Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Sep 21, 2019 | anonymity, Best Practices, browsers, Business, Hacking, Hacking, Internet, Nationstates, new browser, Organized Crime, Patents, Phishing, Radio Show, Radio_Show, Security, Security, Security Alerts, spying, Technology, Tracking, VPN, Web Tools
Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...
Sep 21, 2019 | Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Dark Web, data sharing, Exploits, Financial, Hackers, Hacking, Hacking, Hacking, Hacking Tools, Internet, Malware, Malware, Marketplace, Organized Crime, Radio Show, Radio_Show, Utilities, Zero-Day
You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Sep 14, 2019 | Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Electricity, Firewalls, Firewalls, Hackers, Hacking, Hacking, Networking, Patches, Power Grid, Radio Show, Radio_Show, Security, Security Alerts, Software, Technology, Updates, Utilities
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Sep 7, 2019 | Applications, Best Practices, Big Tech, Business, Consumer, Cybercrime, Cybersecurity, Data, data sharing, Employee Training, Facebook, Facebook, Google, Hacking, LinkedIn, LinkedIn, Radio Show, Radio_Show, Resources, Security, Social Media, Social Networking, Software, Software As A Service, storage, Technology, Web Tools
Companies Sharing Your Data with Their Third-Party Vendors It seems that every day there’s another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on...