May 2, 2020 | ACLU, Anti-Discrimination, Business, CFAA, Internet, Privacy Policy, Radio Show, Radio_Show, Security, Technology, Terms of Service, Website
Terms of Service Violations are not Criminal Acts In the United States, there is a law called the Computer Fraud and Abuse Act (CFAA), instilled to prevent hacking. With the advent of more regulatory information were are seeing on every website, terms of service, and...
May 2, 2020 | Apple, Business, CPU, GPU, iMac, iOS, Mac Pro, MacBook, Mobile, Proprietary Design, Radio Show, Radio_Show, Security, Technology
Intel No More: Apple Designs its Own Processors Covid-19 spells the end for Intel (at least for Apple). Next year Apple will be using its own proprietary CPU’s an GPU’s in its products. They will be basing the design of these on their company developed...
May 2, 2020 | Applications, Business, Data, Hospital, Internet, IoMT, Medical, Radio Show, Radio_Show, Security, Technology
Medical IoT Prone to Security Challenges Hospitals are busy places, and anytime they can save time or make something more natural, they try to do so. Medical device companies are adding applications and creating real products to solve medical issues. Medical IoT...
May 2, 2020 | Apple, Business, Fake News, Internet, Radio Show, Radio_Show, Security, Technology, Vulnerabilities, Zero-Day
The Apple Exploit that Wasn’t “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
May 2, 2020 | Amazon, Amazon platform, Big Tech, Business, Internet, Online Shopping, Product Lines, Radio Show, Radio_Show, Retail, Sales, Security, Technology, Third-Party resellers
Amazon’s Own Products designed by Data from Third-Party Sellers Is Amazon playing fair with its third-party resellers? Or have they been using them to gather statistics and ideas to create popular products of their own? Amazon is a retail behemoth, but did they get...
May 2, 2020 | Agencies, Banking, Banking, Biological Viruses, Business, communication, Consumer, CoronaVirus, Coronavirus, Covid-19, Cyber breaches, Cybercrime, Cybersecurity, Financial, fraudster, Government, Hackers, Internet, News, Phishing, Phishing, Quarantine, Radio Show, Radio_Show, scam, Security, Smishing, Technology, Vishing
Who Is Falling for COVID-19 Scams…Lots of People Hackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel...
May 2, 2020 | Access Controls, Business, Corporate Reputation, Cybercrime, Cybersecurity, Dark Web, Data Loss, Employees, Exploits, Hacking Tools, Inside Information, Internet, Malicious Insider, Marketplace, Radio Show, Radio_Show, Security, Technology
Malicious Insiders Monetize Their Knowlege Using Dark Web Have you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...
May 2, 2020 | Applications, Big Tech, Biological Viruses, Business, Cisco, Collaboration Tools, Coronavirus, Covid-19, Employees, Internet, Machine Learning, Microsoft, Microsoft Teams, Patching, predictive algorithms, Privacy, Quarantine, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, Slack, Technology, Technology, Updates
Collaboration Platforms Using AI to Help Remote Workers With hundreds of thousands to millions of employees working from home during this pandemic, businesses are seeking ways to collaborate more manageable and with better efficiency. There are several platforms, some...
Apr 28, 2020 | Business, Cryptocurrency, Cryptojacking, Cryptomining, Features, iHeart, Internet, Security, Technology
Cryptojacking Hi. Craig Peterson here with a blink into Cryptojacking. Has your Android phone been getting hot? I mean really hot. Has the battery life on your smartphone all of a sudden dropped to almost nothing? How about your desktop or laptop web browser. Is...
Apr 28, 2020 | Business, Features, iHeart, Internet, Pwned, Security, Technology
Pawned Accounts Hi. Craig Peterson here with a blink into the stolen account business, also known as “Pwning.” [Prounced “poned” as in p-owned] Pwned means that your account has been the victim of a data breach. Your username and password have been stolen from a...