Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

New Vivaldi version integrates Mastodon into the browser sidebar

Bleeping Computer: “Vivaldi 5.6 was released today with a Mastodon client integrated directly into the browser’s sidebar, seamlessly incorporating the rising social media platform in the browser’s interface. Vivaldi is a cross-platform web browser created by the former co-founder and CEO of Opera Software, Jon Stephenson von Tetzchner. It is geared towards power users who… Continue Reading

Apple advances user security with powerful new data protections

Apple: “Apple today introduced three advanced security features focused on protecting against threats to user data in the cloud, representing the next step in its ongoing effort to provide users with even stronger ways to protect their data. With iMessage Contact Key Verification, users can verify they are communicating only with whom they intend. With… Continue Reading

Computer Matching and Privacy Protection Act: Data Integration and Individual Rights

CRS Report – Computer Matching and Privacy Protection Act: Data Integration and Individual Rights, December 6, 2022: “Computers and information technologies have increased the amount of data that can be collected, stored, and processed. Computers make it easier to exchange, share, and match data on individuals across programmatic and agency boundaries, enabling the use of… Continue Reading

Amazon is offering customers $2 per month for letting the company monitor the traffic on their phones

Insider: “Amazon’s Ad Verification program offers select users $2 per month for sharing their traffic data. It is part of Amazon’s Shopper Panel, an invite-only program that offers users financial rewards. The voluntary program could raise privacy concerns over how Amazon handles customer data… Under the company’s new invite-only Ad Verification program, Amazon is tracking… Continue Reading

Stop Before You Shop – Are Your Shopping Apps Sharing Access to Your Device?

incogni blog: “In a recent consumer survey, 88% of respondents reported having at least one shopping app installed on their mobile device. Given their popularity, you might think these apps are pretty harmless.  In our previous research, we already looked into the Google Play Store data safety section and how to determine the amount of… Continue Reading

LLRX November 2022 Issue

Articles and Columns for November 2022 10 fatal traps that explain why law firm strategic plans are DOA – Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

TSA now wants to scan your face at security. Here are your rights.

Washington Post – $ – “Next time you’re at airport security, get ready to look straight into a camera. The TSA wants to analyze your face. The Transportation Security Administration has been quietly testing controversial facial recognition technology for passenger screening at 16 major domestic airports — from Washington to Los Angeles — and hopes… Continue Reading

Grad Students Analyze, Hack, and Remove Under-Desk Surveillance Devices Designed to Track Them

Vice: “In October, [Northeastern University] quietly introduced heat sensors under desk without notifying students or seeking their consent. Students removed the devices, hacked them, and were able to force the university to stop its surveillance….Surveillance has been creeping unabated across schools, universities, and much of daily life over the past few years, accelerated by the… Continue Reading

These file types are the ones most commonly used by hackers to hide their malware

ZDNET: “…ZIP and RAR files have overtaken Office documents as the file most commonly used by cyber criminals to deliver malware, according to an analysis of real-world cyber attacks and data collected from millions of PCs.  The research, based on customer data by HP Wolf Security, found in the period between July and September this… Continue Reading