Mar 21, 2020 | Agencies, Attack Vectors, Bitcoin, Business, Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Data Loss, FBI, Financial, Government, Hackers, Hacking, Hacking, Hacks, Judicial, Legal, Monitoring, News, Patching, Police, Radio Show, Radio_Show, Security, Security Alerts, Surveillance, Technology, Under Arrest, Updates
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy. For 24 members of an Atlanta cybercrime gang involved in fraud and money...
Mar 14, 2020 | Applications, Applications, Attack Vectors, Best Practices, Big Tech, Breaches, Compliance, Critical data, Cyber breaches, Cybercrime, Cybersecurity, Data Loss, Hackers, Hacking, industrial espionage, Insider Threat, Malware, Operating Systems, Patches, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates, Updates, Updates, Vulnerabilities
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Mar 14, 2020 | Cybercrime, Dark Web, Hackers, Identity Theft, Internet, Privacy, Radio Show, Radio_Show, Technology, TOR
Want To Search Dark Web? It May Soon Be Easier with New Search Engine There are three parts to the Internet. The part we know of as the “web” is the surface web and is only one of the elements. The other two sections are the Deep Web, which is the non-indexed part,...
Mar 14, 2020 | App Store, Apple, Apps, Best Practices, Business, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iOS, Mobile, Mobile Phones, Privacy, Push Notification, Radio Show, Radio_Show, Security, Technology
Revised Apple Policy Rules for Apps in App Store Developers of apps distributed through the Apple App Store will be subject to a new set of guidelines and policies distributed this week. Some of these changes are controversial. Some of the revisions include mobile...
Mar 7, 2020 | Best Practices, Business, Business Email Compromise, Compliance, Cybercrime, Cybersecurity, CyberTraining, Employees, Employees, Executives, Executives, Extortion, Financial, Hackers, Hacking, Human Element, Inattention, Insider Threat, Internet, Nationstates, Organized Crime, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Security, Security, Social Engineering, Technology
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...