Feb 17, 2023 | Financial, Fines and Penalties, Hacking, Podcast
Cyber security is no longer an option for small business owners – it’s a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous...
May 16, 2020 | Amazon, Apple, Big Tech, Business, Google, Internet, Microsoft, Radio Show, Radio_Show, Tech Overlords, Technology
The Noose of Big Tech No longer our friends and allies now, it’s official the tech giants are acting as the most powerful entities in the world. These tech giants have engulfed our freedom and are acting as controlling masters over our lives. We do what they say...
Apr 18, 2020 | Best Practices, Business, Computers, Expose Client Functions, File Deletion, Hewlett Packard, Radio Show, Radio_Show, Security, Security, Software, Software Manufacturers, Support Assistant Utility, Technology, Vulnerabilities
HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business? Turns out that their pre-installed Support Assistant Utility is quite insecure by design. It is capable of exposing 250 client functions and is filled with vulnerabilities...
Apr 18, 2020 | biometric fingerprint, biometric sensors, Business, Cybercrime, fingerprint authentication, optical, password alternative, Radio Show, Radio_Show, Security, Technology, ultrasonic
Fingerprint Authentication is Bypassable! Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...
Apr 18, 2020 | Business, Cybercrime, DeepFake, Internet, Malware, Porn Scams, Radio Show, Radio_Show, Ransomware, Security, Sextortion, Technology
Watch out – Porn Scams by Email are back! Cybercriminals will try just about any tactic they can to get you to click on and accept their malware. One of their most successful have been scams related to pornography. These scams surround the possible situation...