Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Sep 19, 2018

Freezing credit is a cumbersome process The good news is it now free to freeze or unfreeze your credit report.

Find out more as Craig talks with Ken and Matt this Wednesday morning about Equifax, the new iPhone XS Max, and top security tips from DEFCON.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Black Hat And Defcon Cybersecurity Experts Share Tips On How To Protect Yourself 

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/19/2018

iPhone XS Max - Now Free To Freeze Your Credit - Top Security Tips From Defcon

Craig Peterson: [00:00:00] Hey everybody. Good morning, I wanted to give a shout out to everybody listening to these podcasts. And, you know, I, I used to podcast a lot. I've been pretty good about it for the last couple of years, but there were probably three, maybe even five years when I wasn't podcasting I started doing this decade ago, excuse me, maybe what, 1520 years ago, a long time before they even podcast started putting them up online. And then I started podcasting and I got listed with Apple and 20 million plus downloads but because I stopped for a while I just I lost a lot of listeners but I really appreciate all you guys and gals who are listening and for sharing the podcast if you know somebody who might benefit from these podcasts in my like it might like a more mature look at technology not this stuff that kids are doing online but from somebody who's been in the tech business now for many many decades I'd love it if you'd share the easiest way to share this podcast just tell people to go to http://craigpeterson.com/iTunes and you'll find that will redirect you right to Apple's website. http://craigpeterson.com/iTunes and have them sign up because that's the that's the best way for me to keep track of who is online least how many and gives them a little bit of ratings as well and if you haven't rated this podcast yet please do that and you can do that easily. Again just go to http://craigpeterson.com/iTunes and rate the podcast so far we've got only a handful of reviews which is fine but they're all five stars so I'd like that and hopefully you give me a five star review as well. So please do take the time share this podcast with friends and family and business people who may be as I said want to understand tech a little more what's important particularly in the security around my spend a lot of stuff time in that space because that's what I do for a living and you know there are no commercials in this right this is commercial free it always has been I've been approached by people to take money for this and then shirt them I'd really rather have this be a free podcast but you know it's an effort of love it always has been my radio shows the same thing I don't get paid for any of this I'm just trying to get the information out I'm trying to help people and for those people who think that maybe they'd like a little bit extra help and want to hire me great I'd be glad to do some consulting work for you. Normally we start out with an RIR which is a risk intelligence report so you know what your risks are and then help you put together a plan to take care of those risks as time goes forward so I think that might be useful for you if it is let me know and it's simple to find me just me@craigpeterson.com. Me@craigpeterson.com and you will be all set. Just a quick email over there. That is a monitored email account. Alright, so this morning I was on in Maine, three different stations up there. We talked about the new Apple iPhone a little bit and what that means to all of us, frankly, the new freeze law for your credit report starting Friday, big deal and I'm so glad that they did this and that President Trump signed that bill. I think this is going to be a really good thing from a security standpoint. And then a little bit about black hat and DEFCON, cyber security the tips from the experts what should you do to help keep everything safe so here we go with Ken and Matt and by the way for those that have already shared this podcast I just want to say thanks. Thanks for spending the time thanks for your faith in me and thanks for sharing it and for being a listener even you know it it's great and you can always send me an email me@craigpeterson.com. I'd love to hear from you. What did you get from the podcasts What did you like about it how has it helped you or your business that's always helpful because we can share those with other people who are like you who are like us who can then hopefully find us and start listening as well hopefully will benefit their lives to here we go

Unknown 4:28
okay time to go back to Craig Peterson our tech guru. He joins us as he always does on Wednesdays at this time. Craig How are you this morning?

Unknown 4:36
doing really well It almost sounds like I'm boring every Wednesday you know where's the variety here you want to do Thursday next week and not have to be Wednesday it works once

Unknown 4:47
you will be here but

Unknown 4:51
by the way, this whole male thing I gotta I gotta chime in on this mayo and ketchup and all this other stuff me up. Hey up is what its gonna make. Mayo. Yeah. Yeah, I was in Belgium. And the first time ever they had something I think they called it Superman sauce I think is what it was. And they put it on their hamburgers over there. And it's mayo and Sriracha. Yes,

Unknown 5:19
yes, they have $1 bottles you can give them the grocery store.

Unknown 5:22
You know I got that we got some because we saw it there it is quite good. We had actually made it ourselves, which is very difficult to find. You know the Hellman's in the garage and put it together but it it it is fantastic you know i

Unknown 5:39  
i use it anytime I have sushi and I and I used to mix it myself but it was either be too spicy or not spicy enough and I keep having to add and then they now have it in a bottle I have two bottles in my refrigerator right now

Unknown 5:51
I don't remember what it's called that mixed up it's

Unknown 5:54
it's right next to each other

Unknown 5:57
I think they call it remember you know

Unknown 5:59
I look when I at home and I'll try and remember look into yeah it's

Unknown 6:02
not for me oh but yeah it is really good so people who are wondering you know cuz Ken's often crazy. It's not crazy crazy like a fox up this

Unknown 6:15
crazy like a fox? Craig so the iPhone XS Max

Unknown 6:23
your new phone? Wow.

Unknown 6:25
You know I've been seeing some reviews on it. And it's really big. I mean, it's now they set when I look at that a toadstool was that necessary?

Unknown 6:38
It seems to me if you're blind as a bat, like I am. And you have short, stubby fingers like I do that that's really a good thing to get. Although a lot of people want to be able to touch things. One hand it you know, while holding it. Oh, and you don't really do that folks are just

Unknown 6:55
one of my sons roses as well. And he thought he didn't want the big chunk of he's, you know, he's 22. So he knows pretty much everything and it's a big phones were absolutely stupid. And he can tax one handed. And so he ended up getting the eight. What does he get? Yeah, you got the eight plus, which is of course a bigger phone. And he absolutely loves it. Because he can use it with one hand. And Apple has actually made a whole bunch of studies and they work to them so that it is usable with one hand even even the keyboard on it. You know the on screen keyboard is designed for that just as

Unknown 7:37
an aside cricket you don't you find it interesting how our tastes constantly change about this kind of stuff. I remember, you know, of course, when cellphones first became a thing, they rather large because they sort of had to be heavy. Yeah, like the old Nokia phones. They were pretty they were bricks, basically. Right, right. And then over time, progressively, we got smaller and smaller, we made flip phones so that they could fit into your little pocket. And then you got you know, I remember at one point, I had the smallest flip phone like every was like the size of my fingernail, right? It was like just such a small phone. And then over time, people like, boy, those small phones are stupid. I really don't like those small phones. I want something with a bigger screen. I've got to get something that's larger. And so then the screens grew in size, grew in size grew in size. And now they're Of course, my Galaxy Note is the size of a iPad, basically. And now kids these days are saying those stupid old people with their big phones. Oh, you know, I wanna I want a smaller phone. So I can text with one hand. It's just on kind of constantly changes what our

Unknown 8:29
tastes are these days. I can't believe these good. Yeah, pretty much, Matt. It's interesting. Because we do change. Right. And, and tastes do change. But I think a lot of it has to do with what we're using the phones for, you know, when when they came out. I had the Motorola flip phone as well. I had a few different models of my love them. They're so small, but we only use it as a phone right, right now now, which are for most people for more than half of the world that have actually access to some sort of a computing device. The phone is it, right? That's it. composing stuff, they're doing video editing, they're using it as their cameras, the only camera they have, and the it's a different world map. It's not just a taste of change. It's the way we're using the tech is changing and and it's going to change more as we go forward. We've already got Have you seen that gives a phone that is again, it's a smartphone. And it's a roll up. It's almost like what it's a roll up like a girl? Yeah, yeah, I'm thinking of a fruit roll up. That's almost perfect, right? So that's fine. It's kind of a very thick pen. And you roll out the display because the display is just kind of like paper. I

Unknown 9:52
don't even know how you do

Unknown 9:55
mean, how do you use it? I mean,

Unknown 9:58
how does a phone you have a battery in a row.

Unknown 10:02
Okay, well, thank you. it like that. Think of it as as to DSL stacked on top of each other to see cells making stacked on top of each other, right. So that's the size of the core of your phone. So you'd have these two D sells seashells. Excellent. Closer see sitting or three c cell stack up. So there's sitting stacked up on your desk. So now you pull the display out of the GS stack of seashells. So you pull it out towards the right for instance. And now you have a display that you're looking at. And it projects a keyboard on to whatever surface it's on. So if it's on the table, now there's a keyboard projected with a laser on to your desktop, and it monitors your fingers, it's reading your fingers and where they are as you're typing. So now any surface becomes a keyboard and this devices with you anywhere you go. And if you want to have a look at it while you're on the road that you pull it out and do pull out the display. Now right now the display is not touch sensitive. But that's kind of the sinking of where the next step is these this device already exists and and then we've got the stuff that's going to tie into your brains. We've got a couple of major companies now including Apple working on a heads up display basically think of Google Glass and Apple is doing some major things with that as well. They're kind of changing that around so that it's now you're competing device so it's monitoring your eyes What you're looking at so you are seeing your display in front of you and what to look at and the way you blink controls the computer so I think Matt we're going from two Magus phones like this x x x x max to again, it's going to be teeny tiny. Just something that's almost tight right into your brain. Which I don't know if that's good or not fun. It's not a science fiction about that one out there.

Unknown 12:08
Craig Peterson our tech guru join us, Wednesdays at 730. So let's have some serious stuff that you know, we certainly were talking about credit reports and access to credit reports whether we could freeze them and freeze them. Is that policy gonna change? Greg?

Unknown 12:21
Yeah, that's, I think, a really good question and problem and it will, you know, we could go into this for a long time. But of course, Equifax happened about a year ago. And we know there are dozens of people not in jail because the Equifax hack

Unknown 12:36
well. Excellent people should probably shouldn't be in jail that aren't. And all of these people 145 million people's information was stolen and Equifax basically got away with it. But not only did they kind of get away with it, a few people lost their jobs, no question. But there's estimates out there that Equifax made $50 million off of the breach itself. So you might wonder how, how did that happen? Right, bottom line? Well, because Equifax and everybody charges you to freeze your credit, and unfreeze your credit in most states. Now, some states had regulations saying you can't do that. But and every three months you had to rephrase it. So they were making five to 10 bucks every time every quarter from you. If you wanted to freeze your credit, so that your credit wasn't used as part of that fast from Equifax and you had to pay five to 10 bucks again to unfreeze it, if you wanted to apply for new credit card or buy a car or something. It was absolutely crazy. So as part part of the act of President Trump signed in May, with the economic growth regulatory relief and Consumer Protection Act, the feds now starting September 21. So in other words, Friday, consumers can now freeze and unfreeze your credit without paying any fee all. So that is a fantastic thing. The recommendations from all of the security experts out there is basically keep your credit frozen. And that means that if, if a bad guy has your information, and you know, frankly, between us guys, the bad guys probably have your information, okay, if they have it, they cannot go and buy a car, buy a house, etc. Using your credit, they can still become get arrested and claim to be you. So the next time you get pulled over by the cops, you get a felony stop. But that will stop them from using your credit, which is a very good thing.

Unknown 14:44
We're talking to Craig Peterson, our tech guru who joins us at this time every Wednesday to go over the world of technology. Craig, I have one last question for you. before we let you go. You of course have seen in the news you know some of these cybersecurity experts, some black hat folks and one giving tips on to people for exactly how to protect themselves, make sure that they don't do anything stupid online. What are these tips what should people do?

Unknown 15:10
Oh, this goes on and on. I've got a great article. In fact, if you want to text me, I will send you that article. Anybody who's listening just text me say send the article if you want to me at 855-385-5563. So this text 855-385-5553 but there are there's a great article that I was able to find online as picking up on website is from CNET and black cat was the big conference we just had black hat and DEF CON out in Vegas these are the white hat and frankly the black hat guys getting together with government people as well so there are there's probably two dozen different security experts all with their top tips online. But when it comes to business and and you can get those you can find those again, online at my websites easiest place probably. But bottom line if your business the number one tip is make sure you've got good backups and make sure you test those backups and other words, don't just assume that because you signed up for backup service, it's still working, trying restore files from time to time to make sure that that backup is working for you. Of course that's not going to protect you from the lawsuits if you lose your customers information or they'll find which can amount to 200 bucks for credit card your business has taken over the last couple of years. So in many cases it can be huge fines but the very basics for everybody and small business backup backup off and test the silly thing make sure really is working

Unknown 16:54
Tech talk guru joining us as he does every Wednesday at 738 as boring as I may be will try and change it once in a while to join us. We'll talk to you next week.

Unknown 17:04
Take care bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 18, 2018

In the wake of the Equifax data breach one year ago, an estimated 145 million consumers’ personal information was stolen from the credit agency. Craig talks with Jim Polito in depth about the Equifax hack and the changes that will take effect this week.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/18/2018

Deep Look At New Law Concerning Equifax - New Hacking Tools

Craig Peterson: [00:00:00] Hi guys. Craig Peterson here this morning with Jim Polito I talked about two things one I wouldn't do a bit of depth here on the whole Equifax hack and the changes that go into effect this week. That's right. New laws in place signed by President Trump a couple of months back. And this is a real game changer. So all of the pain people went through. It's going to be a little easier here in the future. And then I also just took a couple of minutes and explained a whole new piece that ran somewhere out there and how the bad guys are using it. And in fact a whole new category of business in the bad guys' field. So there's lots going on and here we go with Jim.

[00:00:53] This is the man with all the answers the guy we turn to all the time.

[00:00:58] Is it a national I.T. professionals day. He's far above and I.T. professional but you know he was at one time. Joining us now the man the sheriff of the Internet Craig Peterson.

[00:01:12] Good morning sir. Good morning. Yes I am. You are t. 

[00:01:19] Hey you helped us out when we had that whole Equifax data breach and you have done a lot of people for free. By the way for free on your own time which impacted about 145 million customers that personal information was stolen from this credit agency. So the advice was Hey get out there freeze your credit you get paid to do it but freeze your credit. Now you're saying that it may be soon that you don't have to pay that transaction fee for each of the three agencies that it will be free.

[00:01:58] Here's what happened and of course a lot of people were very upset with what happened then and understandably so.

[00:02:04] Equifax I still can't believe that they're still in business and they are they have a license to print money. The three credit firms have a license to print money. You and I should have gotten in on that.

[00:02:19] Well they didn't lose my license right there. That's right. It's just it's the implication is if you screw up it's over. Right. Pull your license. Yeah. They've got it. They smuggled in the printing press the same way they put it. That's exactly what they're doing. And you know Jim I did it for 100 listeners. OK.

[00:02:44] I monitored the credit stuff in the dark web for a while and I'm probably next month going to start doing something going to offer it for small businesses as well to see if your small business information is out there OK. But I did it for a couple of hundred listeners absolutely free. And some reports. And part of the report that I put together were OK if you were hacked with Equifax would say most people were frankly or if something new shows up on the dark web. Here's what you should do and it involves a whole bunch of different things you have to do because frankly if they hacked your information nobody cares right.

[00:03:29] You can't call up. You know I work with the FBI. Yes yes. And the FBI is there you know it's come on. You're one of how many.

[00:03:41] 145 million consumers. Is the right

[00:03:48] Word. Trying to a while anyway. So yeah. So they don't really care but if someone had stolen your information and then you're dead then you have to talk to the police department. You had to go the next step and the course now file that report with all of your you know credit card companies that maybe the information was used to steal money from the credit card people had the cars that were purchased using their name and their credit for they had to prove now that they never bought that new car that goes on and on.

[00:04:25] Right.

[00:04:25] At a minimum if your information is stolen and the bad guys use that word talk to them Jim I'm a nightmare because what I just talked about you have to call the bank right or you still do. Right.

[00:04:38] This stuff is still happening. Right. And when you have to call a bank during working hours right because that's when they're open. Right.

[00:04:48] When do you have to reach out to all of these different agencies the police department everything. Yeah the police and the banks are there 24/7. But there are fraud bureaus are the people who are handling this thing are only there nine to. When you do your homework.

[00:05:06] Most people work 9:00 to 5:00.

[00:05:09] So we're talking about on average if your data is stolen and someone then tries to impersonate you. We're talking an average of three hundred hours of your time writing letters chasing down documentation sending it off to all of these different credit agencies places where your name was used in order to try and get your good name back.

[00:05:36] And those are 300 hours out of a working here. That's two thousand hours right your normal working here is 24 hours. Right.

[00:05:44] So we're talking about you know what is it about 20 percent of your year. You can't work because you are running around trying to take care of all of this stuff.

[00:05:56] So on top of all of that what you have to do is in most states here you have to pay a fee of between five and ten dollars on top of all of that to freeze your credit.

[00:06:11] Yeah.

[00:06:12] So now it's it's just it's a nightmare when it happens to people and that's why I spent so much time and my staff. I had five people working full time on all of this dark web stuff for our listeners here.

