Biographical information for identifying the identity of the person to whom it relates
POPULARITY
Exposing Security Flaws: Government Officials' Data Leaks, Defense Contractor Fines, and Cyber Crime Involvement In this episode of Cybersecurity Today, host Jim Love highlights significant cybersecurity breaches affecting US security officials, a government defense contractor, and a Department of Government Efficiency staffer. Personal information of senior US security officials was found accessible online, raising concerns about national security. Morse Corp, a defense contractor, was fined $4.6 million for failing to meet cybersecurity requirements. Additionally, a 19-year-old tech aide from the Department of Government Efficiency was found linked to a cyber crime group, causing alarm due to his recent advisory roles with significant government agencies. The episode underscores the need for stringent cybersecurity practices and accurate compliance within government and defense circles. 00:00 Introduction and Headlines 00:24 Exposure of US Security Officials' Personal Information 02:22 US Defense Contractor's Cybersecurity Failures 04:40 19-Year-Old Linked to Cyber Crime Ring 07:05 Conclusion and Final Thoughts
AP's Lisa Dwyer reports that a judge has blocked DOGE from accessing some Social Security systems.
A mailer demanding personal information is showing up in mailboxes in Utah... and Utahns are questioning if it is real or a scam. KSL Investigative Reporter Matt Gephart joins the show with what he found.
Financial Freedom for Physicians with Dr. Christopher H. Loo, MD-PhD
Identity theft protection and recovery is more critical than ever, as millions of people fall victim to fraud each year. In this eye-opening episode, Dr. Joan Hangarter shares expert strategies to help you secure your personal information, recover from fraud, and prevent future identity theft. If you've ever worried about stolen identity, financial security, or identity fraud prevention, this conversation is packed with actionable insights you need.
Chuck Joiner, David Ginsburg, Marty Jencius, Jeff Gamet and Jim Rea discuss Amazon's new AI-powered Alexa+, highlighting its conversational abilities and privacy concerns. Opera's browser sidebar integrations with apps like Discord and Slack prompt debate about productivity versus distraction. Google's updated tool for managing personal information sparks skepticism regarding its effectiveness and sincerity. MacVoices is supported by the new MacVoices Discord, our latest benefit for MacVoices Patrons. Sign up, get access, and jin the conversations at Patreon.com/macvoices. Show Notes: Chapters: 00:05 The A-Lady Plus Unveiled 04:05 Privacy Concerns and AI 14:26 Opera's New Integrations 23:55 Google's Data Removal Tool Links: Amazon unveils Alexa+, a generative AI update with vision capabilities and more, in preview in March 2025 for $20 per month or free to Prime subscribers https://www.theverge.com/news/619755/amazon-alexa-ai-upgrade-artificial-intelligence-smart-assistant Opera One Adds Discord, Slack, and Bluesky Integration to Browser Sidebar https://www.mactrast.com/2025/02/opera-one-adds-discord-slack-and-bluesky-integration-to-browser-sidebar/#google_vignette Google Makes It Easier to Remove Personal Info From Search Results https://www.macrumors.com/2025/02/26/google-remove-info-search-results/ Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
U.S. Citizenship Test 2025. Learn, practice and test yourselves anywhere anytime.Test Yourself at Can You Pass This Civics Test?Practice 100 Civics Tests for 50 STATES in U.S.A.Practice 100 Civics Tests at a FAST SPEEDPractice 100 Civics Tests at a SLOW SPEEDPractice 100 Civics Tests in RANDOMPractice Civics Test by CATEGORYPractice Civics Test by GROUPPractice Civics Test in ORDERPractice English Test: Reading & WritingPractice Form N-400 at Can You Pass This Interview?#uscitizenshiptest #uscitizenshipinterview #uscitizenshippodcast #uscitizenshipexam
Sara Gerkeis an associate professor of law at the University of Illinois Urbana-Champaign. Stephen Morrissey, the interviewer, is the Executive Managing Editor of the Journal. S. Gerke, M.B. Jacoby, and I.G. Cohen. Bankruptcy, Genetic Information, and Privacy — Selling Personal Information. N Engl J Med 2025;392:937-939.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Welcome to The Political Purple Breakdown, a feature of US RESIST NEWS, a nonprofit news service dedicated to truthful reporting in an age of disinformation. Hosted by Radell Lewis, this podcast delivers in-depth analysis of the biggest political stories shaping the U.S. and the world.From major shifts in Congress and high-profile legal battles to the latest in international conflicts and policy debates, we break down the key developments that impact everyday Americans. Stay informed on the latest political power moves, legislative updates, and global events—all with a clear and fact-based approach.Tune in to The Political Purple Breakdown for insightful discussions, expert perspectives, and the news you need to navigate today's complex political landscape.www.usresistnews.org
