The Latest in Tech Today
Convenience Gadgets – Design, Functionality then Security
Convenience Gadgets - Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Facebook’s Libra cryptocurrency loses all but one payment company
Facebook’s Libra Cryptocurrency Loses all but One Payment Company Cryptocurrency is a fool's game. It is not ready for primetime and is not an investment. No matter how many get into it, the infrastructure to support this new currency change is not yet under...
Fake iPhone Jailbreak Site leads to Advertising Click Fraud
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....
Protect your Anonymity is all about Layers
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
New Tools Keep CyberThieves From Disabling Your Cyber Protections
New Tools Keep CyberThieves From Disabling Your Cyber Protections Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Nation-State Cyber Theft May Cause US Aerospace Downfall
Nation-State Cybertheft May Cause US Aerospace Downfall Our government leaders have known for years about the industrial espionage conducted by China. It is at the expense of our American companies. They know of China’s goal to develop a colossal aerospace...
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication -- but it why? Most businesses who choose to use it -- decide to use the most insecure version of it. Hackers already know the...
Standing our Ground on Encryption – without it, we will lose all Privacy!
Standing our Ground on Encryption - without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally stored...
Bathroom Humor and High-End Executive Cars
Bathroom Humor and High-End Executive Cars Enough already with the Fart jokes! Said every father to his sons. I am not sure why boys get so much enjoyment from this topic, but now it is going a little far with the businessman Elon Musk adding a farting noise to the...
Problems You Never Knew Could Be Solved By Smart Devices
Problems You Never Knew Could Be Solved By Smart Devices How smart do you want your home to be? It seems like every day they come out with some new gadget that can connect to your network, in hopes of making your daily life more convenient. Some are useful and...
Popular VPNs Are Vulnerable To Exploit
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
More Than Three-Quarters of US Businesses Are CyberAtttack Targets
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
The Future Communication Means No Phones
The Future Communication Means No Phones Our world today is changing, and we are demanding convenience, efficiency, and speed in our transactional pursuits, and this might mean that smartphone you purchase or finance for the next five years might be unnecessary...
Maintaining Privacy Means Obfuscating Online Security Answers
Maintaining Privacy Means Obfuscating Online Security Answers Why does your neighbor next door list his home as Nairobi, Kenya? You know he not only does not live there and probably could not even locate it on a map. It is what is known as social media...
Sophisticated Email Attacks Against Businesses Are Up Exponentially
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...
Keeping Windows Safe Means Patching, Patching, Patching and More Patching
Keeping Windows Safe Means Patching, Patching, Patching and More Patching Just when you thought that you were safe from worms, malware, etc. here come the cybercriminals again. If you can believe it, they are still targeting exploits for which the manufacturer...
Popular Game Breaches Personally Identifiable Information of 218 Million People
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
‘Father of Identity Theft’ Gets 30 Years after being Convicted Of Mail Fraud, and Aggravated Identity Theft
'Father of Identity Theft' Gets 30 Years after being Convicted Of Mail Fraud, and Aggravated Identity Theft James Jackson refers to himself as the "Father of Identity Theft." He preyed upon the recently deceased and using their identities to take over...
Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products
Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus ProductsIt has been two years since a Binding Operational Directive was issued by the Department of Homeland Security to all Federal executive branch departments and agencies directing...
Google Play “Malware” Store — Poor App Management Platform
Google Play “Malware” Store -- Poor App Management PlatformIf you want to download apps for your smartphone or tablet, there are many choices. However, the two primary sources are the App Store, for Apple devices and the Google Play Store, also known as the Android...
Terminated Government Contractor Ends Up in Jail After Destroying IT System Resources
Terminated Government Contractor Ends Up in Jail After Destroying IT System Resources IT people are hard to come by and are getting harder to find. That goes for business and government alike. In late 2016 the government terminated a contract with an IT Systems...
Alexa, Now A Truly Useful Smart Assistant
Alexa, Now A Truly Useful Smart Assistant Smart assistants are being used widely in homes worldwide and Amazon is has a significant part of the market with more than 150 different products that feature Alexa capabilities. Alexa can control several smart...
You have got to experience Apple Maps’ new iOS 13 update
You have got to experience Apple Maps’ new iOS 13 update Do you want to let your loved ones or friends know when you will arrive? With the new features in Apple Maps, you can do just that. Apple is no longer the laughing stock of the digital cartography market...
FDA Approves New X-ray Technology System That Implements Machine Learning Algorithms
FDA Approves New X-ray Technology System That Implements Machine Learning Algorithms. Artificial Intelligence is coming to a hospital near you. Well, not exactly. What we have is machine learning, and it is a precursor to real artificial intelligence. Machine learning...
Insider Threats and DoD Response
Insider Threats and DoD Response Insider threats are a danger to every organization. While all threat actors have motives, insiders enjoy ideal means and opportunity. From the inside, they are in a much better position to carry out damaging activities....
Cybercriminals Target Veterans Looking for Civilian Employment
Cybercriminals Target Veterans Looking for Civilian EmploymentTaking advantage of anyone is unacceptable. However, when it targets our warriors who are seeking civilian employment at the end of their military service, I find it infuriating. Cybercriminals set up an...
Ransomware Storm Against Schools and School Districts
Ransomware Storm Against Schools and School DistrictsSchool Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...
Recycling Disks the Wrong Way can Bite you!
Recycling Disks the Wrong Way can Bite you! Recycling old technology is big business. Companies employ life cycle management for their IT hardware. Disposing of used servers, storage, and networking equipment on your own can be expensive and time-consuming and often...
Spearphishing Mobile Devices of Executives
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
“Technology Help” Cybercriminals Scam Seniors into Paying Thousands
“Technology Help” Cybercriminals Scam Seniors into Paying ThousandsComputers began during our seasoned citizens lifetime. They did not grow up with them, and this places them at a distinct disadvantage when it comes to their level of understanding. Senior citizens are...