Nov 16, 2019 | Anti-Virus, Anti-Virus, Applications, Best Practices, Business, Consumer, Cyber breaches, Cybercrime, Cybersecurity, Data, Hackers, Hacking, McAfee, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Updates, Vulnerabilities, Zero-Day
Vulnerability in Popular Anti-Virus Program McAfee anti-virus software has a very serious vulnerability in its code execution. No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...
Nov 16, 2019 | Business, Business Email Compromise, credential stealing, cyberattacks, Cybercrime, Cybersecurity, Email, Hackers, Hacking, Hacking, Identity Theft, Organized Crime, Phishing, Phishing, Radio Show, Radio_Show, Security, third-world
Bots Losing Panache as Cybercriminals Hire In Third World As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Nov 16, 2019 | Artificial Intelligence, automation, DOD, Future Workforce, Government, Machine Learning, Military, Politics, Projects, Radio Show, Radio_Show, Research, Robotics, safety, Science, Security, Technology, vehicles, Virtual Reality, Warfare, wearables
Future Defense and Military Tech Warfare is changing which means that the way we fight and the weapons we use will need to change. Much of the technology that we enjoy and use everyday, initially came from technology developed by and for the military and for space...
Nov 16, 2019 | 2FA, Best Practices, Business, Computers, credentials, Cyber breaches, cyberattacks, Cybersecurity, Employees, Employees, Hacking, Hacking, hardware token, Internet, Laptops, Malware, MFA, Phishing, Radio Show, Radio_Show, Security, Security, Technology
Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems? They use many tactics but on of the easiest is through the use of compromised credentials. The problems is that these are real valid credentials...
Nov 9, 2019 | Best Practices, Business, Computer Repair, Contractors, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Internet, IT Professional, Psychology, Radio Show, Radio_Show, Security, Security, Stress, Technology
Job Dissatisfaction is prominent among IT Security Professionals Many Cybersecurity professionals love a challenge. They do not enjoy the doldrums of make work security. They long for excitement and challenging work. They are in demand so it is not suprising...
Nov 9, 2019 | Applications, Artificial Intelligence, Audit Logs, Best Practices, Business, credentials, Cyber breaches, cyberattacks, Cybercrime, CyberTraining, data sharing, Data Storage, Databases, Employees, Employees, Firewalls, Firewalls, Hackers, Hacking, Hacking, Hacks, Hard Disks, Intellectual Property Theft, Laptops, Liability, Malware, Malware, Networking, Networking, Patching, Radio Show, Radio_Show, Ransomware, Routers, Security, Security, Security Alerts, segmentation, Software As A Service, Switches, Technology, Updates
Cyberbreaches cause Small Businesses to Close Cybercriminals have found a lucrative new target – the small business. Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....