The Latest in Tech Today
Tech Talk Show Notes February 13, 2021
Read. Learn. Share Tech Talk Show Notes February 13. 2021Strengthening Zero Trust Architecture The invention of the term "Zero Trust" is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although it's not new, the concept has...
Online Trading – Staying Safe
Using Online Trading Apps Safely Chris Ryan: There's been a lot of discussion about, online trading and, getting involved with different aspects of trading outside the traditional methods. [00:00:10] I'm curious as to what you think of that from a safety perspective,...
Tech Talk Show Notes January 24 – 30, 2021
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there's a new danger in town: cloud jacking. The...
The Best Way to Prevent a Hack – Solarwinds, the Russians, and What You Can Do About It
Craig Peterson: Well, it's looking more and more like those Russian hackers are behind the massive SolarWinds cyber attacks. Hackers use it to compromise many U. S. Government agencies ' networks. Some of the most sensitive agencies you can think of, including the...
Show Notes January 10 – 16, 2021
Tech Talk Show Notes January 10-16, 2021WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app WhatsApp, the Facebook-owned messenger that claims to have privacy coded into its DNA, is giving its 2 billion-plus users an ultimatum: agree to...
Show Notes January 3 – 9, 2021
Tech Talk Show Notes January 3-9, 2021 DDoS Attacks Spiked, Became More Complex in 2020 The large-scale shift to remote work and the increased reliance on online services as the result of the global pandemic this year gave threat actors new opportunities to use...
Show Notes Dec 27, 2020 to Jan 2, 2021
Tech Talk Show Notes December 27, 2020 - January 2, 2021 Mozilla praises Apple anti-tracking privacy features in iOS 14 Mozilla, the organization that maintains Firefox and other open source projects, has launched a new campaign in support of a suite of privacy...
Show Notes Dec 20 to Dec 26, 2020
Tech Talk Show Notes December 20 -26, 2020Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Solarwinds Hack and its impact on business and home
SolarWinds Hack Craig Peterson: In case you didn't hear, we have had a massive hack. We're going to be talking about that and what it means to you. What it means to the federal government. What it means to organizations that are using SolarWinds. Oh my [00:00:24] Hi...
The H1-B Provision of Immigration Law Strikes Again
Tens of Thousands Laid Off - Now What? Amidst recent layoffs at tech giants such as Amazon, Meta, and Salesforce, US immigrants holding H1-B visas for specialized skills have been brutally hit. These visas, which are in high demand among large tech companies, allow...
Show Notes Nov. 29-Dec 5, 2020
Tech Talk Show Notes November 29 - December 5, 2020Gaming Over the Holidays? 7 Important Security Tips It's the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable with...
Surveilling Employees: Management use Webcams to Enforce Remote Workers
Suveilling Employees: Management use Webcams to Enforce Remote Workers This pandemic has changed the model under which businesses operate. Some businesses shuttered their doors, others sent employees home with to work, and others tried to re-create an office on-line...
The Noose of Big Tech
The Noose of Big TechNo longer our friends and allies now, it's official the tech giants are acting as the most powerful entities in the world. These tech giants have engulfed our freedom and are acting as controlling masters over our lives. We do what they say for...
Cybercriminals Ramp-Up and Zero-In on WordPress Sites
Cybercriminals Ramp-Up and Zero-In on Wordpress Sites It is a new cyber target - WordPress. It is a popular website creation platform that powers almost a third of all websites on the internet. Wordpress sites are under attack and the attempted attacks against...
Encryption Wars: Collaboration Services Acquire to Compete for Marketshare
Encryption Wars: Collaboration Services Acquire to Compete for MarketshareThe pandemic laid bare the vulnerabilities are some popular business collaboration platforms. Usage of these platforms surged during the coronavirus pandemic as more businesses began to rely...