[00:06:25] That was great period of three weeks OK. It was just crazy. Now that and so what that means is if you want to free the credit it's five to ten bucks for every one of those three agencies on top right now if you want to use your credit you have to pay another five or 10 bucks to get your credit unfrozen to get it right. So here's what's happened now. The president Trump has signed a bill that was part of the economic growth regulatory relief and Consumer Protection Act. So just starting on the 21st. So that's very sweet. Yep the law now that President Trump signed abolishes those fees. So all of those fees associated with freezing and freezing your credit which by the way that even if you freeze your credit it's only good for maximum three months. So all of those fees are gone. And that's a really good thing because the aquifer.

[00:07:30] Yeah. After the Equifax hack Jim about 20 percent now of consumers got a freeze. But most of those phrases ended up expiring. So this is a great thing. I wish Equifax wasn't in business. I wish you didn't have to deal with me.

[00:07:46] And you know I'm not calling for regulation here by any stretch but how the heck are these people not sitting in jail somewhere. Yeah we're responsible for something as simple as not doing enough data to third party software in other words they updated you update your Windows machine. OK. That's all well and good. And you got to do that. But on top of your Windows machine you have your Chrome browser you have Firefox to house whatever other tools and they didn't know

[00:08:21] What it was.

[00:08:22] Ok. And they're still walking around. Oh yeah couple of people lost their jobs.

[00:08:27] That's about all of that.

[00:08:30] And it cost Americans millions. In fact there are some people who are critical of this saying hey listen look at the money Equifax made because they quote lost unquote 145 million consumers personal information and then they charge five to ten bucks every time someone wanted to freeze and freeze. We're talking about them or tentatively here having made at least 50 million dollars of their script.

[00:08:57] We're talking with Craig Peterson. At the end of the segment. We're going to give you a number and if you text my name you'll get this information plus a lot of other information standard data and text rates apply. Quickly before we go I do want to talk about this new ransomware that has arrived and Ransomware is that you know comes in and says hey your computer is locked and we'll unlock it. We can fix the virus if you pay us. So there's a new one out there.

[00:09:29] Yeah this is. This is an interesting one because the ransom that's out there right now has been automatically morphine itself. So it changes it's also your standard antivirus software test is not going to catch that. We've now found something new and it's called the path. It just appeared last month for the first time we finally saw this stuff out there. But it has a module in it that allows attackers to customize the attack and how it's attacked. And the encryption key that text doesn't know everything else. Now we have we have a customer Jim and this is just not so. But it's true who has a business as a law firm and the law firm had apparently been losing documents that had to be filed with the court and then all of a sudden it started losing pictures of the owner's family. All of these pictures and stuff got stolen. It looks like what might have happened years that the guy hired hacked or he's not the guy by the bad guy which was in this case probably his ex-wife had hired a they got onto the computers and made some changes let's say to the files deleted things everything else. And apparently, it cost thirty-five dollars to hire this hacker to try and destroy this small law firm. Thirty-five bucks that's what it's going for right now. So and it's really kind of an interesting case. At any rate what we're talking about now is new type of ransomware completely remotely controllable completely customizable. Perfect for hacker as a service. That's a new business out there. Hacking has a service for thirty-five dollars. You as you can have someone hack your former business partner and your wife or maybe some company that you know has some money and you want to get that money out of that bank account 35 bucks is what it's going for.

[00:11:48] You see now this is why Craig Peterson is with us all the time because you get this information and then if you want more information you are more in-depth than you want to be on his list if there's another massive hacker breach or something. It's very simple. All you have to do is text my name Jim to this number.

[00:12:05] 855-385-5553. That's 855-385-5553. 

[00:12:20] Standard data and text rates apply. Craig Peterson will not sell you down the river he will not yield he won't do anything like that. That's the bottom line and he's here every Tuesday. Craig thank you so much for your time buddy.

[00:12:37] Hey thanks, Jim. Take care.

[00:12:38] You too. Craig Peterson, a great resource. OK when we return a final word.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 15, 2018

Chinese tech company caught lying, again.  Listen in as I describe how they misrepresented their product and what the US did about it.

Announcements from Apple.  Yea - I was a bit underwhelmed.  I will discuss why I think that the announcement unveiled just incremental improvements.

Do you use Cloud products in your business?  I will explain why you must not just trust that they all know what they are doing and what you need to do to protect the information they store for you.

Help me, Help you!  I want to know what information you need to increase your security and protect your business.

It's going to be free to Freeze your Credit! I will tell you about the bill President Trump signed to prevent these Credit Reporting Agencies from charging for this service.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/15/2018

New Announcements from Apple. Huawei Lies, Again, Free Credit Freezes. Don't Trust the Cloud to be Secure. 

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. It is time for another session. here Tech Talk with Craig Peterson. You know, I was looking on my Amazon Echo for my radio show and I was able to find it. I found the podcast and then the next day I couldn't, I don't know what's going on out there. But, hey if you are listening to my podcasts, please let me know. Let me know what you think! I'd absolutely love to know because I'm trying to figure out if I'm going to put more time into these radio shows. Maybe, we'll go back to an hour. We'll see how things end up going here on these same stations. But, anyhow, today we are going to talk about a couple of things. First of all a cyber attack. We'll kind of run through the anatomy of a cyber attack. Would your company handle it better, than maybe what happened here? We have a real live company we'll be talking about. We're also going to be talking about Black Hat and DEFCON these are Cybersecurity experts. They've got some great tips on how to protect yourself. Freezing and unfreezing credit. You know that was a huge problem when we had a massive massive breach of all of our personal information over at Equifax. That breach about a year ago now. So, should we be able to do it for free and a whole lot more. By the way, if you are a company and you're using Amazon to do processing or store data. We've got a massive leak to tell you about. Oh, I got to mention Huawei again, because somehow they seem to be making it to the news almost every week. So, here we go. You're listening to Craig Peterson. 

[00:01:44] Ok. So, first up let's talk about Huawei, this is a company that has been hammered and nailed and nailed and hammered and hammered and hailed by the government, recently. In fact, they complained a lot about it, bitterly, for a good reason, I think. Although, you know, if I was in their position I'd complain too. Don't get me wrong. They should have been hammered by the government with what they apparently were doing. The allegations are that while Huawei was actually sharing their data their information with the Chinese People's Liberation Army government officials. So, they were sharing all of this stuff about locations of troops, conversations and e-mails and everything, which is just a terrible thing. And so we, of course, advise people don't use Huawei. That the company, by the way, is spelled H U A W E I. So I've heard it pronounced all kinds of different ways but the correct pronunciation is a WAH WEI. Well. You're going to love this one. They got caught again, Huawei. This time they were caught and this isn't the first time they've been caught doing this. You know, this week Apple, of course, had their big announcement and they announced some new phones with some really, if you ask me, incremental features, nothing terribly exciting, nothing that's going to make me want to run out and buy one of these phones.

[00:03:17] If you are almost a professional gamer using your iPhone, if you're using it for all kinds of video games and maybe virtual reality and enhanced reality and all these different things, well then maybe you want to go and get one. Other than that, I'm not so excited about it. They have introduced, Apple did back and the iPhone 7 days for the plus phones a whole new camera subsystem that included a very, very cool chip that was just dedicated to figuring out pictures and Apple calls it machine learning. And, I think they're overblowing that term. I certainly wouldn't classify it as machine learning and, in fact, they got caught, Apple. I was sitting there watching them, at least, part of the presentation this week and they were just out and out and lying about stuff. Lying. For instance, the new camera allows you to change your depth of field, after you've taken the picture which is a phenomenal feature, in other words, you can change the background and how In Focus are out of focus it is. And they lied about it. They said this is the first camera ever to do this and I'm sitting there saying wait a minute I've got a camera that's four years old. It's called a light field camera. 

[00:04:35] And I've been taking pictures like that for years and years where after the fact I can go in and I can change the depth of field. I can put everything in focus or certain things out of focus. I can even move the focus point around afterwards, which is more than it looks like this new iPhone can do. So, you guys quit your misrepresentation, and they did a couple of other things too that they said they were the first, and they just weren't. I'm starting to wonder about Apple now in so many ways. So anyhow, one of the things that they announced the big deal there was this new lens system that they have on the new iPhone and the new intelligence, machine learning which, again is not machine learning. They're using a very, very fast little chip in order to figure out things like where is a person's face where their eyes are, get rid of the red eye, automatically, let's do all these different things. And that's really cool. I love it. OK, don't get me wrong about that. If you want a phone that has a great camera then, wow. I don't think you're going to go wrong with this new iPhone and the camera that's built into it. Huawei, however, was caught again, using a professional DSLR to take the pictures. And this is kind of cool, because the woman who was in these pictures, the actress who was supposed, you know,  taking candid pictures, her boyfriend was there with his arms stretched out and taking a snap, snap. 

[00:06:13] There you go. And it showed our little box around her face as the cameras recognizing her face and is focusing on it. Well, this actress's social media posts revealed what was really going on. She posted a picture, that showed her sitting there with the other actor. So, the guy has his arm extended with nothing in his hand, right because he's supposed to be holding this Huawei camera, nothing in his hand. She's sitting there next to him posing like she's supposed to be, posing and in front of them, is a guy with a professional camera. The whole idea behind the ad campaign is look at how great our Huawei camera's are and we can't make the background blurred just like Apple, would kind of basically, right. And, in fact, it wasn't. It was a professional camera, he had set the depth of field. You know you adjust the aperture, you make sure the lights right, you do all of that sort of stuff. They were lying, Huawei out and out lying.

[00:07:13] Faking the picture, at least Apple isn't faking the pictures that they're showing us, including they showed us a picture that was on the cover of Time magazine taken with an iPhone, a beautiful picture. They had just done some amazing things. Now this is not the first time while way's been caught faking a smartphone photo I'm sure it will be the last because they did it before and what was the reason that they gave. What did we always say? It wasn't, Yeah, Yeah, Faked it. They're not admit that, right. So, what Huawei says, this Chinese firm, is ah, we were just showing the type of picture you might want to take with the selfies on our Huawei smartphone, Yeah. Yeah, that's it. I'm sure that you weren't trying to convince people that your camera is as good as a three to four thousand dollar DSLR camera body. Yeah, that's not what you doing. Yeah. Well, you know I've been complaining about Equifax and we've been producing a dark Web reports where we go when we do searches and stuff for people's information. And we've been doing that for about six months now. We offered it to people right after the Equifax breach and we're thinking about maybe doing something like that for businesses, which would be really nice, right. Wouldn't it be nice to know if your business data, Has been stolen, right? 

[00:08:48] Wouldn't it. Wouldn't that be nice. I would think it would be nice. So, we may do that in the future. Keep an eye out. We've got a few things going on. And by the way make sure you check your e-mail from this morning because not only are all the articles from today in there, but I'm going to be sending out some e-mails. I really want your feedback. And you know the only way that I know what you want to is, via that feedback you can go way back in my history and I back in the 70s mid 70s was the first time I designed a computer. Actually, it was right around 1972 or three. And I designed and implemented a computer. I made a little computer that would play a simplified game of chess back there in 73 and then I went on to run data centers and be one of the first people on the internet quite literally helping to develop the protocols and implement them for them for a lot of companies. In fact, some of my code I wrote is probably still in use today. I know Apple used to use some of the code I wrote, as did Microsoft, in fact, I helped to develop the Microsoft operating system NT and I wrote to a lot of the audio subsystem and also some of the network subsystem for that. 

[00:10:03] But, I've been very involved in the Internet, since the early 1980s and I've been well known for working with big companies and helping them to do large implementations. Frankly since about the early 90s, My business has all been about the networks that are necessary, the machines, the data centers and even the software necessary to run a big Internet installation. All right. I was well-known for developing Big Yellow. Do you remember that? Remember Superpages? Actually Superpages is still around, although I'm sure they've completely rewritten it by now. So, that's where I've been well-known for. And then more recently since I was attacked in 93 and fell victim to hackers back in 1993 and it's a while ago now, Wow. Twenty five years ago. Since then I've also been known for security because I started studying security very closely. Electronic security physical security up to the point where today I am providing webinars for the FBI Infragard program. So, I'm trying to disseminate this information. Like I've been trying to do on this radio show for a very long time. So I've been known for a lot of things over the years, and it's kind of changed as the marketplace has changed and as people's demands have changed. So, what I'm looking to find out from you guys is what else can I do for you? I've done all of this for big companies.

[00:11:36] I've done it for small firms, as small as you know typically about 20 employees. But I've done it for smaller, as well, right now I'm working with some accounting agencies that just have a handful of employees, including one that's just mainly the accountant and his assistant. But, what can I do for you? You think about all the stuff that you know you're dealing with everyday when it comes to security you can't sleep you lose sleep at night over your business and you're concerned about losing it all. You're worried about what's going to happen if I get Ransomware? And, that's why I've got this great article about ransomware up on my site that came from ZDNet and I think you might want to have a look at that up at Craig Petterson dot com. But, what is it that I can do for you, Next? We talk about things every week. What is it that interests you? What can I do, that's going to help you? Should I put together some mini classes? Some courses? What sort of thing is going to help you when it comes to computers and security. And you know I might even go a little wider than that because I talked for, a few years ago about developing another brand that we get information out on. And I was calling business edge back at the time and the idea behind business Edge was again like my customers demand. Where they wanted to know, how can I use iPad's properly?

[00:13:09] How can I increase the efficiency of my employees? How can I tighten the communications channels with my vendors? with my suppliers? How can I make all of this stuff work. It's a, you know it's a problem, it's a real problem for businesses. So, if that's something that interests you, let me know. You know I've been doing this for a very, very long time and I've been helping a lot of people. Now I want to help the small businesses out there. Small businesses are the ones that are constantly being attacked. Small businesses are the ones that don't have the resources to be able to deal with this. So, if you're involved with a small business, send me an email. Just me at Craig Peterson dot com or you can text me as well straight to my phone 8 5 5 3 8 5 55 53. We'll give those out again a little later. What can I do to help you? What can I help you with on this radio show, that's going to take you to that next level? What's going to help you to be able to sleep at night? What's going to help stop those arguments with your spouse, over the business and all the time you've been putting in? Then heaven forbid you get hacked and your data is stolen and now you're hung out to dry. 

[00:14:25] Right. Because it's out there. What are you going to do about it? What can I do to help you? So, let me know I'm going to be sending out an e-mail with a brief little poll in there. You're not going to take it 20 seconds. But I'm going to list some topics that people who listen to the radio show, people who listen to the podcast, have asked me about. So, that you can just kind of click which one you think might be best and then another question that just kind of a qualification would you prefer a short course that's just straight to the point where you know hey Craig I know you know a ton about this way more than I do, I don't want the background, I just want the steps. What should I do? Is that what you're looking for? Is that what you're looking for on the radio show? Or are you looking for more of course, You know I have to understand this little bit more. I know in my life I've had many times I've hired people and, of course, hundreds. But when I'm hiring those people I've found I've had in the back of my mind I don't know enough really to evaluate this person. I don't know enough about sales that was kind of the first thing and so I learned about sales I really studied up on sales before I could really confidently hire a salesperson because in my estimation I've been I've been screwed before, right where people came in and they sold me a bill of goods and then they didn't deliver. 

[00:15:50] Same thing with marketing. And I have been a student of security. I told you that already now a serious student for over 25 years. So, it's a very, very big deal. And I want to your opinion. Where do you want to fall on that line? And I've had these free webinars before, I'm planning on doing more. In fact it's my 25th anniversary I'm going to do a 25th anniversary series here, coming up probably in October. Twenty five years since I got hacked the first time I mean hacked not just a virus, I mean hacked. So. What? What can I do for you? So, keep an eye out for that. Let me know what you think and what's going to be beneficial to you? That's really, you know the most important thing. and you can always just e-mail me at Craig Peterson dot com. That's of course P E T E R S O N dot com. So, on Peterson dot com or text me if you have your smartphone handy. Just 8 5 5 3 8 5 55. Fifty three. All right. Next up 

[00:17:02] A little rockabilly, I guess you might call that, music. I love this we've had the same bumps now for over a decade here on the radio show. 

[00:17:08] But, oh well. We've got some new ones coming and I'm already using a new one at the beginning of the show. If you were a victim of the Equifax hack, you know what a pain it was. Because this Equifax data breach that was over a year ago required you to start doing more serious credit monitoring. And Equifax themselves wanted to charge you for the credit monitoring. They still do. And they said, Do you remember this if you went to their Web site and said Yeah I want to know if I've been hacked and they say you've been hacked and they said hey we'll give you free credit monitoring. But, in order to get the free credit monitoring from Equifax you had to agree to not sue them. To not be part of a class action suit. 145 million people's personal information was stolen from them and they wanted to charge you to keep an eye out in case somebody out there stole your identity you know stole the money from your bank account, right. Nothing big, right, no big deal, no big deal. Well, credit freezes can be important if you know your data has just been stolen. And that's one of the things that I tell the people that were doing the dark web searches for, right. If there is a change and we'll tell you if there's been a change if there has been a change in your data out there on the dark web. Now's the time to look at a credit freeze, an important thing. So, it's become harder for identity thieves to apply for loans or lines of credit. 

