2023 Calendar

Cybersecurity

Will Governments Weaponize ChatGPT?

Security expert and app developer Rex M. Lee gives his thoughts on how governments can weaponize ChatGPT to eliminate human rights, launch cybersecurity attacks on networks, and spread disinformation/misinformation.

See More

Is Advanced AI The Reason To Exit The Centralized Internet?

By Rex M. Lee

With the recent advancements and proliferation of AI ChatGPT, it may be time for individuals, companies and governments to consider exiting the centralized internet due to massive security, privacy, and safety threats exposed by artificial intelligence pioneers and industry experts who have recently come forward such as Elon Musk (OpenAI Founder) and Alphabet's (Google) Geoffery Hinton known as the "Godfather of AI".

In this essay, Rex M. Lee, security advisor/tech journalists, highlights the threats posed by remaining on centralized internet and presents best practices on the decoupling from the centralized internet, AI, and surveillance capitalism.

See More

Russia Appears To Be Preparing For More Ransomware Attacks, Microsoft Warns

In a February report on the cyber threats in Ukraine, Alphabet Inc.’s Google said that cyber campaigns by Sandworm, which it calls FrozenBarents, “seem designed to advance Russian strategic objectives and respond to changes in Russian intelligence requirements throughout the conflict.”

Written by TGDBuzz, read more at TGDaily, updated Mar. 16, 2023

See More

Cybersecurity Attacks Associated with Endpoint Attack Vectors on the Rise

By Rex M. Lee

According to a new report from Secureworks, business email compromise (BEC) attacks are on the rise.  BEC attacks, initial access vector (IAV), are considered insider attacks due to employee error according to IBM’s Breach Report. The FBI reported in 2022 that BEC attacks created a $43 billion dollar industry.

Social engineering (low skill) attacks, such as BEC, require nothing more than an effort to send phishing emails to mass numbers of email recipients. By mass email blasts, bad actors rely on a low percentage of recipients who will simply click on a nefarious link and/or an attachment enabling the malware to infect the recipient’s computer while spreading to other clients on the infected network.

See More

Security Expert: Tik Tok Existential National Security Threat

Interview on China in Focus with Rex Lee, cybersecurity advisor and expert

Chinese Developer ByteDance, the developers of TikTok, have been in the news lately regarding bans issued by government agencies for government employees.

Businesses, medical institutions, organizations, plus local and state governments should also consider banning intrusive apps and social media platforms in general, especially those developed in adversarial countries such as China and Russia.However, it is not that easy to implement a ban without knowing the facts. 

In this investigative report/interview, Rex M. Lee, security advisor/tech journalists, highlights security and privacy threats associated with TikTok, plus other intrusive apps/social media platforms.

See More

The BLACKOPS REPORT: Chinese Surveillance/Espionage In The US

This week The BLACKOPS REPORT with Merle Garrison and Casey Fleming, BlackOps Partners, discuss Chinese surveillance on the U.S. in light of the recent violation of U.S. airspace/sovereignty by China regarding the Chinese Spy Balloon.

Aside from the Chinese spy balloon, Merle and Casey address Chinese spy apps such as TikTok, WeChat, Temu, Shein, and other intrusive Chinese apps that pose massive privacy, security, and safety threats to U.S. end users, including teens, children, and business end users.

Merle and Casey welcome special guest, Rex M. Lee, Security Advisor and Tech Journalist, to discuss intrusive Chinese apps that enable Chinese app developers to surveil and data mine U.S. citizens, for profits while posing a national security threat to the United States.

See More

Surveillance Capitalism Part 3: Predatory App Terms of Service!

Have you ever wondered what you are agreeing to when you click on "I Agree" to Accept The Terms & Conditions that support apps & platforms developed by Google, Facebook, Twitter, Amazon and other Developers?

Tech Industry Insider Rex M. Lee exposes potentially illegal business practices associated with intrusive, addictive, & harmful apps supported by predatory & exploitive terms & conditions.

Interview with Rex M. Lee, Privacy and Cybersecurity Advisor

See More

Why All Apps/Social Media Platforms Are A Security Threat Aside From TikTok!

The media, plus government officials, simply do not understand how much personal and business information app & social media platform developers collect on the end user. CyberTalk TV exposes how much surveillance and data mining app and social media developers can conduct on end users.

See this explosive investigative report to understand that all intrusive apps & social media developers pose massive privacy, security, civil liberty, and safety threats to end users.

Interview with Rex M. Lee, Privacy and Cybersecurity Advisor

See More

Great Power Competition: The Stealth War Between China, Russia, & The U.S.

Interview with Rex Lee, Privacy and Cybersecurity Advisor

See why all social media platforms, including those from China and Russia, are a massive privacy and cybersecurity threat to your personal and business information due to the fact that all developers concerned are in the "information trafficking business" centered on collecting highly confidential end user personal, government, and business information.

This expert panel discussion highlights the fact that unrestricted and tech hybrid warfare targets everyone, including teens, children, and government/business end users of intrusive apps and social media platforms that are nothing more than legal malware.

See More

The Centralized Internet Exodus to Decentralized Web3: Why Migrate to Web3?

By Rex M. Lee

There was a time when the internet meant freedom, opportunity, innovation, and provided information on any topic at your fingertips, that time was in the 90s before the internet was centralized by monopolies we refer to as “Big Tech”. 

Now in the era of “Surveillance Capitalism”, how can Web3 be the answer to decoupling from today's internet? 

See More