SEND ME A TEXT MESSAGE NOWJoin me, Jeff Alan Wolf, as I unravel the high-stakes drama between US President Donald Trump and Ukraine's President Zelensky. With Trump's volatile claims and misleading lies about Ukraine, we're witnessing a geopolitical conundrum. I'll explore how Ukraine's martial law and postponed elections intersect with the chaos stirred by Trump's bewildering leadership style. From the bird flu mishap at the US Department of Agriculture to the sudden closure of the JFK Presidential Library, I draw parallels to illustrate the broader implications of disorganized governance.On a lighter yet equally compelling note, discover the untapped potential of oysters in the world of medicine. I'm diving into groundbreaking research from Australia that reveals oysters contain a protein capable of combatting antibiotic-resistant bacteria, offering a beacon of hope in the fight against diseases like pneumonia and strep throat. This episode isn't just about political tension or medical innovation; it's about navigating a world that seems to be spinning out of control. I invite you to share your thoughts and insights. Join me and together we will try to make sense of A World Gone Mad.AWorldGoneMadPodcast@gmail.com
Consumer Privacy: Laws protecting consumers' personal information from unauthorized collection, use, and disclosure.Consumer privacy laws are designed to protect individuals' personal information from being collected, used, or disclosed without their authorization. This area of law is increasingly important in the digital age, where vast amounts of personal data are collected and processed by businesses.Here's a breakdown of key aspects:What is Personal Information? This typically includes any information that can be used to identify an individual, such as name, address, phone number, email address, social security number, credit card details, browsing history, and location data.Why is it Important? Consumer privacy laws aim to:Protect individuals from identity theft and fraud.Safeguard sensitive information from being used for discriminatory purposes.Ensure that individuals have control over their own data.Build trust between consumers and businesses.Key Regulations: Various laws and regulations govern consumer privacy, which vary by jurisdiction. Some examples include:General Data Protection Regulation (GDPR): In the European Union, the GDPR sets strict rules for how businesses can collect, use, and store personal data.California Consumer Privacy Act (CCPA): In California, the CCPA gives consumers more control over their personal information, including the right to know what data is being collected and the right to request that it be deleted.Common Issues:Data breaches: Unauthorized access to and disclosure of personal information.Surveillance and tracking: The collection of data on individuals' online activities without their knowledge or consent.Targeted advertising: The use of personal data to deliver personalized advertisements, which can be intrusive and raise privacy concerns.Enforcement: Regulatory bodies are often responsible for enforcing consumer privacy laws and can impose penalties on businesses that violate these laws.In essence, consumer privacy laws seek to balance the interests of businesses in collecting and using data with the rights of individuals to protect their personal information.
A reminder landlords aren't privy to the personal information of their tenants. Privacy Commissioner Michael Webster says many renters feel the need during the busy rental season to disclose more about themselves to secure a flat. He says it can be tempting for landlords to collect this information when considering applications. Webster says there's also been issues in the past of landlords black-listing tenants and sharing their information when they've had issues. But he told Mike Hosking there are processes to protect landlord's property through bond arrangements in rental agreements and the Tenancy Tribunal. LISTEN ABOVE See omnystudio.com/listener for privacy information.
