Apr 18, 2020 | Apple, Big Tech, Business, contact tracing, Covid-19, Epidemiology, Google, Internet, Mobile Phones, Pandemic, Phone, Public Health, Radio Show, Radio_Show, Security, Technology
Big Tech Contact Tracing – Antithetical to American Society The way that public health follows infection of a population is by tracing the contact of infected persons, and testing them is known as contact tracing. It is how epidemiologists aim to reduced...
Apr 4, 2020 | Applications, Attack Vectors, Business, Internet, Mobile, Mobile Phones, Phishing, Phone, Privacy, Radio Show, Radio_Show, Security, Technology, updates and patches
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so...
Apr 4, 2020 | Agencies, Big Tech, Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, FDA, Fines and Penalties, Government, Hacking, Mobile Phones, Monitoring, Monitoring, Pandemic, Patching, Privacy, Quarantine, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, social distancing, Technology, Technology, Tracking, Updates
Technology Empowers Pandemic Response, But Privacy Worries Remain In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules scuttled...
Mar 14, 2020 | App Store, Apple, Apps, Best Practices, Business, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iOS, Mobile, Mobile Phones, Privacy, Push Notification, Radio Show, Radio_Show, Security, Technology
Revised Apple Policy Rules for Apps in App Store Developers of apps distributed through the Apple App Store will be subject to a new set of guidelines and policies distributed this week. Some of these changes are controversial. Some of the revisions include mobile...
Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 8, 2020 | 5G, Attack Vectors, Best Practices, Business, Internet, IoT, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Tracking, Updates, updates and patches
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready? With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” — and it is creating a huge security challenge for businesses! A...