Who Really Is the Messenger? There is growing debate about the extent to which content platforms are responsible for the content third parties create and distribute. As I write this, the US Congress is holding a hearing about whether Facebook, Twitter and Google should be held liable for the unsavory posts and other controversial content […]
The average Internet user has over 100 online accounts, according to Dashlane. Who on earth can keep track of that many accounts? No one really. That’s why millions of people use password managers to keep their passwords encrypted and organized. Typically, password managers are apps that encrypt and store your passwords in the cloud or […]
This week, the President approved a measure that removes internet privacy restrictions for Internet Service Providers (ISPs) who connect millions of consumers and businesses to the Internet through wireline and wireless connections. Privacy advocates and late-night talk show hosts have voiced their outrage over this “internet privacy repeal”. But what is actually at stake?
Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work.
Big Brother has Built Geofences to Control Behavior, Tesla Drivers Beware City Hall Can Now Control Your Location. The Snowden revelations opened the general public’s eyes to the (alleged) eavesdropping by the NSA and other government organizations. The Hong Kong protests showed the world how today’s mass video surveillance uses facial recognition to identify the […]
OOO No! Was Gmail Brought Down by Overworked Vacation Seekers? Google suffered not one, but two outages this week, with its Gmail (among other Google services) going dark for several hours at a time. Many Gmail users reported emails bouncing back and other error messages. At their peak, these outages affected a vast number of […]
In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.
Yes, it’s true. The House of Representatives unanimously passed the Email Privacy Act. The fact that everyone in the House can agree on the importance of email privacy suggests that Americans overwhelmingly consider email privacy an essential right.
James Bond Enters Cyber Security Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations).
March 17, 2023
March 10, 2023
March 03, 2023
February 24, 2023
February 17, 2023