Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...
Jan 11, 2020 | Algorithms, Applications, applications, Applications, Artificial Intelligence, Automation, Automotive, Business, Cars, Coding, Computers, Consumer, CPU, Cyber Liability, Encryption, Hacking, Incident Response, Law Enforcement, Liability, LIDAR, Location Data, Machine Learning, Navigation, Patching, Police, predictive algorithms, Radio Show, Radio_Show, safety, Security, Security Alerts, Technology, Updates
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors In an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...
Dec 7, 2019 | Anti-Virus, Attack Vectors, Consumer, Family, FBI, Government, Hacking, Identity Theft, Internet, Monitoring, Radio Show, Radio_Show, safety, Security, Surveillance, Technology, TV
Smart TVs, Security and the FBI Did you go out on Black Friday and pick up a new television for the family? Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...
Dec 7, 2019 | Attack Vectors, Consumer, Hacking, Hacking, Internet, IoT, Malware, Pet Monitoring, Privacy, Psychology, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Speakers, spying, Technology, Zero-Day
Peeping on Toms Many of us have a lovable tomcat who stays at home while we are at work. We all love our pets! Now taking care of them is getting even easier with the advent of an assortment of digital and technological devices. This sector is growing...
Nov 30, 2019 | Anti-Virus, Best Practices, Big Tech, Business, Consumer, credentials, Cyber breaches, Cybercrime, Employees, Employment, Hackers, Hacking, Identity Theft, Insider Threat, Radio Show, Radio_Show, Security, Security, Technology, Vulnerabilities
Cybercriminals return to old-school ID theft tactics As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...