Aug 3, 2019 | automation, bluetooth, Home, Infosec, IoT, Radio Show, Radio_Show, Security, Security, Smart Home, Technology
Smart Home Devices Leak Private Information A publicly accessible ElasticSearch cluster owned by Orvibo, a Chinese smart home solutions provider, leaked more than two billion user logs containing sensitive data of customers from countries all over the world....
Aug 3, 2019 | Artificial Intelligence, automation, Health, Privacy, Radio Show, Radio_Show, Science
AI in Medicine and its Drawbacks Each year, one out of every five patients admitted to a hospital in the United States for serious care develops acute kidney injury. For a variety of reasons, these patients’ kidneys suddenly stop functioning normally and become unable...
Aug 3, 2019 | Cybercrime, Cybersecurity, Hackers, Radio Show, Radio_Show, Ransomware, Security
Cybercrime costs are Rising The costs of cybercrime are extremely high these days. This year we’ve seen how a church lost $1.75 million in a BEC scam; two cities in Florida paid ransoms totaling over a million dollars after ransomware attacks; and British Airways had...
Aug 3, 2019 | Children, Cybercrime, Databases, Education, Hackers, Hacking, Radio Show, Radio_Show, School Districts, Technology
Hackers Stick a Bullseye on Schools and School Districts Some hackers demand ransom; others sweep up personal data for sale to identity thieves. But whatever hackers’ motives, school systems around the country have been the targets of their cyberattacks. One attack...
Aug 3, 2019 | Best Practices, Business, Cybercrime, Data Storage, Hacking, Hacking, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, storage, Technology
Storing your Password in Plaintext…Say What???? Stock trading company Robinhood has admitted to storing passwords of some of its users in plaintext. The California-based firm said that it came across this security lapse on Monday this week. In an email,...
Aug 3, 2019 | Best Practices, Business, CEO, Cloud Vendors, Computers, CyberTraining, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.” To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...