Mar 21, 2020 | Agencies, Attack Vectors, Bitcoin, Business, Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Data Loss, FBI, Financial, Government, Hackers, Hacking, Hacking, Hacks, Judicial, Legal, Monitoring, News, Patching, Police, Radio Show, Radio_Show, Security, Security Alerts, Surveillance, Technology, Under Arrest, Updates
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy. For 24 members of an Atlanta cybercrime gang involved in fraud and money...
Feb 1, 2020 | Attack Vectors, Audio-Visual Data, Best Practices, Biometrics, Business, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, CyberTraining, DeepFake, Employees, Employees, Executives, Extortion, Hackers, Hacking, Hacking, Human Element, Impersonation, Incident Response, industrial espionage, Internet, Market Value, Marketing Manipulation, Patching, Radio Show, Radio_Show, records, scam, Security, Security, Security Alerts, Social Engineering, Technology, Updates
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Jan 25, 2020 | Advertising, Amazon, Apple, Big Tech, Business, Copyright, Financial, Google, Internet, Legal, M&A, Marketing, Marketing Manipulation, Microsoft, Microsoft, R&D, Radio Show, Radio_Show, Technology
Big Tech Stomps All Over Small Businesses Are small tech companies being squeezed by tech giants? You bet and it has happened numerous times. Sometimes they announce a big product or service, never planning to ever bring it to market. They drive excitement for their...
Jan 11, 2020 | Amazon, anonymity, Apple, Applications, Asset Management, Audit Logs, audit logs, Big Tech, Big Tech, Business, CCPA, Chrome Browser, Compliance, Computers, Cyber Liability, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Encryption, Financial, Fines and Penalties, Google, Government, Hacking, Internet, Legislation, Malware, Microsoft, Monitoring, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, spying, Technology, Updates, Windows (Microsoft)
Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California’s...
Jan 4, 2020 | anonymity, Applications, Big Tech, Big Tech, Biometrics, Business, Employees, Facial Recognition, Hacking, Hacking, Internet, Location Data, Radio Show, Radio_Show, safety, Security, spying, Technology
Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone. The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...