Wink is Short on Cash: Smart Hub Users Notified Pay Up or Lose Access
Wink is Short on Cash: Smart Hub Users Notified Pay Up or Lose AccessWhen businesses get short on cash, they only have a couple of solutions. It happened to a Worcester, MA cable smart home alarm system early this year and has happened recently to another smart-home...
Microsoft wants You to Use FIDO instead of Passwords
Microsoft wants You to Use FIDO instead of Passwords Passwords are a security issue, but primarily the problem with passwords is human behavior. People choose an insecure password, reuse them on multiple sites, don’t change them, and share them with colleagues....
Cybersecurity Focus moves from Data Center to Clouds and Endpoints with the advent of Corporate telecommuting.
Cybersecurity Focus moves from Data Center to Clouds and Endpoints with the advent of Corporate telecommuting.One thing this pandemic has unveiled is that cybersecurity does begin and end in the data center. Technology has enabled the spread of multiple devices, both...
Internet Backbone Holding its Own with Increase of Remote Work and Virtual Schooling
Internet Backbone Holding its Own with Increase of Remote Work and Virtual SchoolingStay at home orders have forced a majority of the US population home to work and educate their children. That means a lot of time being spent on the internet, working, learning, and...
Calling Future Engineers – Dyson Provides Free Experiments for Kids
Calling Future Engineers - Dyson Provides Free Experiments for KidsEngineers at Dyson, along with the James Dyson Foundation has created and released engineering and science experiments for you to use. It is a free set of 44 different creative learning projects that...
Post-COVID Business Climate and the Change in Telecommuting
Post-COVID Business Climate and the Change in TelecommutingAfter the pandemic, the way that businesses operate will be completely different. For many, they will now understand the importance of their Information technology and cybersecurity personnel. Companies will...
Pandemic Hackers are Active – Be Aware
Pandemic Hackers are Active - Be AwareCon artists, hackers, cybercriminals will use any excuse to create a plan for defrauding unsuspecting people. COVID-19 is no different, and it has created a swarm of scams related around this pandemic. It is time to open your eyes...
Executive Order Protects US Power Grid from Nation-State Hackers
Executive Order Protects US Power Grid from Nation-State HackersUnited States companies must manufacture all equipment connected to the US power grid, according to an executive order issued by the President this week. This executive order will protect our electrical...
The Diminished Necessity for Office Real Estate for Post-COVID Businesses
The Diminished Necessity for Office Real Estate for Post-COVID BusinessesFor a majority of the population, this pandemic introduced a massive change in the way we work. Telecommuting previously frowned upon by executives is now commonplace. Although not planned, the...
Credential Security is Essential when using Collaboration Platforms
Credential Security is Essential when using Collaboration Platforms Microsoft teams gained popularity as a collaboration platform to use as you telecommute to the office during this pandemic. As part of this platform, Teams utilize some automated notifications. Well,...
Unique Ransomware Variants are Actively Propogating
Unique Ransomware Variants are Actively PropogatingRansomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called "Lockbit."...
Backdoors in Apps Steal Your Senstive Data
Backdoors in Apps Steal Your Senstive DataHackers will always find ways to distribute programs with backdoors. Enter the largest app store in the world, Google Play Store. We know that Google’s record of vetting apps on its app store is less than optimal. This lack of...
BitTorrent and Pandemic: A Match Made in Hacker Heaven
BitTorrent and Pandemic: A Match Made in Hacker HeavenThose who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...
Terms of Service Violations are not Criminal Acts
Terms of Service Violations are not Criminal ActsIn the United States, there is a law called the Computer Fraud and Abuse Act (CFAA), instilled to prevent hacking. With the advent of more regulatory information were are seeing on every website, terms of service, and...
Intel No More: Apple Designs its Own Processors
Intel No More: Apple Designs its Own ProcessorsCovid-19 spells the end for Intel (at least for Apple). Next year Apple will be using its own proprietary CPU's an GPU's in its products. They will be basing the design of these on their company developed chip in use in...