Oct 12, 2019 | Automation, Automotive, Humor, Liability, Navigation, Operating Systems, Patents, Radio Show, Radio_Show, Technology, Tesla, Tesla, Transportation, Updates, vehicles
Bathroom Humor and High-End Executive Cars Enough already with the Fart jokes! Said every father to his sons. I am not sure why boys get so much enjoyment from this topic, but now it is going a little far with the businessman Elon Musk adding a farting noise to the...
Oct 12, 2019 | Consumer, gadgets, Radio Show, Radio_Show, Security, Security, Smart Home, Technology
Problems You Never Knew Could Be Solved By Smart Devices How smart do you want your home to be? It seems like every day they come out with some new gadget that can connect to your network, in hopes of making your daily life more convenient. Some are useful and...
Oct 12, 2019 | Business, Consumer, Cybercrime, Encryption, Government, Hackers, Hacking, Home, Malware, Nationstates, Networking, Networking, NSA, NSA, Organized Crime, Radio Show, Radio_Show, Security, Technology, VPN, VPN
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
Oct 12, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, industrial espionage, Internet, Malware, Radio Show, Radio_Show, Security, Security, Technology
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Oct 12, 2019 | Alexa, Applications, Artificial Intelligence, Artificial Intelligence, automation, Big Tech, Business, Cars, Consumer, Data, Infosec, Phone, Radio Show, Radio_Show, Security, Siri, Smart Assistants, Technology
The Future Communication Means No Phones Our world today is changing, and we are demanding convenience, efficiency, and speed in our transactional pursuits, and this might mean that smartphone you purchase or finance for the next five years might be unnecessary...
Oct 12, 2019 | anonymity, Cybercrime, Hackers, Hacking, Privacy, Radio Show, Radio_Show, spying
Maintaining Privacy Means Obfuscating Online Security Answers Why does your neighbor next door list his home as Nairobi, Kenya? You know he not only does not live there and probably could not even locate it on a map. It is what is known as social media...
Oct 12, 2019 | Business, Business Email Compromise, cyberattacks, Cybersecurity, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...
Oct 12, 2019 | Business, Internet, Microsoft, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security Alerts, Updates, Windows (Microsoft)
Keeping Windows Safe Means Patching, Patching, Patching and More Patching Just when you thought that you were safe from worms, malware, etc. here come the cybercriminals again. If you can believe it, they are still targeting exploits for which the manufacturer...
Oct 5, 2019 | Apple, Business, Cyber breaches, cyberattacks, Cybercrime, Gaming, Google, Hackers, Hacking, Hacking, iPad, Radio Show, Radio_Show, Tablet, Technology
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Oct 5, 2019 | Consumer, credentials, Identity Theft, Radio Show, Radio_Show, scam, Senior
‘Father of Identity Theft’ Gets 30 Years after being Convicted Of Mail Fraud, and Aggravated Identity Theft James Jackson refers to himself as the “Father of Identity Theft.” He preyed upon the recently deceased and using their...