Apr 25, 2020 | Android, anonymity, Apple, Applications, apps, Big Tech, Biological Viruses, Business, contact tracing, Coronavirus, Covid-19, Covid-19, Epidemiology, Google, Government, Internet, Mobile, Mobile Phones, Monitoring, Monitoring, Pandemic, Privacy, privacy, Public Health, Quarantine, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Technology, Tracking
Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Apr 25, 2020 | 5G, Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Government, Internet, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Social Distancing, Social Media, Social Networking, Technology, Threats, Utilities
Conspiracy Theorists Grasping at 5G There are always those who will believe the most phenomenal theories when they someone with scientific authority says comments on it. That is the case with the conspiracy theory that the radiation from 5G cell towers creates...
Apr 18, 2020 | bank account information, Business, fraudster, Government, Internet, IRS, Radio Show, Radio_Show, Security, Stimulus, stolen identity, Technology
Stimulus Payments Easy to Intercept If you are expecting a check from the US government you may be in for a surprise if you are one of the millions that are not required to file a tax return. For these people, the IRS has set up a site where they can give...
Apr 18, 2020 | Apple, Big Tech, Business, contact tracing, Covid-19, Epidemiology, Google, Internet, Mobile Phones, Pandemic, Phone, Public Health, Radio Show, Radio_Show, Security, Technology
Big Tech Contact Tracing – Antithetical to American Society The way that public health follows infection of a population is by tracing the contact of infected persons, and testing them is known as contact tracing. It is how epidemiologists aim to reduced...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...