Sep 14, 2019 | 5G, Android, Android, Best Practices, Cell Phone, cell phones, Cellular Services, Consumer, Cybersecurity, Data, Internet, iOS, IoT, iPhone, Legal, Mobile, Mobile Phones, Networking, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Surveillance, Technology, WiFi
Security Demands Up With 5G Zhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...
Sep 14, 2019 | Apple, Business, cell phones, Computers, iOS, Marketing, Mobile Phones, Phones, Radio Show, Radio_Show, Siri, Tablet, Technology
Are you ready? — Apple’s Product Announcement Apple’s big hardware event for 2019 has wrapped, and, as expected, it brought a bounty of exciting announcements. Of course, the iPhone 11 happened — and, yes, a version is really called the iPhone 11 Pro Max —...
Sep 7, 2019 | Automotive, Computers, Consumer, Liability, Monitoring, Navigation, Radio Show, Radio_Show, Security, Software, spying, Surveillance, Technology, Tracking, vehicles
Do You Own A Car That Spies On You? The secret sensors, fitted to all new and used motors sold by the firm’s dealers, pinpoint the vehicle’s exact location. The firm sold more than 170,000 new cars in Britain alone last year. Mercedes will not say how long it has used...
Sep 7, 2019 | Applications, Best Practices, Big Tech, Business, Consumer, Cybercrime, Cybersecurity, Data, data sharing, Employee Training, Facebook, Facebook, Google, Hacking, LinkedIn, LinkedIn, Radio Show, Radio_Show, Resources, Security, Social Media, Social Networking, Software, Software As A Service, storage, Technology, Web Tools
Companies Sharing Your Data with Their Third-Party Vendors It seems that every day there’s another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on...
Sep 7, 2019 | Business, Computers, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Home, Malware, Malware, Networking, Networking, Passwords, Radio Show, Radio_Show, Routers, Security, Security Alerts, Technology, WiFi
Security Protections Badly Needed On Routers New testing by Consumer Reports shows important differences in how routers from popular brands handle digital security. Some of the 29 routers we examined this spring and summer build in important safeguards, such as...
Sep 7, 2019 | Best Practices, Business, Computers, Cybersecurity, Data Storage, Hacking, Hacking, Hard Disks, Liability, Privacy, Radio Show, Radio_Show, Repair, Security, Security, Security Alerts, storage, Technology
Has New Storage Tech Made It Impossible To Securely Erase Old Hard Disks In the olden days, when you wanted to replace your hard drive with a bigger one, you’d run a “secure erase” on it to completely remove any personal data. This would write zeros to the entire...