Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Jan 25, 2020 | Apple, Apple, Best Practices, Big Tech, Business, FBI, Government, iOS, iPhone, Phone, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Smart Phone, Technology
Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to...
Jan 18, 2020 | Applications, Big Tech, browsers, Business, Compliance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Firefox, Government, Hackers, Hacking, Hacking, Homeland Security, Internet, Legacy Systems, Malware, Mozilla Firefox, Nationstates, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Vulnerabilities, warnings, Zero-Day
Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Dec 7, 2019 | Anti-Virus, Attack Vectors, Consumer, Family, FBI, Government, Hacking, Identity Theft, Internet, Monitoring, Radio Show, Radio_Show, safety, Security, Surveillance, Technology, TV
Smart TVs, Security and the FBI Did you go out on Black Friday and pick up a new television for the family? Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...