Oct 26, 2019 | Applications, Best Practices, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Updates
Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores. Additionally, businesses depend on older software applications are at a great risk...
Oct 26, 2019 | Best Practices, Biometrics, Business, Data Storage, Facebook, Facial Recognition, Fines and Penalties, FTC, Radio Show, Radio_Show, Security, Security, Technology
Plaintiffs in Facebook Class Action Awarded Standing Plaintiffs in a $35 billion class-action suit against Facebook won their argument proving standing to sue. This lawsuit concerns the collection and storage of millions of users’ biometric data without...
Oct 26, 2019 | Alexa, Amazon, anonymity, Apple, Audio, Best Practices, Big Tech, bluetooth, Consumer, gadgets, Google, Hacking, IoT, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Siri, Smart Assistants, Smart Speakers, spying, Surveillance, Technology
Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything — all the time. Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Oct 19, 2019 | anonymity, Anonymity, Business, Encryption, Government, Hacking, Internet, Monitoring, Radio Show, Radio_Show, Security, Security, spying, Surveillance, Technology, TOR
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...