Apr 30, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, CPU, Critical data, Cybercrime, Data, Databases, Emotet, FCC, Government, Hackers, Hacking, iMac, Internet, Laptops, Law Enforcement, Mac Pro, MacBook, Monitoring, News, Podcast, Police, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Security, Security, Security Alerts, Show Notes, Skyrocketing Ransoms, SpaceX, Starlink, Technology, Unsecured
Read. Learn. Share. Tech Talk Show Notes May 1, 2021 Lyft is getting out of the self-driving business Lyft has sold its self-driving division to a Toyota subsidiary called Woven Planet for $550 million—the latest sign that it takes deep pockets to compete in the...
Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Mar 19, 2021 | Amazon, Amazon platform, App Store, Apple, Apple, Apps, Artificial Intelligence, Attack Vectors, Backdoors, Best Practices, Big Tech, Breaches, browsers, Business, China, Computers, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Email, Encryption, Exchange Server, Exchange Server, Google, Google, Government, Government, Hackers, Hacking, hacking as a service, Hacks, Homeland Security, Information Technology, Infrastructure, Intellectual Property Theft, Internet, Law Enforcement, Legal, Machine Learning, Malware, Microsoft, Microsoft, Monitoring, Nationstates, Networking, News, Patches, Patching, Phishing, Podcast, predictive algorithms, Publishing, Radio Show, Radio_Show, Ransomware, Ransomware, Russia, Security, Security, Security Alerts, Security First, Show Notes, Software, Spyware, Tech Overlords, Technology, Technology, third-world, United States, Updates, Web Tools
Read. Learn. Share. Tech Talk Show Notes March 20, 2021 U.S. Unprepared for AI Competition with China, Commission Finds The National Security Commission on Artificial Intelligence is out with its comprehensive final report recommending a path forward for...
Feb 22, 2021 | 5G, Announcements, App Store, Apple, Apps, Big Tech, Business, Cable Companies, Comcast, Comcast, Computers, Credentials, Critical data, Cryptocurrency, Cyber breaches, Cybercrime, Cybersecurity, data sharing, Drones, Drones, Executive Orders, Facebook, Facebook, Facial Recognition, Facial Recognition, False Positives, Government, Government, Hackers, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Internet Service Providers, Location Data, Machine Learning, Malware, Malware, Media, Microsoft, Nationstates, Navigation, Netflix, Netflix, News, Online, predictive algorithms, President Joe Biden, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Remote-Work, Security, Security, Show Notes, Social Media, Social Networking, Software Manufacturers, Streaming Entertainment, Surveillance, Technology, Technology, Third-Party, Tracking, Uncategorized, United States, Vulnerabilities, Warfare
Read. Learn. Share TECH TALK SHOW NOTES February 6, 2021 Drone Swarms Are Getting Too Fast For Humans To Fight, U.S. General Warns General John Murray, head of Army Futures Command, told a webinar audience at the Center for Strategic & International Studies that...
Dec 25, 2020 | Agencies, Android, Apple, Apps, Backdoor, Backdoors, Best Practices, Big Tech, Business, CPU, cyberattacks, Cybercrime, Cybersecurity, FBI, Google, Google Play Store, Government, Hackers, Hacking, Hacking, Internet, Law Enforcement, Malicious Apps, Malware, Microsoft, Microsoft, Mobile, Nationstates, Networking, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Russia, Security, Security, Show Notes, Technology, third-world, VPN, VPN
Tech Talk Show Notes December 20 -26, 2020 Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Page 1 of 4123...NEXT»Last »