SummaryIn this episode of Culture Uncut, hosts DJ Nova Fresh and Casanova Love discuss the aftermath of the Super Bowl, the cultural significance of fast food chains like Popeyes, and the implications of government cuts on social programs. They delve into Elon Musk's influence on information access and the recent Kendrick Lamar halftime performance, exploring its messages and cultural impact. The conversation wraps up with reflections on the music industry and the importance of supporting one another within the culture.TakeawaysMondays after the Super Bowl should be a national holiday.Popeyes has changed its food quality over the years.Government cuts can have serious implications for social programs.Elon Musk's access to government information raises concerns.Kendrick Lamar's performance was a statement on culture.The music industry often overlooks the importance of supporting each other.Fast food culture reflects broader societal trends.People often don't care about issues until they affect them personally.Blind loyalty to political figures can be dangerous.Cultural commentary in music can provoke important discussions.Chapters00:00 Super Bowl Monday Blues04:08 Popeyes and Fast Food Nostalgia06:36 Government Cuts and Their Impact11:41 Global Aid and Health Concerns14:13 IRS and Financial Accountability16:00 The Wild West of Credit and Control16:48 Legal Ramifications and Government Oversight17:22 Access to Personal Information and Its Implications18:15 Background Checks and Vetting Processes19:09 Long-term Economic Consequences19:58 Cultural Commentary and the Super Bowl21:31 Kendrick Lamar's Halftime Show Analysis26:49 Final Thoughts on Culture and Music Hosted on Acast. See acast.com/privacy for more information.
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
A massive data breach affected millions of students, parents, and teachers. Someone discovered security flaws within Subaru vehicles. And everything that was announced at Samsung Galaxy Unpacked 2025. Emily Forlini is joining Mikah Sargent this week! Emily talks about a massive security incident with software company PowerSchool, in which 62 million students' personal data was stolen, along with parents and teachers. Mikah talks about how a security researcher discovered a security flaw within a Subaru vehicle that gave them access to its location data through web vulnerabilities. And Patrick Holland from CNET joins the show to discuss everything unveiled at Samsung's Galaxy Unpacked event, including the S25 phones. Hosts: Mikah Sargent and Emily Forlini Guest: Patrick Holland Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: threatlocker.com for Tech News Weekly Melissa.com/twit
News with Sean 1-15-2025 …If TikTok is banned you can still give your personal information to the Chinese
Když se badatelé z Pew Research Center ještě během pandemie ptali Američanů, co si myslí, že bude v roce 2025 naléhavým problémem, poukázali na digitální technologie. Prý představují riziko pro naše soukromí, tudíž i pro demokracii. Odhad to byl správný. Digitalizaci se během pandemie prohloubila na všech úrovních společnosti a dnes i mnozí odborníci bijí na poplach. Právníci navíc upozorňují, že je třeba formulovat cosi jako „kognitivní práva“. Tzv. neurotechnologie již umí monitorovat třeba naši únavu, soustředění nebo duševní výkonnost a my bychom měli mít pojistky proti tomu, aby zaměstnavatel monitoroval naše nálady bez našeho vědomí. Že nám někdo vidí do hlavy? Zní to dystopicky. Ale metafora „Big Brother“ je přesto zavádějící. Orwell totiž ještě vycházel z jednosměrného, často nedobrovolného dozoru: stát sleduje občana, který o to buď nestojí, nebo to přijímá jako nutné zlo. Jenže ten soudobý dozor by nemohl existovat, kdybychom jej s velkým nasazením sami nepodporovali. Nejenže víme, že jsme sledováni, my navíc chceme být sledováni, byť třeba jen proto, že nám to zlepší pozici v práci. Navíc sledujeme druhé. A obojí – jak být sledován, tak sledovat druhé – si užíváme. „Sledování se stalo životním stylem,“ píše David Lyon, skotský sociolog a spoluzakladatel časopisu Surveillance and Society, který v této souvislosti hovoří o „kultuře participativního dozoru“. Tímto obratem poukazuje i k tomu, jak moc se proměnil status soukromí a veřejnosti. Kdysi bylo obtížné probojovat se na veřejnost; dnes jsou její brány rozevřené. Naopak privátnost je nový luxus, který si užívají ti skutečně mocní. Právě ti se nemusejí neustále někde ukazovat, trousit citlivá data, dokonce konstruovat svou identitu skrze exhibicionismus. Tereza Matějčková se na tomto pozadí mimo jiné zabývá tím, že ke svobodě patří možnost stáhnout se, být netransparentní a nepředvídatelný. Nikdo nemá povinnost být srozumitelný. Právě na tuto stránku osobnosti má kultura dozoru nicméně spadeno. Proto je třeba začít soustavněji tematizovat odvrácené stránky digitalizace, osobní transparentnosti, ale třeba i efektivity. I. „Data never sleeps.