Sep 2, 2023 | Android, iOS, Malware, Mobile, Quishing, Smishing, Spyware, trojans, Vishing
What is Mobile Malware? Mobile malware is a real and growing threat that you need to be aware of. 🚨📲💻 Especially if you’re running a business or allowing employees to use their own devices. Why are hackers setting their sights on mobiles? With the rise of...
Nov 7, 2021 | 2FA, Cisco, Malware, Radio Show, WGAN, WGIR, WTAG
Do You Use 2-Factor Authenitcation Yet? Well, it’s already under attack! A Drone Tried to Disrupt the Power Grid. It Won’t Be the Last https://www.wired.com/story/drone-attack-power-substation-threat/ In July of last year, a DJI Mavic 2 drone...
Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Apr 2, 2021 | Access Controls, Anti-Spoofing, Bitcoin, Business, Cryptocurrency, Fairphone, Federal Reserve Notes, Government, Hacking, Malware, News, Personally Identifiable Information, Podcast, Qualcomm, Radio Show, Radio_Show, RDP, Security, Security Alerts, Semi-Conductor, Show Notes, SMS, Supply Chains, Technology, Tesla, Twitter, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 3, 2021 Teen who hacked Twitter accounts of Musk, Obama for Bitcoin gets 3 years in prison The hacker behind last year’s big Twitter hack has just been sentenced to hard-time. Graham Ivan Clark, the teenage hacker who...
Mar 19, 2021 | Amazon, Amazon platform, App Store, Apple, Apple, Apps, Artificial Intelligence, Attack Vectors, Backdoors, Best Practices, Big Tech, Breaches, browsers, Business, China, Computers, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Email, Encryption, Exchange Server, Exchange Server, Google, Google, Government, Government, Hackers, Hacking, hacking as a service, Hacks, Homeland Security, Information Technology, Infrastructure, Intellectual Property Theft, Internet, Law Enforcement, Legal, Machine Learning, Malware, Microsoft, Microsoft, Monitoring, Nationstates, Networking, News, Patches, Patching, Phishing, Podcast, predictive algorithms, Publishing, Radio Show, Radio_Show, Ransomware, Ransomware, Russia, Security, Security, Security Alerts, Security First, Show Notes, Software, Spyware, Tech Overlords, Technology, Technology, third-world, United States, Updates, Web Tools
Read. Learn. Share. Tech Talk Show Notes March 20, 2021 U.S. Unprepared for AI Competition with China, Commission Finds The National Security Commission on Artificial Intelligence is out with its comprehensive final report recommending a path forward for...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Page 1 of 10123...510...NEXT»Last »