Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Mar 19, 2021 | Amazon, Amazon platform, App Store, Apple, Apple, Apps, Artificial Intelligence, Attack Vectors, Backdoors, Best Practices, Big Tech, Breaches, browsers, Business, China, Computers, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Email, Encryption, Exchange Server, Exchange Server, Google, Google, Government, Government, Hackers, Hacking, hacking as a service, Hacks, Homeland Security, Information Technology, Infrastructure, Intellectual Property Theft, Internet, Law Enforcement, Legal, Machine Learning, Malware, Microsoft, Microsoft, Monitoring, Nationstates, Networking, News, Patches, Patching, Phishing, Podcast, predictive algorithms, Publishing, Radio Show, Radio_Show, Ransomware, Ransomware, Russia, Security, Security, Security Alerts, Security First, Show Notes, Software, Spyware, Tech Overlords, Technology, Technology, third-world, United States, Updates, Web Tools
Read. Learn. Share. Tech Talk Show Notes March 20, 2021 U.S. Unprepared for AI Competition with China, Commission Finds The National Security Commission on Artificial Intelligence is out with its comprehensive final report recommending a path forward for...
Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Mar 14, 2020 | Apple, Apple, Applications, Applications, Apps, Big Tech, Business, Congress, Court Challenges, Data, Data Assets, Data Records, data sharing, Data Storage, Databases, Dragnet, FBI, GeoFence Warrants, Google, Government, Internet, Legislation, Location Data, Radio Show, Radio_Show, Security, Security First, Technology
Have Your Phone — It Might Get You Questioned About A Crime! You come home from a long day at work and sit down at your computer to check your email to find an email from Google’s legal investigations support team informing you that local police were demanding...
Feb 29, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Cybercrime, Cybersecurity, Hackers, Hacking, iMac, iPad, Laptops, Mac Pro, MacBook, Malware, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Security First, Tablet, Technology, Updates
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Apple designs their computers with a security-first mindset but that does not mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Page 1 of 6123...5...NEXT»Last »