In this episode iPhone X debuts among concerns about facial recognition technology Are Utah elections secure? Conversation with Lt. Governor Spencer Cox (10:05) Voting online – will it ever be a reality in Utah? (22:00) Legal brief – What businesses need...
Congress considers authorizing cyber vigilantes (Link to story here) Cybercriminals disguised by email (6:33) Ignoring red flags and clicking without suspicion (12:34) Acting quickly increases chances of recovering stolen money (21:15) How many emails do you get a...
When you hear the term “hacker” you likely picture someone sitting in front of a black computer screen writing code to steal your personal or financial data. But there are also hackers who like to take control of things like medical devices and vehicles. “Any device...
By 2025, some estimates indicate approximately 80 billion devices will be connected to the Internet. To give you some perspective, approximately 11 billion devices connect to the Internet now. So for every device online now – seven more will be added over the...
North Korea tests US cyber vulnerabilities Authentication, encryption and the padlock on your browser (9:40) Implementation of guidelines to protect US critical infrastructure (22:40) Hackers attacking hospitals, cars and pacemakers – sometimes for profit...