Mar 12, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Big Tech, Breaches, Business, China, Cybersecurity, DeepFake, Exchange Server, FLoC, Genealogy, Global Supply Chain, Google, Government, Government, Hacking, Impersonation, Internet, Malware, Microsoft, Microsoft, Mobile Phones, MyHeritage, Nationstates, News, North Korea, Patches, Patching, Radio Show, Radio_Show, Russia, Samsung, Security, Security, Security Alerts, Show Notes, Smart Phone, Social Media, Social Networking, Supply Chains, Technology, Tesla, Tesla, Third - Party, Third-Party, third-world, Threats, Tracking, Tracking, United States, Updates, vehicles, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes March 13, 2021 Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...
Feb 22, 2020 | applications, Applications, Automotive, Best Practices, Business, Cell Phone, Corporate Reputation, Ford, Hacking, Mobile, Patching, Phone, Phones, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Phone, Technology, Third - Party, Updates
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies. Automotive companies designed apps to assist their car owners to easily access some of the features of their automobiles. However, during the design process, they failed to...
Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Jan 25, 2020 | Apple, Apple, Best Practices, Big Tech, Business, FBI, Government, iOS, iPhone, Phone, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Smart Phone, Technology
Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to...
Jan 4, 2020 | Android, Android, anonymity, Asset Management, audit logs, Cell Phone, cell phones, Cellular Services, Censorship, College, College, Cybersecurity, Data Assets, data sharing, Education, iOS, iPhone, Mobile, Mobile Phones, Monitoring, Online, Phone, Privacy, Radio Show, Radio_Show, safety, Schools and Colleges, Security, Smart Phone, spying, Surveillance, Tracking
How is your Social Credit Score? It turns out that some American Universities use them to track their students. Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
Dec 7, 2019 | Business, Cell Phone, cell phones, Cellular Services, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iPhone, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Smart Phone, T-Mobile, Technology
Call 611 Now — Hackers Breach 1M Cellular Customers Cybercriminals will go after anyone who has an expolitable vulnerability. Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...
Page 1 of 11123...510...NEXT»Last »