Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Records

The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year

EFF: “Every year, countless emails hit our inboxes telling us that our personal information was accessed, shared, or stolen in a data breach. In many cases, there is little we can do. Most of us can assume that at least our phone numbers, emails, addresses, credit card numbers, and social security numbers are all available somewhere on the internet. But some of these data breaches are more noteworthy than others, because they include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive they’re impossible to ignore. For that reason, we are introducing the Breachies, a series of tongue-in-cheek “awards” for some of the most egregious data breaches of the year. If these companies practiced a privacy first approach and focused on data minimization, only collecting and storing what they absolutely need to provide the services they promise, many data breaches would be far less harmful to the victims. But instead, companies gobble up as much as they can, store it for as long as possible, and inevitably at some point someone decides to poke in and steal that data. Once all that personal data is stolen, it can be used against the breach victims for identity theft, ransomware attacks, and to send unwanted spam. The risk of these attacks isn’t just a minor annoyance: research shows it can cause psychological injury, including anxiety, depression, and PTSD. To avoid these attacks, breach victims must spend time and money to freeze and unfreeze their credit reports, to monitor their credit reports, and to obtain identity theft prevention services.   This year we’ve got some real stinkers, ranging from private health information to—you guessed it—credit cards and social security numbers. The Winners:

Feds Warn SMS Authentication Is Unsafe After ‘Worst Hack in Our Nation’s History’

Gizmodo: “Do you use text messages for multi-factor authentication? You should probably switch to a different method, especially with everything we’re learning about a recent hack that’s been dubbed the “worst in our nation’s history.” Even the federal government is putting out warnings now, including a call for government officials to only use encrypted apps… Continue Reading

We’re about to enter the Digital Dark Ages

The Business Insider – Online archives are vanishing — and they’re taking our history with them. “The long-promised digital apocalypse has finally arrived, and it was heralded by a blog post. Published on July 18, the post’s headline sounded pretty arcane. “Google URL Shortener links will no longer be available,” it declared. I know, I… Continue Reading

Guide to Abortion Privacy – Digital Defense Fund

Keep Your Abortion Private & Secure –  This page is organized into different security-related threats. You can jump to the ones that most concern you. Along with each scenario is a list of digital security tips to neutralize the threats. These are possible concerns you might have: Seeing advertisements related to pregnancy/abortion Tech companies like… Continue Reading

6 Gmail Mistakes That Can Get You Fired (and How to Avoid Them)

How To Geek: “Whether you’ve used email a lot in your personal life, or if your first encounter with emails is in the workplace, you need to take special care with this fundamental web communication format, or you could find yourself in hot water!” Sending Sensitive Files Without Encryption Hitting “Reply All” to a Mass… Continue Reading

Why is printer ink so expensive?

Digital Rights Bytes – “Few liquids are more precious than printer ink, but that’s not because ink is expensive to make. How can HP— and its handful of competitors in the highly concentrated printer market—get away with charging these kinds of markups? Simple: It’s a combination of monopoly power, wacky laws, and consumer-hostile tech… So… Continue Reading

Find out why your health insurer denied your claim

ProPublica’s Claim File Helper lets you customize a letter requesting the notes and documents your insurer used when deciding to deny you coverage. Get your claim file before submitting an appeal. What’s a Claim File? Why Should I Request One? A claim file is a collection of the information your insurer used to decide whether… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, December 7, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, December 7, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Delete all your tweets for free with Cyd

Wired: “Michah Lee wants to help you achieve that same cleansing release. Today, he launched Cyd—an acronym for “Claw back Your Data”—a desktop application designed to give users more control over their X history: archiving it, trimming it to their preferences, or destroying it altogether. In the free version of Cyd, the program allows anyone… Continue Reading

Location Tracking Tools Endanger Abortion Access

EFF – Location Tracking Tools Endanger Abortion Access. Lawmakers Must Act Now“…EFF has warned before about how the location data market threatens reproductive rights. The recent reports on Locate X illustrate even more starkly how the collection and sale of location data endangers patients in states with abortion bans and restrictions.In late October, 404 Media… Continue Reading