• 00:15

    No Malware, No Compromise

    in Technology

    While conducting incident response work, Mandiant encounters security teams and executives who seem to focus on malware as the defining feature of a compromise. These groups think that the scope of an incident depends on knowing where the intruder installed malware. Knowing where malware was used, and how it was used, is indeed important for effective incident response. Unfortunately, knowledge of malware, however complete, is only half the picture.

  • 00:17

    PODCAST: Insights into 2014 Mobile Malware Report

    in News

    Welcome to the Federal Blue Print podcast series. Using tools from Blue Coat’s comprehensive security portfolio and data gathered from over 75 million users around the world, the 2014 Mobile Malware Report provides a comprehensive overview of the state of malware and what we can do to mitigate its effects.


    Today, we are speaking with Sasi Murthy, Senior Director, Product Marketing at Blue Coat Systems, who is going to share more insights into this report.

  • 01:59

    Computer America - F-Secure's Malware Expert David Perry!

    in Technology

    Computer America


    Both Hours: F-Secure.  David Perry is the new Threat Strategist and Spokesperson for F-Secure!  Tonight we explore all of the newest malware and threats to you and your personal computer!

  • 00:05

    Unflod Baby Panda - iOS 7 Mobile Malware Can Steal Apple IDs

    in Software

    In this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device. 


    To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ . 


     


     

  • 00:14

    Tech Talk Repair Time Episode 3 - Viruses/Malware

    in Computers

    During this episode, we will talk about viruses and malware. After explaining the difference between viruses and malware, we will talk about ways to protect yourself from viruses and malware.


    Once we are done talking about viruses and malware, we will open the phones to callers with their own personal questions about PCs.


    If you are interested in being part of the show with your personal question about PCs, make sure to call in before 10:00pm CST so we can get a little bit of information about you prior to the show.
     

  • 00:39

    How To Draw The Last Line Of Defense In Your Network Perimeter

    in Technology

    More so than just absolute threats to workstations or servers, security threats and risks posed to a network can have even graver consequences.  For example, if your network perimeter goes unprotected, malformed data packets can enter in, which can lead to Distributed Denial of Service (DDoS) attacks.  Also, an exposed network can allow for all types and kinds of malware, spyware, and adware to enter in, bringing your network and everything on it, to a screeching halt.  


    What can you do to protect your network?  In today's podcast, we learn about a new solution called 'GlassWire'.  It is a network security tool, and consists of the following features:


    1) Visual Network Monitoring;


    2) A Network Time Machine;


    3) Alert Systems;


    4) Bandwidth Usage Monitoring;


    5) Remote Server Monitoring;


    6) Internet Privacy Protection.


    Tune in and learn how to protect your network!!!

  • 00:31

    How To Make Your CyberSecurity Defenses The Best Ever

    in Technology

    In today's world, we all know that just about everything and anything based on Internet are prone to Cyber Security attacks and hacks.  Whether it be malware, spyware, trojan horses, botnets, etc. your corporate IT infrastructure is fair game to it all. But, implementing a security strategy to protect your small to medium sized business (SMB) is not only confusing to figure out, but it can also be costly as well.  But, this scenario could very well be changing now. 


    In today's radio show, we interview the CEO (Mr. Andrew Bagrin) of a brand new company called "My Digital Shield". His company has developed a new security solution which is very affordable to the SMB.  All that is required is some hardware, come cabling, and a quick download of their security solution.  All of the security monitoring is done in the Cloud - so you can stay focused on what you do best, which is running your business.


    Listen to our interview with Mr. Bagrin, and find out how you can fortify your lines of Cyber Security defenses further and deeper, with "My Digital Shield".

  • 00:59

    World War III is a Cyber War and it Has Begun

    in Politics Conservative

    Did North Korea attack Sony?  Did Islamic Iranian hackers target airlines?  Malware panic seizes America.  Is North Korea working with Iran?  The Axis of Evil is alive and well. 


    The Federal Bureau of Investigation has warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment.


