Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Nov 1, 2019 | anonymity, Banking, Banking, Business, Cashless, China, Cryptocurrency, Cryptocurrency, Financial, Government, Hacking, Monitoring, Online, Privacy, Radio Show, Radio_Show, Security, spying, Surveillance, Technology, Tracking
Privacy and China — Not So Much China is planning on developing its digital currency due to the rising costs of currency circulation and lack of control. China, a communist society, wants to control everything about its citizens. That goes on to include how,...
Oct 26, 2019 | Alexa, Amazon, anonymity, Apple, Audio, Best Practices, Big Tech, bluetooth, Consumer, gadgets, Google, Hacking, IoT, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Siri, Smart Assistants, Smart Speakers, spying, Surveillance, Technology
Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything — all the time. Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Oct 19, 2019 | automation, bluetooth, Business, Consumer, cyberattacks, Cybercrime, gadgets, Hackers, Hacking, Hacking, Hacking, Hacks, Infosec, Intellectual Property Theft, Internet, IoT, Monitoring, Nationstates, Organized Crime, Passwords, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Home, spying, Surveillance, Technology, Updates
Convenience Gadgets – Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Oct 19, 2019 | anonymity, Anonymity, Business, Encryption, Government, Hacking, Internet, Monitoring, Radio Show, Radio_Show, Security, Security, spying, Surveillance, Technology, TOR
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
Sep 21, 2019 | Amazon, anonymity, Apple, Big Tech, Business, Consumer, Data, Google, Microsoft, Monitoring, Patents, Privacy, Radio Show, Radio_Show, spying, Surveillance, Technology, Tracking, Tracking
Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....