“ [Začátek až 12:04] II. Pandemické prohloubení dozoru [12:04 až 18:45] III. Od panoptikonu k synoptiku [18:45 až 28:20] IV. Nejsme online; žijeme onlife. [28:20 až 39:45] V. Logika letiště a náš ubohý datový dvojník [39:45 až 49:15] VI. Proti transparentnosti. Proti rigidnosti. Proti poddajnosti. [49:15 až konec] Bibliografie Michel Foucault, Dohlížet a trestat, přel. Čestmír Pelikán, Praha: Dauphin, 2000. Oscar Gandy, The Panoptic Sort: A Political Economy of Personal Information, Oxford: Oxford University Press, 2021. Yuval Noah Harari, Nexus. A Brief History of Information Networks from the Stone Age to AI, New York: Penguin, 2024. David Lyon, The Culture of Surveillance: Watching as a Way of Life, Cambridge: Polity Press, 2018. David Lyon, Surveillance. A Very Short Introduction, Oxford: Oxford University Press, 2024. Pew Research Center, „Experts Say the ‘New Normal' in 2025 Will Be Far More Tech-Driven, Presenting More Big Challenges“, 18. 2. 2021, https://www.pewresearch.org/internet/2021/02/18/worries-about-life-in-2025/
This episode of "Ciber Afterwork" with Eduardo Castillo, along with experts Pablo San Emeterio and Mónica Valle, delves into the critical world of cybersecurity, focusing on the constant threats of data breaches and other cyber incidents. The discussion highlights that complete security is unattainable, but it is essential to strive for a high level of protection. In this program, we are joined by Lambert Hervé, Global Consumer Operations Manager at Panda Security, with whom we will discuss the importance of protecting ourselves against data breaches." Here are some key points from the sources that relate to the translated text: * Cybersecurity is a major challenge: The program emphasizes that cybersecurity is a significant challenge affecting businesses and individuals. It is not just an economic issue but a social one, as cybercriminals profit from vulnerabilities. * The impossibility of 100% security: The hosts acknowledge that 100% security is not achievable in any domain, not just in the digital world. The goal is to reach a high level of security, like 99%, and be prepared to recover from incidents. * Focus on data breaches: The episode dedicates significant time to discussing data breaches, what they are, how they happen, and what can be done to minimize their impact. This is a key topic of concern for both companies and individuals. * Expert Insights: The program features experts like Pablo Sanemeterio and Mónica Valle who analyze the evolving cybersecurity threats. Additionally, Herbelanbert from Panda Security provides specific insight into the nature of data breaches and how to respond to them. * Importance of preparation and response: The program discusses the importance of being prepared for cyber incidents and having plans in place to recover from attacks. * Threat intelligence is important: The importance of threat intelligence is discussed, as it helps companies understand how cybercriminals are operating, what their techniques are, and improve their response and detection capabilities. * Real-world examples of data breaches: The program discusses real-world examples, like the cyberattack on the textile group Tendam, where a large amount of data was stolen. These examples highlight the importance of cybersecurity for all kinds of businesses and how they are at risk of attacks. * The consequences of data breaches: The discussion includes the financial and reputational impacts that data breaches have on companies. The loss of trust with customers is also mentioned. Additionally, the potential for fraud and legal consequences are highlighted. * Steps to take when your data is compromised: The show discusses the steps to take when your data has been compromised such as changing passwords, enabling multi-factor authentication, and using tools to monitor for compromised data. * The importance of monitoring and auditing systems: The program highlights the need to monitor systems and networks, as well as the dark web, for possible breaches. It also discusses the importance of constant audits and the need for procedures that are kept up to date.
