Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Feb 22, 2021 | 5G, Announcements, App Store, Apple, Apps, Big Tech, Business, Cable Companies, Comcast, Comcast, Computers, Credentials, Critical data, Cryptocurrency, Cyber breaches, Cybercrime, Cybersecurity, data sharing, Drones, Drones, Executive Orders, Facebook, Facebook, Facial Recognition, Facial Recognition, False Positives, Government, Government, Hackers, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Internet Service Providers, Location Data, Machine Learning, Malware, Malware, Media, Microsoft, Nationstates, Navigation, Netflix, Netflix, News, Online, predictive algorithms, President Joe Biden, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Remote-Work, Security, Security, Show Notes, Social Media, Social Networking, Software Manufacturers, Streaming Entertainment, Surveillance, Technology, Technology, Third-Party, Tracking, Uncategorized, United States, Vulnerabilities, Warfare
Read. Learn. Share TECH TALK SHOW NOTES February 6, 2021 Drone Swarms Are Getting Too Fast For Humans To Fight, U.S. General Warns General John Murray, head of Army Futures Command, told a webinar audience at the Center for Strategic & International Studies that...
Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
Jan 29, 2021 | Applications, Automation, Automotive, Big Tech, browsers, Chrome, Cloud, Cloud Jacking, Cyber breaches, Cybercrime, Cybersecurity, Data Aggregator, Data Brokers, DIA, Dragnet, Edge, GeoFence Warrants, Government, Hackers, Hacking, Hacks, Internet, Law Enforcement, Location Data, Malware, Nationstates, North Korea, Passwords, Privacy, Radio Show, Radio_Show, safety, Security, Security, Show Notes, Spyware, Technology, trojans
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
Jan 8, 2021 | Agencies, Amazon, Amazon platform, Attack Vectors, Big Tech, Coronavirus, Covid-19, cyberattacks, Cybersecurity, Data Loss, Facial Recognition, False Positives, Government, Hacking, Hacking, Malware, Malware, Microsoft, Microsoft, Microsoft, Radio Show, Radio_Show, Security, Security, Show Notes, Surveillance, Tech Overlords, Third-Party resellers
Tech Talk Show Notes January 3-9, 2021 DDoS Attacks Spiked, Became More Complex in 2020 The large-scale shift to remote work and the increased reliance on online services as the result of the global pandemic this year gave threat actors new opportunities to use...
Apr 28, 2020 | Business, Features, iHeart, Internet, Security, Spyware, Technology
Recognizing and Avoiding Spyware Hi. Craig Peterson here with a blink into spyware. To start with, the term “spyware” doesn’t refer to the Russians. It isn’t the KGB. Spyware is also known as “adware.”More specifically, it refers to...