Technology & Social Media

Home Topics Technology & Social Media

Facebook Murder Fantasy

Facebook Murder Fantasy
Tracy starts out the show talking about being solo during this Easter edition podcast. He talks about the band Green Day and how they...

How The Bad Guys Trick You Into Taking Their Bait

How The Bad Guys Trick You Into Taking Their Bait
“Phishing” is one of the most common and most effective ways for the bad guys to get your passwords or credit card information. In...

Identity Theft Protection Is a Theft

Identity Theft Protection Is a Theft
Millions of people subscribe to credit monitoring or Identity theft protection services each year. This is due in part to the million + of...

“I Am Optimistic About Mankind’s Future,” says Doc Dave Dockery

"I Am Optimistic About Mankind's Future," says Doc Dave Dockery
The emotional impact technology has had on our lives has unarguably transformed society. The current generation doesn't know a world without computers; yet for Doc Dave...

The ‘Cyber-Fairy’ Revisited & ‘Healthy Seeds’ for your new year

The 'Cyber-Fairy' Revisited & 'Healthy Seeds' for your new year
While you were sleeping, the Washington cyber-fairy got her way again by convincing Congress to slide language in the omnibus budget bill that arguably violates...

Protecting Your Privacy at the US Border

Protecting Your Privacy at the US Border
What are your rights at the border? It depends on your immigration status, and even US citizens will not enjoy their usual Constitutional rights...

Inoculating the World Against Malware

The WannaCry ransomware worm spread across the planet is a matter of hours, infecting over 200,000 computers in just a matter of hours -...

Dark Web Reveals Evil Side of Mankind, Bob Francis

Dark Web Reveals Evil Side of Mankind, Bob Francis
If you thought you knew all there was to know about the internet - think again! There is a sister universe on the web...

Your Email is as Vulnerable as Sending a Postcard

Your Email is as Vulnerable as Sending a Postcard
Would you write banking information, passwords, private conversation or any sensitive data on the back of a postcard? Sounds like a silly question perhaps -...

Shaping The New Narrative, Big Brother & Big Media – Sharyl Attkisson

Shaping The New Narrative, Big Brother & Big Media - Sharyl Attkisson 2
The new narrative today involves; as Sharyl Attkisson puts it 'Shady Political Operatives' - who have essentially taken possession of the minds, bodies and emotions of an entire...

An Inside Look at Spamming from a Former Spammer

An Inside Look at Spamming from a Former Spammer
Spam has become an integral part of Internet life. Once your e-mail address gets on a spam list, it's close to impossible to remove it....

When the Hackers Become the Hacked

When the Hackers Become the Hacked
The Shadow Brokers have dumped a treasure trove of NSA secret hacking tools, proving that even the best secret-keepers in the country can’t always...

Achieving Trust in the Digital Age

Is trust just an emotion or is it more than that? In this week’s episode, I speak at length with Jeffrey Ritter: a lawyer,...

NotPetya Malware Strikes, Everything You Need to Know

Lawrence Abrams is the creator and CEO of Bleeping Computer, and he and I delve into the latest malware sweeping the globe called NotPetya...

Don’t Tread on My Bits: Why Net Neutrality Matters

Are you ready for the next YouTube, Netflix or Hulu? Then you need to fight to save net neutrality. Today I discuss the threatened...

How Dumb Are Your ‘Smart Devices’?

Do you have a “smart” TV? Or an Internet-connected baby monitor? Then you are a part of the Internet of Things (IoT)! Welcome to...

Yahoo Hacked Again! Free Email Services Becoming Costly to Consumers

Yahoo Hacked Again! Free Email Services Becoming Costly to Consumers
More than ONE BILLION Yahoo accounts have been exposed after a third-party hacker hit the internet company in a separate attack from the one that was...

Changing the way we teach our kids, Will Rhame

Changing the way we teach our kids, Will Rhame
Our kids are spending the bulk of their time on technology - some reports have kids spending as much as 12 hours a day on their...

Intel Closes a Nine-Year Backdoor

Intel Closes a Nine-Year Backdoor
This week I’ll tell you why you should not be using Microsoft’s Edge Browser, how to find out if you were bitten by a...

