Nov 1, 2019 | Business, Computers, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, industrial espionage, Intellectual Property Theft, Privacy, Radio Show, Radio_Show, safety, Security, Security, spying, Technology, Tracking
Little Inexpensive Devices Can Remove Sensitive Data Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed. Well, these under $20 devices can be connected in computers...
Nov 1, 2019 | BBC, Big Tech, Business, Censorship, Government, Internet, Networking, News, Politics, Privacy, Radio Show, Radio_Show, safety, spying, Surveillance, Technology, Tracking
International News Hits the Dark Web Privacy is paramount, and it is one reason that the US government designed and implemented the TOR project. Now there is another reason, and that is preventing censorship of thought. That is the main reason that major...
Nov 1, 2019 | Big Tech, Business, China, Code-Breaking, Cyberbullying, Government, industrial espionage, Intellectual Property Theft, Internet, Nationstates, Radio Show, Radio_Show, Regulation, spying, Surveillance, Technology, Tracking
When Businesses Are Required to Capitulate to Chinese Society China is forcing companies to deliver content that is not culturally acceptable to Chinese society. Many companies and organizations are capitulating with these requirements to do business in China....
Oct 5, 2019 | Advertising, Android, Android, Exploits, Google, Google, Hacking, iPad, Malware, Mobile, Organized Crime, Radio Show, Radio_Show, Smart Phone, Software Manufacturers, Tablet, Technology, Tracking
Google Play “Malware” Store — Poor App Management Platform If you want to download apps for your smartphone or tablet, there are many choices. However, the two primary sources are the App Store, for Apple devices and the Google Play Store, also known as the...
Sep 21, 2019 | Android, Android, Business, Cell Phone, cell phones, Cellular Services, iOS, iPhone, Mobile, Mobile Phones, Passwords, Phone, Phones, Privacy, Radio Show, Radio_Show, scam, Security, Security Alerts, Smart Phone, T-Mobile, Technology
Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Sep 21, 2019 | Amazon, anonymity, Apple, Big Tech, Business, Consumer, Data, Google, Microsoft, Monitoring, Patents, Privacy, Radio Show, Radio_Show, spying, Surveillance, Technology, Tracking, Tracking
Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....