Sep 21, 2019 | Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Dark Web, data sharing, Exploits, Financial, Hackers, Hacking, Hacking, Hacking, Hacking Tools, Internet, Malware, Malware, Marketplace, Organized Crime, Radio Show, Radio_Show, Utilities, Zero-Day
You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Sep 21, 2019 | bluetooth, Business, Cybercrime, Cybersecurity, Hackers, Networking, Networking, Privacy, Radio Show, Radio_Show, Routers, Technology, WiFi
Perils of Public WiFi and How To Protecting Your Information With the abundance of available public WiFi networks that are prompting us to connect whenever we sit down in a public area. Who pays for those WiFi routers, is it a profit point for the business by selling...
Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Sep 14, 2019 | Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Electricity, Firewalls, Firewalls, Hackers, Hacking, Hacking, Networking, Patches, Power Grid, Radio Show, Radio_Show, Security, Security Alerts, Software, Technology, Updates, Utilities
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Sep 7, 2019 | Applications, Best Practices, Big Tech, Business, Consumer, Cybercrime, Cybersecurity, Data, data sharing, Employee Training, Facebook, Facebook, Google, Hacking, LinkedIn, LinkedIn, Radio Show, Radio_Show, Resources, Security, Social Media, Social Networking, Software, Software As A Service, storage, Technology, Web Tools
Companies Sharing Your Data with Their Third-Party Vendors It seems that every day there’s another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on...
Sep 7, 2019 | Business, Computers, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Home, Malware, Malware, Networking, Networking, Passwords, Radio Show, Radio_Show, Routers, Security, Security Alerts, Technology, WiFi
Security Protections Badly Needed On Routers New testing by Consumer Reports shows important differences in how routers from popular brands handle digital security. Some of the 29 routers we examined this spring and summer build in important safeguards, such as...