Mar 26, 2021 | Agencies, anonymity, Apple, Attack Vectors, Automotive, Backdoors, Best Practices, Big Tech, Bitcoin, Business, Business Email Compromise, Cars, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Dark Web, Data Brokers, Databases, DeepFake, Encryption, FBI, Financial, FTC, Government, Government, Hackers, Hacking, Hacking, Hacks, Homeland Security, Infrastructure, Internet, IoT, Location Data, Mac Pro, MacBook, Malware, MFA, Nationstates, News, Patching, Podcast, Radio Show, Radio_Show, Ransomware, Ransomware, Risks, Security, Security, Security Alerts, Show Notes, spying, Technology, Threats, Tracking, United States, Unsecured, Updates, vehicles, Vulnerabilities, Zero Trust, Zero-Day, Zero-Day
Read. Learn. Share Tech Talk Show Notes March 27, 2021 Intel hires Justin Long to mock Macs in a throwback to 2000s “I’m a Mac” ads Chipmaker Intel has produced a series of ads mocking Apple’s M1 Macs, and it brought on actor Justin Long—famous for his role in...
Mar 19, 2021 | Amazon, Amazon platform, App Store, Apple, Apple, Apps, Artificial Intelligence, Attack Vectors, Backdoors, Best Practices, Big Tech, Breaches, browsers, Business, China, Computers, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Email, Encryption, Exchange Server, Exchange Server, Google, Google, Government, Government, Hackers, Hacking, hacking as a service, Hacks, Homeland Security, Information Technology, Infrastructure, Intellectual Property Theft, Internet, Law Enforcement, Legal, Machine Learning, Malware, Microsoft, Microsoft, Monitoring, Nationstates, Networking, News, Patches, Patching, Phishing, Podcast, predictive algorithms, Publishing, Radio Show, Radio_Show, Ransomware, Ransomware, Russia, Security, Security, Security Alerts, Security First, Show Notes, Software, Spyware, Tech Overlords, Technology, Technology, third-world, United States, Updates, Web Tools
Read. Learn. Share. Tech Talk Show Notes March 20, 2021 U.S. Unprepared for AI Competition with China, Commission Finds The National Security Commission on Artificial Intelligence is out with its comprehensive final report recommending a path forward for...
May 9, 2020 | Apps, Backdoors, Business, Internet, Radio Show, Radio_Show, Security, Technology
Backdoors in Apps Steal Your Senstive Data Hackers will always find ways to distribute programs with backdoors. Enter the largest app store in the world, Google Play Store. We know that Google’s record of vetting apps on its app store is less than optimal. This lack...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Aug 18, 2019 | automation, Business, China, Hackers, Hacking, Hacking, Infosec, Internet, IoT, Malware, Monitoring, Nationstates, Privacy, Radio Show, Radio_Show, Russia, Security, Surveillance
IoT – Putting our Business Networks and Security at Risk IoT – Putting our Networks and Security at Risk Just take a look at any website or catalog, and you will see the availability of hundreds to thousands of connected devices touted to make your...