Dec 25, 2020 | Agencies, Android, Apple, Apps, Backdoor, Backdoors, Best Practices, Big Tech, Business, CPU, cyberattacks, Cybercrime, Cybersecurity, FBI, Google, Google Play Store, Government, Hackers, Hacking, Hacking, Internet, Law Enforcement, Malicious Apps, Malware, Microsoft, Microsoft, Mobile, Nationstates, Networking, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Russia, Security, Security, Show Notes, Technology, third-world, VPN, VPN
Tech Talk Show Notes December 20 -26, 2020 Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Feb 8, 2020 | Applications, Audit Logs, Business, CEO, Cloud, Compliance, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Databases, Disaster Recovery, Executives, Foreign Currency Exchange, Hackers, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Technology
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Sep 28, 2019 | Best Practices, Bitcoin, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Malware, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Ransomware Attack, Schools and Colleges, Security, Security
Ransomware Storm Against Schools and School Districts School Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...
Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Sep 21, 2019 | Algorithms, anonymity, Banking, Banking, Bitcoin, Cryptocurrency, Cryptocurrency, Cybercrime, Dark Web, data sharing, Featured, Financial, Malware, Marketplace, Open Source, Organized Crime, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Technology, Valuations
Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...