Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Sep 21, 2019 | anonymity, Best Practices, browsers, Business, Hacking, Hacking, Internet, Nationstates, new browser, Organized Crime, Patents, Phishing, Radio Show, Radio_Show, Security, Security, Security Alerts, spying, Technology, Tracking, VPN, Web Tools
Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...
Sep 21, 2019 | Algorithms, anonymity, Banking, Banking, Bitcoin, Cryptocurrency, Cryptocurrency, Cybercrime, Dark Web, data sharing, Featured, Financial, Malware, Marketplace, Open Source, Organized Crime, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Technology, Valuations
Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...
Sep 21, 2019 | Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Dark Web, data sharing, Exploits, Financial, Hackers, Hacking, Hacking, Hacking, Hacking Tools, Internet, Malware, Malware, Marketplace, Organized Crime, Radio Show, Radio_Show, Utilities, Zero-Day
You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Sep 14, 2019 | Big Tech, Business, Computers, Data, data sharing, Financial, Fines and Penalties, Google, Google, Google, Law Enforcement, Legal, Liability, Radio Show, Radio_Show, Regulation, Security, Software, Software Manufacturers, Technology, Valuations
No More Hiding -Google’s Tactics Under Scrutiny On Monday, 50 attorneys general from US states and territories signed onto an antitrust investigation into Google, placing even more pressure on the major tech firm that is already facing intense scrutiny over its...
Sep 14, 2019 | 5G, Android, Android, Best Practices, Cell Phone, cell phones, Cellular Services, Consumer, Cybersecurity, Data, Internet, iOS, IoT, iPhone, Legal, Mobile, Mobile Phones, Networking, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Surveillance, Technology, WiFi
Security Demands Up With 5G Zhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...