Breakfast Bytes: All About Malvertising
Breakfast Bytes
Breakfast Bytes: Kill switch legislation for smartphones now in effect
2014 Verizon Data Breach overview
Website hosting issues explained
Three different types of website hosting are explained
Templatized website hosting explained
Accompanying article: Website Hosting Issues
Today's program with Felicia King. What do you do with that old XP computer? XP end of life April 8, 2014 You must be using a fully patched system when browsing the internet.
Breakfast Bytes with Felicia King: Multiple topics. XP Computers: What to do with them? Linux vs. Apple vs. Windows.
Felicia begins her discussion of the ongoing issues regarding the huge security breach and hacking of personal accounts at Target stores.
Breakfast Bytes. Yahoo advertisement malware breach; Why you must block ads; The future of bitcoin mining; Crytoblocker payout; JAVA is still #1 attack vector; FIREFOX blocks the loading in of out-dated plug-ins.
Exercising while using your computer: Treadmill Desk; http://www.lifespanfitness.com/tr1200-dt5-treadmill-desk.html How to prevent your SSA direct
Facebook modifies privacy policy in response to lawsuit - privacy policy settings are no clearer. More and more cars are hackable - deadly consequences
UPnP vulnerabilities and why it needs to be disabled; Cisco wireless LAN controller vulnerabilities Web servers hacked over and over through SSH backdoor that steals credentials; Malware infects two major US power companie
Health Matters: Hosted by Dr. Charles Komen Brown. Dr. Brown's guests today will talk about the Flu.
Technology Matters: Interview with Gary Baum, Vice President Product Marketing for N-Trig, a leading manufacturer of digitizing pen solutions for touch devices including tablets, phones and laptops.
BREAKFAST BYTES: Chinese state-sponsored attacks target theft of Intellectual Property of American companies http://www.bloomberg.com/new
Two prime examples of proper firewall technology and sizing: Handling DDoS with proper network design and equipment; Handling network capacity and security planning.
NSA spying on Americans without warrants; More on critical flaws in industrial control systems; Service sells access to RDP systems in large corporations; 95% of breaches are due to mis-configured firewalls.
Over Easy: iPhone5 vs Galaxy 3; Overreliance on technology?; Living without a Smartphone; Windows 8 Performance.
Breakfast Bytes: Lawsuit over LinkedIn lawsuit; ACLU whistleblows on trap and trace wiretaps on U.S. citizens; Massive increase in mobile malware; SCADA devices;Preview of Windows Server 2012
Breakfast Bytes: Be careful about what you put on employment websites; Virus delivered by clicking on fake Facebook photo tag emails; Duh, how NOT to make software; the most important technology company you've never heard
Breakfast Bytes: SMS delivered Trojans hack Android and iPhone; How to disable unwanted apps on Android; 2 factor authentication in gmail; Old NICs, newer OSs and why you have to get off of XP; DropBox breached, again; App
BBOE: Windows 8 on a Stick; IE 10 to have Do No Track by default; Illinois passes law preventing employers from asking for social networking usernames and passwords; Microsoft wants you to adopt the Tiled UI, but don't cal
Pagination
- Previous page
- Page 4
- Next page