Nov 12, 2023 | Business Email Compromise, Malware, Privacy, Ransomware, Zero-Day
Small businesses are big targets for hackers. That’s because they’re often seen as easy targets with limited budgets and resources when it comes to cybersecurity. And unfortunately, many small businesses fall victim to cyber-attacks every year. But...
Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Jan 15, 2021 | Amazon, anonymity, Apple, Applications, Apps, Artificial Intelligence, Big Tech, Business, CES, Consumer, Demonetize, Dragnet, Facebook, Facial Recognition, Fake News, False Positives, GeoFence Warrants, Google, Google, Google, Government, Hacking, Hacks, Internet Service Providers, Law Enforcement, Malware, Millennials, Mobile Phones, Show Notes, Social Media, Tech Overlords, Technology, Zero-Day
Tech Talk Show Notes January 10-16, 2021 WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app WhatsApp, the Facebook-owned messenger that claims to have privacy coded into its DNA, is giving its 2 billion-plus users an ultimatum: agree to...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Apr 4, 2020 | Access Controls, Attack Vectors, Business, Cybercrime, Cybersecurity, Government, Hackers, Internet, intrusion tactics, Malware, Mobile, Networking, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Remote-Work, Security, Technology, Technology, Vulnerabilities, Zero Trust, Zero-Day
Introducing Zero-Trust Access Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
Page 1 of 4123...NEXT»Last »