Apr 30, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, CPU, Critical data, Cybercrime, Data, Databases, Emotet, FCC, Government, Hackers, Hacking, iMac, Internet, Laptops, Law Enforcement, Mac Pro, MacBook, Monitoring, News, Podcast, Police, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Security, Security, Security Alerts, Show Notes, Skyrocketing Ransoms, SpaceX, Starlink, Technology, Unsecured
Read. Learn. Share. Tech Talk Show Notes May 1, 2021 Lyft is getting out of the self-driving business Lyft has sold its self-driving division to a Toyota subsidiary called Woven Planet for $550 million—the latest sign that it takes deep pockets to compete in the...
Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Mar 12, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Big Tech, Breaches, Business, China, Cybersecurity, DeepFake, Exchange Server, FLoC, Genealogy, Global Supply Chain, Google, Government, Government, Hacking, Impersonation, Internet, Malware, Microsoft, Microsoft, Mobile Phones, MyHeritage, Nationstates, News, North Korea, Patches, Patching, Radio Show, Radio_Show, Russia, Samsung, Security, Security, Security Alerts, Show Notes, Smart Phone, Social Media, Social Networking, Supply Chains, Technology, Tesla, Tesla, Third - Party, Third-Party, third-world, Threats, Tracking, Tracking, United States, Updates, vehicles, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes March 13, 2021 Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...
Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Jan 29, 2021 | Applications, Automation, Automotive, Big Tech, browsers, Chrome, Cloud, Cloud Jacking, Cyber breaches, Cybercrime, Cybersecurity, Data Aggregator, Data Brokers, DIA, Dragnet, Edge, GeoFence Warrants, Government, Hackers, Hacking, Hacks, Internet, Law Enforcement, Location Data, Malware, Nationstates, North Korea, Passwords, Privacy, Radio Show, Radio_Show, safety, Security, Security, Show Notes, Spyware, Technology, trojans
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
Jan 11, 2020 | Algorithms, Applications, applications, Applications, Artificial Intelligence, Automation, Automotive, Business, Cars, Coding, Computers, Consumer, CPU, Cyber Liability, Encryption, Hacking, Incident Response, Law Enforcement, Liability, LIDAR, Location Data, Machine Learning, Navigation, Patching, Police, predictive algorithms, Radio Show, Radio_Show, safety, Security, Security Alerts, Technology, Updates
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors In an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...