2023 Calendar

Cybersecurity

Surveillance Capitalism Part 3: Predatory App Terms of Service!

Have you ever wondered what you are agreeing to when you click on "I Agree" to Accept The Terms & Conditions that support apps & platforms developed by Google, Facebook, Twitter, Amazon and other Developers?

Tech Industry Insider Rex M. Lee exposes potentially illegal business practices associated with intrusive, addictive, & harmful apps supported by predatory & exploitive terms & conditions.

Interview with Rex M. Lee, Privacy and Cybersecurity Advisor

See More

Why All Apps/Social Media Platforms Are A Security Threat Aside From TikTok!

The media, plus government officials, simply do not understand how much personal and business information app & social media platform developers collect on the end user. CyberTalk TV exposes how much surveillance and data mining app and social media developers can conduct on end users.

See this explosive investigative report to understand that all intrusive apps & social media developers pose massive privacy, security, civil liberty, and safety threats to end users.

Interview with Rex M. Lee, Privacy and Cybersecurity Advisor

See More

Great Power Competition: The Stealth War Between China, Russia, & The U.S.

Interview with Rex Lee, Privacy and Cybersecurity Advisor

See why all social media platforms, including those from China and Russia, are a massive privacy and cybersecurity threat to your personal and business information due to the fact that all developers concerned are in the "information trafficking business" centered on collecting highly confidential end user personal, government, and business information.

This expert panel discussion highlights the fact that unrestricted and tech hybrid warfare targets everyone, including teens, children, and government/business end users of intrusive apps and social media platforms that are nothing more than legal malware.

See More

The Centralized Internet Exodus to Decentralized Web3: Why Migrate to Web3?

By Rex M. Lee

There was a time when the internet meant freedom, opportunity, innovation, and provided information on any topic at your fingertips, that time was in the 90s before the internet was centralized by monopolies we refer to as “Big Tech”. 

Now in the era of “Surveillance Capitalism”, how can Web3 be the answer to decoupling from today's internet? 

See More

Russian & Chinese Hacker Attacks

Interview with Rex Lee, Privacy and Cybersecurity Advisor

China hacked six states and Russia hacked major airports in the United States in recent cyberattacks.

Nation-state cyberattacks are getting more sophisticated according to cybersecurity expert, Rex M. Lee, My Smart Privacy/CyberTalk TV.

Nation-state hacking groups such as China's Apt41, Russia's Sandworm, & N. Korea's Lazarus are doubling down on tech hybrid warfare exploiting vulnerabilities within the Android OS, Apple iOS, Microsoft Windows OS, and Intrusive Apps that support Smartphones, Tablet PCs, connected products, and PCs.

Cybersecurity expert, Rex M. Lee will explain how it works.

See More

Social Engineering Security Attacks: What You Need To Know Part 2

By Rex M. Lee

In my previous article, Social Engineering Security Attacks Part 1, we learned that a single security breach can cost an organization between $4.5 - $10+ million dollars, and that’s just to research the breach, according to IBM’s 2022 Cost of a Data Breach Report.

Part 1 highlighted some of the most common social engineering attacks. However, there are other attack vectors associated with social engineering attacks that we will examine here.

Social engineering attacks are simply defined as attacks centered on taking advantage of human psychology through deception in order to acquire confidential and protected information. 

See More

Social Engineering Security Attacks: What You Need To Know

According to IBM’s 2022 “Cost of a Data Breach Report”, aside from legal fees the average cost of a breach is approximately $4.5 million dollars globally and nearly $10 million dollars in the United States. Furthermore, the report states that 90% of all breaches occur due to human error. Although these types of attacks are nearly 100% preventable, most companies do not have the right incident response policies in place to prevent these attacks in the first place.

– Rex Lee, Privacy and Cybersecurity Advisor

See More

Are Business Users of Smartphones Supported by Intrusive Apps Violating Confidentiality Agreements and Laws?

By Rex M. Lee

Due to the proliferation of intrusive operating systems (OS) and apps that support smartphones, many businesses; major corporations; government entities, including the military; law enforcement agencies; healthcare providers; legal professionals; and journalists have adopted smartphones to use professionally within a confidential and protected work environment.

Intrusive operating systems and apps enable the developers to indiscriminately monitor, track, and data mine the end user for profits which means that the developers are collecting confidential and protected information from the end user posing privacy and cybersecurity threats to the end user.

See More

Russian Hacking Group Killnet Launches Attacks on U.S. Airports

CyberTalk TV's Rex M. Lee, Cybersecurity Advisor/Tech Journalist, interviewed by California Today News Regarding Cyberattack On U.S. Airports, Including LAX by Russia's KillNet

California Today, Oct. 17, 2022

See More

The Need for an Enterprise Top Down Security Strategy

Since the U.S. government is both unable and seemingly unwilling to protect U.S. corporations and private businesses from nation-state threats, it is incumbent upon board members and senior executives to be at the forefront to a top-down Intelligence, security and privacy strategy that includes corporate counter intelligence and wargaming.

The fact is, companies from China and Russia have been wargaming to prepare for competition since the mid-90s when China officially launched their unrestricted hybrid warfare campaign against the west.

By Rex M. Lee
Rex M. Lee is a Privacy and Cybersecurity Advisor, Tech Journalist and a Senior Tech/Telecom Industry Analyst for BlackOps Partners, Washington, DC. Find more information at My Smart Privacy, www.MySmartPrivacy.com

See More