Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Sep 14, 2019 | Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Electricity, Firewalls, Firewalls, Hackers, Hacking, Hacking, Networking, Patches, Power Grid, Radio Show, Radio_Show, Security, Security Alerts, Software, Technology, Updates, Utilities
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Sep 14, 2019 | automation, Automation, Automotive, Business, Cars, Coding, DOJ, Fines and Penalties, Navigation, Radio Show, Radio_Show, Robotics, Security, Technology, Tesla, Transportation, vehicles
Tesla Autopilot Feature Raises Issues Yet another Tesla driver has apparently fallen asleep behind the wheel while his car cruised down the freeway. The latest video comes from the Boston area, where a local man caught a video of a Tesla driver and his...
Sep 14, 2019 | apps, Best Practices, Big Tech, Business, Cloud, Cyber breaches, Cybersecurity, Data, data sharing, Data Storage, Health, Legal, Liability, Privacy, privacy, Radio Show, Radio_Show, Security, Security, Security, Software, storage, Technology, Tracking
HIPAA Can’t Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...
Sep 14, 2019 | Big Tech, Business, Computers, Data, data sharing, Financial, Fines and Penalties, Google, Google, Google, Law Enforcement, Legal, Liability, Radio Show, Radio_Show, Regulation, Security, Software, Software Manufacturers, Technology, Valuations
No More Hiding -Google’s Tactics Under Scrutiny On Monday, 50 attorneys general from US states and territories signed onto an antitrust investigation into Google, placing even more pressure on the major tech firm that is already facing intense scrutiny over its...
Sep 14, 2019 | 5G, Android, Android, Best Practices, Cell Phone, cell phones, Cellular Services, Consumer, Cybersecurity, Data, Internet, iOS, IoT, iPhone, Legal, Mobile, Mobile Phones, Networking, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Surveillance, Technology, WiFi
Security Demands Up With 5G Zhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...