Apr 25, 2020 | Applications, Business, Cloud, Collaboration Tools, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, misconfigured environments, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Technology, Updates, Zoom
Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...
Apr 25, 2020 | Apple, Big Tech, Biological Viruses, Business, China, Coronavirus, Covid-19, Covid-19, Cybercrime, Economic Disruption, Global Supply Chain, Government Control, Hacking, Intellectual Property Theft, Internet, Nationstates, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Technology, Technology, third-world, Unfair Trade Practices
Can America Compete? US iPhone vs Chinese iPhone We should be manufacturing the products we use in America. American companies can compete with China and it actually would not be that much more expensive. For years we have heard about the Global supply chain but when...
Apr 25, 2020 | Banking, Big Tech, Big Tech, Business, China, Consumer, Entertainment, Gaming, Global Supply Chain, Government Control, Internet, Nationstates, Radio Show, Radio_Show, Security, shopping, Technology, Technology, Tencent, TV
Tencent: The biggest name in Entertainment Tencent is a Chinese entertainment conglomerate who buys up every type of entertainment they can. These entertainments include movies, video games, music, comic books and even technology including messaging services that have...
Apr 18, 2020 | Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Cybercrime, Hackers, Hacking, Hacks, Internet, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, scam, Security, Security, Social Engineering, Technology, Uncategorized
Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around. Whenever there is something big in the news, you can bet that there will be criminals who will exploit it. It has never been more...
Apr 18, 2020 | Best Practices, Business, Consumer, CoronaVirus, Covid-19, Cybercrime, Hackers, Hacking, Identity Theft, Internet, Online, Pandemic, Phishing, Privacy, Quarantine, Radio Show, Radio_Show, Retail, Sales, scam, Security, Security, Shopping, Social Distancing, Technology
Payment Card Skimming is Up during Pandemic forced Online Shopping During the pandemic people have basically stopped going to the local malls to shop and this has forced an increase the number of purchases they make on-line. Well guess what cybercriminals are not...
Apr 18, 2020 | bank account information, Business, fraudster, Government, Internet, IRS, Radio Show, Radio_Show, Security, Stimulus, stolen identity, Technology
Stimulus Payments Easy to Intercept If you are expecting a check from the US government you may be in for a surprise if you are one of the millions that are not required to file a tax return. For these people, the IRS has set up a site where they can give...
Apr 18, 2020 | Best Practices, Business, Computers, Expose Client Functions, File Deletion, Hewlett Packard, Radio Show, Radio_Show, Security, Security, Software, Software Manufacturers, Support Assistant Utility, Technology, Vulnerabilities
HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business? Turns out that their pre-installed Support Assistant Utility is quite insecure by design. It is capable of exposing 250 client functions and is filled with vulnerabilities...
Apr 18, 2020 | biometric fingerprint, biometric sensors, Business, Cybercrime, fingerprint authentication, optical, password alternative, Radio Show, Radio_Show, Security, Technology, ultrasonic
Fingerprint Authentication is Bypassable! Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Apr 18, 2020 | Business, Cybercrime, DeepFake, Internet, Malware, Porn Scams, Radio Show, Radio_Show, Ransomware, Security, Sextortion, Technology
Watch out – Porn Scams by Email are back! Cybercriminals will try just about any tactic they can to get you to click on and accept their malware. One of their most successful have been scams related to pornography. These scams surround the possible situation...