Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Feb 22, 2021 | 5G, Announcements, App Store, Apple, Apps, Big Tech, Business, Cable Companies, Comcast, Comcast, Computers, Credentials, Critical data, Cryptocurrency, Cyber breaches, Cybercrime, Cybersecurity, data sharing, Drones, Drones, Executive Orders, Facebook, Facebook, Facial Recognition, Facial Recognition, False Positives, Government, Government, Hackers, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Internet Service Providers, Location Data, Machine Learning, Malware, Malware, Media, Microsoft, Nationstates, Navigation, Netflix, Netflix, News, Online, predictive algorithms, President Joe Biden, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Remote-Work, Security, Security, Show Notes, Social Media, Social Networking, Software Manufacturers, Streaming Entertainment, Surveillance, Technology, Technology, Third-Party, Tracking, Uncategorized, United States, Vulnerabilities, Warfare
Read. Learn. Share TECH TALK SHOW NOTES February 6, 2021 Drone Swarms Are Getting Too Fast For Humans To Fight, U.S. General Warns General John Murray, head of Army Futures Command, told a webinar audience at the Center for Strategic & International Studies that...
Jan 29, 2021 | Applications, Automation, Automotive, Big Tech, browsers, Chrome, Cloud, Cloud Jacking, Cyber breaches, Cybercrime, Cybersecurity, Data Aggregator, Data Brokers, DIA, Dragnet, Edge, GeoFence Warrants, Government, Hackers, Hacking, Hacks, Internet, Law Enforcement, Location Data, Malware, Nationstates, North Korea, Passwords, Privacy, Radio Show, Radio_Show, safety, Security, Security, Show Notes, Spyware, Technology, trojans
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
Mar 14, 2020 | Apple, Apple, Applications, Applications, Apps, Big Tech, Business, Congress, Court Challenges, Data, Data Assets, Data Records, data sharing, Data Storage, Databases, Dragnet, FBI, GeoFence Warrants, Google, Government, Internet, Legislation, Location Data, Radio Show, Radio_Show, Security, Security First, Technology
Have Your Phone — It Might Get You Questioned About A Crime! You come home from a long day at work and sit down at your computer to check your email to find an email from Google’s legal investigations support team informing you that local police were demanding...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Feb 22, 2020 | Applications, Applications, Best Practices, Big Tech, Business, Chrome Browser, Compliance, Cyber Liability, cyberattacks, Cybercrime, Employees, Extensions, Google, Google, Hacking, Internet, Location Data, Patching, Policies and Procedures, Radio Show, Radio_Show, records, Regulatory Compliance, Security, Security, Security Alerts, Technology, Threats, Tracking, Updates
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...