FBI Atlanta is seeing a substantial increase in computer cookie thefts. Atlanta News First Investigates talks with Joe Zadik, FBI supervisory special agent, on how you can take more steps to protect your online personal information from thieves.
Did you know? Leaving those delivery boxes outside your door might be giving away more than you think!
Many people might say that sharing personal information at work is taboo. But, recent research shows that it might be beneficial – no matter what the content. Intrigued? Listen in and learn more! Research and Additional Resources: Research Article: Hardin (2024) Keep up with our book journey: Sign Up Here Reach out to bring us to […] The post Should You Share Personal Information at Work? appeared first on Workr Beeing | The Science Of Thriving Workplaces.
Apple's latest iPad mini refresh leaves some critics wanting more. If Apple plans a product event in the near future, what will get updated and what won't? And we've got some tips on using Apple's new iPhone Mirroring feature. Show Notes: iPad mini (A17) Which iPad Is Best for You in 2024? Which Apple Pencil works with my iPad? iPhone had best ever Q3 for Apple, nearly topped Samsung globally per report USB-C and Thunderbolt: Understanding Ports and Cables for Macs, iPhones, and iPads Apple Slowly Moves Away From Its Annual Product Release Strategy How to Use iPhone Mirroring and iPhone Notifications on Mac, and Why You Should Broken Mirror: iPhone Mirroring at Work May Expose Employees' Personal Information Meet the all-new Kindle family, including the first colour Kindle Porch Pirates Are Stealing AT&T iPhones Delivered by FedEx Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.
Why Real Estate Agents Ask for Your Personal Information Hello! I'm Walter Monteiro, and I understand you might be wondering why real estate agents are asking for personal information, like your ID or details about your financial transactions, during real estate dealings. Let's take a moment to explain why this is necessary and how it protects everyone involved. In Canada, the real estate industry is regulated by the Financial Transactions and Reports Analysis Centre of Canada, or FINTRAC. FINTRAC is responsible for fighting money laundering and terrorist financing, and real estate agents are legally obligated to comply with their regulations. These regulations require real estate agents to collect and verify certain personal information from their clients. This isn't optional—it's the law. By doing so, agents ensure that all real estate transactions are legitimate and transparent, helping to protect the market from illegal activities: Here's why this matters: First, Legal Compliance: Collecting identification and transaction details is part of a real estate agent's legal duty. It helps verify that transactions are genuine and not being used for illicit purposes. Second, Protecting Everyone: These measures prevent criminals from using real estate transactions to launder money or fund illegal activities, which keeps the market fair and safe for everyone. If real estate agents don't comply with FINTRAC regulations, there are serious consequences: Penalties and Fines: Non-compliance can lead to substantial fines. Legal Action: In some cases, it can result in legal proceedings, including sanctions or even imprisonment. License Revocation: Real estate professionals risk losing their licenses if they don't follow these rules, which could end their careers. By following these regulations, real estate agents are not only fulfilling their legal obligations but also ensuring that transactions are secure and trustworthy. It's understood that providing personal information can feel intrusive, but rest assured, it's handled with the utmost confidentiality and is used solely to meet these legal requirements. So, when a real estate agent requests your ID or details about a financial transaction, it's not just paperwork, it's about maintaining a safe and transparent real estate environment for everyone involved. If you have any questions about why this information is needed or how it's used, please feel free to ask. Real estate agents are here to ensure that your experience is smooth, secure, and compliant with all legal requirements. Thank you for your understanding and trust. Let's work together to achieve your real estate goals responsibly and confidently!
