Tech Talk Show Notes – March 13, 2021

Tech Talk Show Notes – March 13, 2021

Read. Learn. Share. Tech Talk Show Notes March 13, 2021   Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies.

Automotive Apps originally designed for Personal Owners cause headaches for rental agencies.

Automotive Apps originally designed for Personal Owners cause headaches for rental agencies. Automotive companies designed apps to assist their car owners to easily access some of the features of their automobiles.  However, during the design process, they failed to...
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack

Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring?  Did you do your due diligence?  I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince.    ...

Security First, Apple Stands Ground on iPhone Encryption

Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private.  To do that they use a proprietary encryption system. While there have been private companies who have tried to...

How is your Social Credit Score? It turns out that some American Universities use them to track their students.

How is your Social Credit Score? It turns out that some American Universities use them to track their students. Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
Call 611 Now — Hackers Breach 1M Cellular Customers

Call 611 Now — Hackers Breach 1M Cellular Customers

Call 611 Now — Hackers Breach 1M Cellular Customers   Cybercriminals will go after anyone who has an expolitable vulnerability.  Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...