Apr 2, 2021 | Access Controls, Anti-Spoofing, Bitcoin, Business, Cryptocurrency, Fairphone, Federal Reserve Notes, Government, Hacking, Malware, News, Personally Identifiable Information, Podcast, Qualcomm, Radio Show, Radio_Show, RDP, Security, Security Alerts, Semi-Conductor, Show Notes, SMS, Supply Chains, Technology, Tesla, Twitter, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 3, 2021 Teen who hacked Twitter accounts of Musk, Obama for Bitcoin gets 3 years in prison The hacker behind last year’s big Twitter hack has just been sentenced to hard-time. Graham Ivan Clark, the teenage hacker who...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
May 16, 2020 | Best Practices, Business, Cyber breaches, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacks, Internet, Radio Show, Radio_Show, Security, Security, Technology, WordPress
Cybercriminals Ramp-Up and Zero-In on WordPress Sites It is a new cyber target – WordPress. It is a popular website creation platform that powers almost a third of all websites on the internet. WordPress sites are under attack and the attempted attacks...
Apr 18, 2020 | Best Practices, Business, Computers, Expose Client Functions, File Deletion, Hewlett Packard, Radio Show, Radio_Show, Security, Security, Software, Software Manufacturers, Support Assistant Utility, Technology, Vulnerabilities
HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business? Turns out that their pre-installed Support Assistant Utility is quite insecure by design. It is capable of exposing 250 client functions and is filled with vulnerabilities...
Page 1 of 4123...NEXT»Last »