Oct 26, 2019 | Automation, Automotive, Business, Legal, Liability, Radio Show, Radio_Show, Repair, safety, Technology, Tesla
They Look Cool but How Safe Are They? I have been warning about these embedded handles for a while. As you may know, I spent 10+ years as a volunteer advanced EMT where I responded to a number of accidents. Handles that completely fold inside the door are dangerous...
Oct 26, 2019 | Alexa, Amazon, anonymity, Apple, Audio, Best Practices, Big Tech, bluetooth, Consumer, gadgets, Google, Hacking, IoT, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Siri, Smart Assistants, Smart Speakers, spying, Surveillance, Technology
Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything — all the time. Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Oct 19, 2019 | automation, bluetooth, Business, Consumer, cyberattacks, Cybercrime, gadgets, Hackers, Hacking, Hacking, Hacking, Hacks, Infosec, Intellectual Property Theft, Internet, IoT, Monitoring, Nationstates, Organized Crime, Passwords, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Home, spying, Surveillance, Technology, Updates
Convenience Gadgets – Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Oct 19, 2019 | Apple, Audio, Cell Phone, cell phones, Consumer, Hackers, Hacking, Hacking, Internet, iOS, iPhone, Jailbreak, Malware, Mobile, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....
Oct 19, 2019 | anonymity, Anonymity, Business, Encryption, Government, Hacking, Internet, Monitoring, Radio Show, Radio_Show, Security, Security, spying, Surveillance, Technology, TOR
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...