Nov 1, 2019 | Business, Hacking, Internet, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, safety, Security
Common Password Vulnerabilities and How to Avoid Them There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...
Oct 26, 2019 | Audit Logs, audit logs, Best Practices, Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Hackers, Hacking, Hacking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Third-Party, Updates
Exploitable Vulnerability Allows Major VPN Breaches 3000 Servers hacked, the blame is being pointed at a third-party provider utilizing a remote management system in the data center. Who owned the data center? That would be NordVPN, a popular consumer VPN provider....
Oct 26, 2019 | Best Practices, Big Tech, Business, China, Contractors, cyberattacks, Cybercrime, Cybersecurity, Employees, Employment, Government, Guests, Hackers, Hacking, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Jobs, Nationstates, Radio Show, Radio_Show, Security, Security, Technology
Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors. If you are not aware the Chinese...
Oct 26, 2019 | Alexa, Amazon, anonymity, Apple, Audio, Best Practices, Big Tech, bluetooth, Consumer, gadgets, Google, Hacking, IoT, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Siri, Smart Assistants, Smart Speakers, spying, Surveillance, Technology
Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything — all the time. Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Oct 19, 2019 | automation, bluetooth, Business, Consumer, cyberattacks, Cybercrime, gadgets, Hackers, Hacking, Hacking, Hacking, Hacks, Infosec, Intellectual Property Theft, Internet, IoT, Monitoring, Nationstates, Organized Crime, Passwords, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Home, spying, Surveillance, Technology, Updates
Convenience Gadgets – Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Oct 19, 2019 | Apple, Audio, Cell Phone, cell phones, Consumer, Hackers, Hacking, Hacking, Internet, iOS, iPhone, Jailbreak, Malware, Mobile, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....