[00:18:44] If you have put in place, a credit freeze. Well now, the Trump administration has put something into effect it's called the Economic Growth regulatory relief and consumer protection act. It does many things, but starting September 21st consumers can freeze and unfreeze their credit without paying a fee. Isn't that amazing. So, this is going to be really, really good. Only about 2 to 3 percent of Americans had a credit freeze in place at the time of the Equifax hack. Now, remember they stole pretty much all of the information about every person of, you know, adult age who had credit, they stole it. But just about everyone in the U.S. you know it's like almost 100 percent of the population of the adult population. And after the theft occurred it was estimated that maybe 10 percent may be as much as 20 percent of American consumers actually put a credit freeze in place. So, removing these financial barriers which cost about five to 10 bucks every time you put a freeze in place or an unfreeze in place it was five to ten bucks maybe now that they have to give it to you for free. Consumers will start doing that. I think it's important. I'm really glad that some of the crazy restrictions that were put in place back in 2008, are being removed as well. Again, I think mobility for consumers is important. Transparency is important. And hopefully we'll end up with more of that, as we go forward. 

[00:20:33] Now this next thing, this is kind of interesting if you're a business person. 

[00:20:41] Now, you know as a business person a lot of services are moving to the cloud and it shocks and amazes me how many times you go into a business and they're using a cloud service they don't realize there's a cloud service, right. So, they've had accounting software from company X forever and now Company X instead of going to a local server you go to a web browser in order to be able to get the data from Company X. Well, that is a cloud service now. Now, Company X is probably not really good at running a data center. So, what is Company X do in most of the cases Company X goes to Amazon. Now, there's other options it might go to Microsoft and Azur there. IBM has called services a lot of different places have called services that are out there and you know that's all well and good but is saving them money really worth it. 

[00:21:42] And here's why. Here's the problem I'm seeing. We go into a business and the first thing we typically do is what we call RI report. This is a risk intelligence report. So, we'll go ahead and we'll scan all of their computers for data that if it were stolen would cause them to get fined or even face criminal prosecution. That's a big deal right. It's a very big deal and now we have different types of risk intelligence reports will do this for HIPAA. We'll do it for accounting. We have them available and we just ran some for GDPR which is the new European standards. So, we have all of these different types of risk intelligence reports because you need to know what data is on your machines that might be at risk. So, we just did one this week for a company and it's an accounting firm. Now we found a few things that you might expect in accounting firms like Bank account information and other things. We found credit card numbers, we found personally identifiable information on their computers but they were using a cloud service and they were saying hey listen no, no, no, wait a minute we're using the cloud service. We don't have a server on site anymore running their database. 

[00:23:05] We don't have a server on site anymore where we're holding on to this client information. It's up in the cloud. It's now the responsibility of that cloud service vendor. Let me straighten out a few things in everybody's mind here. First of all it is not their responsibility, unless you have an explicit agreement with them that passes the liability onto them. And I've got to tell you most people don't have them, if you want a copy of an agreement like that. Let me know, I'd be glad to send you one we have them. But any of your service providers, whether they be a managed services company taking care of your computers or break-fix shop or in this case a cloud service provider, you need to have these business contracts in place that helps make them liable. But that's not where the problem was this week. The problem was we found that their Web browsers were using caches, which is true for almost everybody out there. So, when you go to a Web page have you noticed the second time you go to the Web page it loads that much faster? Have you noticed that with some of these web pages it loads a lot faster and in some web pages it's almost instantaneous. Well, a lot of that is because of the cache your browser cache.

[00:24:32] So, in the browser cache at these businesses who were using cloud services we found personally identifiable information the caches were not being wiped. So, even though they thought they didn't have the data there, it was on their local computers. They did not have the proper agreements in place with their cloud services provider and they got nailed. In fact, just this week a company left terabytes of data exposed on Amazon. They were providing a cloud service and they had no idea what they were doing. They didn't know enough. They had no idea they had terabytes of clients personal information available online. So bottom line be careful, if you have questions if you like a copy of the contract, let me know. Be glad to just send it to you and then you can take it to your attorney and get it all worked out so that all the details are correct and let me know what can I help you with? Send me an email. I've been doing this for years. 

[00:25:39] Decades literally. What should I do? What's your my next product to be? What should I buy next coaching call be on? What are you interested in/ E-mail me at Craig Peterson dot com with any comments, any questions or just text me directly. 8 5 5 3 8 5 55 53. All right. Take care. Have a great week ahead. And we will be talking with you. And next week it's going to be a best of. But you know these shows are all great. What can I say? Take care, bye-bye

 ---

Related articles:

Are You Using A “Cloud Service” For Your Business?

Huawei Has Been Fined $1.2B By The US

Black Hat And Defcon Cybersecurity Experts Share Tips On How To Protect Yourself

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report 

New Ransomware Arrives With A Hidden Feature That Hints At More Sophisticated Attacks To Come

How To Protect Yourself Against A Sim Swap Attack

CYBER-ATTACK! Would Your Firm Handle It Better Than This?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 12, 2018

 

Have you had problems with a keyboard on your Mac?  If so, listen in as I discuss with Ken and Matt the design issues that cause it and what Apple is doing about it.

It's Apple Announcement day.  Ken and Matt and I talk about why there is not much innovation!  Just some new incremental improvements.

Did you know that even in this day and age -- Employees are sharing Passwords.  I explain to Matt and Ken why this is a practice that MUST stop.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/12/2018

Poor Design is causing Mac Keyboard. Apple Announcements. Don't Share Email Passwords. 

Craig Peterson: [00:00:00] Hey, Howdy, Howdy, everybody. Craig Peterson, here. I was on this morning with Ken and Matt and we talked about a couple of different things. We talked about the Segway drift e-skate. Are these things, maybe, finally going to get Segway fully on the map. More about the business email fraud attacks and some of the things that go on there. What you have to watch for in your business when employees, maybe they're sharing their e-mails, maybe they're trying to do a couple of things they shouldn't do. And of course, a couple more things you never get away free with Ken and Matt. But, this morning they were a little bit more talkative, which is good. I tried to make them talk as opposed to just having me lecture them. You know, it's I don't know if you ever been in a studio before when our shows live like this, but if you have a guest like me that you know and you know can handle the whole segment by themselves with no problem oftentimes that's the time when you eat the donut or get the coffee or do more research for your next segment. So, I don't know if I did them a favor or if they're mad at me now, cause I made them respond to me in the middle of the segment, a few times. Anyway. I should mention that if you've had problems with a mac keyboard, one of these Mac Pro keyboards, boy they've been a real problem for a lot of people, and I talk with Ken about that as well, because his mac keyboard, kind of failed on him and he ended up having to leave it at the Apple store for a while. So 

[00:01:31] We talk about that as well. The Apple keyboard and the Apple announcement coming up today. 

[00:01:39] Ok, we're back again. It is 737 on the WGAN morning news, here on a Wednesday morning. Good morning to you. Ken and Matt here, and so is Craig Peterson, our tech guru, who joins us at this time every Wednesday. Craig, how are you this morning? 

[00:01:52] Good morning y'all. 

[00:01:54] Y'all, are you down in Texas you must be down South somewhere. 

[00:01:59] No, Southern Maine in the south y'all. Y'all, all y'all both. Yeah, yeah, yeah. 

[00:02:08] It's a word. I'm from Oklahoma and I know it's word. I never thought y'all was a friend of mine. You know you do. Do I understand that Apple's 'gonna have an announcement today, by the way, are they doing there. We could hear something new from Apple today, by the way.

[00:02:26] Yeah, you heard about that. I did 

[00:02:28] Yeah, there isn't a lot of rumors out there about that there company. Yeah, here's here's what we expect. Apple has been kind of sitting on their hands when it comes to a couple of their products. One of them is their Little Mac Mini, which I use. I use one in my studio. There great little devices, but it really hasn't been updated in years. Their Mac Pro has not been updated since 2013, and I have one those as well. So, we are hoping they're going to start making some announcements about that. Although the Mac Pro looks like it will probably be next year. But on top of that, they are going to have some phone announcements and those are going to be interesting. I'll be on top of that, we can talk about it more next week. But, they are expected to come up with a lower-priced iPhone. Which is going to be good for a lot of people that want an iPhone. Basically, want the reliability and the security, and they are talking about some of the rumors have them using both thumbprint and the face scanner on some of the phones. So it's going to be an interesting day. There's a lot of potential announcements, Apple might come up with. And I think one of the most interesting things is like you remember the iPhone. What was the Six SE?

[00:03:51] Which was the lower price phone that they came up with. 

[00:03:56] And, it didn't do very well in the market, but apparently they're planning on doing something similar with the iPhone 10 having an inexpensive version of it. So, we'll see if that does any good or not. But, yeah that will be coming up, midday today as Apple has all of their fall announcements.

[00:04:15] By the way, I should mention I have a MacbookPro that I just got about a year and a half ago and I had I had a horrible experience. And, I, you know I love Macs. But the key point your keys were falling off right and left, I brought it in and they replaced one and, then I had a guy in the Genius Bar who I happen to know, who said to me you know it's not really publicly known but they're replacing keyboards because they're really defective. So, and I think they had it for 10 days not me not having my computer for ten days. Like going through a heroin withdrawal. But, just like a divorce. Yes, exactly right but it's not. It wasn't really publicly known that these keyboards really defective. Oh yeah. 

[00:05:00] It's called the butterfly keyboard and it has to do with the mechanism and the keyboard. Now, Apple has been telling people that, you know if your keyboard isn't working properly, it's because you got food or something into the keyboard and technically, they're right because anything even two fat keyboards fail. Its frankly, between us, it's a bad design. And Apple has come to recognize that it's a bad design enough that their new MacBook Pro has a keyboard that has one little difference in it which is enough to keep all of the dust and crumbs from food out of the keyboard. So, in other words, they recognized its a problem, they fix the problem, but they are not usually very helpful about replacing your keyboards for free when they fail. So, I tend to think that it really is a design problem. Apple should replace all of them. I suspect eventually may end up replacing all of those keyboards. But there's you know about a year and a half, two years, where you got to be really careful with those keyboards because almost anything will make this silly thing fail, Ken. So, you're not imagining things and your genius friend is not either. 

[00:06:19] It is a real problem is getting reported all over the place we're talking to Craig Peterson our tech guru who joins us at this time every Wednesday to give us an eye on the world of technology. Do people share passwords?

[00:06:34] Yeah. They still do. Who falls for that in this day and age. Are these the same people that have joint Facebook accounts? You know like Tom and You know Jane. 

[00:06:42] Yeah, yeah, exactly. This is silly in this day and age. You'd think you'd know better. But this is true in a lot of small businesses, like Ken and Matt, you guys both have small offices, right.

[00:06:54] Right. And that means you've got a couple of people working there, a few people a handful, and in most cases, everybody knows everybody. 

[00:07:03] What could possibly go wrong? I'm going to be on vacation next week. Here's my password. So, somebody if someone e-mails. You can go ahead and follow up with them. Well, in this day and age, we've got this huge problem of business email compromise and the FBI came up with a new number on this, and they're showing now that we're over. This is crazy. Guys, I hope you sitting down, in the last two years more than 12 billion dollars has been stolen from small businesses. Cash was stolen -- 12 billion of it. It's incredible when you think about it. One of the things companies are doing their people are doing is sharing their e-mail passwords. This just makes it that much easier for the bad guys to get at your money. And here's what they're doing with a business e-mail compromise and we're seeing it all the time we keep getting called into companies saying something weird is going on with my e-mail. So, we come in we have a closer look and we find out, yes, you've been hacked. So, when you're going on vacation, people, do not share your passwords. Which means in advance of people being out for the day or on vacation, If you have an account for, let's say you've got somebody who is responsible for billing, or payroll or sales, or whatever it might be, Do not have a single e-mail account that people send the mail to in other words you don't send mail to Joan in accounting. 

[00:08:46] Ok, you send mail to town team and have accounting set up not as a shared mailbox but have accounting set up. So, Joan has an e-mail box that gets all of the accounting e-mails anything sent to accounting. That way when Joan goes on vacation John can go ahead and get those accounting e-mails delivered to him. Do not share them, take my word for it. We could go to a lot of detail on this. But there are a lot of reasons not to share passwords. You don't know if you are familiar with this Stat here, Matt, but we're talking about a lot of people. One in five employees on average, according to a new survey that just came out, of switch fast, one in five employees are sharing their e-mail passwords with co-workers. That's absolutely huge. When we're talking about small to medium business getting hit with nearly 4000 cyber attacks per day. 

[00:09:49] It's crazy. And, if you're in a couple of businesses, you guys know anybody that's in real estate, of course. Yeah, the number of attacks against real estate offices, small real estate offices, e-mail attacks has increased 1000 percent in the last year. 1000 percent and other categories of small businesses are up 400-500 percent and on average over everyone is up 25 percent. So, Matt, don't let your employees, Ken same things don't share e-mail passwords, get your e-mail set up the right way. Do not use shared e-mail boxes, either because you can't tell who did what? When did it happen? And, the biggest problem is, if you get an email from "quote" the CEO asking to have a vendor paid double check with the CEO. Make a phone call to them. make sure really is the CEO. Make sure she really did want to have that money transferred. Because nowadays it's almost as likely, that it's a scammer doing it, so be careful. Pay attention. It's not just anti-virus anymore, you've got to have just layers upon layers of security and people need to pay a lot more attention than we used to.

[00:11:12] We are talking to Craig Peterson, our Tech guru, who joins us Wednesdays at 730 and on Craig Peterson dot com and get all the information anytime you want. You know I've always wanted a Segway, and I've never gotten one, but it is now a Segway e-skate. So, I can have a hovercraft like Back to the Future. They promised us to have a hovercraft. Never. This is exciting news. 

[00:11:36] Yeah, that was a few years ago was supposed to be out. Yeah, this is kind of cool, because it's our neighbor, of course, to the west in New Hampshire in Manchester New Hampshire. Dean Kamen started the whole Segway thing and boy was that a big P.R. push. But Segway has come up with something that's better, even cheaper now within about a 300 dollar price point. You can get skates. Now, these are not rollerskates, OK. You don't strap these things onto your feet, but you stand on them, they've got nice wide wheels on them. They look like they would be pretty good for maybe a warehouse or someplace that doesn't have a lot of curbs or bumps or anything. But you just stand on these things and basically balance. If you can keep your balance standing on one foot. I would say, this is my opinion if you can stand on one foot and mostly keep your balance you'll do fine on these things. So you just stand on them and lean forward a little bit to go forward and you lean back to go backwards. You can step off of them very easily if you start to lose your balance you step off of one of them and they'll stop going forward. So, it's yet another Segway which is kind of cool. These things will go up to seven and a half miles per hour, which is kind of cool. Kind of scary, all at the same time. But you know kind of bicycle speeds, not race in a bicycle but a nice little place down the road. And they're hoping that these new little what they're calling drift e-skates are going to finally be one of the general popular populous adopts. Because instead of Costing you five grand these costs about 300 and they should be out very soon now. So, we might even see some in some stores by Christmas, this year.

[00:13:29] Wow. All right Craig Peterson, our tech guru who joins us at this time every Wednesday. Appreciate it, Craig. We're going to talk to you again next week.

[00:13:37] Gentlemen, take care. Bye-bye. Thanks. 

[00:13:40] Now his plan on making September here my nugget month is going to be releasing these little nugget videos that were very to the point nice and short talking about some of the main things that you should be doing and being aware of as a business person. But, I have had so many new clients that I just haven't had the time to do them. So I've been taking care of my clients I guess that's why I have to put the priority right. The people that are already paying me and everybody else we'll get to it. OK. I just haven't had the time. I have to apologize. But keep an eye out. I still plan on getting those nuggets going here within the next week. So, take care. And we will be back on Saturday, with my regularly scheduled Saturday radio show. 

[00:14:27] Take care. Have a great day and the rest of the week.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 11, 2018

Did you know that business losses have passed 10 billion dollars due to business email compromise? Find out more about this as well as why you should not be sharing your email password as Craig discusses this with Jim Polito.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers

Business Email Fraud Attacks Jump 25%
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/11/2018

The Increase In Business Email Compromise Passed 10 Billion Dollars - Why Not Share Passwords

Craig Peterson: [00:00:00] Hi, Craig Peterson, here. It's a bit of a sombre day today, of course. You know, you might put two and two together, here, and realize I'm recording this on 9/11, and I remember this well it was also Tuesday when the hijackers hit. It's a sad day of remembrance, of all of that, and of course at 8:46 this morning, 8:46:40 is when the first event, along with that long line of events, that morning took place. Where the flight I think it was Flight 11 took off from Boston Logan. So, my heart and thoughts go out to everybody, who lost anyone or knew someone who lost anyone on that day. So, we'll leave it at that. This morning, Jim Polito, and I talked about a couple of different things I talked more about business email compromise. The statistics, what's happening, how big this really is. Believe me, it's really, really big. We've got one industry where we're talking about a one thousand percent increase, in the number of attacks. And the FBI upped their numbers. It's now over a ten billion dollar industry. The actual money stolen from businesses, so it's a bad thing. So, we talked about that and we talked very briefly as while about sharing passwords but what are some ramifications, there. So, here we go with Jim Polito on this rather sombre morning. He is our favorite guy.

