Sep 21, 2019 | Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Dark Web, data sharing, Exploits, Financial, Hackers, Hacking, Hacking, Hacking, Hacking Tools, Internet, Malware, Malware, Marketplace, Organized Crime, Radio Show, Radio_Show, Utilities, Zero-Day
You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Sep 21, 2019 | bluetooth, Business, Cybercrime, Cybersecurity, Hackers, Networking, Networking, Privacy, Radio Show, Radio_Show, Routers, Technology, WiFi
Perils of Public WiFi and How To Protecting Your Information With the abundance of available public WiFi networks that are prompting us to connect whenever we sit down in a public area. Who pays for those WiFi routers, is it a profit point for the business by selling...
Sep 21, 2019 | Android, Android, Business, Cell Phone, cell phones, Cellular Services, iOS, iPhone, Mobile, Mobile Phones, Passwords, Phone, Phones, Privacy, Radio Show, Radio_Show, scam, Security, Security Alerts, Smart Phone, T-Mobile, Technology
Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Sep 21, 2019 | Amazon, anonymity, Apple, Big Tech, Business, Consumer, Data, Google, Microsoft, Monitoring, Patents, Privacy, Radio Show, Radio_Show, spying, Surveillance, Technology, Tracking, Tracking
Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....
Sep 21, 2019 | Applications, Best Practices, Business, cyberattacks, Employees, HR, Malware, Radio Show, Radio_Show, Security, Security
HR The Gateway To Cybercrime Today’s cybercriminals are continually developing new and sophisticated techniques with which to gain access to their victim’s internet technology systems. Currently, over 90% of all cybercrime involves a phishing email....
Sep 14, 2019 | Algorithms, Government, Judicial, Legal
Algorithms Should be Fair — But they are not. Kentucky lawmakers thought requiring that judges consult an algorithm when deciding whether to hold a defendant in jail before trial would make the state’s justice system cheaper and fairer by setting more people...
Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Sep 14, 2019 | Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Electricity, Firewalls, Firewalls, Hackers, Hacking, Hacking, Networking, Patches, Power Grid, Radio Show, Radio_Show, Security, Security Alerts, Software, Technology, Updates, Utilities
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Sep 14, 2019 | automation, Automation, Automotive, Business, Cars, Coding, DOJ, Fines and Penalties, Navigation, Radio Show, Radio_Show, Robotics, Security, Technology, Tesla, Transportation, vehicles
Tesla Autopilot Feature Raises Issues Yet another Tesla driver has apparently fallen asleep behind the wheel while his car cruised down the freeway. The latest video comes from the Boston area, where a local man caught a video of a Tesla driver and his...
Sep 14, 2019 | apps, Best Practices, Big Tech, Business, Cloud, Cyber breaches, Cybersecurity, Data, data sharing, Data Storage, Health, Legal, Liability, Privacy, privacy, Radio Show, Radio_Show, Security, Security, Security, Software, storage, Technology, Tracking
HIPAA Can’t Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...