Jun 22, 2019 | Breaches, Computers, Cybersecurity, Data, Data Storage, Databases, Law Enforcement, Legal, Privacy, Radio Show, Radio_Show, Security, Security, Technology
When Your Vendors Become A Cyber Liability If It’s Digital, It’s Hackable Customs and Border Protection failed to keep their photographic database of vehicular traffic crossing through US border crossings safe. It involved a single lane at one...
Jun 22, 2019 | Advertising, browsers, Business, Cybersecurity, Monitoring, new browser, Radio Show, Radio_Show, Security, Security, Technology
Newest Browsers Are All About Your Privacy There’s a new battleground in the browser wars: user privacy. Firefox just made its Enhanced Tracking Protection a default feature, Apple continues to pile privacy-focused features into its Safari browser, and people...
Jun 15, 2019 | Business, Data, data sharing, Internet Service Providers, Online, Privacy, Radio Show, Radio_Show, Security
Using You for Profits Many companies take our information and use it to make profits to enrich themselves. Some we share with, and others get our information without our approval because it is shared with them by another vendor with whom we chose to do business. Who...
Jun 15, 2019 | Backup, Business, Computers, Cybersecurity, Data, data sharing, Data Storage, Databases, Networking, Privacy, Radio Show, Radio_Show, Ransomware, Regulation, Resources, Security, Security, Technology
CEOs and Business Owners Aren’t Taking CyberSecurity Seriously — And Are Facing Huge Penalties In the last two weeks, warnings about two massive vulnerabilities have hit the wires. They involve two of the largest manufacturers of software and components,...
Jun 15, 2019 | Business, Data, data sharing, Data Storage, Databases, DNA, Law Enforcement, Legal, News, Open Source, Privacy, Radio Show, Radio_Show, Resources, Science, Security, Technology, Tracking
Technology and Databases have Murderers and Rapists Crying Foul Did you hear about how the Golden State Killer was finally apprehended? If you are not familiar with the story, the Golden State Killer spend ten years on a murderous spree carrying out at least 12...
Jun 1, 2019 | bluetooth, Cybersecurity, gadgets, hardware token, Laptops, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, WiFi
You know that I advise people to use 2FA. But Google’s token has a problem that might affect you. Just this week Google announced that their two-factor authentication FOB, called Titan, has a vulnerability that allows it to be hacked by anyone who is within 30...