Apr 25, 2020 | Agencies, Biological Viruses, Business, China, Coronavirus, Covid-19, Cybercrime, Economic Disruption, Expose Client Functions, Government, industrial espionage, Internet, Malware, Monitoring, Monitoring, Privacy, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, Surveillance, Technology, Technology, trojans, Tyranny, Unsecured Devices
Thank you Coronavirus – Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace. It is not meant to curtail all economic activity of the society. With this pandemic,...
Apr 25, 2020 | Android, anonymity, Apple, Applications, apps, Big Tech, Biological Viruses, Business, contact tracing, Coronavirus, Covid-19, Covid-19, Epidemiology, Google, Government, Internet, Mobile, Mobile Phones, Monitoring, Monitoring, Pandemic, Privacy, privacy, Public Health, Quarantine, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Technology, Tracking
Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Apr 25, 2020 | 5G, Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Government, Internet, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Social Distancing, Social Media, Social Networking, Technology, Threats, Utilities
Conspiracy Theorists Grasping at 5G There are always those who will believe the most phenomenal theories when they someone with scientific authority says comments on it. That is the case with the conspiracy theory that the radiation from 5G cell towers creates...
Apr 25, 2020 | Amazon, Amazon, Applications, Big Tech, Biological Viruses, Business, CEO, Consumer, Coronavirus, Corporate Reputation, Covid-19, Deliveries, Family, groceries, Home, Internet, Online, Quarantine, Radio Show, Radio_Show, Resources, Retail, Retail, Sales, Scalability, Shopping, shopping, Technology, Technology, Third - Party
Pandemic Customers Buy but Amazon Can’t Deliver With our shopping abilities deeply curtailed by this forced government self-isolation to prevent the spread of COVID-19, we have turned to those who can supply our needs through online shopping. Turns out that for many...
Apr 25, 2020 | Best Practices, Business, Consumer, Cybercrime, Data Loss, Hackers, Hacking, Internet, Networking, Networking, Password Managers, Passwords, Patching, Privacy, Radio Show, Radio_Show, Routers, Routers, Security, Security, Security Alerts, Technology, Technology, Updates
Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...
Apr 25, 2020 | Applications, Business, Cloud, Collaboration Tools, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, misconfigured environments, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Technology, Updates, Zoom
Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...