[00:01:45] He really is, Cause he gets us out of jams all the time and he gets you out of jams too when it comes to this digital age. I'm talking about our tech guru, Craig Peterson who joins us a little early today. Craig, thanks for being flexible. Hey, ditto. All right. So, I want to talk about the e-mail again. E-mail passwords, but I want to start with something quite frightening you've let me know about. Business e-mail fraud attacks are up 25 percent. What's that all about? 

[00:02:20] Yeah, isn't that huge. We've known for a while that there are problems here. And the biggest parts of this problem, at least as far as I'm concerned, is that businesses and this is according to the FBI, have now over the last two years lost some 12 billion dollars, because of this. Now, you know there's a lot of ways to lose money right. You wake up in the morning and you see the stock markets down, its bad, right. You could lose money because of all of bad investments. As a business person, you can lose money because you invest in a new way of doing something, and it just doesn't work for you. In this case, what we're talking about is a type of fraud where they get you to do something, and they do it via e-mail. So, here's what it is you open an e-mail and you see in there that the boss wants to pay a vendor. Well, you know that happens every day, right. You get directives from your boss telling you to do something, right or don't do something, probably. And so it happens all of the time. In this case what they're doing is they do a little bit of research on your business, and then send an e-mail into the business. It looks as if the boss and you now take action on that because the boss told you to pay this vendor. 

[00:03:51] Well, what we're finding now, and what businesses have found out, including in most cases, especially smaller businesses is it isn't the boss and billions of dollars over 10 billion now have been transferred by the employees to the bad guys. And these attacks are up about twenty-five percent, right now. Now there is one industry that's even worse than that, Jim. You probably can't guess that it has something to do with you know Leasing something one of the biggest expenditures of money we make. Of course, number one is our house right. Well, number two in the car, the car, the car the fraud in the business of car dealers where they're going after car dealers. Now, with these e-mail fraud attacks is up over one thousand percent, in the last six months. It's absolutely huge. Absolutely. It's crazy here. Now, we're seeing some industries where it's up 400 percent in the last quarter. So, this is a huge, huge, huge they're engineering these e-mails. They're spoofing e-mail addresses. We get calls from businesses every week, almost every day, now where they're saying something weird happening with our e-mail. And you know that they're not sure what up but one has to have a look at it which we do. Right. 

[00:05:28] And Danny we lose. All

[00:05:39] Right. You know that. 

[00:05:55] Craig. We've got Craig, Craig, I don't know, I don't know.

[00:05:59] I don't know, Danny if he can hear me. But, can you make a reconnection with him? Something happened with that connection there. But what Craig's talking about is business e-mails, protecting businesses from having to protect themselves. But also this fraud that's going on and protecting yourself and leasing a car and things like that. And again, the car is your second greatest expense, after your house. Well, where are the bad guys gonna to go? The bad guys are going to go, where the money is, and the money is first in going after homes, you know taking out a second mortgage on your home without your knowledge or credit cards, too. So, Craig -  is Craig is back with us? I believe, Danny, we got him. 

[00:06:56] Down now. OK. 

[00:07:00] He's also going to be talking about your e-mail password sharing your e-mail password. All right, Craig, I'm sorry we lost you there. Toward the end, it started to drop off. 

[00:07:14] Sorry, about that. No problem. Now you blame, blame the tech blame the tech, people. 

[00:07:21] Yeah, exactly, right. This is a huge deal. We're talking about e-mails here. You know you've got be careful to make sure that your employees, your fellow employees your boss know that the simplest way to avoid this is if you get an e-mail that's a little suspicious. Like, I don't recognize that vendor and why should we be paying them? Pick up the phone, call the boss and say, Hey, I just wanted to make sure that this was legit or you know wasn't legit. And, in that case, FBI warning about this all over the place, we've been talking about it on the FBI infragard webinars. It is just rolling, like crazy because it's working. 

[00:08:09] Yeah, they're making money, I said while we lost you. If they're making money you know what I mean if there's money to be had there that's where the bad guys are going to go.

[00:08:20] Exactly right. 

[00:08:22] We're talking with Craig Peterson, our tech talk guru, at the end of this segment. We are going to give you a number that you can text my name to, standard data and text rates apply. And you'll get all this information, plus weekly updates. And if there's ever a crisis, a hack you'll have the information from Craig and what to do. Craig, don't share your e-mail password. I think that's obvious, but apparently, a lot of folks do it.

[00:08:53] Or Yeah you have your passwords on a post-it note stuck on your screen. No, No. Exactly. Well and that's because, well in your case, it's something like P A S S W O R D. You follow John Podesta's lead and make your password, password with a zero. Yeah pretty tricky, Yeah. Yeah, well one in five employees are sharing their passwords with co-workers. So, looking at it is an easy way, if they're out of the office that co-workers can check their e-mails for them. There are all kinds of liability problems with this. Don't do it. Don't share your password. You could be the subject of a criminal investigation if you share your password with another employee and let's say they leave the company or they're fired from the company. You don't remember that you shared your password with them and they now use your account to hack into company computers or to do other things, nefariously. What happens all the time. And, then to top it off if your username and password get stolen from another Website because you and your fellow employee knows it and they use it elsewhere. You could be liable.

[00:10:08] Yeah, yeah. See that's the part. Like all of you know, it's because I was careless with it. But, now if anything happens with it it's going to be my fault. It is your fault. 

[00:10:18] And nowadays we're talking about criminal prosecutions, Jim, yeah. Where they are going after you. So, don't share your password if you're in business. And let's say you have people working in the payables or receivables or whatever, sales. Set up a mail reflector. So, everybody gets that email. Be careful don't use shared e-mail accounts. There just all kinds of problems that you can't track down who did what when, and if they do it in sales you also have the problem of salesmen trying to leave the company with your customer list and going to a competitor. So, you know just to make sure that doesn't happen do not allow employees to share them and make sure you have certain types of reflectors, so that you can shut off their access, as soon as they leave the business. 

[00:11:10] Craig Peterson, you heard it there. He's he's got it all. He's got a lot of other stuff to talk about and share with you. And you can get it all for free, no obligation. He's not going to pester you, he's not going to sell your cell phone number so what you do is text my name to this number.

[00:11:28] 8 5 5 3 8 5 5 5 53 that's eight five five three eight five fifty five fifty three. 

[00:11:37] That's right. Standard data and text rates apply. You'll get this information and more, from our friend Craig Peterson you will also receive updates or alerts when something big is going on and he'll give you instructions on what you need to do to protect yourself. And, Craig I appreciate you coming in a little bit early for us. We appreciate the time and we can't wait to talk to you next week. 

[00:12:04] Thank you. Take care. Craig Peterson. everybody. Oh by the way. 

[00:12:10] After a while we.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 8, 2018

 

Do you or your Employees share passwords?  If so, STOP immediately and change them, now.  This week I will explain why.

Segway has some new fun Technology and I will discuss it today.

Business Email Compromise is on the Rise.  I will tell you why and how the hackers are going after small businesses.

People are still not patching their routers.  Also a new Router vulnerability this time against routers used worldwide by ISPs.  I will explain who, how and what you can do about it.  

Craig will be release some video securiy nuggets during the month of September.  Watch for them.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/08/2018

Don't Share Passwords. Privacy is not Absolute. BEC the new hacker scam to beware of. Mikrotik ISP routers have been hacked.

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. Craig Peterson here and we've got a lot to cover today as usual. I don't  if you've been getting some of my e-mails. Hopefully, you do, if you're not subscribed go to Craig Peterson dot com slash subscribe. We keep all kinds of great information there and we send out alerts about Hacks and about some of the latest things including I am now producing a whole bunch of what I'm calling nuggets. These are pieces of information short videos that I think are going to make a big difference in your life particularly in your business. So, keep an eye out for those wonderful nuggets. Those are videos I'm kind of releasing all over the place including on my Web site. Today we're going to talk about something that really concerns me and this is about the Five I's. If you haven't heard about them they are affecting your life in potentially a very big way in the future. Segway has some real cool new devices out. We're going to talk about the latest one that they have and I don't know if I'd buy this, but there are some other ones I might buy but, 

[00:01:06] this is really cool. If you are an employer or an employee you're not alone, if you share your e-mail password with co-workers. By the way, it's a dangerous thing to do. Hackers are trying to scam you again, and this is all about the e-mail scams business e-mail compromises that the FBI has been warning about, and, of course, that's a very, very big deal too. Unpatched router's Yeah, yeah, a huge proxy army spying on networks and it turns out it's not just your home routers anymore that they have control over. No, no, no. The bad guys have control over some of the routers that your Internet service provider may have provided to you. So, all of that and more stick around. Here we go. Well, the Five I's are countries that cooperate together. And they've been cooperating for a long time. In fact, some of this has come up as part of this so-called Russian investigation that's been going on, because apparently the British were being used to spy on President Trump and feed information back to the Department of Justice, the FBI, and maybe even the Hillary Clinton campaign. 

[00:02:34] Well, what are the five I's and what are they doing. Bottom line, we're talking about the U.S., the U.K., Canada, Australia, and New Zealand. These five countries that cooperate on spying on each other's citizens. Now, that's a very, very, big deal of course. Some of these countries also spy on their own citizens, as well. We're finding out more as the in-depth analysis is being done of the Mueller probe. But, the whole idea here is, if I'm in the United States and I have somebody who is a citizen of the U.S. that I suspect might be a bad guy, they might be bringing drugs in, they might be part of a terrorist network. I can't do a whole lot. Unless they call outside of the country, or they call into the country from outside. Once the communications leave the borders in the United States it's no longer considered. well kind of like privileged, right. They cannot just willy-nilly grab that data, grab your voice, et cetera. But, another country can and that's what's been happening. So, for instance in the case of these so-called Russian collusion operations, the U.K. apparently was spying on, wire tapping some of President Trumps communications, and some of his campaign workers communications as well. So, it's a very, very, big deal because they are gathering all of this.

[00:04:09] They are gathering stuff that, even they admit is illegal. You remember the story I talked about here just a few weeks ago, where the National Security Agency went ahead and deleted three years worth of telephone intercept data because they weren't sure if some of it was legally obtained or not. So, it's frankly a very, very big deal and it's a scary thing. Well, they came out with a statement after they met, and they just met, and that you know that part is a little concerning to what they're doing but they are spying worldwide, and they're very concerned because they cannot decrypt a lot of the communications. Now, they can intercept them obviously. That's why the Five I's exist so they can spy on each other's citizens, which is a problem right there, right. So, they can spy on each other citizens. But, here's where the big problems come in, and for them they can certainly intercept communications that are encrypted, but they cannot do much with them. In fact, they can't do anything with some of them. So, they met, and they came up with a statement. Now, this is really interesting. Here's a statement on privacy or part of it, privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute. The increasing gap between the ability of law enforcement to lawfully access data and their ability to acquire, and use the content of that data is a pressing international concern.

[00:05:48] Each of the Five Eyes jurisdictions will consider how to best implement the principles of this statement, including with voluntary cooperation of industry partners. Any response be it legislative or otherwise will adhere to requirements for proper authorization and oversight. Now we've had this debate before. You might remember, if you're old enough, during the Clinton administration, they were trying to force these clipper chips down everybody's throat, they are oh so safe, it's all so wonderful. And, it turned out that in fact there were back doors in them. So, the government could listen in. So, this is something we'll keep an eye on. We're going to watch see what happens. There are veiled threats to businesses in there, saying, hey basically if you don't comply, with you know, law enforcement, if they want to gain access to something, then bad things going to happen to you. It's really scary. But, next up let's talk about something kind of fun. OK, let's move into the fun category now. I know the guy who who started this company, right here in Manchester, New Hampshire. The company is called Segway. I've met him a few times, I've interviewed him a couple of times, and been very involved with U.S. First which I think is an absolutely fantastic program for kids to learn and get inspired. 

[00:07:15] It really is. In fact, that's kind of their whole thing now is inspiring kids. So, it's a really good thing. Remember, there was all of this hype about the Segway. How it's going to change the world? And, we certainly have seen Segway's around. I went on a tour over in France, in Lyon, in southern France and it was really very cool because we were on Segways we could go very quickly, when we needed to, or wanted to. And, then we could kind of stop and talk and look around at everything. I loved it. I want to go on more Segway tours, now. If you haven't done one, you should try it because it's it's very easy and it's rather intuitive. I think you might well enjoy it. Well, they have come up with a few different models over the Segway. You have some now that just kind of fit between your legs so you're not even standing, fully. They have one with kind of a seat, I've seen before. I think that's not actually a Segway. Now, they have roller skates. I guess they're calling them e-skates. The drift, is what they're calling them now drift w-one it's going to be available in stores sometime soon. 

[00:08:37] But these skates use the same self balancing technology as Segway's other better known products. So, shifting your body weight controls acceleration and deceleration. Now, if you've worn roller skates before or roller blades you know you strap them on your feet and sometimes you get out of control and you fall. And, I've taken a couple of big spills on those as well and I had protection on at the time, but you fall. That's because you're feet are strapped and you can't do much about it. If you lose your balance, et cetera. Well, these E-skates you just stand on. So you are standing on one on each foot. So they are independent they are individual. I saw some video of somebody using these, which is really kind of cool, because you can step off of it very easily. Much like you can with a regular Segway. Just step off the skate if you're starting to lose your balance you can take one foot off and put it on the ground. But, it is really, really neat. So, they can only tilt forward and backwards just that single access. So, there's no risk at all of rolling your ankles, like there are for roller blades etc. And, it's really kind of cool. 

[00:09:53] The attendants who were at this show, that just happened, where they were shown, over in Berlin, the IFA, that show. It's a really cool show, but we'll get into that right now. But, the really cool thing about these roller skates is the attendants were able to just say. Just get on it and do what comes naturally. Because, they really have got the right sensors in these skates now too to detect what you're trying to do. So, much like a regular Segway you kind of lean forward a little bit to go forward. You, can go backwards on these things if you lean back a little bit and apparently it just takes a few minutes to get relaxed in control which is about what it took me to get used to the Segway over there in France. My 80 year old father's even gone, for the very first time, on a Segway tour. This was in southern Utah. He went down very, very pretty area and perfect again for a Segway tour because you just zoom around and enjoy the sights as you're going. But, he didn't have too many problems I guess he fell off once said 80 years old, that's not bad. But he really enjoyed it absolutely would do it again. I don't know if I want to try these little, little E-skates again. Keep an eye out for them. The called the drift Segway drift. But, I can tell you I probably would try them. They're only going to be a few hundred bucks, apparently, versus the thousands for the big Segways. But, it should be kind of fun. All right, a few of you are sharing passwords. You're not alone.

[00:11:39] Now, we we know a lot of people over the years that are sharing passwords, and obviously that's a problem, right. And you know sharing your password with your computer is one thing, and it's it's bad. OK, it's pretty bad. But sharing your password with someone for your e-mail account, it looks like it's even badder than than just sharing your basic password. Now, for your computer and here's why, people don't choose great passwords for their e-mail accounts. And, a lot of times that workers will kind of share and say OK here listen while I'm gone here's my password. Get on check because I'm expecting this from a client, or that from a vendor, et cetera. And so people share their passwords, and you hope there's no real ramification certainly nothing as bad as missing an order, or missing the delivery problem, right. Doesn't that make sense to you? 

[00:12:41] Well, there are ways to have group and shared accounts. We do this. I've got to tell you every time we've gone into a business to clean up after there's been a hack and wow it's really bad. 100 percent of the time they've been sharing passwords, 100 percent of the time. And, one of the ways that these bad guys get in is, let's say there's a problem with a hack on a big company, and they're able to steal usernames and passwords. Guess what they now have, they have a username and password that they know worked at this company that just stole it from, right. So Yahoo, for instance, because we know they lost more than a billion accounts information. So, let's just say Yahoo for the lack of another example, right now. But Yahoo has usernames passwords are stolen, or some other small Web site out there that you're using. Most people are using the exact same password for their accounts on every site. So, they use the same username which is often their business e-mail, unless it's obviously just a straight up personal thing that might have a personal e-mail, but most people just have the two e-mails. 

[00:14:11] So, they their business e-mail is shared now with another person along with a password for that account. 

