Kik is a private messenger app that enables its users to remain totally anonymous. This makes it appealing to teenagers and easy for predators to send pornography. This week we discuss the dangers associated with an app that only requires a use
Hackers exploited a vulnerability in Kaseya’s software on July 3, 2021 and deployed ransomware to 1,500 organizations. To make matters worse, it was revealed that Kaseya was made aware of the security flaw six years earlier in 2015. When a serv
Weak or stolen credentials are hackers go-to method in most attacks. This week we discuss Multi-Factor Authentication and why every organization should implement MFA to improve their security posture.In this episode we cover:• Multi-Factor Auth
On June 8, 2021 Amazon quietly launched its shared network called Sidewalk. This service creates a WiFi network using existing Ring and Echo devices that will share a portion of your internet bandwidth. The most frustrating part, unless users o
One of the primary security measures to protect your organization from cyber security attacks is software patching. This week we discuss best practices for patch management and some of the challenges companies face when it comes to protecting t
Instagram for Kids isn’t just a bad idea, it’s an awful idea. It’s also an easy target for online predators to create fictional profiles and socialize with kids. This week we discuss the difficulty with securing a platform that specifically tar
They say nothing in life is free. This week Adam gives a detailed breakdown of of his frustrating experience with Alexa while playing a free trivia game. We also discuss the frustration with microtransactions and the endless ways we are pepper
This week we discuss “tattleware” and how some employers are forcing their workers to download apps onto their phone to track their productivity. One of the biggest concerns is the employer rarely knows where this information is stored and how
Facebook recently announced a data leak which resulted in the exposure of 533 MILLION users mobile numbers. These users accounts were first put up for sale back in June of 2020. This week we discuss why it’s important to protect your phone numb
This episode we discuss wearable tech devices like the Me.Ring that claim to protect users from private companies who steal our personal data. While these devices have good intentions the reality is the best device to protect us from data minin
This week we discuss the lack of moderation in chat rooms with popular games like Among Us. The chat function is an open invitation for predators and unfortunately a lot of parents are unaware of what their kids are reading. In this episode we
This week we discuss which device scares us the most if hacked by bad actors. From smart cars to smart speakers, manufacturer’s want connected devices to become an essential to our daily lives. Are the constraints presented to us by life in the
When you sign up for a social media account, you agree to terms and conditions and if you violate those stipulations you can be suspended or even permanently removed from the sites altogether. This week we discuss if an entity like Facebook or
To pay or not to pay. Ransomware has grown into a billion dollar business and your company could be next. This week Adam and John dive into ransomware attacks and the dilemma with paying cyber criminals.In this episode we cover:• Ransomware• K
This week we deep dive into Internet-enabled crimes and scams. According to the FBI’s Internet Crime Complaint Center (IC3), last year had the highest dollar loss reported since the center was established. Individuals and organizations must re
This week we discuss screen time and internet addiction. The internet has some incredibly high utility and nutritious stuff on it. Unfortunately, there’s also a lot of zero-calorie garbage online and things that are really bad for you. In this
As we adopt more IoT devices, attach them to critical infrastructures and store sensitive data in them, we also have to wrestle with the problem of securing them.In this episode we cover:• IoT Devices• Internet Security• Hacks and Vulnerabilit
On this weeks show we discuss the recent petition filed by the American Civil Liberties Union and the Electronic Frontier Foundation with the Supreme Court over digital-privacy. In this episode we cover:• Cell Phone Privacy• Facial and Fingerti
John and Adam discuss the best hacker movies. Is Office Space actually a great hacker movie? Tune in to see which movie wins the top spot. In this episode we cover:• Hacker Movies• John doesn't like the Matrix• Felton likes the movie SwordFish
In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Many innocent people get caught in the crossfire when tech-savvy vigilantes wage a war on information. In this episode we discuss if tactics such as doxxing, defa
The first step in protecting a business is understanding key areas of weakness and convincing the decision makers to take action. Unfortunately, many organizations lack a high-level strategy for their cybersecurity needs. In this episode we cov
This week Adam and John discuss cyber security details for elected officials. Does Joe Biden have to change all his passwords again since he won the election?In this episode we cover: • Cyber Security• Password Protection• Email Protection• Tra
Adam and John discuss Third Party security and the risk involved with giving too much information when completing a transaction. In this episode we cover: • Third Party Risk Management• The beauty of a no-hassle transaction • Email Protection•
Adam and John discuss Zero Day Threats and the steps organizations can take to protect themselves.In this episode we cover: • Zero Day Threats• Mitigating your risk • The NY Jets are awful• Mike Tyson won!! Do you have a question on Cyber Secur
Adam and John discuss the dangers of using the same password for multiple social media accounts. In this episode we cover: • Why you shouldn’t trust Social Media with your photos• Using a Password Manager • What should you do if your account ha