Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Feb 1, 2020 | Business, Corporate Reputation, Employees, Employment, Hiring, Internet, On-line Applications, Radio Show, Radio_Show, Security, Spoofed Websites, Technology
Searching For A Job Online — FBI Warns About Rising Number Fake Employers It seems as though the only way to get a job these days is to apply online. Very few companies will take a written resume or schedule an interview until you have applied online through a...
Dec 7, 2019 | Anti-Virus, Attack Vectors, Consumer, Family, FBI, Government, Hacking, Identity Theft, Internet, Monitoring, Radio Show, Radio_Show, safety, Security, Surveillance, Technology, TV
Smart TVs, Security and the FBI Did you go out on Black Friday and pick up a new television for the family? Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
May 25, 2019 | Anonymous, Government, Hactivism, Law Enforcement, Monitoring, Radio Show, Radio_Show, Social Justice, Surveillance, WGIR
There has been a bitter war raging across the internet. This war uses technology to promote a specific political agenda or to make a change in societal behavior. Some of the success of these tactics is now gaining traction in the corporate world in the expression of...