May 9, 2020 | Bittorrent, Business, Covid-19, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Internet, movies, Pandemic, Quarantine, Radio Show, Radio_Show, Security, Technology
BitTorrent and Pandemic: A Match Made in Hacker Heaven Those who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...
Apr 18, 2020 | Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Cybercrime, Hackers, Hacking, Hacks, Internet, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, scam, Security, Security, Social Engineering, Technology, Uncategorized
Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around. Whenever there is something big in the news, you can bet that there will be criminals who will exploit it. It has never been more...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Mar 21, 2020 | Agencies, Attack Vectors, Bitcoin, Business, Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Data Loss, FBI, Financial, Government, Hackers, Hacking, Hacking, Hacks, Judicial, Legal, Monitoring, News, Patching, Police, Radio Show, Radio_Show, Security, Security Alerts, Surveillance, Technology, Under Arrest, Updates
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy. For 24 members of an Atlanta cybercrime gang involved in fraud and money...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...