TTS 2023 calendar is NOW LIVE. Download: Calendar List

Cybersecurity

Great Power Competition: The Stealth War Between China, Russia, & The U.S.

Interview with Rex Lee, Privacy and Cybersecurity Advisor

See why all social media platforms, including those from China and Russia, are a massive privacy and cybersecurity threat to your personal and business information due to the fact that all developers concerned are in the "information trafficking business" centered on collecting highly confidential end user personal, government, and business information.

This expert panel discussion highlights the fact that unrestricted and tech hybrid warfare targets everyone, including teens, children, and government/business end users of intrusive apps and social media platforms that are nothing more than legal malware.

See More

The Centralized Internet Exodus to Decentralized Web3: Why Migrate to Web3?

By Rex M. Lee

There was a time when the internet meant freedom, opportunity, innovation, and provided information on any topic at your fingertips, that time was in the 90s before the internet was centralized by monopolies we refer to as “Big Tech”. 

Now in the era of “Surveillance Capitalism”, how can Web3 be the answer to decoupling from today's internet? 

See More

Russian & Chinese Hacker Attacks

Interview with Rex Lee, Privacy and Cybersecurity Advisor

China hacked six states and Russia hacked major airports in the United States in recent cyberattacks.

Nation-state cyberattacks are getting more sophisticated according to cybersecurity expert, Rex M. Lee, My Smart Privacy/CyberTalk TV.

Nation-state hacking groups such as China's Apt41, Russia's Sandworm, & N. Korea's Lazarus are doubling down on tech hybrid warfare exploiting vulnerabilities within the Android OS, Apple iOS, Microsoft Windows OS, and Intrusive Apps that support Smartphones, Tablet PCs, connected products, and PCs.

Cybersecurity expert, Rex M. Lee will explain how it works.

See More

Social Engineering Security Attacks: What You Need To Know Part 2

By Rex M. Lee

In my previous article, Social Engineering Security Attacks Part 1, we learned that a single security breach can cost an organization between $4.5 - $10+ million dollars, and that’s just to research the breach, according to IBM’s 2022 Cost of a Data Breach Report.

Part 1 highlighted some of the most common social engineering attacks. However, there are other attack vectors associated with social engineering attacks that we will examine here.

Social engineering attacks are simply defined as attacks centered on taking advantage of human psychology through deception in order to acquire confidential and protected information. 

See More

Social Engineering Security Attacks: What You Need To Know

According to IBM’s 2022 “Cost of a Data Breach Report”, aside from legal fees the average cost of a breach is approximately $4.5 million dollars globally and nearly $10 million dollars in the United States. Furthermore, the report states that 90% of all breaches occur due to human error. Although these types of attacks are nearly 100% preventable, most companies do not have the right incident response policies in place to prevent these attacks in the first place.

– Rex Lee, Privacy and Cybersecurity Advisor

See More

Are Business Users of Smartphones Supported by Intrusive Apps Violating Confidentiality Agreements and Laws?

By Rex M. Lee

Due to the proliferation of intrusive operating systems (OS) and apps that support smartphones, many businesses; major corporations; government entities, including the military; law enforcement agencies; healthcare providers; legal professionals; and journalists have adopted smartphones to use professionally within a confidential and protected work environment.

Intrusive operating systems and apps enable the developers to indiscriminately monitor, track, and data mine the end user for profits which means that the developers are collecting confidential and protected information from the end user posing privacy and cybersecurity threats to the end user.

See More

Russian Hacking Group Killnet Launches Attacks on U.S. Airports

CyberTalk TV's Rex M. Lee, Cybersecurity Advisor/Tech Journalist, interviewed by California Today News Regarding Cyberattack On U.S. Airports, Including LAX by Russia's KillNet

California Today, Oct. 17, 2022

See More

The Need for an Enterprise Top Down Security Strategy

Since the U.S. government is both unable and seemingly unwilling to protect U.S. corporations and private businesses from nation-state threats, it is incumbent upon board members and senior executives to be at the forefront to a top-down Intelligence, security and privacy strategy that includes corporate counter intelligence and wargaming.

The fact is, companies from China and Russia have been wargaming to prepare for competition since the mid-90s when China officially launched their unrestricted hybrid warfare campaign against the west.

By Rex M. Lee
Rex M. Lee is a Privacy and Cybersecurity Advisor, Tech Journalist and a Senior Tech/Telecom Industry Analyst for BlackOps Partners, Washington, DC. Find more information at My Smart Privacy, www.MySmartPrivacy.com

See More

Cyber Attacks On America: Hackers Use OS & Apps to Launch Attacks

Cyber Attacks On America: Hackers Use OS & Apps to Launch Attacks

In this special CyberTalk TV episode, China In Focus sat down with TechTalk Summit's Rex M. Lee, cybersecurity adviser.  He helps shed light on cyberattacks on America from nation-state hackers, how they affect us in our daily lives, and what can be done to stop them.

Lee notes how adversarial countries can get in is through intrusive apps and operating systems: “You have to look at an app as legal malware. And that’s the best way you can describe apps today. An app—whether it’s a social media app developed by Bytedance (China), such as TikTok, or Facebook, or Instagram—any of these apps, they are basically legal malware that enable the developer to monitor, track, and data mine the end user for financial gain 24 by seven, 365 days a year.”

See More

Tech-based Hybrid Warfare Waged by Adversarial Countries: Threats Posed by Intrusive Apps

Adversarial countries, including nation-state hackers, are waging unrestricted Tech-based Hybrid Warfare against the free world using intrusive apps that support smartphones, tablet PCs, and connected products supported by the Android OS, Apple iOS, and Microsoft Windows OS.

Learn how nation-state actors can use intrusive apps to surveil end users while data mining end users 24x7/365 days per year by way of apps that support connected products and services manufactured/developed in China

See More
Twitter feeds