Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Mar 12, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Big Tech, Breaches, Business, China, Cybersecurity, DeepFake, Exchange Server, FLoC, Genealogy, Global Supply Chain, Google, Government, Government, Hacking, Impersonation, Internet, Malware, Microsoft, Microsoft, Mobile Phones, MyHeritage, Nationstates, News, North Korea, Patches, Patching, Radio Show, Radio_Show, Russia, Samsung, Security, Security, Security Alerts, Show Notes, Smart Phone, Social Media, Social Networking, Supply Chains, Technology, Tesla, Tesla, Third - Party, Third-Party, third-world, Threats, Tracking, Tracking, United States, Updates, vehicles, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes March 13, 2021 Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...
Feb 22, 2021 | 5G, Announcements, App Store, Apple, Apps, Big Tech, Business, Cable Companies, Comcast, Comcast, Computers, Credentials, Critical data, Cryptocurrency, Cyber breaches, Cybercrime, Cybersecurity, data sharing, Drones, Drones, Executive Orders, Facebook, Facebook, Facial Recognition, Facial Recognition, False Positives, Government, Government, Hackers, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Internet Service Providers, Location Data, Machine Learning, Malware, Malware, Media, Microsoft, Nationstates, Navigation, Netflix, Netflix, News, Online, predictive algorithms, President Joe Biden, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Remote-Work, Security, Security, Show Notes, Social Media, Social Networking, Software Manufacturers, Streaming Entertainment, Surveillance, Technology, Technology, Third-Party, Tracking, Uncategorized, United States, Vulnerabilities, Warfare
Read. Learn. Share TECH TALK SHOW NOTES February 6, 2021 Drone Swarms Are Getting Too Fast For Humans To Fight, U.S. General Warns General John Murray, head of Army Futures Command, told a webinar audience at the Center for Strategic & International Studies that...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 22, 2020 | Applications, Applications, Best Practices, Big Tech, Business, Chrome Browser, Compliance, Cyber Liability, cyberattacks, Cybercrime, Employees, Extensions, Google, Google, Hacking, Internet, Location Data, Patching, Policies and Procedures, Radio Show, Radio_Show, records, Regulatory Compliance, Security, Security, Security Alerts, Technology, Threats, Tracking, Updates
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Page 1 of 5123...5...NEXT»Last »