Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Mar 22, 2017 | Business, Daily, Government, Security
So what CAN you take carry on to a plane? As governments ban gadgets over ISIS plot to down jets we look at the rules over what is and isn’t allowed The ban, which will be phased in over the coming days, will affect travellers on direct flights to the UK from...
Dec 24, 2016 | Radio Show
Saudi Arabia Has Just Suffered a Series of Major Cyber Hack Attacks State-sponsored hackers have conducted a series of destructive attacks on Saudi Arabia over the last two weeks, erasing data and wreaking havoc in the computer banks of the agency running the...