Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...
Jan 4, 2020 | Android, Android, anonymity, Asset Management, audit logs, Cell Phone, cell phones, Cellular Services, Censorship, College, College, Cybersecurity, Data Assets, data sharing, Education, iOS, iPhone, Mobile, Mobile Phones, Monitoring, Online, Phone, Privacy, Radio Show, Radio_Show, safety, Schools and Colleges, Security, Smart Phone, spying, Surveillance, Tracking
How is your Social Credit Score? It turns out that some American Universities use them to track their students. Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Nov 30, 2019 | Best Practices, Business, China, Cyber breaches, Cybersecurity, Data, Economic Disruption, Hacking, Internet, Iran, Nationstates, North Korea, password spraying, Phishing, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Russia, Security, Security, Security, Software, Technology, Vulnerabilities
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...