Nov 16, 2019 | Business, Business Email Compromise, credential stealing, cyberattacks, Cybercrime, Cybersecurity, Email, Hackers, Hacking, Hacking, Identity Theft, Organized Crime, Phishing, Phishing, Radio Show, Radio_Show, Security, third-world
Bots Losing Panache as Cybercriminals Hire In Third World As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Nov 1, 2019 | Business, China, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Government, Hackers, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Nationstates, News, North Korea, Organized Crime, Privacy, Radio Show, Radio_Show, Regulation, Russia, safety, Security, spying, Surveillance, Technology
Cyber Cold War Right on Our Door Step Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Oct 19, 2019 | automation, bluetooth, Business, Consumer, cyberattacks, Cybercrime, gadgets, Hackers, Hacking, Hacking, Hacking, Hacks, Infosec, Intellectual Property Theft, Internet, IoT, Monitoring, Nationstates, Organized Crime, Passwords, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Home, spying, Surveillance, Technology, Updates
Convenience Gadgets – Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Oct 19, 2019 | Anti-Virus, Applications, Best Practices, Business, Cybercrime, Cybersecurity, Hackers, Hacking, Malware, Microsoft, Microsoft, Nationstates, Operating Systems, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, Web Tools, Windows (Microsoft)
New Tools Keep CyberThieves From Disabling Your Cyber Protections Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Oct 19, 2019 | cyberattacks, Cybercrime, Cybersecurity, Email, Encryption, Government, Hacking, Internet, Nationstates, News, Online, Organized Crime, Privacy, Radio Show, Radio_Show, Security, Technology
Standing our Ground on Encryption – without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...