[00:14:21] So, now that other person gets in and starts using it. Now, remember that that password has been compromised in this scenario so, somebody else out there, a bad guy knows it. So, now someone internal to your company knows it and maybe even multiple people, now know it. And, what's been turning out is that there have been a number of kind of vengeance hacks where someone who knows someone else's password gets into the network, after the fact. So, make sure companies use set up group mails when it comes to your accounts receivable, accounts payable, any sort of customer transactions use a group mailbox, use of forwarder, there's lots of ways to do it. We do it all of the time for customers. So, make sure that happens. Don't allow employees to share passwords. If you're an employee insist that the manager set up a group password or group account, I should say, a group email account. Set up some sort of group e-mail account so, you're not held liable. So, your username and password are not used to hack the company at a later point in time, by one of your former fellow employees or potentially even worse. By the way, this survey found that three out of five small businesses that suffered a breach are likely to go out of business within six months. 

[00:15:52] Ok, that's a pretty standard statistic, I've seen. Usually, it's around 50 percent. In this case, they're showing 60 percent. So, you do not want to have a breach. There's all kinds of stats, and if you want to go to my Web site Craig Peterson dot com, you'll see it right there. Now, here's our next our article here. It's another scam that's been very successful for the hackers. Now, cyber criminals have been out there since the days of computers, really. You know initially, initially, initially probably not so many, but there have been over the years, a whole lot of these bad guys. While they're now turning more and more of their efforts to business email compromise scams, as well as, telephone scams, and they're using these to steal funds that are causing billions of dollars in fraud losses over the past few years according to statistics from the FBI. And, I get reports from the FBI almost every day, certainly every week, about new variations of these e-mails scams. Now, the scammers are typically targeting employees with access to company finances, payroll data, and other personally identifiable information. So, this particular report looked at 3000 randomly selected business e-mail compromise attacks. 

[00:17:25] Now, it said type of spam, spam e-mail. Obviously it's been called spear phishing before, and now it's called a business email compromise, because they're doing some amazing things here. They're trying to trick the e-mail recipients into doing a wire transfer to a bank owned by the attacker in half of the cases. Isn't that amazing? So, once the money's out of your bank account because you're just wired it, bam it's in the attackers account within 90 seconds. And, if they own the bank, they are not going to cooperate with any sort of investigation. So, some other types of attacks include getting recipients to click on a malicious link, that's 40 percent of the time, and those malicious links are then used to install spyware on your computer, or to verify that you are who they think you are. They also use them to establish rapport with the victim, and stealing personal identifiable information, that makes up the last 13 percent here. So, very simple e-mails. So, a subject like vendor payment. Hey, Joe, are you around? I need to send a wire transfer ASAP to a vendor from Jane. 

[00:18:44] Now, they're going to find who the CEO is or a high level executive. In this case that company had a high level executive a CEO, COO named Jane. So, they figured that out. How do they figure that out? Well, they probably just went to the company's Web page. Go to my company's Web page Mainstream dot net there you will not find any information about any of the officers, who they are. and then Hey Joe, obviously, they know who Joe is and they can find that also probably on the company's Web page, right under officers. It's crazy what people put up there. And the other easy way to find it is just to go to LinkedIn. You can scan around you can find tons of stuff about businesses, small businesses and otherwise. So, about 60 percent of these business e-mail attacks do not involve a malicious link. So, it's just a plain text e-mail attempting to trick them into performing a wire transfer, or some other sensitive information. It's really scary. So, here's the people there are attacking, right. Forty-three-percent of the time they are impersonating, the CEO or founder and they are attacking the CFOs, finance, H.R. people, C-level executives, CEOs and others across the companies, is about half. So, why would they go after H.R. person? We'll so they can get the W-2 information so they now have Social Security numbers, names, addresses.

[00:20:20] Think of everything H.R. has. So, here's what you should do to keep company safe. All of this is up on my Web site, by the way, Craig Peterson dot com. Prohibit wire transfers from going out without an in-person conversation or phone call. That means contact the CEO, right if Jane sent you that e-mail you've got Jane's number, call her. I don't care if she's on vacation, in fact, that's often when they will target someone they see on Facebook. Hey, Jane's going on vacation she's going to be in Bermuda's, she's going to be on her ship, She's not going to be able to have communications. And that's when they go after it. Take caution with e-mails from the CEO. All right. Because they're the most likely ones to be impersonated. So, if they make a request that seems a little unusual pick up the phone and call them. Obviously, if you are responsible for training in a company, make sure that you've got a training program in place, deploying an e-mail protection system that stops these type of spear phishing attacks, Cyber fraud attacks. So, it goes on and on. Very good, Very interesting and there's a lot of information about this. If you go to Craig Peterson dot com slash security, you might be overwhelmed. 

[00:21:34] But, that's what our golden nuggets are all about. I'm producing now throughout the month of September. These nugget nuggets of information about how to stay safe. And we're going to lead all of that up to an offer that I'm going to have in October. So, we'll talk about that as well to help you completely clean up all of these problems, but keep an eye out for my nuggets. You'll be seeing them on Craig Peterson dot com in fact, to put it up a little Coming soon thing on the site. So, next stop you'd think we were past this point. Now unpatched Routers. OK. We've got multiple malware campaigns right now, and they're spreading the hacks of gear from a company called microtik. Now this is probably not a name you're familiar, if you're a business person hopefully you're using current Cisco gear, not old stuff. Hopefully, it's patched and kept up to date, as well. Right. If you're a regular old home user you might be familiar with companies like D-link or Netgear, neither of which I use in my home, because of all of the problems they've had over the years. You definitely should not be using those in your business. Well, microtik posted a software update for a vulnerability that was found earlier this year. 

[00:23:11] But, researchers have found themselves, that more than almost 400,000 of these routers they've identified on the Internet were still vulnerable. People are not applying the patches. Now, here's what's kind of really scary about them. We've got 7500, that we know of, that are being actively spied on by attackers, they are actively forwarding full captures of all to the network traffic to a number of remote servers, OK. Just crazy. Another quarter million, of these hacked routers, have been turned into proxies. So, they are being used to again send the data off to the bad guys. So what data, all of your data. Now, here's the part that is the part that basically explains, why you don't know about these guys. They are providing hardware for Internet services providers, including campus network infrastructure at schools. They provide equipment for outdoor fiber routers, wireless backbones, OK. It goes on and on. Now, these routers are all over the world. Some of the largest concentration are in Brazil and Russia, here. A lot of the ISP's are using Cisco gear, but there's 14,000 they've already identified here in the U.S. So, again can you trust the hardware that you get from your ISP? Probably not, 100 percent. So, what are you going to do about it.? I can tell you what we do. We don't use the hardware that they give us.

[00:24:54] Right. So, they've they've got Modem of some sort or terminal device. We feed that directly into some really good hardware, that we've installed, that we control, that providing high levels of Firewall. So, it's a very big deal. Microtik, keep an eye out, if you are again a business, and this is really important or if you have quite a bit of money that you want to protect. Make sure you get rid of that router at the edge of your network, that's provided by Internet service provider. Get rid of it. Let's go ahead and do something reasonable. Contact a company that knows what they're doing with security firewalls et cetera. And, unfortunately I got to tell you that 99 percent of them, we have not met very many companies, and we deal with them all over the country, here, that really know what they're doing most most of them have no clue, they're just selling a box and pushing it. But, anyhow that's what's going to happen in October. Keep an eye out for my nuggets. Make sure you sign up at Craig Peterson dot com. We'll be all kinds of good security nuggets we're going to be putting out. Have a great week, and we'll be back again, next week with more tech talk with Craig Peterson, see you then.

 ---

Related articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers


Threats To Our Privacy: Tech Industry Told ‘Privacy Is Not Absolute’ And End-To-End Encryption ‘Should Be Rare’


Business Email Fraud Attacks Jump 25%

Unpatched Routers Being Used To Build Vast Proxy Army, Spy On Networks


Segway’s Drift E-Skates Aren’t Nearly As Dangerous As They Look

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 5, 2018

Did you see that the Internet Speeds in the US have doubled?  Yes, it is true -- Listen in as I talk with Ken and Matt about what caused this growth.

Do you own a small business?  If so, you'll be interested in what I have to say to Ken and Matt about the dangers you may be facing.

Been to Dulles lately? They have some new technology in place.  This morning with Ken and Matt I will discuss it and the impacts it will have in the future.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:


The End Of Net Neutrality Has Doubled Our Internet Speed Ranking!

With The End Of Net-Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

Half Of Small-Businesses Believe They’re Not Cybercrime Targets

New Facial Recognition System Catches First Imposter At US Airport

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/05/2018

Internet Speeds have doubled in the US due to Net Neutrality Repeal. Small Businesses are the targets of Hackers.  Facial Recognition at Airport's first Imposter.  

Craig Peterson: [00:00:00] Hey, Good Morning. Craig Peterson, Here on in Maine. I talked a little bit this morning, again, just like I did yesterday with Jim. I guess this is a big story about the U.S. Internet speed where our ranking has doubled, which is just absolutely amazing just how much faster we've gotten. And, also a little bit about AT&T and their investments into the Internet. This new facial recognition system, catching our first imposter at the airport, and we talk about how many airports it's in place. It's surprising we caught one, Half of all small businesses believe they are not Cybercrime targets, and frankly that's not a good thing. So, that's what we talked about this morning stick around here we go. 

[00:00:49] Well it's that time of the week again, Craig Peterson joins us, once again, to go over what's happening in the world of technology. Craig, how are you this morning? Hey, Good Morning. Doing well.

[00:00:59] So, when I went in and looked at your Web site, Craig Peterson dot com,  my internet speed is just so much better. Is this a result of the end of net neutrality?

[00:01:11] Craig, Yeah well for those who don't remember, of course, net neutrality was an Obama era FCC thing, where they were trying to bring the Internet into the same rules and regulations that have been in place since the 1930s for the telephone companies. And as you know for, jeepers since the early 70s, really, what became the Internet had been pretty much unregulated and had been completely unregulated since 1991. Other than of course the Federal Trade Commission, the FTC, was regulating it and has been regulating it pretty heavily. So, we had net neutrality in place for a while, and there are a lot of people who were out there yelling and screaming that we needed it because we needed fairness, we need equal access. In other words, the kid sitting there with me in front of their computer who is playing video games streaming live all day long. Plus they've got Netflix playing over on the side and maybe they've got music playing as well and this happens and it happens quite frequently. So, they use a lot of bandwidth. They wanted it to be fair. So, he would pay the same price as the grandma who was sitting at home hoping to get an e-mail from the grandkids. You know which is of course totally crazy. And to top it all off we had you know businesses out there who wanted to get some money back from their investments into network infrastructure. So they put it in place in the very first thing that came in front of the FCC net neutrality the very first time and this was terrible.

[00:02:56] That's not a good thing. It was in place because what they were doing is the FCC denied a company that wanted to give away free streaming video because it would be unfair to their competition. You know, heaven forbid you've got a startup company that wants to go up against Verizon and offer a better deal, right. So, net neutrality, absolute failure and we have the Trump administration with the new chairman of the FCC who got rid of this net neutrality thing and when they got rid of it, of course, we still had people who were out there screaming hey, we've got to we've got to put it back in place its terrible the world we're going to come to an end. The Internet never existed without the FCC regulations, of course, you know I'm kind of going a little overboard here to come up with a point, but that's basically what is happening. In fact, it has gotten so bad that the chairman of the FCC has had to get armed protection for himself because of the death threats and armed protection for his kids. So, now we've got people like Ken out there who are we have noticed something which is since the repeal of net neutrality took effect just this spring.

[00:04:14] The internet has a ranking of the U.S. and the Internet has changed. The Internet has sped up in the U.S. and the U.S. has gone from being the twelfth fastest Internet in the world, average, average speed to people's homes so, we were 12th. And since this spring since net neutrality went away we're now the six fastest Internet in the world. We've basically halved our rank which is a very good thing. AT&T is investing nearly 120 million dollars just in Iowa to improve their network. So, now the businesses know they can get their money back out of it. That they can charge the kid sitting there using up all of their bandwidth. That they can charge Netflix, that's using half of the Internet bandwidth, at times, in the U.S. That the backbone carriers who have paid for the infrastructure can say hey Netflix you owe money, in order for us to carry all of these movies for everyone. Now, that's in place, we've got companies reinvesting in the Internet. We're seeing internet speeds improving and we're also seeing improvements for consumers. I just switched my mobile phone plan, my cell plan. I've had the same company for about 20 years now and I switched it because I'm now getting twice the speed for half of the cost. 

[00:05:38] And with net neutrality, in place it would have had to get permission from the FCC to lower their prices or to improve their performance or speed. So, thank goodness it's gone. I predicted this would be the case. if it did go in place and if it was removed. So, it is great. I know there's a lot of people who don't like it, and I want to warn those people who are more on the conservative side, who are now starting to call for more regulation of the Internet, because of what's been happening with Facebook and Twitter and other places where they are apparently censoring some of the conservative speech. So, we've got conservatives now out there saying oh we've got to have this regulation in place including just yesterday the new chairman of the FCC the guy that got rid of net neutrality really seem a kind of a personal statement if you will saying hey listen we may have to regulate the MAGAF companies. You know again Microsoft and Amazon Google Apple and Facebook we may have to regulate those companies because they are not treating all information fairly. So, it is kind of interesting here is the pendulum sways. Maybe, that should be a name of a new soap opera or something guys.

[00:07:02] Craig Peterson, our tech guru, joins us right now to give us an eye on the world of technology and before I move onto the next topic I should mention, speaking of net neutrality and whatnots, Ajit Pai, is going to be here, next Friday, coming to an event at the Maine Heritage Policy Center. So, if anybody's interested in that, Maine policy dot org, ladies and gentlemen Not interested. Yes, I know you're not. But maybe the great crowd out there listening to this might be. So Craig, now that I've done my little disclaimer. 

[00:07:26] Yeah, he's the FCC chairman for those who didn't know who that was.

[00:07:29] Correct. Basically, the one who is responsible for killing it, killing net neutrality, in the first place. So, anyway moving on to other topics. You know, if I were a small business owner right now I may be, I might be a target for cybercrime, but I'm just a small fish, right. So, I'm probably not. Am I wrong about that?

[00:07:50] That's one of the things that you hear all the time isn't it. No. I would say go after me. Why did Willie Sutton rob banks? Because that's where the money was. And, so many people are assuming that the bad guys are going after the big businesses which they are, and they are going after the banks online trying to hack them. They're trying to break into their networks into the computers get all kinds of information. But the big banks and the big businesses can afford to do security and do security right. And, now they are spending money on that. They're spending real money on trying to keep things secure, while small businesses and the home users don't have that money. So, where are they going to go. Well obviously, they're still going to hit some small people and you know in their homes. But, now the FBI is saying that small businesses are the biggest target, right now for the bad guys, for hackers. And, unfortunately, a lot of small business people are thinking that they're really not going to be coming after me. But, when you look at the numbers that are involved here, where an average hack can cost 130,000 dollars. We just picked up a client that had been hacked and they lost 180,000 dollars in cash. So, you know you've got to be careful business owners, just like you were indicating Matt, Don't think they are the target but they are the target. And, you've got to start using real multifactor authentication or two-factor authentication for your business e-mail accounts because that's where they're usually going to ask you, they're using something called a business email compromise. It's something the FBI has been warning a lot about. It's something that's been very effective and very cost effective for them and unfortunately has literally stolen the livelihood and the businesses, that people are working their whole lives for. It's been stolen from them. So, it's a big deal. Don't think that just because you're a small business you're not a target. Because in fact, you are the target. 

[00:10:03] We're talking to our tech guru, who joins us Wednesdays at seven thirty-eight. So, facial-recognition which works on my iPhone really well. Is it becoming more viable for security issues in airports?

[00:10:18] Yeah. What's in your iPhone is really interesting because it's close up. It's able to measure multiple points on your face simultaneously, to figure out if it's really you. And, by the way, Apple's expected to release some more information about their phones coming up here, next week. But, yeah facial recognition is interesting when you're talking about it for a crowd. We've used it at major events, major sporting events for about a decade now. And, we've had a lot of false positives which is OK, because it was new technology and the police understood that. What I'm concerned about is in the future. What happens when people are falsely identified, as well? Well, down in Washington D.C. Their main airport down there which is Washington Dulles is now using an interesting form of facial recognition. What they're doing is the computer looks at their passport photo and is able to use that photo without training like you have to train your iPhone, right.

[00:11:26] Can you see your face Yeah exactly.

[00:11:31] This is just training? So, he presented a French passport as his I.D. the computer scanned it. The computer used a camera that's sitting there. And, they do film all of your interactions at these international airports and was able to identify a man with a fake passport, just using this new facial recognition system. So, you can expect this is going to grow as time goes on is going to be used more and more. There are 14 airports, right now, using facial recognition technology. It is being used to help screen these people and this was the very first one ever caught using facial recognition and it was just a couple of weeks ago. So, it's kind of interesting and we're going to see more of it, as time goes on.

[00:12:17] All right Craig Peterson, our tech guru, joins us at this time every Wednesday to give us technology around the world. Craig, thank you very much, sir. We will talk again next Wednesday.

[00:12:27] Hey, thanks, gentlemen. Take care. All right.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Sep 4, 2018

Find out more about how we are winning with the end of net neutrality as Craig talks about it more in depth with Jim Polito.

