Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Jan 15, 2021 | Amazon, anonymity, Apple, Applications, Apps, Artificial Intelligence, Big Tech, Business, CES, Consumer, Demonetize, Dragnet, Facebook, Facial Recognition, Fake News, False Positives, GeoFence Warrants, Google, Google, Google, Government, Hacking, Hacks, Internet Service Providers, Law Enforcement, Malware, Millennials, Mobile Phones, Show Notes, Social Media, Tech Overlords, Technology, Zero-Day
Tech Talk Show Notes January 10-16, 2021 WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app WhatsApp, the Facebook-owned messenger that claims to have privacy coded into its DNA, is giving its 2 billion-plus users an ultimatum: agree to...
Apr 25, 2020 | Android, anonymity, Apple, Applications, apps, Big Tech, Biological Viruses, Business, contact tracing, Coronavirus, Covid-19, Covid-19, Epidemiology, Google, Government, Internet, Mobile, Mobile Phones, Monitoring, Monitoring, Pandemic, Privacy, privacy, Public Health, Quarantine, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Technology, Tracking
Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Page 1 of 4123...NEXT»Last »