Mike discusses the recent data breach affecting three billion individuals, emphasizing the importance of understanding the dark web and protecting personal information. He provides insights on how to check if one's data has been compromised and offers practical steps to safeguard against identity theft. Visit NPD Breach Check to see if your sensitive information was compromised. Need a second opinion on your retirement plan? Visit MichigansRetirementCoach.com to connect with Mike and his team today!See omnystudio.com/listener for privacy information.
In this episode of the Tech Optimist, Alumni Ventures' Managing Partner Ray Wu discusses the future of AI sovereignty with Sean Ren, CEO and co-founder of Sahara AI. Explore how Sahara AI leverages blockchain technology to address the critical need for data provenance and user sovereignty in AI applications. Sean shares insights into the development of their unique AI blockchain platform designed to empower users to manage and monetize their digital assets securely. The conversation also covers the intricate balance between advancing AI technology and ensuring ethical standards and user privacy are maintained. Dive into a detailed discussion on how Sahara AI is shaping a new landscape where technology meets user empowerment and security.Sean's Ask: Sean Ren encourages the Alumni Ventures community to engage with Sahara AI in developing and advocating for decentralized AI applications. He seeks collaboration to educate and build an ecosystem that supports innovative, blockchain-enhanced AI solutions.To Learn More:Alumni Ventures (AV)AV LinkedInAV AI FundTech OptimistSahara AISpeakers:Ray Wu - Guest Sean Ren - Guest Chapters:(00:00) - Intro (02:56) - Interview (22:31) - Sean's Ask (26:00) - Closing Legal Disclosure:https://av-funds.com/tech-optimist-disclosures
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
On Cincinnati Edition, we discuss data privacy concerns after the Dobbs decision
In this week's news, we'll tell you about a woman who lost a half million dollars in a Social Security scam, con artists who offer up free pianos, then trick the customer into paying high shipping fees. You'll also hear how your smart TV could be robbing you. Learn more about your ad choices. Visit megaphone.fm/adchoices
It was a crazy and chaotic Friday around the world and the world is not recovering quite yet - still flight delays, bank systems down and more - we break down what went wrong. Also, other topics we dive into are the personal information emails you may get - how do you know if its legit. Also, Spam folders, Proton VPN troubleshooting and more as Doug Swinhart answers your tech questions on Tech Talk!
Today's top stories, including a body language expert weighs in on the Alec Baldwin involuntary manslaughter trial. A growing list of celebrities calling for President Biden to drop out of the race and possible replacement names are discussed. How political views are changing across generations. Are you willing to share more personal information to take advantage of AI use. Many couples break up after their first vacation together and how to prevent it.
The moment you've been waiting for is here! The Rock Retirement Club has opened its doors once again. Enrollment is open until July 18, so head on over to Rock Retirement Club to sign up today. After you do that, listen to this episode to learn how to protect yourself and your data from scammers. On this episode, Pete, a cybersecurity expert, joins me to discuss ways to secure your personal information. Listen in to hear how you can defend your data. OUTLINE OF THIS EPISODE OF THE RETIREMENT ANSWER MAN LISTENER QUESTIONS [4:51] Are SMA's the right choice for tax strategies? [10:45] On drawing down an HSA [14:01] How to get unbiased financial information [18:38] How do you define whether someone is overfunded, constrained, or underfunded? PRACTICAL PLANNING SEGMENT [23:20] What Pete does [26:50] What you should do first [41:04] Your level two line of defense [53:05] Level 3 [1:01:44] Final thoughts TODAY'S SMART SPRINT SEGMENT [1:03:12] Take one baby step from the list to protect your data Resources Mentioned In This Episode 1Password LastPass Align.Financial Rock Retirement Club Roger's YouTube Channel - Roger That BOOK - Rock Retirement by Roger Whitney Roger's Retirement Learning Center
In this thought-provoking episode of TCAST, hosts Alexander McCaig and Jason Rigby dissect the White House's recently published "Blueprint for an AI Bill of Rights." They offer a critical analysis of the document's implications for data privacy, individual freedoms, and the future of AI regulation. Key Topics Discussed: Introduction to the AI Bill of Rights (0:00 - 5:00) Overview of the White House's 73-page document Initial reactions and concerns from the hosts Safe and Effective Systems (5:00 - 15:00) Critique of the government's approach to protecting citizens Discussion on who determines what is "safe" and "effective" Concerns about potential overreach and control Algorithmic Discrimination Protection (15:00 - 25:00) Analysis of the proposed protections against algorithmic bias Debate on whether top-down