Technology & Social Media

Home Topics Technology & Social Media

Your Email is as Vulnerable as Sending a Postcard

Your Email is as Vulnerable as Sending a Postcard
Would you write banking information, passwords, private conversation or any sensitive data on the back of a postcard? Sounds like a silly question perhaps -...

When the Hackers Become the Hacked

When the Hackers Become the Hacked
The Shadow Brokers have dumped a treasure trove of NSA secret hacking tools, proving that even the best secret-keepers in the country can’t always...

Facebook Murder Fantasy

Facebook Murder Fantasy
Tracy starts out the show talking about being solo during this Easter edition podcast. He talks about the band Green Day and how they...

Congress Just Sold You Out (Again)

Congress Just Sold You Out (Again)
This week I discuss the stunning repeal of Internet privacy provisions with Ernesto Falcon from the Electronic Frontier Foundation. Congress narrowly passed a bill...

Protecting Your Privacy at the US Border

Protecting Your Privacy at the US Border
What are your rights at the border? It depends on your immigration status, and even US citizens will not enjoy their usual Constitutional rights...

Masking Your Digital Footprints

Masking Your Digital Footprints
WikiLeaks dumped almost 9000 pages of secret CIA documents on the web for all to see, detailing dozens of secret hacking tools and techniques....

How The Bad Guys Trick You Into Taking Their Bait

How The Bad Guys Trick You Into Taking Their Bait
“Phishing” is one of the most common and most effective ways for the bad guys to get your passwords or credit card information. In...

Why CloudBleed Wasn’t So Bloody Scary

Why CloudBleed Wasn’t So Bloody Scary
The media was once again telling everyone to light their hair on fire over the latest web bug that threatens to expose all of...

The Internet of Things is The Next Big Security Nightmare

The Internet of Things is The Next Big Security Nightmare
The Internet of Things involves the increasing advances of objects and entities provided with the ability to automatically transfer data over a network. The “Internet...

Does Biometric Scanning Really Keep Your Personal Information Safe?

Does Biometric Scanning Really Keep Your Personal Information Safe?
It requires more than just a key or a password -- you need to use a physical attribute to now get inside some airports,...

Shaping The New Narrative, Big Brother & Big Media – Sharyl Attkisson

Shaping The New Narrative, Big Brother & Big Media - Sharyl Attkisson 2
The new narrative today involves; as Sharyl Attkisson puts it 'Shady Political Operatives' - who have essentially taken possession of the minds, bodies and emotions of an entire...

Yahoo Hacked Again! Free Email Services Becoming Costly to Consumers

Yahoo Hacked Again! Free Email Services Becoming Costly to Consumers
More than ONE BILLION Yahoo accounts have been exposed after a third-party hacker hit the internet company in a separate attack from the one that was...

Own an Android? Chances Are You’ve Been Hacked!

Own an Android? Chances Are You’ve Been Hacked! 2
Android 'Gooligan' Hackers Scored The Biggest Ever Theft Of Google Account by hacking into 1 million Google accounts hitting them with malware that can access...

RULE 41 and the Destruction of Your 4th Amendments Rights

RULE 41 and the Destruction of Your 4th Amendments Rights
Dec 1st was when your 4th Amendment was destroyed. “We’re in the midst right now of one of the biggest battles in the privacy world...

An Inside Look at Spamming from a Former Spammer

An Inside Look at Spamming from a Former Spammer
Spam has become an integral part of Internet life. Once your e-mail address gets on a spam list, it's close to impossible to remove it....

Identity Theft Protection Is a Theft

Identity Theft Protection Is a Theft
Millions of people subscribe to credit monitoring or Identity theft protection services each year. This is due in part to the million + of...

Clinton Email Hack… Could It Happen To You?

Clinton Email Hack… Could It Happen To You?
In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Bait and Phish, Computer Hacks Target People Just Like You!

Bait and Phish, Computer Hacks Target People Just Like You!
Many scams happen online and are set up by computer hackers. The hackers send fake emails and/or set up bogus websites, which may look...

Google’s Psych-War On Police No Laughing Matter

Google's Psych-War On Police No Laughing Matter
Those who don’t believe that there is an active War on Police are naïve. This war impacts law enforcement officers on many fronts including...

American Tech Companies Continue To Sell Consumers Out

American Tech Companies Continue To Sell Consumers Out
Without the cooperation of American tech companies — both voluntary and compelled — the National Security Agency’s system of mass surveillance is simply not...

Sociopathic Corporations Operate Like The Mafia

Sociopathic Corporations Operate Like The Mafia
This past Monday I watched some dramatic live coverage from Mandan, North Dakota on Democracy Now’s website. The coverage showed the celebration of the official...

The GMAIL Quandary & what to do about it!

The GMAIL Quandary & what to do about it!
I met a man recently who uses cash, no credit cards, and he has no email account - and I thought what a fool!...

Screen Addiction An Epidemic

Screen Addiction An Epidemic
So here we go—another dire warning of the addictive qualities, and costs, of small screens on children and adults. But is this warning more...

“I Am Optimistic About Mankind’s Future,” says Doc Dave Dockery

"I Am Optimistic About Mankind's Future," says Doc Dave Dockery
The emotional impact technology has had on our lives has unarguably transformed society. The current generation doesn't know a world without computers; yet for Doc Dave...

Our Intelligence Dilemma

Our Intelligence Dilemma
Following the 9/11 terrorist attack, the federal government immediately reformed its existing security programs by creating new bureaucracies. The previously unknown Patriot Act immediately...

Futurist Gray Scott: Seven Emerging Technologies That Will Change the World Forever

Futurist Gray Scott: Seven Emerging Technologies That Will Change the World Forever 1
Over five million jobs will be lost by 2020 as a result of developments in genetics, artificial intelligence, robotics and other technological change, according...

Potential Attacks on America’s Infrastructure, Colonel Waurishuk

Potential Attacks on America's Infrastructure, Colonel Waurishuk
There are so many basics of life that we take for granted in America, our water; our electrical grid; our phones; our ability to...

Dark Web Reveals Evil Side of Mankind, Bob Francis

Dark Web Reveals Evil Side of Mankind, Bob Francis
If you thought you knew all there was to know about the internet - think again! There is a sister universe on the web...

Changing the way we teach our kids, Will Rhame

Changing the way we teach our kids, Will Rhame
Our kids are spending the bulk of their time on technology - some reports have kids spending as much as 12 hours a day on their...

The ‘Cyber-Fairy’ Revisited & ‘Healthy Seeds’ for your new year

The 'Cyber-Fairy' Revisited & 'Healthy Seeds' for your new year
While you were sleeping, the Washington cyber-fairy got her way again by convincing Congress to slide language in the omnibus budget bill that arguably violates...