Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen

Online Voting is a Disaster waiting to Happen   If it is connected it can be hacked.  The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Technology idea that started 50 years ago but we rely on today

Technology idea that started 50 years ago but we rely on today

Technology idea that started 50 years ago but we rely on today   It has taken 50 years to bring the network we know today as the internet to this point.  In October 1969 the Advanced Research Projects Agency designed a network that research investigators could...
Popular VPNs Are Vulnerable To Exploit

Popular VPNs Are Vulnerable To Exploit

Popular VPNs Are Vulnerable To Exploit   Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks

Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks

Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...
Security Demands Up With 5G

Security Demands Up With 5G

Security Demands Up With 5G Zhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...