Who is listening to you? Amazon, Apple, Google, Facebook? Probably. Maybe. Definitely. You decide. Here are a couple of pages about devices listening and how to stop it. This is not a complete list, or the entire story, but it should raise an eyebrow and get you looking at your settings.
https://www.vox.com/recode/2019/9/20/20875755/smart-devices-listening-human-reviewers-portal-alexa-siri-assistant
https://pittsburgh.cbslocal.com/2019/11/18/technology-spying-prevention/
https://www.cnet.com/how-to/alexa-delete-what-i-just-said-heres-how-to-prevent-amazon-from-listening-in/
Tuesday, November 19, 2019
Saturday, November 9, 2019
Phishing, and Spear Phishing, are examples of email social engineering attacks that can be very effective. The best security hardware, the perfect firewall, and the crack IT support team can be rendered useless by these attacks. This YouTube video, produced by Cisco, demonstrates how it can play out and what the consequences could be from the attack, in this case a ransomware attack.
Subscribe to:
Posts (Atom)