The Latest in Tech Today

Show Notes Dec 20 to Dec 26, 2020

Tech Talk Show Notes December 20 -26, 2020Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...

read more

Solarwinds Hack and its impact on business and home

SolarWinds Hack Craig Peterson: In case you didn't hear, we have had a massive hack. We're going to be talking about that and what it means to you. What it means to the federal government. What it means to organizations that are using SolarWinds. Oh my [00:00:24] Hi...

read more

Show Notes Nov. 29-Dec 5, 2020

Tech Talk Show Notes November 29 - December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It's the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable with...

read more
The Noose of Big Tech

The Noose of Big Tech

The Noose of Big TechNo longer our friends and allies now, it's official the tech giants are acting as the most powerful entities in the world. These tech giants have engulfed our freedom and are acting as controlling masters over our lives. We do what they say for...

read more
Cybercriminals Ramp-Up and Zero-In on WordPress Sites

Cybercriminals Ramp-Up and Zero-In on WordPress Sites

Cybercriminals Ramp-Up and Zero-In on Wordpress Sites  It is a new cyber target - WordPress. It is a popular website creation platform that powers almost a third of all websites on the internet. Wordpress sites are under attack and the attempted attacks against...

read more
Microsoft wants You to Use FIDO instead of Passwords

Microsoft wants You to Use FIDO instead of Passwords

Microsoft wants You to Use FIDO instead of Passwords Passwords are a security issue, but primarily the problem with passwords is human behavior. People choose an insecure password, reuse them on multiple sites, don’t change them, and share them with colleagues....

read more
Post-COVID Business Climate and the Change in Telecommuting

Post-COVID Business Climate and the Change in Telecommuting

Post-COVID Business Climate and the Change in TelecommutingAfter the pandemic, the way that businesses operate will be completely different. For many, they will now understand the importance of their Information technology and cybersecurity personnel. Companies will...

read more
Pandemic Hackers are Active – Be Aware

Pandemic Hackers are Active – Be Aware

Pandemic Hackers are Active - Be AwareCon artists, hackers, cybercriminals will use any excuse to create a plan for defrauding unsuspecting people. COVID-19 is no different, and it has created a swarm of scams related around this pandemic. It is time to open your eyes...

read more
Unique Ransomware Variants are Actively Propogating

Unique Ransomware Variants are Actively Propogating

Unique Ransomware Variants are Actively PropogatingRansomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called "Lockbit."...

read more
Backdoors in Apps Steal Your Senstive Data

Backdoors in Apps Steal Your Senstive Data

Backdoors in Apps Steal Your Senstive DataHackers will always find ways to distribute programs with backdoors. Enter the largest app store in the world, Google Play Store. We know that Google’s record of vetting apps on its app store is less than optimal. This lack of...

read more
BitTorrent and Pandemic:  A Match Made in Hacker Heaven

BitTorrent and Pandemic: A Match Made in Hacker Heaven

BitTorrent and Pandemic: A Match Made in Hacker HeavenThose who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...

read more
Terms of Service Violations are not Criminal Acts

Terms of Service Violations are not Criminal Acts

Terms of Service Violations are not Criminal ActsIn the United States, there is a law called the Computer Fraud and Abuse Act (CFAA), instilled to prevent hacking. With the advent of more regulatory information were are seeing on every website, terms of service, and...

read more
Intel No More: Apple Designs its Own Processors

Intel No More: Apple Designs its Own Processors

Intel No More: Apple Designs its Own ProcessorsCovid-19 spells the end for Intel (at least for Apple). Next year Apple will be using its own proprietary CPU's an GPU's in its products. They will be basing the design of these on their company developed chip in use in...

read more
Medical IoT Prone to Security Challenges

Medical IoT Prone to Security Challenges

 Medical IoT Prone to Security ChallengesHospitals are busy places, and anytime they can save time or make something more natural, they try to do so. Medical device companies are adding applications and creating real products to solve medical issues. Medical IoT...

read more
The Apple Exploit that Wasn’t

The Apple Exploit that Wasn’t

The Apple Exploit that Wasn’t“This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store icon...

read more
Who Is Falling for COVID-19 Scams…Lots of People

Who Is Falling for COVID-19 Scams…Lots of People

Who Is Falling for COVID-19 Scams...Lots of PeopleHackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel the...

read more

Malicious Insiders Monetize Their Knowlege Using Dark Web

Malicious Insiders Monetize Their Knowlege Using Dark WebHave you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...

read more

Collaboration Platforms Using AI to Help Remote Workers

Collaboration Platforms Using AI to Help Remote Workers With hundreds of thousands to millions of employees working from home during this pandemic, businesses are seeking ways to collaborate more manageable and with better efficiency. There are several platforms, some...

read more
Cryptojacking

Cryptojacking

CryptojackingHi. Craig Peterson here with a blink into Cryptojacking.   Has your Android phone been getting hot? I mean really hot.   Has the battery life on your smartphone all of a sudden dropped to almost nothing?   How about your desktop or laptop web browser. Is...

read more