Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Stop Giving Companies Your Real Email—Do This Instead

HowToGeek: ” Websites may sell your email address to spammers or leak your address in a data breach. An email alias service hides your real email address and makes it easier to curb spam. Choose an email alias service like Proton Mail for top-notch encryption, or AnonAddy for easy, on-the-fly alias generation. You can’t increase… Continue Reading

Nine Takeaways From Our Investigation Into Microsoft’s Cybersecurity Failures

ProPublica: “After Russian hackers exploited a flaw in a widely used Microsoft product duringone of the largest cyberattacks in U.S. history, the software giant downplayed its culpability. However, a recent ProPublica investigation revealed that a whistleblower within Microsoft’s ranks had repeatedly attempted to convince the company to address the weakness years before the hack —… Continue Reading

Your employer might be spying on your tech. Here’s how to check.

Washington Post: “Your employer may be able to see everything you’re doing on your phone or computer. They might know you’re reading this article right now. (Hi!) But how can you be sure? Companies have a growing number of ways to keep tabs on workers. They can gather details from common workplace apps and use… Continue Reading

There’s a Trump Presidential Library at the National Archives and It’s Hiring

No words for this via Washingtonian – “Now here’s a fun job listing: This position is part of the National Archives and Records Administration. Incumbent serves as the Deputy Director of the Donald J. Trump Presidential Library within the National Archives and Records Administration. Serves as a principal advisor to the Library Director. At the… Continue Reading

How to find and remove spyware from your phone

ZDNET: “iPhone and Android users alike are facing more sophisticated surveillance threats than ever before, and some may be close to home. Suspect you’re being tracked? Here’s what to do.  Spyware doesn’t just impact today’s PCs, it can end up on your mobile devices, too. Spyware designed for smartphones can disguise itself as a fake… Continue Reading

Hacked data reveals which US gun sellers are behind Mexican cartel violence

USA TODAY exclusive: “A massive leak of Mexican military intelligence has exposed for the first time in two decades U.S. gun shops and smugglers tied to 78,000 firearms recovered south of the border – and which types of guns are being trafficked. The nuggets of information are among roughly 10 million records hacked by an… Continue Reading

After I learned this easy email trick the clutter vanished from my inbox

ZDNET: “Is your inbox overflowing with ads, newsletters, and social media updates? You don’t need complex rules or multiple accounts to get things under control. Just the magic of one feature that’s built into most email solutions…The magic of email aliases. An alias is an alternate email address that’s linked to your main account. Messages… Continue Reading

Slack has been using data from your chats to train its machine learning models

Engadget – “The only way to opt out is by asking your company’s workspace owner to send Slack an email. Slack trains machine-learning models on user messages, files and other content without explicit permission. The training is opt-out, meaning your private data will be leeched by default. Making matters worse, you’ll have to ask your… Continue Reading

The Man Who Killed Google Search

Where’s Your Ed Act via Metafilter – “Edward Zitron has been reading all of google’s internal emails that have been released as evidence in the DOJ’s antitrust case against google.  Zitron concludes that Google Search died on February 5th, 2019. It was on that date at Google’s HQ evil lair an emergency meeting, aka a… Continue Reading

Introducing Dark Web Monitoring for credential leaks

Proton Blog: “Your email address is your online identity(new window), and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches affecting online services are increasingly common, with tens of billions… Continue Reading