Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Sep 21, 2019 | anonymity, Best Practices, browsers, Business, Hacking, Hacking, Internet, Nationstates, new browser, Organized Crime, Patents, Phishing, Radio Show, Radio_Show, Security, Security, Security Alerts, spying, Technology, Tracking, VPN, Web Tools
Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...
Sep 21, 2019 | Algorithms, anonymity, Banking, Banking, Bitcoin, Cryptocurrency, Cryptocurrency, Cybercrime, Dark Web, data sharing, Featured, Financial, Malware, Marketplace, Open Source, Organized Crime, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Technology, Valuations
Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...
Sep 21, 2019 | Android, Android, Business, Cell Phone, cell phones, Cellular Services, iOS, iPhone, Mobile, Mobile Phones, Passwords, Phone, Phones, Privacy, Radio Show, Radio_Show, scam, Security, Security Alerts, Smart Phone, T-Mobile, Technology
Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Sep 21, 2019 | Applications, Best Practices, Business, cyberattacks, Employees, HR, Malware, Radio Show, Radio_Show, Security, Security
HR The Gateway To Cybercrime Today’s cybercriminals are continually developing new and sophisticated techniques with which to gain access to their victim’s internet technology systems. Currently, over 90% of all cybercrime involves a phishing email....
Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...