 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The End Of Net Neutrality Has Doubled Our Internet Speed Ranking!

With The End Of Net Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/04/2018

The Stats On Net Neutrality Are Out - We Are All Winning

 

Craig Peterson: 0:00 Hey, Craig Peterson here. You guys remember the whole quote, debate, unquote, about net neutrality? I never thought there was a debate here. There was no sense in this whole idea of net neutrality. It just when you played it out, it was absolutely ridiculous. So any how we got some stats, some hard numbers, what has happened since the end of net neutrality, and that's where I talked about this morning with Jim. So here we go.

0:30
He is the man. He is our tech talk guru. And he's our good friend. I'm talking about Craig Peterson. Got some important stuff to discuss today. Good morning, sir. How are you? Hey,

0:44
Good morning, Jim. Doing well this morning. You know, it's almost the end of the heat wave like this. And they get good again. Yeah, that

0:52
for a Canadian? Yes, absolutely. For Canadian. This is heatstroke. weather. So,

1:00
you know, I'm an American now, right?

1:03
Oh, no, no, no, no, I know that. I meant more like, you know, like, we, which we're very happy about that you did, because you're a wonderful addition to the country. I just met, like, you know, being a Canadian coming from Canada being raised. They're not necessarily the customs. I'm talking about the climate

1:23
and all that. Yeah. Yeah, like a please. You know, like half an hour of sunlight a day. You know, all that stuff. That's it. Well, actually, now, were you not where you came from? But, you know,

1:38
yeah, well, in the summertime, the sun never actually quite set. It was worse. It was Twilight though. And my daughter's in worse shape. Right now. She's up in Norway. And she's saying that the days are already getting cold. It's below freezing.

1:54
Yeah, that's, it's nice to go there in the summer.

2:00
If you wanted to come visit, I'm not so sure.

2:04
You just tell her dad. He's got a big new contract. He's working on me. Can't I'll be there. I'll be there in June.

2:13
Exactly.

2:15
Well, we need your help today. Because two things have come up net neutrality and an actual increase in internet speed ranking. So in the US. So remember, we I think we just need a refresher on what net neutrality was. And now we were told that the sky would fall if net neutrality went away. It did go away and the sky hasn't fallen. So could you lay it out for me, please?

2:46
Sure. Absolutely. I had a request to do exactly that. Another station and another station today, Craig, can you come on, I want you to take net neutrality from both sides. I want you to be productive neutrality and anti net neutrality. And I said, you know, I'm not sure I can take the pro side. But I can tell you what they're saying. And what they were saying, Jim, was that we need a way for the government to regulate the internet very, very closely. We need to make sure that the federal government has control over everything that's online, so that we can enforce free speech rights. But you know, more burden than ever, what we need to do is make sure that these big bad evil companies are not over charging their constituents never word your your internet service provider, whether it be you know, Comcast or whoever it might be even your phone provider, make sure that they have to obey the same rules that were put in place in the 1930s on top of the telephone companies. So that's what they were doing. They said, if we don't have net neutrality, everything's going to fall apart, the speeds are going to slow down and people going to get charged way more is just going to be a terrible, horrific thing. Of course, this was during the Obama administration. And they didn't bother mentioning that, in fact, the internet and it survive just fine without the FCC regulating it for more than 20 years. He back the internet internet had grown immensely over that time.

4:26
So it's this big monster.

4:30
Yeah, we need control over and you know, what I get concerned about right now is we've got the right wing voices and libertarian voices, basically everything except for socialist, slash communist, socialist, fascist voices, all of the other voices out there are getting squashed. And I'm getting concerned. Because we have a lot of people who are saying, whoa, wait a minute. Now, we need to regulate the internet. And the voices that are saying that today are tend to be on the right hand side of the aisle, the left hand side,

5:03
which is a flip,

5:05
yeah, it's a big flip. And, and I'm kind of wondering if this isn't the manipulation. But I was against to the whole idea of so called net neutrality, because here's, here's the bottom line problem. You've got some kid sitting in the basement of his mom's house, like the typical picture, right. And he's sitting there playing these streaming video games with a dozen of his closest friends around the world. He's got Netflix movie playing over here, and he's got his streaming music playing over there. And he's just using bandwidth coming out of the kazoo. And the people who are pro net battle net neutrality were saying, Hey, listen, he shouldn't have to pay more than the grandmother next door who's living off of social security and all she's looking for is a nice little picture of the great grand kids or grandkids to come in on a piece of email. So in their mind those were equivalent in their mind Netflix which uses more than half of all of the Internet bandwidth in this country that Netflix we should be paying the same and should not be charged by the backbone providers any more than your local soccer team was in the gym? Yeah,

6:23
because they were vacuuming it up

6:28
exactly and why would they have to be responsible for why would someone that pain Netflix to watch movies Why would they have to pay more if they have a plane movies all day long and someone that never opens a movie never streams video right it was insanity so I was absolutely against it. And I told everybody about it on my show on your show and they listen this is this is just stupid. And worst of all, what it's going to do is it's going to stop expansion the growth we had seen on the internets going to stop because you had to go to the FCC and kiss the ring, pardon me,

7:10
and and say, Hey, listen, I have a whole new model for doing business. And in fact, the very first case that was brought in front of the FCC for for arbitration was a company that wanted to give free streaming movies to people. And the FCC said, No, you can't do that. Because, you know, lines and isn't doing that. And it just wouldn't be fair to these other companies out there if you give stuff away for free. So under Obama's net neutrality rules, they were stopping us from getting free stuff. So it's it's absolutely wonderful now that President Trump put in a new chairman for the FCC, whose life has been threatened, whose children's arrives had been threatened by apparently left wingers because he did the see it's crazy. He now has armed security guards, but the new chairman of the FCC got rid of his net neutrality rules. And the beauty of this gym is exactly what I predicted would happen did happen. And that is the companies started to invest in the internet again, because they realize they could charge people based on what they were using. So now they could afford to improve the internet. It's like them well, maybe it's not like the mass pike. But you know, with a pipe if you use it more, you pay more

8:39
Yeah. And and they can, of course, do the repairs and make the better roads to handle the trucks, etc, etc. Right. So now the internet we have doubled in our position here. And since the end of net neutrality, the United States average internet speed has gone from in the world to six in the world. See, that's impossible, because the liberals are telling us that wasn't gonna happen. No, it's gonna get worse. Yeah, that's

9:08
it. That's impossible. You're lying. You're lying.

9:14
I have this stat you go online, you can see it right there. We've got some tweets that people will put the now basically say almost the same thing. But it's showing a dramatic increase. In fact, my I switched my carrier, my telephone carrier over and the for the first time in like almost 30 years, I got cell service 25 years ago. And I stuck with the same company the whole time and I just switched over because I found another carrier now that's given me twice the speed for half the cost under net neutrality they would have had to go to the FCC they would have had to beg permission to charge less and deliver more thank goodness it didn't happen and I morning the conservatives and out there don't to fall for the trap here of trying to regulate the internet in order to stop these left wingers from blocking free speech because if they will get what they want, and they will get all of this regulation and we'll go back to some of the insanity that we had in the 80s and 90s with the so called fairness doctrine that just backfired on everybody so it's gone thank goodness things are getting better dairy is

10:30
folks right there Craig Peterson explaining a said it before and he was right now if you want to get other information from Craig Peterson, you can without any hassle. The only thing is that the standard data and text rates apply. But I will if you text My name him to this number 855-385-5553. That's 855-385-5553.

11:01
You will get all of this information plus more. Plus, if there's ever a big hack. He will notify you and tell you what to do. He will never sell your name. And he will never try to sell you anything and he will protect you, Craig. Always a pleasure. That was an excellent explanation and vindication of really a position you took quite a while ago. Oh, yes. Oh, thanks. Yeah, thanks, Craig. All right. Don't go anywhere.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 1, 2018

How is a world class trainer using tech and social media to help people achieve their goals? Listen in as I talk with Oonagh Duncan about her business Fit Feels Good.  

Congrats to Ajit Pai and President Trump!  I explain why repealing Net Neutrality has helped the industry and everyone else!

What is the biggest danger to SMB's?  Do you know?  Listen in and I will tell you what every business need to be aware of.

 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/01/2018

Fit Feels Good's Oonagh Duncan, Net Neutrality Repeal Benefits, and Business Email Compromises

Craig Peterson: [00:00:00] Hey, Everybody welcome. Of course, tech talk with Craig Peterson. Same time every week, and online as well. Craig Peterson dot com. Today, we've got a couple of different things going on. One I've got a friend of mine I've known for a couple of years who have been using the online world in order to help build a business and help people. You know I'm an entrepreneur, right, and so is she. I think you're going to find this interesting. And if you know anyone who is a woman in their 40s who might have a couple of problems with losing that baby weight that was put on, well she can probably help them out too. But, it's interesting because she's using the modern technology, including some of the stuff that we're constantly complaining about it comes to social media. So, that'll be fun. So, she's up next. We're also going to be talking about a couple of security things, this week. Half of the small businesses believe they're not cybercrime targets. We'll explain why that's a really bad idea. We've got some more information on the DNC, and another hack that appears to be underway. The whole 'Struts' Bug. Hey, if you work in with a bigger company get this fixed. Now, this is critical absolutely critical. This is how Equifax got hacked the same subsystem called Apache Struts 2 Flaw. So, check that out, if you're a bigger business. We've got an Ohio man sentenced to 15 months for BEC scam. We've got new stuff with scanners at airports. AT&T, oh I've got to talk about this. So, we'll get to that and a whole lot more. But first, we are going off to Oonagh. Here we go. 

[00:01:47] We're joined right now by a young lady. No, I say young but she's working with women in their 40s her name is Oonagh Duncan and, Oonagh has been all over the place and associate fitness editor for a magazine. She's been a regular before on all kinds of podcasts and on the air as well as CBC up in the Great White North. And, we're going to talk with Oonagh in a little bit about technology. Now you know tech and you know tech has been influencing us. We've talked about some of the problems social media has caused with all kinds of negative things and when we think about it in kind of a negative stereotype, as well, so many times. The reason we're having Oonagh on is that she has been very busy in helping to build a community of these young women who in their 40's, who want to get back in shape, maybe lose some weight, maybe get that cardiovascular system going. And, then she's doing it using technology. So, I've known her for a while, and I asked her to come on she was gracious enough to do so. So, Hi. 

[00:02:51] Oonagh. Hi, Craig how it been going? It's going really well, now. 

[00:02:55] The first time I met you in person. I suspected that you were probably about 30 years old. You've got more than a decade on that, you've taken good care of yourself. What brought you to the point where you thought you might be able to help other people? And looking online Google, for instance, It has about a thousand people who have rated you 5-stars so, you're obviously good at it too.

[00:03:22] Thank you. Yeah. Oh my gosh, it's been an unbelievable ride. I was I was originally an actor and playwright and then in order to, you know, you would be shocked playwriting is not very lucrative. So, I began to teach fitness classes at 6:00 in the morning and 6 at night. So, I have my whole day to work on my playwriting. And, so I did that for a few years and then I found, that you know, I just kind of getting sick of auditioning all the time, and you know trying to reach my place. So, it's like, no actually, this is the kind of fun. Well, see if I can make a go of it, and it just really took off from there. And, then I noticed that a lot of my clients even though they were exercising, a lot, weren't really seeing the results on their body, that they wanted to because a lot of people don't know this, exercise is not that efficient for a fat loss. It's really efficient to keep off the weight once you've lost it. If you want to lose fat it's going to be almost all about Nutrition. So, I am putting the nutrition component of my program and that I put it all online. So, the only client that had moved away that was sort of my initial impulse but then it just started being like all the strangers come into now I have people in like Mexico, and Germany, and you know Latvia and it's unbelievable. It's so fun because you know I get to log in in the morning, and see how everyone in the UK is doing and then you know before I go to bed and they see everyone on the West Coast and what they have for dinner. So, it's really, really cool the global aspect of it. 

[00:04:49] It is a different world isn't it. You can get an expert to help you from almost anywhere, and that's what you're doing. Tell me about the success here? 

[00:04:58] Two thousand people all over the world with a 100 percent 5-star review. You're having a real shock then. How are you achieving this? 

[00:05:08] Oh, my gosh. Well, you know it is just it's really sort of happened, organically of course, and using Facebook to reach people. But, honestly, I see so much of it is word of mouth, and it's not because you know people are losing weight. My program is called a 28-day transformation challenge. We lose weight, in between. But, because we sort of have snuck in all these psychological triggers that build how bad people are tending to keep the weight off long term. I think that's like making all their friends go. Wait a second. What's going on here, and then? And, so, the word of mouth has just been like spreading wildfire. I think a lot of that is also about the community because there are so many. I mean, I don't know, if you know that there's no many, you know click thirty-nine-dollars to buy a PDF download. This meal plan and workout program that is everywhere. It's not everywhere, it is a life community where everyone is starting the program on the same day. We're all doing it, together. And, you have one on one access to a world-renowned trainer and a nutrition coach. And, it's sort of like sports that we can offer online and know into people's questions. My team, you know before long they're finished hyping it. So, people feel so unsupported, in order. If you were to try and figure that out locally, hey you know, who knows where you live, if you got access to that level of caliber of trainer, nutrition coach, but you know you have to work schedules and then see the cost could be prohibitive. So, really new technology is making history and more accessible to so many people.

[00:06:43] So, you mentioned the kind of the social support side of this. Are you using Facebook? Or, do you have your own membership site? How does that all work? 

[00:06:52] Yea, we do have a membership site but most of the time the membership site we're really just using for, you know, content distribution. It is really all the action happens in the Facebook group. You know we had considered forums because now we have so many people that there's had to be some little you know breakout groups have been new moms, and you know breakout groups women going through menopause and you know you have a little small but really cool dude factor and you know so they might be cool to sort of break that open. Right, now we're just in a big jumble in the Facebook group and sort of organizing with hashtags and you know community memes and stuff like that and it seems to be working pretty well. 

[00:07:30] Now your wife excuse me my wife and you haven't had a chance to talk before. And of course she's almost 60 years old now and she has had a hard time over the years in losing weight and things. So, she has gone out, and we've done everything we've done the app can you name it we've done it and she's found apps online. Some free that she downloaded some she had to pay for and if it was like what you were talking about that 39 dollar PDF and she didn't get anywhere. But, I think maybe even the key that you have really hit on here is this whole idea of social support. Is that why the apps just typically aren't working for people? 

[00:08:15] I think of it, I think to be honest Craig I think part of it is that those are there. You know you pay 20 bucks and they all kind of look the same. You know maybe you get a push notification, if you allow them. But it's so easy to ignore. If you are a real person who follows up and says Hey, Craig what's up? Haven't heard from you for a little while. Hey, I'm looking you know I know you slept in today and you said you really work done after work. 

[00:08:38] I'm waiting for your sweaty selfie. You know. 

[00:08:43] Yeah. And then people were like, Oh yeah I have to do it. So, there's that sense of accountability not only to your trainer and nutrition coach but to the rest of the community because you know you log into Facebook and you see all these other people are like oh my gosh you the soup was fantastic and it The workout was so hard, I can't believe I finished it or whatever. Then you're feel like you're part of something and building the team down if you don't win. And this is a well documented all over the psychology of exercise adherence if you work out as part of a group and that's a team sport or even group exercise in the gym you are hundred percent more likely to adhere to your is to achieve your goal. 

[00:09:20] Yeah. No, part of the problem with the gym, Oonagh, is of course you've you've got to get babysitters, if you have younger kids, and you have a job, more than likely right. So, we only have a couple of minutes left but of course Fit Feels Good, of course, is your website will give that out again in just a minute. But you have this live community aspect that seems to make all the difference. 

[00:09:41] That's right. And you know I'm sure your people are pretty tech savvy so, you know a lot of people are like are you going to go evergreen with this You know make it's sort of passive income that just keep coming in I'm like well yeah I have figured out a way to go evergreen and that we start live you know often. But, it's still a Live start. It still has me physically in the group, Welcoming people, commenting on their things like I can't and I won't ever just turn it into a do it yourself program because I know that doesn't work. 

[00:10:12] Yeah, you've got to have that support. You know I've seen on your Web site you've got some other programs coming up you started with this outdoor kind of a boot camp. You mentioned your 28 day program now. Are you also have something. I think you're trying to set up to go down to Mexico and really kind of bootstrap people, but fit feels good Dot com is your Web site and know your brand is fit Feels good, as well. Can they find everything there or what's the best way to find out more? 

[00:10:42] Yeah. If you go to it feels good dot com. You'll see everything there. You'll see a heading called free stuff and you can grab  free goodies. And, if you find out about my 28 day transformation challenge and next one is starting on the September 10. It actually is a really wicked bonuses going with that one, including you know I've got a celebrity stylist who's going to come in and tell us how to dress for your body shape. I've got a flat belly strong core program. All of that goes with that. So, if anyone is ever interested in taking care of your body, your health, getting lean kind of once and for all if you're done trying all the 39 dollar apps and your like lets get down to business and get this done. And yet come join me September 10th and I will welcome you with open arms and so much accountability. 

