Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Jan 4, 2020 | Android, Android, anonymity, Asset Management, audit logs, Cell Phone, cell phones, Cellular Services, Censorship, College, College, Cybersecurity, Data Assets, data sharing, Education, iOS, iPhone, Mobile, Mobile Phones, Monitoring, Online, Phone, Privacy, Radio Show, Radio_Show, safety, Schools and Colleges, Security, Smart Phone, spying, Surveillance, Tracking
How is your Social Credit Score? It turns out that some American Universities use them to track their students. Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
Jan 4, 2020 | Aviation, Biological Warfare, Business, Drones, Radio Show, Radio_Show, Security, Swine Flu, Technology
Biological Warfare Against Chinese Pig Farmers. A bizarre battle between pig farmers and criminal gangs is happening in China. Farmers began using anti-drone technology to stop gangs of criminals from infecting their livestock with diseases that have killed more than...
Jan 4, 2020 | anonymity, Applications, Big Tech, Big Tech, Biometrics, Business, Employees, Facial Recognition, Hacking, Hacking, Internet, Location Data, Radio Show, Radio_Show, safety, Security, spying, Technology
Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone. The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Dec 19, 2019 | browsers, Business, Firefox, Monitoring, Radio Show, Radio_Show, Security, spying, Surveillance, Technology
Who is tracking your web movements? Use Firefox if you want to know We all are tracked, as we browse the internet, but by which sites are tracking? Mozilla has added a new feature to its Firefox browser that lets you know how often our tracked when website...
Dec 19, 2019 | Business, Chrome Browser, credentials, Google, Internet, Passwords, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates
Chrome 79 will continuously scan your passwords against public data breaches Best practices dictate that you should use a different password for every website, application, or program. However, many do not do this, and it is why cybercriminals can run rampant...