Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data

Little Inexpensive Devices Can Remove Sensitive Data   Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed.  Well, these under $20 devices can be connected in computers...
When Businesses Are Required to Capitulate to Chinese Society

When Businesses Are Required to Capitulate to Chinese Society

When Businesses Are Required to Capitulate to Chinese Society   China is forcing companies to deliver content that is not culturally acceptable to Chinese society. Many companies and organizations are capitulating with these requirements to do business in China....
Google Play “Malware” Store — Poor App Management Platform

Google Play “Malware” Store — Poor App Management Platform

Google Play “Malware” Store — Poor App Management Platform If you want to download apps for your smartphone or tablet, there are many choices. However, the two primary sources are the App Store, for Apple devices and the Google Play Store, also known as the...
Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....