[00:11:27] All right. Now, I've known you now for a couple of years I think give or take. And I got to say she's the real thing. She she lives, she loves this. I get on calls with her. And you know on Zoom or WebEx or you know all these types of technology online and she doing well she's on the call she's on a treadmill talking I'm gonna get on the call. All I know she's doing that right now. All right. 

[00:11:54] Well, I am actually pacing right now. 

[00:11:57] There you go. She she lives it, she loves it. The people that work with her absolutely love it. Oonagh is not compensating me in any way, for those of you who don't know me you haven't been listening for the last 20 years. I think she's got some great tech and great heart and is really trying to help out again. She has been an associate editor, fitness editor, in fact, for magazines. She has been all over the place helping women and some men as she said but kind of specializing in women in their 40s when it's really tough when you've got to start taking those pounds off from the kids. Helping them out doing that live and having a whole lot of fun while doing it. And again the Website is fit feels good dot com. Anything else, Oonagh like to add. 

[00:12:43] No that's fantastic. Thank you so much. OK. That was really lovely. Hey 

[00:12:46] You're welcome. Take care. OK. So now we're going to get into the tech side. We've got a lot of stuff to talk about. So here we go.

[00:12:59] You know we had a lot of complaints from people about this whole net neutrality thing and I think the reason is people just didn't understand it. We had a group just like we have right now a group of far leftists, socialists who want the government to control everything. And, if you don't think that's been the case for a while. Look at your tax bills we're over 50 percent now. What do you buy? What do you own, that you think it's worth 50 percent of your income? Right. Anything is your car worth working six months out of the year for?  Remember that means January through June or July. What's worth that? Is government? Are the services government providing you. Are they worth half of your whole income? Well, those same socialists were out there just beating this drum, because in the latter part of the Obama administration the FCC passed this net neutrality rule where they pulled the Internet under direct FCC control, by one simple ruling right. And the FCC said well we don't really have the authority to do this but they did it anyway just like President Obama said that we don't have the authority to do this but I did anyway. They were saying if net neutrality goes through we are out of luck. 

[00:14:17] Right. Because they're going to slow down the Internet. There's going to be advertising everywhere, if it doesn't go through we need it so that everything on the Internet is treated fairly. So, that your soccer team is treated fairly. So, that you're not overpaying for Internet access. And you'll remember at the time my argument to that was hey wait a minute now. Why should the old grandma, who's sitting there in her home doing nothing except waiting to get an e-mail or some pictures from the grandkids? Why should she pay the same amount as some kid sitting in the basement playing full 3D video games and talking to the friends all at the same time and streaming Netflix in the background? Maybe if Hulu in the background, right? Why should grandma pay the same as a super high end user of the Internet. It just doesn't make sense. Well, there's another factor I talked about which is that you will take the incentive to invest in the Internet away. If you have this so-called net neutrality, right. Why would businesses try new things? Why would businesses invest in more bandwidth, if they can't charge for it? Why would they invest in more bandwidth, if the high end users can't be charged more? 

[00:15:39] Right. You remember me talking about that. Well, we now have proof that what I said was absolutely right. Because you know that President Trumps FCC and of course, the head of the FCC Ajit Pai just came out and eliminated that so-called net neutrality rule. Of course, the left was out all over the place saying oh the world is going to fall apart. Well, guess what. not only did it not fall apart, but the Internet has gotten much, much better because of the net neutrality repeal. So, I'm looking at two articles from this week. One is AT&T is investing more now. Iowa right. Not a big state kind of flyover country, as the Clintons like to call it, right. It's not an East Coast-West Coast which gets most of the attention. No, it's in the Midwest. Iowa. AT&T is investing nearly 120 million dollars to boost local networks in Iowa. That's just this week. So, they're boosting reliability coverage, speed, and overall performance for the residents and businesses of Iowa. Including rural Iowa. OK. So, they've already made 365 network enhancements across Iowa including new cell sites, network capacity, and network upgrades, since President Trump removed this so-called net neutrality, which was terrible, terrible to have in place I can't believe they did this. And, again it's the far left that's doing this. Here's another one. Absolute proof as to what's going on. That's just one sample right that article this week from MarketWatch which is an investment website. OK. And that ultimately came from PR Newswire. Our next one. The U.S. Internet speed has gone from 12th place in the world.

[00:17:38] So, we had the 12 fastest average internet speeds. Now the U.S. we invented the Internet, literally invented the Internet. And we've been we've fallen to 12th place in the world under President Obama, as far as internet speeds go. Well, here you go, we got rid of net neutrality. We've got companies like AT&T and of course Comcast and you name it. Everybody investing this week as well. T-Mobile came out wasn't T-Mobile it was a third-party analysis. T-Mobile right now has the fastest 4G LTE speeds of any company. They are just pounding it. And you know I switch personally from Verizon, I've had Verizon Wireless since the early 90s. So, since they first started providing cell service, before it was even called Verizon. So, I've been with them a long time, and I switched to T-Mobile. And, of course, you have to have a newer phone if your Verizon customer moving to T-Mobile because you need the additional bands. But they've done amazing things again since net neutrality was removed. Well, now we've got this article. We were 12th in the world. And, since the repeal of net neutrality took effect on June 11th. Since then, the U.S. Internet speed has gone from 12th in the world 12th fastest in the world we're now sixth fastest in the world. What does that mean? That means that as far as the Internet goes businesses are investing again because they realize that if they put like AT&T 120 million dollars into Iowa, they can get their money back out.

[00:19:31] Very good thing. I love the fact that they're doing this. So it makes a huge, huge difference here. You should see some of these tweets too about this article. Wow. So Ajit Pai. He announced late last year he's going to repeal it and stuff but it's oh it's going on and on and on. Of course, some positive comments and some others. So, my internet speeds have improved dramatically. How about yours? OK. So we're going to talk about new facial recognition stuff and I want to bring up this whole idea. Businesses have that, no one's going to come after me right.

[00:20:16] Now, of course, who robs banks. thanks, Willy. Text me his last name if you remember 8 5 5 3 8 55 53. He Robbed Banks because that's where the money is. So, where are the bad guys going to try and hack? Well, obviously they're going to go after the money. They try and go after banks and try and build up the whole idea behind banks. And they've got the money we're going to have them but the banks have the money to put into fixing their security. So, where else to go if you're the bad guy?

[00:20:52] Yes Sutton, you're right. Hey, thanks for that. 

[00:20:56] Any other comments, you can always send them there to 8 5 5 3 8 5 fifty-five fifty-three. 

[00:21:02] But, where do they go now? Well, they go after small businesses because small businesses are not savvy when it comes to security. And, I see that every day. You know I keep mentioning I'm picking up more and more customers two more this week where we're doing scans for them because you know in this case one of those cases was the unknown, unknowns right. I don't know. What I don't know about my security. In accountancy, an accounting company. And so we started looking. And of course they do billing for customers and things and we have a customer right now. Well actually their insurance company is our customer because they were an accounting firm and as an accounting firm, they had all of this data the data. Guess what was stolen? They got hacked. Their firewall right through it because most firewalls are pieces of garbage and they were able to use that stole 180000 dollars in cash from the accountancy's customers. So, if you don't think you're exposed, you're wrong. But, you wouldn't be out of the ordinary, because there is right now 76 percent of small businesses say that they have not activated any sort of multifactor authentication. And we've talked about that on the show before. You know I'm using Yubikeys. I've got my clients moving towards those, as well. We've got the integrated systems so, that if someone comes on board we can give them access to everything from one place and if they leave we can remove their access to everything, from one place. 

[00:22:42] But 51 percent of small business leaders who were polled are convinced that their companies are not our target for cybercrime. Now, have any of you have a board of directors that needs some information. Let me know. We just this week did an FBI webinar that I ran, on this very issue. How do you convince your board of directors that they need to do something and do something urgently? This is not the same world it was five years ago. So, 51 percent of small business leaders are convinced their companies are not a target for cybercrime. And yet at the same time, they are the ones who are getting breached. I pick up a new client at least every week that has been breached and we've got to go in and clean up the mess. Or as I mentioned our help when the in the lawsuits that ensue and get paid by the insurance companies and that's after the business is going out of business because they lost all of their working capital, their cash is gone. So, here's another example an Ohio man got sentenced to 15 months for a BEC scam, business email compromise Olemewa Jumeau. I'm probably mispronouncing that, targeted CEOs, CFOs and other business leaders with fraudulent e-mails. 

[00:24:06] So, Chief U.S. District Judge is this from the from the press report press release, Chief U.S. District Judge Janet Hall last week sentenced him to 15 months in federal prison for his role in a business email compromise scheme targeting organizations in the United States. You know I was looking at the stats from our clients from just last week and it was amazing to me to see wow how many attempts there were we stopped for our clients last week. I think it was like four dozen business email scam attacks directly actually attributed to it. Of course, you know tens of thousands of spam e-mails. But these were really directed attacks where they're going after a specific business. OK. So after 15 months in federal prison, he is going to have three years of supervised release. Now, it just bugs the heck out of me. Fifteen months. Here's a guy that stole the retirement, the livelihood of these business people, right. We're businesspeople, we're trying to run a business. We're hoping that it will support us in our retirement because heaven knows Social Security isn't going to cut it. We're hoping that maybe we have something left to pass on to the children, as long as the government doesn't take it from us. So, they've lost it all. They've lost it all. And this guy. It's 15 months. It's absolutely crazy. 

[00:25:37] So, this guy admitted that he caused losses exceeding 100000 dollars in order to pay 90000 restitution. I don't know what the actual numbers are. That's all he admitted to but, bad news. Make sure you tighten up your security if you want me to talk to your board of directors. I'll be glad to make presentations. I do it all the time for annual meetings and other places. Reach out if you have any other questions or comments, reach out. Just pick up your phone you can text me 8 5 5 3 8 5 55 53 8 5 5 3 8 5 55 53. Keep an eye out in your e-mails, hopefully, you're on my e-mail list because starting this week, every week in September I'm going to be doing a different webinar. We're going to be talking about the big problems out there, ransomware what to do about it. Business email compromise. All of this stuff. So, if you want to be involved in those, let me know is well, free to attend. I have solutions that I'm going to offer, as well, but the free information here 8 5 5 3 8 5 55 53. Have a great week and we'll chat again next week. Bye-bye.

 ---

Related articles:

The End Of Net Neutrality Has Doubled Our Internet Speed Ranking

With The End Of Net Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

Half Of Small Businesses Believe They’re Not Cybercrime Targets 

DNC Reports Attempted Cyberattack On Its Voter Database

New Facial Recognition System Catches First Imposter At US Airport

Ohio Man Sentenced To 15 Months For BEC Scam

Another Equifax-Style Hack On The Way? Could Be!

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 29, 2018

Find out how an 11-year-old girl changed the results of Florida's presidential vote as Craig talks with Matt and Joe on the WGAN Morning News.

 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Hippies Are Going To End Up Killing Us All! How China Will Win The Deadly Race For AI Weapons

Election Systems Are So Insecure, That Even An 11-Year-Old Changed The Results Of Florida’s Presidential Vote.

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/29/2018

Hippies Could Kill Us All - How To Make Elections Safer

 

Craig Peterson: 0:00 Hey good morning everybody. Here in the northeast, we are going through a heat wave three H's hazy, hot and humid. Now I know I mentioned this on the FBI webinar I did yesterday I mentioned how hot it was and we're miserable because it's in the 90s and it's humid and poor us and I got notes from people in gas Dallas is hotter than even Houston this year more miserable down there so I get it but for us this is really hot, okay and I'm not really happy about this but you know falls coming that's my favorite time of year I love fall up here in the northeast up in New Hampshire it's just beautiful. So today I was on with Ken was out. So it wasn't Ken and Matt, it was Joe and Matt today. And we talked about two things really, we talked about the hippies in Berkeley and the Bay Area out there and how they are now putting all of our lives at risk. This is a very real threat. So we talked about it and get into some detail and then we get into a little bit about hacking and where things are going and what's happening with our voting system. Because of course, we got a route midterm and then a midterm primaries first. And then the general big election coming up in a couple of years. So what happened out at DEF CON black hat, and, and it's frankly, it's a little scary sides. Oh, here we go.

1:32
Okay. It is 737 on the WGAN Morning News with Canada. We have Joe Reagan in for Ken and we have Craig Peterson, Tech Talk guru who is joining us right now to give us an eye on technology around the world. Craig, how are you? 

1:46
Hey, good morning. I feel like I'm melting lately. This is kind of nasty. But last time of the year. I suppose I this is your last opportunity to get sweat out of your living room. Yes, absolutely.

1:57
And all you wouldn't look forward to is a very cold, long, cold, snowy winter. Yes. Yes.

2:03
I have a daughter right now over Norway. And she's working over there right now on a project. But anyways, she's saying that right now. She wants to send over her winter clothes because it's already about 32 degrees at night. So yeah, that's to look forward to

2:24
yesterday, just like it was yesterday. Okay.

2:26
So Craig, tell me exactly how the hippies are destroying America.

2:31
Oh, those hippies are back again. That's what you know about the military. You know about DARPA, you know that they're constantly trying to improve the technology to kind of one up bar potential enemies. And they've been doing it for a long time using military contractors and others. Right now, guys, when you're thinking about the most advanced technologies, you're probably thinking about mag AF. Right?

3:02
What you may get Microsoft, Apple, Google Amazon. And let me stop you right there. There are so many acronyms in my brain

3:13
government work, you can't start giving them new ones

3:17
like mega with an F on the end. I thought it would be easy for you. Is there a hat? I can put this on

3:27
Red Hat

3:29
Do you think about right? All these leading tech companies are kind of in the lead when it does come to the different types of technology out there. So what is the military do they go to all of those companies? And particularly, we're going to talk right now about Google. But they go to those companies and say, Hey, listen, you've got this great technology. Now, all of these companies license some of their technologies, you other people, and particularly when we're talking about Google, we've received some great technology. Look at me, Amazon now with the echo because I you guys, you know, those right, you have to have any those.

4:09
I have an echo and echo plus, I've got a tap. Yeah, no, I've got a lot of those things.

4:12
I got an echo show. And I got a couple of them. So I gave one to our granddaughter who's over in Kentucky so that we can chat with her. She can jump in anytime she wants. So I mean, Google Home, do you have Google Home or any of those devices now is now

4:28
home stuff terrifies me.

4:30
You know, a refrigerator tweeting is I don't

4:32
mind the refrigerator, tweeting. It's the security peace behind it. And having the cloud that concerns me.

4:39
Yeah, the IoT, right? The Internet of Things. We're talking about 50 billion devices within a couple of years. So that technology gets license Google, license it to other people, Amazon, license it to other people. So when the military of saying, hey, Google, you've got this really cool artificial intelligence project, and we want to use that in some of our development work every want to give it to them, some startup by contractors, you want to pay you for it, etc, etc. You would expect that to happen, right? That's a legit logical thing they license protect other people, why would they not license it to the military. So it started out with a small group of people inside Google who said, No, I don't want my work being used by the military to potentially kill people. And then it ended up being about three to 5000 people within Google who signed a petition saying, I'm going to quit my job, if you license any of this AI technology to the military. So now, we've got all of these peaceniks, which is bringing back in my mind, memories of the 60s and 70s, these hippies running around saying, No, no, no, you can't use our tech, you can't use our tech nine and I man,

5:58
but in the 60s, the government was investing heavily let me the whole purpose of Silicon Valley expanding was due to government investment in the 80s. Where did we get the internet from the army again, from the military? It was another ARPANET project, they will bring that in the internet today, right? That's right. It was the project of where they were linking universities into the military, linking them all together so they could communicate and develop stuff. It's all military, it was military funded. Heck, we even got pain from NASA, right? That does anyone tell you any more, by the way,

6:39
so that's not really a high bar to said,

6:43
Where's the snare drum there? We need to call

6:48
anyways, it's cold. It's cold room shop

6:51
shop there. So the military has long use high tax the years they're young with some

7:02
now they worked with our universities, etc. And now these hippies are saying, No, you can't use it. Now, here's the problem that's just

7:10
cots technology coming out of Google, DARPA is still doing

7:15
investigative research into those areas.

7:17
Absolutely. DARPA has not stopped doing what they've been doing. And of course, they'll know that's the Defense Advanced Research Project Agency because I have to explain some of the fly is today some of the four letter acronym

7:31
so so that's what DARPA is, yes. But the AI technology that the military was trying to license is critical. And here's why China is ahead of us right now, with at least it appears to be with some of this AI technology. And where this could ultimately lead, if it came down to war could be a very, very bad path. We I'm personally I don't think that those people inside Google are thinking this through. I don't think they realize that by not allowing the military to use the most advanced technology in the world, we are going to start falling behind. And when that happens, I personally think things could turn pretty bad ultimately. But that's where the hippies coming back. Who knew?

