Sep 21, 2019 | Android, Android, Business, Cell Phone, cell phones, Cellular Services, iOS, iPhone, Mobile, Mobile Phones, Passwords, Phone, Phones, Privacy, Radio Show, Radio_Show, scam, Security, Security Alerts, Smart Phone, T-Mobile, Technology
Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Sep 21, 2019 | Amazon, anonymity, Apple, Big Tech, Business, Consumer, Data, Google, Microsoft, Monitoring, Patents, Privacy, Radio Show, Radio_Show, spying, Surveillance, Technology, Tracking, Tracking
Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....
Sep 14, 2019 | apps, Best Practices, Big Tech, Business, Cloud, Cyber breaches, Cybersecurity, Data, data sharing, Data Storage, Health, Legal, Liability, Privacy, privacy, Radio Show, Radio_Show, Security, Security, Security, Software, storage, Technology, Tracking
HIPAA Can’t Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...
Sep 7, 2019 | Best Practices, Business, Computers, Cybersecurity, Data Storage, Hacking, Hacking, Hard Disks, Liability, Privacy, Radio Show, Radio_Show, Repair, Security, Security, Security Alerts, storage, Technology
Has New Storage Tech Made It Impossible To Securely Erase Old Hard Disks In the olden days, when you wanted to replace your hard drive with a bigger one, you’d run a “secure erase” on it to completely remove any personal data. This would write zeros to the entire...
Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 24, 2019 | Best Practices, Business, CEO, Computers, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Surveillance
Employee Privacy vs Network Security: The Matchup PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...