Oct 19, 2019 | automation, bluetooth, Business, Consumer, cyberattacks, Cybercrime, gadgets, Hackers, Hacking, Hacking, Hacking, Hacks, Infosec, Intellectual Property Theft, Internet, IoT, Monitoring, Nationstates, Organized Crime, Passwords, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Home, spying, Surveillance, Technology, Updates
Convenience Gadgets – Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Oct 19, 2019 | anonymity, Banking, Big Tech, Business, Cryptocurrency, Cryptocurrency, Facebook, Facebook, Financial, Internet, Libra, Privacy, Radio Show, Radio_Show, Regulation, Security, Social Networking, Technology
Facebook’s Libra Cryptocurrency Loses all but One Payment Company Cryptocurrency is a fool’s game. It is not ready for primetime and is not an investment. No matter how many get into it, the infrastructure to support this new currency change is not yet...
Oct 19, 2019 | Apple, Audio, Cell Phone, cell phones, Consumer, Hackers, Hacking, Hacking, Internet, iOS, iPhone, Jailbreak, Malware, Mobile, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....
Oct 19, 2019 | anonymity, Anonymity, Business, Encryption, Government, Hacking, Internet, Monitoring, Radio Show, Radio_Show, Security, Security, spying, Surveillance, Technology, TOR
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
Oct 19, 2019 | Anti-Virus, Applications, Best Practices, Business, Cybercrime, Cybersecurity, Hackers, Hacking, Malware, Microsoft, Microsoft, Nationstates, Operating Systems, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, Web Tools, Windows (Microsoft)
New Tools Keep CyberThieves From Disabling Your Cyber Protections Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...