Aug 3, 2019 | automation, bluetooth, Home, Infosec, IoT, Radio Show, Radio_Show, Security, Security, Smart Home, Technology
Smart Home Devices Leak Private Information A publicly accessible ElasticSearch cluster owned by Orvibo, a Chinese smart home solutions provider, leaked more than two billion user logs containing sensitive data of customers from countries all over the world....
Aug 3, 2019 | Artificial Intelligence, automation, Health, Privacy, Radio Show, Radio_Show, Science
AI in Medicine and its Drawbacks Each year, one out of every five patients admitted to a hospital in the United States for serious care develops acute kidney injury. For a variety of reasons, these patients’ kidneys suddenly stop functioning normally and become unable...
Aug 3, 2019 | Cybercrime, Cybersecurity, Hackers, Radio Show, Radio_Show, Ransomware, Security
Cybercrime costs are Rising The costs of cybercrime are extremely high these days. This year we’ve seen how a church lost $1.75 million in a BEC scam; two cities in Florida paid ransoms totaling over a million dollars after ransomware attacks; and British Airways had...
Aug 3, 2019 | Children, Cybercrime, Databases, Education, Hackers, Hacking, Radio Show, Radio_Show, School Districts, Technology
Hackers Stick a Bullseye on Schools and School Districts Some hackers demand ransom; others sweep up personal data for sale to identity thieves. But whatever hackers’ motives, school systems around the country have been the targets of their cyberattacks. One attack...
Aug 3, 2019 | Best Practices, Business, Cybercrime, Data Storage, Hacking, Hacking, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, storage, Technology
Storing your Password in Plaintext…Say What???? Stock trading company Robinhood has admitted to storing passwords of some of its users in plaintext. The California-based firm said that it came across this security lapse on Monday this week. In an email,...
Aug 3, 2019 | Best Practices, Business, CEO, Cloud Vendors, Computers, CyberTraining, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.” To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...
Jul 27, 2019 | Breaches, Computers, Consumer, Cyber breaches, Cybercrime, Cybersecurity, Hacking, Laptops, Malware, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Tracking, Video, Windows (Microsoft)
Is Someone Lurking in Your Computer? Whether you’re in an open office where colleagues regularly wander past or live somewhere—like a college dorm—where you may feel comfortable leaving your laptop unattended in the presence of relative strangers, it can be all...
Jul 27, 2019 | Best Practices, Business, Cloud, Cloud Vendors, Computers, Cybersecurity, Internet Service Providers, Networking, Radio Show, Radio_Show, Security, Security, Technology
Are Your Cloud Vendors Paying Attention to Security? Cloud adoption is on the rise: According to International Data Corporation (IDC)’s “Nine Ways to Maximize the Value of Cloud Contracts,” 52 percent of all companies are currently using cloud-based delivery...
Jul 27, 2019 | Brain Implants, News, Patents, Patents, Radio Show, Radio_Show, Research, Science, Self Improvement, Technology
Ready for Computerized Brains… Since its founding in 2016, Neuralink has remained one of Elon Musk’s quieter ventures. It’s the mission of linking human and computer technologies have been, compared to Musk’s work at SpaceX, Tesla, or The...
Jul 27, 2019 | Business, CEO, DeepFake, Radio Show, Radio_Show, Security, Technology, Video
Is Your CEO real or Is He a DeepFake? “Deepfakes” refers to media that has been altered by artificial intelligence to make it appear that a person is doing or saying something that, in fact, that person has never done or said. The technology first began appearing a...