publicly outline the potentially unlawful schemes that tried to keep the former president in office despite his defeat  The House select committee investigating the January 6 attack on the Capitol is expected to stage six public hearings in June on how Donald Trump and some allies broke the… Continue Reading

7 Ways to Find All Accounts Linked to Your Email Address or Phone Number

MakeUseOf: “Over the course of our long and storied lives online, most of us have signed up for many online accounts, only to have them fall by the wayside, unused forever. Now, the email address or a phone number you surrendered for registration can be misused. It’s time to ask yourself, “How do I find… Continue Reading

How a Digital Abortion Footprint Could Lead to Criminal Charges

TIME: “Getting away with breaking the law in the digital age is tricky. Almost everything one does—whether it’s making a Google search for “how to clean up a crime scene,” purchasing suspicious items on Amazon, or merely having been in the proximity of a crime scene with a cell phone that had its location services… Continue Reading