Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Feb 29, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Cybercrime, Cybersecurity, Hackers, Hacking, iMac, iPad, Laptops, Mac Pro, MacBook, Malware, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Security First, Tablet, Technology, Updates
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Apple designs their computers with a security-first mindset but that does not mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Jan 25, 2020 | brain development, cell phones, Consumer, Entertainment, Family, High School, Images, iPad, Media, Mental Health, Mobile, Mobile Phones, Phone, Psychology, Radio Show, Radio_Show, Science, Stress, Tablet, Technology, Video, YouTube
Screen Time Causing Mental Health Issues Are Overblown Turns out that all the hub-bub about technology affecting the mental health of our teenager by increasing anxiety and depression may be quite over-blown. It turns out that when you look at all the studies and...
Oct 5, 2019 | Apple, Business, Cyber breaches, cyberattacks, Cybercrime, Gaming, Google, Hackers, Hacking, Hacking, iPad, Radio Show, Radio_Show, Tablet, Technology
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Oct 5, 2019 | Advertising, Android, Android, Exploits, Google, Google, Hacking, iPad, Malware, Mobile, Organized Crime, Radio Show, Radio_Show, Smart Phone, Software Manufacturers, Tablet, Technology, Tracking
Google Play “Malware” Store — Poor App Management Platform If you want to download apps for your smartphone or tablet, there are many choices. However, the two primary sources are the App Store, for Apple devices and the Google Play Store, also known as the...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...