Clinton Email Hack… Could It Happen To You?

Clinton Email Hack… Could It Happen To You?
In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs...

Cyber Travel Tips: What To Know Before You Go

Summer is upon us and for many of us that means travel - but before you even pack your bags, you need to listen...

The GMAIL Quandary & what to do about it!

The GMAIL Quandary & what to do about it!
I met a man recently who uses cash, no credit cards, and he has no email account - and I thought what a fool!...

Learn These WannaCry Lessons Before Round 2 Hits

The WannaCry virus hit over 200,000 computers in over 150 countries in a matter of days. While WannaCry spread quickly, it had some fatal...

Potential Attacks on America’s Infrastructure, Colonel Waurishuk

Potential Attacks on America's Infrastructure, Colonel Waurishuk
There are so many basics of life that we take for granted in America, our water; our electrical grid; our phones; our ability to...

Own an Android? Chances Are You’ve Been Hacked!

Own an Android? Chances Are You’ve Been Hacked! 2
Android 'Gooligan' Hackers Scored The Biggest Ever Theft Of Google Account by hacking into 1 million Google accounts hitting them with malware that can access...

The Feds Plan For Cars That Can Track & Tattle On You

The Internet of Things will soon include cars... what could possibly go wrong? If all the cars on the road could tell each other...

Our Intelligence Dilemma

Our Intelligence Dilemma
Following the 9/11 terrorist attack, the federal government immediately reformed its existing security programs by creating new bureaucracies. The previously unknown Patriot Act immediately...

Futurist Gray Scott: Seven Emerging Technologies That Will Change the World Forever

Futurist Gray Scott: Seven Emerging Technologies That Will Change the World Forever 1
Over five million jobs will be lost by 2020 as a result of developments in genetics, artificial intelligence, robotics and other technological change, according...

Masking Your Digital Footprints

Masking Your Digital Footprints
WikiLeaks dumped almost 9000 pages of secret CIA documents on the web for all to see, detailing dozens of secret hacking tools and techniques....

Creating and Remembering Killer Passwords

Passwords are the bane of our modern existence. Why the hell haven’t we figured out a better way to prove who we are? Today...

Congress Just Sold You Out (Again)

Congress Just Sold You Out (Again)
This week I discuss the stunning repeal of Internet privacy provisions with Ernesto Falcon from the Electronic Frontier Foundation. Congress narrowly passed a bill...

Bait and Phish, Computer Hacks Target People Just Like You!

Bait and Phish, Computer Hacks Target People Just Like You!
Many scams happen online and are set up by computer hackers. The hackers send fake emails and/or set up bogus websites, which may look...

Why I Killed my Company to Save my Customers, pt 2

In this final segment, we address the classic conundrum: law enforcement believes that your servers hold key information that would prevent a devastating terror...

Google’s Psych-War On Police No Laughing Matter

Google's Psych-War On Police No Laughing Matter
Those who don’t believe that there is an active War on Police are naïve. This war impacts law enforcement officers on many fronts including...

Screen Addiction An Epidemic

Screen Addiction An Epidemic
So here we go—another dire warning of the addictive qualities, and costs, of small screens on children and adults. But is this warning more...

If You Use Public WiFi At The Hotel, Airport, Coffee Shop….

If you use public WiFi of any sort at the hotel, airport, or coffee shop (AND WHO DOESN'T), then you need to pay attention....

RULE 41 and the Destruction of Your 4th Amendments Rights

RULE 41 and the Destruction of Your 4th Amendments Rights
Dec 1st was when your 4th Amendment was destroyed. “We’re in the midst right now of one of the biggest battles in the privacy world...

Why CloudBleed Wasn’t So Bloody Scary

Why CloudBleed Wasn’t So Bloody Scary
The media was once again telling everyone to light their hair on fire over the latest web bug that threatens to expose all of...

Does Biometric Scanning Really Keep Your Personal Information Safe?

Does Biometric Scanning Really Keep Your Personal Information Safe?
It requires more than just a key or a password -- you need to use a physical attribute to now get inside some airports,...

Social Media’s Numbing Effect

Social Media, an incredible platform. But has it disconnected us from being more genuine and human? Every time a celebrity passes, social media reminds...