Mar 12, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Big Tech, Breaches, Business, China, Cybersecurity, DeepFake, Exchange Server, FLoC, Genealogy, Global Supply Chain, Google, Government, Government, Hacking, Impersonation, Internet, Malware, Microsoft, Microsoft, Mobile Phones, MyHeritage, Nationstates, News, North Korea, Patches, Patching, Radio Show, Radio_Show, Russia, Samsung, Security, Security, Security Alerts, Show Notes, Smart Phone, Social Media, Social Networking, Supply Chains, Technology, Tesla, Tesla, Third - Party, Third-Party, third-world, Threats, Tracking, Tracking, United States, Updates, vehicles, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes March 13, 2021 Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...
Apr 25, 2020 | Agencies, Biological Viruses, Business, China, Coronavirus, Covid-19, Cybercrime, Economic Disruption, Expose Client Functions, Government, industrial espionage, Internet, Malware, Monitoring, Monitoring, Privacy, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, Surveillance, Technology, Technology, trojans, Tyranny, Unsecured Devices
Thank you Coronavirus – Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace. It is not meant to curtail all economic activity of the society. With this pandemic,...
Apr 25, 2020 | Android, anonymity, Apple, Applications, apps, Big Tech, Biological Viruses, Business, contact tracing, Coronavirus, Covid-19, Covid-19, Epidemiology, Google, Government, Internet, Mobile, Mobile Phones, Monitoring, Monitoring, Pandemic, Privacy, privacy, Public Health, Quarantine, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Technology, Tracking
Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Jan 25, 2020 | Big Tech, Biometrics, Business, Data, Databases, Facial Recognition, Location Data, Monitoring, Privacy, Radio Show, Radio_Show, Security, Software, Software Manufacturers, Technology, Tracking
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me? What if I told you that the company that developed it was...
Page 1 of 6123...5...NEXT»Last »