approaches truly serve diverse communities Exploration of unintended consequences in AI regulation Data Privacy and Individual Agency (25:00 - 35:00) Examination of proposed data privacy protections Discussion on the importance of individual choice and consent Critique of current data collection practices by both government and corporations TARTLE as an Alternative Solution (35:00 - 45:00) Introduction to TARTLE's user-centric approach to data ownership Explanation of how TARTLE's marketplace allows individuals to control and monetize their data Comparison of TARTLE's transparent system to proposed government regulations The Need for a Global Data Movement (45:00 - 55:00) Call for individuals to take control of their digital identities Discussion on the potential impact of widespread data ownership Exploration of how TARTLE could reshape the data economy Conclusion and Call-to-Action (55:00 - 60:00) Recap of key points and concerns about the AI Bill of Rights Encouragement for listeners to join TARTLE and participate in data ownership Final thoughts on the future of AI regulation and individual privacy Notable Quotes: "Who's protecting me? What if I choose, I should have the right to choose to have data that harms me." - Jason Rigby "The way this AI bill should read is that the systems need to be built from the bottom up." - Alexander McCaig "If you want something that actually does what it says, can you walk the walk and talk the talk, it's over here at TARTLE." - Alexander McCaig Resources Mentioned: White House Blueprint for an AI Bill of Rights TARTLE.co website
The issue that we're having is that information about you is regularly available to individuals like you and I on the engine. The effort to try to discovers peoples personal information has become frictionless. I do believe that the government along with the search and just have a responsibility to remove personal identifiable information. --- Send in a voice message: https://podcasters.spotify.com/pod/show/minimalisttechnews/message Support this podcast: https://podcasters.spotify.com/pod/show/minimalisttechnews/support
Some leaders are too comfortable talking about themselves — and others — at work. Their teams may struggle to trust them because they have no boundaries. Other leaders are reluctant to share anything at all, and risk coming across as remote and inaccessible. But Lisa Rosh says that when you get self-disclosure just right, it can build greater trust on your team. Rosh is an assistant professor of management at the Sy Syms School of Business at Yeshiva University. In this episode, you'll learn how to think about the timing, the substance, and the process for sharing personal information with your team. You'll also learn why it's important to avoid using self-disclosure to seek approval from others or to promote yourself. As Rosh says, “Be yourself, but be it very carefully.” Key episode topics include: leadership, organizational culture, business communication, interpersonal communication, authenticity. HBR On Leadership curates the best case studies and conversations with the world's top business and management experts, to help you unlock the best in those around you. New episodes every week. · Listen to the original HBR IdeaCast episode: Lead Authentically, Without Oversharing (2013)· Find more episodes of HBR IdeaCast· Discover 100 years of Harvard Business Review articles, case studies, podcasts, and more at HBR.org]]>
Electronic medical record giant Epic has accused interoperability company Particle Health of violating HIPAA and putting patient medical records at risk. The dispute provides an early test of the new federal interoperability framework.So why exactly are they fighting? And what does it mean for patient rights and the future of medical record sharing?TOPICS(2:15) Misuse of Personal Information(4:39) The Broken Market of Healthcare Data Players(6:49) Access to Medical Data Beyond Treatment(8:49) The Broad Potential and Narrow Definitions in Health IT(11:24) Privacy Concerns and Data Usage in Insurance(13:31) Reducing Medical Costs and the Role of Data(16:08) Moving towards faster implementation of TEFCA(18:41) Navigating the Health Data Exchange Landscape
Kevin Brasler, executive editor of Consumers' Checkbook, joins Lisa Dent to talk about the new Permission Slip by Consumer Reports that’s aimed at helping people delete their data and stop businesses from selling their personal information. Follow The Lisa Dent Show on Twitter:Follow @LisaDentSpeaksFollow @SteveBertrand Follow @kpowell720 Follow @maryvandeveldeFollow @LaurenLapka
Paul and Ira talk about an article from the Federal Trade Commission about scammers using QR codes to steal your personal information. After Paul received a piece of mail with a QR code on it last week that seemingly offered a deal on something if he scanned it, he warns that these codes can be used for more than just easy access to a website. Later in the episode, Paul talks about a snapchat feature that is feeding the insecurities of teens. For more information about what we do or how we can help you, schedule a 15-minute call with us here: paulwinkler.com/call.
