TTS 2023 calendar is NOW LIVE. Download: Calendar List

Cybersecurity

Russian & Chinese Hacker Attacks

Russian & Chinese Hacker Attacks

Interview with Rex Lee, Privacy and Cybersecurity Advisor

China hacked six states and Russia hacked major airports in the United States in recent cyberattacks.

Nation-state cyberattacks are getting more sophisticated according to cybersecurity expert, Rex M. Lee, My Smart Privacy/CyberTalk TV.

Nation-state hacking groups such as China's Apt41, Russia's Sandworm, & N. Korea's Lazarus are doubling down on tech hybrid warfare exploiting vulnerabilities within the Android OS, Apple iOS, Microsoft Windows OS, and Intrusive Apps that support Smartphones, Tablet PCs, connected products, and PCs.

Cybersecurity expert, Rex M. Lee will explain how it works.

See More

Social Engineering Security Attacks: What You Need To Know Part 2

By Rex M. Lee

In my previous article, Social Engineering Security Attacks Part 1, we learned that a single security breach can cost an organization between $4.5 - $10+ million dollars, and that’s just to research the breach, according to IBM’s 2022 Cost of a Data Breach Report.

Part 1 highlighted some of the most common social engineering attacks. However, there are other attack vectors associated with social engineering attacks that we will examine here.

Social engineering attacks are simply defined as attacks centered on taking advantage of human psychology through deception in order to acquire confidential and protected information. 

See More

Social Engineering Security Attacks: What You Need To Know

According to IBM’s 2022 “Cost of a Data Breach Report”, aside from legal fees the average cost of a breach is approximately $4.5 million dollars globally and nearly $10 million dollars in the United States. Furthermore, the report states that 90% of all breaches occur due to human error. Although these types of attacks are nearly 100% preventable, most companies do not have the right incident response policies in place to prevent these attacks in the first place.

– Rex Lee, Privacy and Cybersecurity Advisor

See More

Are Business Users of Smartphones Supported by Intrusive Apps Violating Confidentiality Agreements and Laws?

By Rex M. Lee

Due to the proliferation of intrusive operating systems (OS) and apps that support smartphones, many businesses; major corporations; government entities, including the military; law enforcement agencies; healthcare providers; legal professionals; and journalists have adopted smartphones to use professionally within a confidential and protected work environment.

Intrusive operating systems and apps enable the developers to indiscriminately monitor, track, and data mine the end user for profits which means that the developers are collecting confidential and protected information from the end user posing privacy and cybersecurity threats to the end user.

See More

Russian Hacking Group Killnet Launches Attacks on U.S. Airports

CyberTalk TV's Rex M. Lee, Cybersecurity Advisor/Tech Journalist, interviewed by California Today News Regarding Cyberattack On U.S. Airports, Including LAX by Russia's KillNet

California Today, Oct. 17, 2022

See More

The Need for an Enterprise Top Down Security Strategy

Since the U.S. government is both unable and seemingly unwilling to protect U.S. corporations and private businesses from nation-state threats, it is incumbent upon board members and senior executives to be at the forefront to a top-down Intelligence, security and privacy strategy that includes corporate counter intelligence and wargaming.

The fact is, companies from China and Russia have been wargaming to prepare for competition since the mid-90s when China officially launched their unrestricted hybrid warfare campaign against the west.

By Rex M. Lee
Rex M. Lee is a Privacy and Cybersecurity Advisor, Tech Journalist and a Senior Tech/Telecom Industry Analyst for BlackOps Partners, Washington, DC. Find more information at My Smart Privacy, www.MySmartPrivacy.com

See More

Cyber Attacks On America: Hackers Use OS & Apps to Launch Attacks

Cyber Attacks On America: Hackers Use OS & Apps to Launch Attacks

In this special CyberTalk TV episode, China In Focus sat down with TechTalk Summit's Rex M. Lee, cybersecurity adviser.  He helps shed light on cyberattacks on America from nation-state hackers, how they affect us in our daily lives, and what can be done to stop them.

Lee notes how adversarial countries can get in is through intrusive apps and operating systems: “You have to look at an app as legal malware. And that’s the best way you can describe apps today. An app—whether it’s a social media app developed by Bytedance (China), such as TikTok, or Facebook, or Instagram—any of these apps, they are basically legal malware that enable the developer to monitor, track, and data mine the end user for financial gain 24 by seven, 365 days a year.”

See More

Tech-based Hybrid Warfare Waged by Adversarial Countries: Threats Posed by Intrusive Apps

Adversarial countries, including nation-state hackers, are waging unrestricted Tech-based Hybrid Warfare against the free world using intrusive apps that support smartphones, tablet PCs, and connected products supported by the Android OS, Apple iOS, and Microsoft Windows OS.

Learn how nation-state actors can use intrusive apps to surveil end users while data mining end users 24x7/365 days per year by way of apps that support connected products and services manufactured/developed in China

See More

Watch the Video Interview
Clicking on “I Agree”: Why App Terms of Use Are A Privacy & Cybersecurity Threat!

Have you ever wondered what you are agreeing to when you click on "I Agree" to Accept The Terms & Conditions that support apps & platforms developed by Google, Facebook, Twitter, Amazon and other Developers? Tech Industry Insider Rex M. Lee exposes potentially illegal business practices associated with intrusive, addictive, & harmful apps supported by predatory & exploitive terms & conditions. 

See More

“Clicking on I Agree”: Cybersecurity, Privacy & Safety Threats Associated with Accepting App Terms of Use 

Ever wonder what you are accepting when you click on “I Agree” to accept the collective terms of use that support popular operating systems (OSs), apps, and social media platforms?

You will be shocked to know that popular OSs, apps, and social media platforms are supported by predatory terms of use enabling all developers concerned, including those from China and Russia, to surveil and data mine their end users for profits 24x7/365 days per year. The surveillance and data mining comes at the expense of the end user’s privacy, cybersecurity, and safety since most apps and social media platforms are intentionally developed to be highly addictive in order for the developer to exploit the end user for profits according to the Netflix documentary, “The Social Dilemma”.

See More
Twitter feeds