    The new war will be fought by tech warriors like Eric Schiffer, cyber security expert and is Chairman and CEO of Patriarch Equity, and DigitalMarketing.com.  Eric is an advanced tech expert, all his companies are armed and equipped with large digital security divisions and revolutionary cutting edge technology.


     


    Tags:  cyber attack, Sony, North Korea, Iran, FBI, Obama, Eric Schiffer, cyber security, hackers, malware

  • 02:00

    Computer America - Apple Expert Gene Steinberg ; F-Secure's David Perry!

    in Technology

    Computer America


    Hour one: Apple Expert and Computer America Correspondent Gene Steinberg joins us for this, our last Show of 2014!


    Hour two: For our last Hour of 2014, Malware Expert and Threat Strategist and Spokesperson for F-Secure David Perry joins us to discuss Santa, Malware and whatever else strikes his fancy!


    HAPPY HOLIDAYS AND A HAPPY NEW YEAR TO YOU FROM ALL OF US HERE AT COMPUTER AMERICA!  WE'LL SEE YOU LIVE AGAIN ON JANUARY 6, 2015!!

  • 00:46

    You Are "The One" Essay Contest Episode 10

    in Entertainment

    This CONTEST requires writing an essay 500 words or less, relating to an experience of yours (past, present or future) to a song of your choice on the new CD release “The One” by Chris Jasper, recognized multi-talented producer, composer, singer, song writer, musician, Hall of Fame Inductee, former member of the Isley Brothers and Isley Jasper Isley Bands and recent recipient of the Grammy Lifetime Achievement Award. Hear It Now Live Radio will broadcasting snippets from the album “The One” which will be broadcast at random times throughout the contest opening and closing date. Features include Albums from Chris Jasper’s vault.  Essays in video format must be on disc, no links accepted, *Discs are subject to virus/disc analysis.  Any disc/electronic submission containing a virus, malware, spyware or malicious code will be disqualified and may be subject to civil/criminal action.  Details/Official Entry Form will be posted on www.entertainmentenclosed.com and the link is available on www.chrisjasper.com .


    Entries will be submitted to the official email address:  youaretheonecontest@gmail.com  or you may submit entry to the official physical mailing address:  You Are “The One” Contest, P.O. Box 90055, Columbia, SC  29290.  No mailing costs will be reimbursed.  Strict adherence to the Official Rules will be followed.  Good Luck Everyone!!  We want to wish all of you a Safe and Blessed Holiday… Merry Christmas and Happy New!!


    Much Happiness and Much Love…

  • 00:56

    You Are "The One" Essay Contest Episode 9

    in Entertainment

    ENTERTAINMENT ENCLOSED and GOLD CITY MUSIC presents ‘You Are “The One” Essay Contest’ Episode 9. A Contest that requires writing an essay 500 words or less, relating to an experience of yours (past, present or future) to a song of your choice on the new CD release “The One” by Chris Jasper, recognized multi-talented producer, composer, singer, song writer, musician, Hall of Fame Inductee, former member of the Isley Brothers and Isley Jasper Isley Bands and recent recipient of the Grammy Lifetime Achievement Award.  HEAR IT NOW LIVE RADIO will be broadcasting snippets from the album “The One” which will be broadcast at random times throughout the contest opening and closing date.  Any Essays in video format must be on disc, no links accepted, *Discs are subject to virus/disc analysis.  Any disc/electronic submission containing a virus, malware, spyware or malicious code will be disqualified and may be subject to civil/criminal action.  Details/Official Entry Form will be posted on www.entertainmentenclosed.com and the link is also available on www.chrisjasper.com .


    All entries will be submitted to the official email address:  youaretheonecontest@gmail.com.  If no computer is available, mailings will be submitted and addressed to the official physical address:  ‘You Are “The One” Contest’, P.O. Box 90055, Columbia, SC  29290.  No mailing costs will be reimbursed.


    Strict adherence to the Official Rules will be followed.


    Good Luck!!  Much Happiness Much Love…

Results Per Page: 12 | 24 | 48
Loading...
Loading...