By Rex M. Lee, Security Advisor, My Smart Privacy
Cybersecurity compliance, such as ISO 27001, GDPR & CCPA, do not address endpoint security and privacy threats posed by Surveillance Capitalism employed by Alphabet (Google), Apple, and Microsoft.
By Rex M. Lee, Security Advisor, My Smart Privacy
Cybersecurity compliance, such as ISO 27001, GDPR & CCPA, do not address endpoint security and privacy threats posed by Surveillance Capitalism employed by Alphabet (Google), Apple, and Microsoft.
CyberTalk TV Interview with Rex M. Lee
Global superpowers are competing on a new battleground: artificial intelligence (AI). But how far does global competition lag behind U.S. development? Will AI be used for tech-based hybrid warfare posing security and privacy threats to end users, including businesses that adopt the use of AI? NTD spoke to Rex Lee, cybersecurity adviser at My Smart Privacy, for more.
By Rex M. Lee
During the proliferation of the internet in the 1990s, the internet was decentralized enabling free trade and commerce on an equal basis where content creators were free to publish anything at will.
Although the internet today is still theoretically decentralized, we cannot discount the fact that the internet, artificial intelligence (AI), and connected technology have been centralized by a handful of multinational corporations that include Google, Apple, and Microsoft.
Interview with cybersecurity analyst, Rex M. Lee
Quantum computing is the next battle arena for the United States and China. China has been building its expertise in the next frontier. looking toward even bigger goals.
With AI-integrated Chinese apps being offered to U.S. citizens, children, and business users, and quantum computing used by nation-state hackers and the military, what else is behind Beijing’s quantum ambitions? And how can Washington up its game? NTD sat down with Rex M. Lee, cybersecurity adviser at My Smart Privacy, for details.
Security expert and app developer Rex M. Lee gives his thoughts on how governments can weaponize ChatGPT to eliminate human rights, launch cybersecurity attacks on networks, and spread disinformation/misinformation.
By Rex M. Lee
With the recent advancements and proliferation of AI ChatGPT, it may be time for individuals, companies and governments to consider exiting the centralized internet due to massive security, privacy, and safety threats exposed by artificial intelligence pioneers and industry experts who have recently come forward such as Elon Musk (OpenAI Founder) and Alphabet's (Google) Geoffery Hinton known as the "Godfather of AI".
In this essay, Rex M. Lee, security advisor/tech journalists, highlights the threats posed by remaining on centralized internet and presents best practices on the decoupling from the centralized internet, AI, and surveillance capitalism.
In a February report on the cyber threats in Ukraine, Alphabet Inc.’s Google said that cyber campaigns by Sandworm, which it calls FrozenBarents, “seem designed to advance Russian strategic objectives and respond to changes in Russian intelligence requirements throughout the conflict.”
Written by TGDBuzz, read more at TGDaily, updated Mar. 16, 2023
By Rex M. Lee
According to a new report from Secureworks, business email compromise (BEC) attacks are on the rise. BEC attacks, initial access vector (IAV), are considered insider attacks due to employee error according to IBM’s Breach Report. The FBI reported in 2022 that BEC attacks created a $43 billion dollar industry.
Social engineering (low skill) attacks, such as BEC, require nothing more than an effort to send phishing emails to mass numbers of email recipients. By mass email blasts, bad actors rely on a low percentage of recipients who will simply click on a nefarious link and/or an attachment enabling the malware to infect the recipient’s computer while spreading to other clients on the infected network.
Interview on China in Focus with Rex Lee, cybersecurity advisor and expert
Chinese Developer ByteDance, the developers of TikTok, have been in the news lately regarding bans issued by government agencies for government employees.
Businesses, medical institutions, organizations, plus local and state governments should also consider banning intrusive apps and social media platforms in general, especially those developed in adversarial countries such as China and Russia.However, it is not that easy to implement a ban without knowing the facts.
In this investigative report/interview, Rex M. Lee, security advisor/tech journalists, highlights security and privacy threats associated with TikTok, plus other intrusive apps/social media platforms.
This week The BLACKOPS REPORT with Merle Garrison and Casey Fleming, BlackOps Partners, discuss Chinese surveillance on the U.S. in light of the recent violation of U.S. airspace/sovereignty by China regarding the Chinese Spy Balloon.
Aside from the Chinese spy balloon, Merle and Casey address Chinese spy apps such as TikTok, WeChat, Temu, Shein, and other intrusive Chinese apps that pose massive privacy, security, and safety threats to U.S. end users, including teens, children, and business end users.
Merle and Casey welcome special guest, Rex M. Lee, Security Advisor and Tech Journalist, to discuss intrusive Chinese apps that enable Chinese app developers to surveil and data mine U.S. citizens, for profits while posing a national security threat to the United States.