AP correspondent Donna Warder reports on a review of the 10 biggest airlines, and whether they're making money off of sharing the personal information of passengers.
Susan Tompor, a personal finance columnist with the Detroit Free Press, joins Lisa Dent to explain ways scammers are attempting to obtain your personal information in order to illegally file taxes on your behalf and how to protect yourself from becoming a victim. Follow The Lisa Dent Show on Twitter:Follow @LisaDentSpeaksFollow @SteveBertrand Follow @kpowell720 Follow […]
Is it wrong for Joan-Marie to cut off a family member who keeps sharing their private conversations with others? Participate on the radio program: call 1-800-Dr-Laura / 1-800-375-2872 or make an appointment https://www.drlaura.com/make-an-appointment. Follow on social media:Facebook.com/DrLauraInstagram.com/DrLauraProgramTwitter.com/DrLauraProgramPinterest.com/DrLauraYouTube.com/DrLauraBecome a Dr. Laura Family Member: https://www.drlaura.com/ See https://www.drlaura.com/privacy-policy for privacy information.
A new report by the F.B.I. says China using A-I technology to increase spying and to steal personal information of Americans. The fear is that there will be a large rise in cyber attacks against corporations, government agencies and even individuals. FOX's Gurnal Scott speaks with Gordon Lawson, U.S Naval veteran and CEO of 'CONCEAL', about the report why it is so worrying. Click Here To Follow 'The FOX News Rundown: Evening Edition' Learn more about your ad choices. Visit megaphone.fm/adchoices
Rob Pizzola and Johnny from betstamp answer frequently asked sports betting questions! Covering nuanced sports betting topics, CLV questions, bankroll management, and some personal questions! Looking to sign up at new sportsbooks? Support Circles Off when you do! www.betstamp.app/circlesoff
|| Welcome to VOLUME 073 of THE BRACKET, a Lights Camera Barstool show. In this episode, we decide THE PERSONAL INFO YOU LEAST WANT MADE PUBLIC. KenJac is in as host alongside Nick, Tommy, Francis and special guests, Rudy, Dana, & Marty. Join us as we go from 16 CLASSIFIED ITEMS all the way down to 1! || Intro - (0:00) || Matchup 1 - (2:13) || Matchup 2 - (15:58) || Matchup 3 - (26:56) || Matchup 4- (36:25) || Matchup 5 - (58:52) || Matchup 6 - (1:09:42) || Matchup 7 - (1:14:31) || Matchup 8 - (1:20:07) || Matchup 9 - (1:27:16) || Matchup 10 - (1:33:00) || Matchup 11 - (1:38:12) || Matchup 12 - (1:41:57) || Matchup 13 - (1:46:38) || Matchup 14 - (1:46:55) || Matchup 15 - (1:51:59) || Watch On YouTube: https://www.youtube.com/c/lightscamerabarstool || Movie Rankings/Streaming Database: MovieRankings.net || Subscribe to our YouTube channel: youtube.com/lightscamerabarstool || BUY LCB MERCH: store.barstoolsports.com/collections/lights-camera-barstool || Follow us on Instagram: instagram.com/thebracket || Follow us on Twitter: twitter.com/BracketPod || Follow us on TikTok: https://vm.tiktok.com/TTPdUh4sEV/ || Follow us on Facebook: https://www.facebook.com/LCBarstoolYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/lightscamerabarstool