Nov 30, 2019 | Attack Vectors, Best Practices, Business, iMessage, Internet, iPhone, Mobile, Phone, Privacy, Radio Show, Radio_Show, Security, Security, SMS, Technology, Text Messages, Threats
Privacy, Security and SMS How many times a day do you send text messages? Do you even think about security when you do so? Most people don’t consider that all information contained within them is not private. That means that your short messages might be read...
Nov 23, 2019 | Android, Android, AT&T, Big Tech, Business, Cell Phone, cell phones, Cellular Services, Google, Google, Internet, Jailbreak, Malware, Mobile, Mobile Phones, Operating Systems, Patching, Phone, Phones, Radio Show, Radio_Show, Security, Security Alerts, Smart Phone, T-Mobile, Technology, Updates, Verizon, Zero-Day
Reduce Vulnerabilities by Ditching Android Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...
Nov 23, 2019 | Android, Android, AT&T, Audio, Big Tech, Business, Cell Phone, cell phones, Cellular Services, Fines and Penalties, Internet, iOS, iPhone, Mobile, Networking, Patching, Phone, Radio Show, Radio_Show, Security Alerts, Smart Phone, Technology, Updates
Cellular Throttling and Why it cost AT&T a Chunk of Change We are all familiar with cell carriers and their different plans — some of which seem to change as fast as the weather in New England. All of them have some type of an ulimited plan —...
Nov 9, 2019 | Android, Android, Applications, Applications, applications, Biography, Business, Cars, Coding, Consumer, Hacking, Hacking, Hacks, Internet, iOS, iPhone, Mapping, Mobile, Mobile Phones, Navigation, Patches, Patching, Phone, Phones, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Phone, Software Manufacturers, Technology, Third-Party, Tracking, Travel, Updates, vehicles
Powerful Apps allow Control for…. Ever! Many companies are creating apps and they are powerful. They are convenient and offer ease of use to their product lines. However, they may not have concidered the implications when not used in the manner that they...
Nov 1, 2019 | Business, Computers, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, industrial espionage, Intellectual Property Theft, Privacy, Radio Show, Radio_Show, safety, Security, Security, spying, Technology, Tracking
Little Inexpensive Devices Can Remove Sensitive Data Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed. Well, these under $20 devices can be connected in computers...
Nov 1, 2019 | BBC, Big Tech, Business, Censorship, Government, Internet, Networking, News, Politics, Privacy, Radio Show, Radio_Show, safety, spying, Surveillance, Technology, Tracking
International News Hits the Dark Web Privacy is paramount, and it is one reason that the US government designed and implemented the TOR project. Now there is another reason, and that is preventing censorship of thought. That is the main reason that major...