Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors.  If you are not aware the Chinese...

They Look Cool But How Safe Are They?

They Look Cool But How Safe Are They?

They Look Cool but How Safe Are They?I have been warning about these embedded handles for a while.  As you may know, I spent 10+ years as a volunteer advanced EMT where I responded to a number of accidents.  Handles that completely fold inside the door are dangerous...

Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything -- all the time.  Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets - Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....

Fake iPhone Jailbreak Site leads to Advertising Click Fraud

Fake iPhone Jailbreak Site leads to Advertising Click Fraud

Fake iPhone Jailbreak Site leads to Advertising Click Fraud   Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....

Protect your Anonymity is all about Layers

Protect your Anonymity is all about Layers

Protect your Anonymity is all about Layers   The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...

Nation-State Cyber Theft May Cause US Aerospace Downfall

Nation-State Cyber Theft May Cause US Aerospace Downfall

Nation-State Cybertheft May Cause US Aerospace Downfall   Our government leaders have known for years about the industrial espionage conducted by China. It is at the expense of our American companies. They know of China’s goal to develop a colossal aerospace...