Chinese Using Visas to Import Corporate Spies and Thieves
Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors. If you are not aware the Chinese...
They Look Cool But How Safe Are They?
They Look Cool but How Safe Are They?I have been warning about these embedded handles for a while. As you may know, I spent 10+ years as a volunteer advanced EMT where I responded to a number of accidents. Handles that completely fold inside the door are dangerous...
Is someone eavesdropping on your Smart Speaker?
Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything -- all the time. Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Watch This If You: Have Been Getting Unknown Calls or Texts; Noticed Your Phone is Getting Hot; Noticed Slowness on Your Smartphone; Need to Understand Social Engineering
Convenience Gadgets – Design, Functionality then Security
Convenience Gadgets - Design, Functionality then Security The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Facebook’s Libra cryptocurrency loses all but one payment company
Facebook’s Libra Cryptocurrency Loses all but One Payment Company Cryptocurrency is a fool's game. It is not ready for primetime and is not an investment. No matter how many get into it, the infrastructure to support this new currency change is not yet under...
Fake iPhone Jailbreak Site leads to Advertising Click Fraud
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....
Protect your Anonymity is all about Layers
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
New Tools Keep CyberThieves From Disabling Your Cyber Protections
New Tools Keep CyberThieves From Disabling Your Cyber Protections Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Nation-State Cyber Theft May Cause US Aerospace Downfall
Nation-State Cybertheft May Cause US Aerospace Downfall Our government leaders have known for years about the industrial espionage conducted by China. It is at the expense of our American companies. They know of China’s goal to develop a colossal aerospace...