The Latest in Tech Today

Protect your Anonymity is all about Layers

Protect your Anonymity is all about Layers

Protect your Anonymity is all about Layers   The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...

read more
Bathroom Humor and High-End Executive Cars

Bathroom Humor and High-End Executive Cars

Bathroom Humor and High-End Executive Cars Enough already with the Fart jokes! Said every father to his sons. I am not sure why boys get so much enjoyment from this topic, but now it is going a little far with the businessman Elon Musk adding a farting noise to the...

read more

Problems You Never Knew Could Be Solved By Smart Devices

Problems You Never Knew Could Be Solved By Smart Devices   How smart do you want your home to be? It seems like every day they come out with some new gadget that can connect to your network, in hopes of making your daily life more convenient.  Some are useful and...

read more
Popular VPNs Are Vulnerable To Exploit

Popular VPNs Are Vulnerable To Exploit

Popular VPNs Are Vulnerable To Exploit   Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...

read more
The Future Communication Means No Phones

The Future Communication Means No Phones

The Future Communication Means No Phones   Our world today is changing, and we are demanding convenience, efficiency, and speed in our transactional pursuits, and this might mean that smartphone you purchase or finance for the next five years might be unnecessary...

read more
Alexa, Now A Truly Useful Smart Assistant

Alexa, Now A Truly Useful Smart Assistant

Alexa, Now A Truly Useful Smart Assistant   Smart assistants are being used widely in homes worldwide and Amazon is has a significant part of the market with more than 150 different products that feature Alexa capabilities.  Alexa can control several smart...

read more
Insider Threats and DoD Response

Insider Threats and DoD Response

Insider Threats and DoD Response   Insider threats are a danger to every organization. While all threat actors have motives, insiders enjoy ideal means and opportunity. From the inside, they are in a much better position to carry out damaging activities....

read more
Ransomware Storm Against Schools and School Districts

Ransomware Storm Against Schools and School Districts

Ransomware Storm Against Schools and School DistrictsSchool Districts, Schools and Colleges across the country are under a ransomware attack.  These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...

read more
Recycling Disks the Wrong Way can Bite you!

Recycling Disks the Wrong Way can Bite you!

Recycling Disks the Wrong Way can Bite you! ​Recycling old technology is big business. Companies employ life cycle management for their IT hardware. Disposing of used servers, storage, and networking equipment on your own can be expensive and time-consuming and often...

read more
Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...

read more