Oct 19, 2019 | Aviation, Business, China, Cybercrime, FAA, Financial, Government, Hackers, Hacking, industrial espionage, Intellectual Property Theft, Liability, Marketplace, Nationstates, Patents, Politics, Radio Show, Radio_Show, Security, Technology, Transportation, Uncategorized
Nation-State Cybertheft May Cause US Aerospace Downfall Our government leaders have known for years about the industrial espionage conducted by China. It is at the expense of our American companies. They know of China’s goal to develop a colossal aerospace...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Oct 19, 2019 | cyberattacks, Cybercrime, Cybersecurity, Email, Encryption, Government, Hacking, Internet, Nationstates, News, Online, Organized Crime, Privacy, Radio Show, Radio_Show, Security, Technology
Standing our Ground on Encryption – without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
Oct 12, 2019 | Automation, Automotive, Humor, Liability, Navigation, Operating Systems, Patents, Radio Show, Radio_Show, Technology, Tesla, Tesla, Transportation, Updates, vehicles
Bathroom Humor and High-End Executive Cars Enough already with the Fart jokes! Said every father to his sons. I am not sure why boys get so much enjoyment from this topic, but now it is going a little far with the businessman Elon Musk adding a farting noise to the...
Oct 12, 2019 | Consumer, gadgets, Radio Show, Radio_Show, Security, Security, Smart Home, Technology
Problems You Never Knew Could Be Solved By Smart Devices How smart do you want your home to be? It seems like every day they come out with some new gadget that can connect to your network, in hopes of making your daily life more convenient. Some are useful and...
Oct 12, 2019 | Business, Consumer, Cybercrime, Encryption, Government, Hackers, Hacking, Home, Malware, Nationstates, Networking, Networking, NSA, NSA, Organized Crime, Radio Show, Radio_Show, Security, Technology, VPN, VPN
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
Oct 12, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, industrial espionage, Internet, Malware, Radio Show, Radio_Show, Security, Security, Technology
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Oct 12, 2019 | Alexa, Applications, Artificial Intelligence, Artificial Intelligence, automation, Big Tech, Business, Cars, Consumer, Data, Infosec, Phone, Radio Show, Radio_Show, Security, Siri, Smart Assistants, Technology
The Future Communication Means No Phones Our world today is changing, and we are demanding convenience, efficiency, and speed in our transactional pursuits, and this might mean that smartphone you purchase or finance for the next five years might be unnecessary...
Oct 12, 2019 | anonymity, Cybercrime, Hackers, Hacking, Privacy, Radio Show, Radio_Show, spying
Maintaining Privacy Means Obfuscating Online Security Answers Why does your neighbor next door list his home as Nairobi, Kenya? You know he not only does not live there and probably could not even locate it on a map. It is what is known as social media...
Oct 12, 2019 | Business, Business Email Compromise, cyberattacks, Cybersecurity, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...