8:24
Well, Craig, it's a great point. I think that, you know, looking at as far as foreign policy concerned, but also the impact of technology on our voting systems. I mean, we've had a lot of conversations around the use of the Russians both influencing through social media, traditional media. But then there's also discussions around the actual threats to the physical things in which we use to vote, right. Yeah,

8:46
we just had the big conference out there in Vegas, we had the black hat and DEF CON conferences. Now, these are conferences that every year, it's kind of interesting, because they are talking about how things can be hacked. And if go to one of those conferences, you do not want to bring any electronic devices, because the likelihood is they will be hacked. I don't care what they are, they're going to get hacked out there. And one of the things that they did this year is they expanded it. Well, let me just back up a little bit. You've been to conventions before, and conferences anytime. And they've got tracks, right. So you might have the CEO track or this tracker, that track record, they do the same thing out of these hacking conferences in Vegas. And this year, they had the biggest that they've ever had voting systems online. So they took a whole bunch of wanting system, some of which are in us, in the US and throughout the US. And they put them into a room and they said, have added guys, and they had contests and of course, they were they were all hacked, right? Every one of them. And I got to say that the secretaries of state say, Hey, listen, you know, that's not the real world. Because in the real world, we have more secure networks, we have air gaps, and of course, all that defeated to the thing that's most interesting. Joe, I'm glad you brought this up from the conference here just a couple of weeks ago, is that they also had a junior section. So they had they had let him loose. I mean, kids on voting machines and an 11-year-old girl hack voting machine. And I mean, what she ended up doing was, and this is interesting, right, man, how do the results get disseminated to the press? Most of the time it's via websites, right? You check the website and you've got it. So what does this 11-year-old girl do? She had a replica of the Florida Secretary of State's website out there at Black Hat. So again, every part of this is a problem because what happens if in Washington, they're not calling up and saying I'm you're the Secretary of State for me, give me the vote tallies. What was a code word of the week change code words? I know what you so I know the numbers are legit. What happens if they go to the state of Maine's website to find out what the vote tallies are to put them together to say yes, so it's always our new next president. And in fact, all they had to do was had website had the email. So, Joe, you're dead on this is a huge, huge problem. We have not fought all the way through yet. What are some of the solutions that are being proposed, you'd like to hope that when you look at what DEF CON is trying to do, is it's trying to bring in those white hat hackers that can come in and try and identify the problems in the hope that you're gonna have solutions that are going to come out of that. I mean, are there any ways in which we can further secure the voting system or there's being discussed? Well, yeah, I think they are. I think the best way to do this is a spot audience by people. I think that you using a piece of paper where you mark down who you're voting for, you know, and most of the states that are doing the paper ballots now or are using the optical scanners and it's not, you know, it's not Paper Paper till heavier than a sheet of paper. But then the machine reads it and then the machine gives the tallies and I think what should we only way to move forward here because we're gonna have to use some of this technology but he is you have the machines read them and then you have people spot check they manually go through looking for hanging chads rice in a flashback 20 years ago, and that they look at them, they looked at the tallies, make sure everything looks fine. And then we have to have a secure way of making sure that those tallies that are coming from individual districts and counties and state or all shared properly so that we get good final numbers. That's the only way we can really trust it. I think that the recount that we have right now some states have automatic recount. So if it's close enough of a race, some don't have that. But I think we should make recount easier. So if you want to do a recount, no problem. We bring you some of your people in we will watch you guys with the balance making sure you're not doing anything phony baloney so that anyone almost can do a recount so that we can trust the final tallies. That's the only way I think that we can move forward on this job. Because the tech the tech just cannot be 100% trusted.

13:34
Well, on that happy note, Craig, I think we're done. Unfortunately, we ran out of time. So we have to leave it there, Craig, appreciate your appearance. And we will talk to you again next Wednesday. Hey, gentlemen, take care. Thanks so much. All right. We're gonna take a quick break. We'll come back on the other side.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Aug 28, 2018

What kind of effect do video games have on gamers? Do video games make people violent?

Listen as Craig discusses the latest news story about the video game shooting in Florida with Jim Polito.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Looks Like Google Is Always Recording Your Location -- Even When You Tell It Not To

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/28/2018

Psychology And Videogames

Craig Peterson: [00:00:00] Hey, Good Morning everybody! Craig Peterson here. And I'm saying good morning cause as you probably already know tape these in the morning. This morning I was on with Jim Polito. Jim was all by himself this morning. He didn't have Danny. His board op and producer to help him out. So, I kind of took it easy with him and we stuck with the one big story in the news this week, which of course is the story about the video game shooting down in Florida. So, we went a little bit more detail obviously a different track than I went on with Jack yesterday. But, you know if you heard Jack's interview you might skip today's, but you might want to listen to today's because there's always a little bit different. 

[00:00:41] So, here we go with Mr. Jim. Here he is, our tech guru, the man with all the answers. Craig Peterson. Good morning, sir. 

[00:00:55] Good morning, Jim. It's been quite a morning here with all of the video game stuff going on. Mental health issues. Did you know I was the chairman of the oversight board for Health and Human Services in New Hampshire for a couple of years? 

[00:01:11] Yeah, yeah I did not know that. 

[00:01:15] Oh, OK.

[00:01:17] Yet another hat that I've worn. Craig every time you're on the show, it's something else, next going to tell me you were an astronaut. 

[00:01:29] That would be fun I always wanted to go to that place down in Alabama. Are you kidding me? Yeah right. Right. No. Rocketown.

[00:01:40] Absolutely. You're absolutely right.

[00:01:44] No, go ahead. No, I'm just a space cadet. That's all.

[00:01:48] Never ever made it into the space force.  This whole thing is really interesting when you're talking about mental health issues and kids and video games. In fact, a lot of people might not really be aware of what it's like, nowadays. You know you and I might have played some Donkey Kong or I you remember when Pong came out and I had pong.

[00:02:11] I wish I had the original game because my parents bought it for me one Christmas. 

[00:02:18] Do you burn in the TV tube? Pretty much 

[00:02:21] It was an old black and white. And you know eventually, I did. But, nobody cared because it was an old black, a spare black and white that we had. 

[00:02:32] When did you get your first color TV? I remember my family of like 1970. 

[00:02:37] I think we were '72 because it was a tiny one. It weighed a ton. And I actually ended up bringing it to college as my TV. It was a small way too tiny it was one of those so-called portables. But, you know it was like a medicine ball trying to lift the thing. It was around 72 because this is the anniversary right about now the 72 Olympics I was just doing something on it earlier this morning Mark Spitz. I remember watching that small color TV when the Israeli athletes were taken hostage, in the siege and the slaughter. I remember watching Jim McKay on that little-colored TV that weighed a ton. So, it had to be around 72. The first real color TV like a big one. I don't remember but this was 72. The big old console TV.

[00:03:39] Yeah, we had a console TV in the living room, exactly.These games have come a long way. Now, what's happening at this event and if you've never seen one of these or been one of them. I think this will be a real eye-opener for a lot of people because these are huge events, and there is more excitement in the stands than I have ever seen anywhere, except for maybe the U.S. first event, the first robotics. To me, it's interesting Jim because I don't watch professional sports, right. 

[00:04:13] Period. Right. Right. Not even the Canadian Football. Craig, not even Canadian football but that's real football. An extra 10 yards on the field a field and one less down you know by that, by the way, no hockey, Craig. 

[00:04:31] Yeah. I was captain of my hockey team. But, you know I've never watched the game other than my dad was watching or my brothers were watching. My brother was on the minor league team for the Toronto Blue Jays. 

[00:04:45] That's a big deal. 

[00:04:47] It's a very big deal, but not me. Right. So, I just don't get it. Why would you be there cheering on someone? Watching them play a video game because that's what it is. You have the players up in the front and the players are playing, in this case, Madden football and they're they're all up at the front there's huge screens so everyone can watch. Yeah, and they're going through it. Now, there's lots of them. There's a shoot up scenarios you know you can be in World War Two. Yeah, and you're there with your platoon and you're talking back and forth with the other members of your platoon. Your killing zombie nazis and things, right, as you're going around. Now, they have this artificial feeling, like they are actually there. When they might be in their mom's basement and somebody else might be in Siberia, it doesn't really matter. They're all around the world. In reality, they're not building real friendships they're not really communicating, People, there's a whole huge business, look up twitch, a huge business built around people going to twitch and watching other people play video games. And you're not even watching them play the video game watching, you're watching their screen. 

[00:06:11] Yeah right. I don't get it.

[00:06:13] I don't either. I've seen it. I went to what is at PAX East and I watched some competition. Danny, who's not here today. Danny watches other people compete in things like Fortnight. I mean it's actually become something that people do. Watch these competitors on these games. I mean I get it. I do. I do get it. Now, the question is you know psychologically and I know you used to be when we were younger, Craig, people would say oh watching violent movies make people violent, you know. And now it's OK so playing these video games makes people violent. I just don't think that's it. I think it's like my psychiatrist friend years ago, 20 years ago, said to me how do you know if this person didn't have a psychiatric issue. If they wouldn't be violent, anyway. And the same thing about a gamer, just because they're playing the game, maybe if they weren't a gamer they'd still be a violent person. 

[00:07:25] There's a difference between correlation and causation, right. And that's kind of why I was going to add to Jim these types of games are attractive to certain people with certain types of mental disorders. However, the same can be said about circuses or almost anything that you might name, right. This is not causal, near as we can tell. I've had a number of psychiatrists and psychologists on my radio show, talking about this whole issue in general. Is it harmful? I think what we have to look at and I think pretty much everyone's in agreement when the child is very young like, in the single digits of age, particularly the first four or maybe even as much as eight years of their life. Now the first four certainly. Do not expose them to a whole lot of time either in front of the TV or in front of an iPad or in front of a computer. Because their brains need to mature those pathways need to develop. And near as we can tell those pathways don't develop as well when the kid is sitting watching something. As opposed to maybe they're outside or creating. I used to love Lego when I was a kid. Yeah, I made all kinds of stuff, that that's the right things flowing in the brain. Jim, I don't think there's really anything conclusive, there certainly is no agreement as to whether this is just kind of an associative sort of thing at that track that people with these types of disorders and obviously doesn't track a lot of them like this. This isn't happening frequently but it is a different world that I think a lot of people should look into a little bit. You know you mentioned PAX East. I have a son that went to that event. In fact, he went there with a girlfriend because he loves to play the video games on his little video game console. You know when you're 30 35 40 and you're still spending a lot of time in your video game. It's you know it's time to move on to real life.

[00:09:33] I get it. Craig I know we had so much other stuff to talk about today but it's always good to get your perspective when things like this are in the news. Especially I found fascinating, the stuff you sent me about how Google is still tracking me even when I tell it not to. That's a great, great piece and folks that's just some of the stuff, you can get from Craig Peterson if you text him my name Jim to this number 8 5 5 3 8 5 55 53 that is text the Jim or ask any questions you might have.

[00:10:13] to 8 5 5 3 8 5 fifty five fifty three. 

[00:10:18] That's right. Standard data and text rates apply. You get great information from Craig Peterson. If there's some type of an emergency with a massive hack or a data breach, he gets you the facts and what you need to do. He doesn't try to sell you anything and it's all free. Craig, thank you so, so much I really appreciate the time and your perspective on that news story.

[00:10:45] Take care, Jim. Already. Bye-bye folks don't go anywhere. Final word when we return you're listening to.

[00:10:52] Hey, everybody. I want you know this is a bit of a heads up. Starting next week for the entire month of September every week I'm going to be doing a special webinar. We're going to talk about how to protect yourself from certain types of attacks. And I have a package I'm going to offer to you if you are on the Webinar some really special deals with some real special bonuses. But, overall a whole lot of learning and stuff. I don't think you are already aware of. So, keep an eye out for that in your e-mail. And if you want to sign up you can always just text me or e-mail me at Craig Peterson dot com. Have a great day bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 27, 2018

 

Video Games and Tournaments are interesting.  Jack and I discussed the shooting in Jacksonville, yesterday and the effects of video gaming on the young people today, as well as some of the underlying mental health issues.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Jacksonville Shooting The High-Pressure Big Money World of Competitive Gaming

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/27/2018

Jacksonville Video Game Shooter.  My experience with gamers.  Mental health issues.

Craig Peterson[00:00:00] Hey, Good Morning, everybody. Craig Peterson, here. Unfortunately and you might have seen this in the news. In fact, probably pretty hard to miss, although it's been a very busy news week, this week. There was a shooting at a video game tournament in Florida. So, this morning Jack Heath and I spent a few minutes discussing it. I don't know if you knew that I have also a mental health background. So, this was an interesting discussion. I think you'll maybe pick up a few things, I know Jack was surprised So, here we go. 

[00:00:35] You know one of the stories that we're watching this morning is out of Jacksonville, Florida and that video gaming tournament. Craig Peterson, our tech talk guy, with tech talk which airs on the weekends, on Saturdays on iHeart news talk stations. Craig, I'm not saying video gaming is really all about high tech, but a lot of it is, and this is a separate story, but these video gaming tournaments, have you ever been to one?

[00:01:00] Good morning, Jack. I have been to them before. I've been to a couple of them just to kind of check them out and do some interviews. And, I have one of my sons. He's thirty-four and he just loves to play video games. Now, he doesn't spend his days and nights playing them. But he does enjoy them. These things Jack, are absolutely huge. You get a lot a lot of emotion in the audience, and that to me, you know I guess, Jack, we're the wrong generation. I look at it and say yes, somebody else is playing the video game. Why do I care? But, to these kids, they've played these games many times before. They've been unable to get past some of these obstacles that these professional players are able to get past and then they just go wild at that talent.

[00:01:55] that some of these kids have. I guess, you know you hear the story about this one 24 year old David Katz, who you know, is the apparent killer of two and wounding several others before, taking his own life. And, the other thing I might again there's no correlations here. You know it's the old ninety-nine point nine percent of the people that go to these, you don't have probably incidences, but I think you know this story is all about video gaming and the gun and, so forth versus, I think at the core of this is going to be another mental illness, mental health story, that we just don't seem to be addressing. Another young man, you know I just heard the Fox National Lead on our on our news top of the hour, bottom hour they are saying you know he lost a video game and then apparently lost his mind. I mean that's sort of the way they're portraying this. I imagine once they investigate more, in Baltimore, I think you'll see there were probably some issues in terms of the mental health front. 

[00:02:54] Yeah, I don't know if you're aware of it but I was chairman of Health and Human Services Advisory Board, for a few years. And,  it was troubling to see just how many people have real mental health issues and very few tend to get the treatment that they need. You know families just don't accept the fact that there is a problem you know. Going into the basement, right. The standard depiction of one of these kids going into the basement playing video games online all day long and having mom bring you food and whatever. That's not necessarily a sign that someone's going to be violent. There's no question about that. Kids really getting into video games, again not necessarily a mental health issue. But you know, Jack, you and I have talked many times in the past. And part of what we've discussed is how these kids need to get out. They need to meet people, face to face. You know they have this illusion that somehow they are communicating. They're making friends with people when all they're doing is playing a game together. Again, I don't know how much you've been into some of these games, but I think you know Craig you're in laugh I don't think I've ever played a video game. I think Mario Kart was the last one I played. But what happens with these games now is that kids are sitting there, in their homes. Each one of them has on, usually a headset with headphones, so they don't have to listen to what's going on in the house, and they are but for instance in a platoon together in a war scenario. They could be in World War Two. They could be fighting aliens on a distant planet. They're talking to each other just like you would expect a military platoon to talk to each other.

[00:04:55] And, so now they're living in this fake universe that being created and they're having these experiences that are almost life and death experiences, at least as far as they're concerned. You know the line between reality and fiction, but you know that's a really separate issue because the mental health, mental illness situation, in this state, I think it even underlies the drug opioid, drug crisis because mental illness in some ways can be part of that. It's a more pervasive wider spread, the reality it's affecting more families, and for some reason, the state and the country got away from. And, as you said earlier about five minutes ago a lot of the folks who do need treatment, either go undiagnosed or don't get or don't get the real help. It does it lead to bigger issues. All right, Craig, I appreciate it on this Monday morning. Craig Peterson Tech Talk stuff. Make it a good one. Stay cool.

[00:05:52] Hey you too, Jack.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 24, 2018

Would you like to know about Black Hat and DEFCON? Listen in today as I explain to you some of the things that went on at these two Conferences.  

MAGAF might be the end of us?  Yes.  Today I will tell you why we must be concerned about these companies and the people they employ.

Weaponizing Satellites? I will explain how it can and is happened and why.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/25/2018

11-year-old hacks election machines. MAGAF could kill us all. New dangers in satellite systems.

Craig Peterson: [00:00:01] Hi, Everybody. Craig Peterson here. We've got a ton going on as usual. You know the big conference out in Vegas gave us some real surprises, in fact, there's some things that you can learn from it. We'll talk about those DefCon and Black Hat Conferences. You're not going to believe this. Let me tell you what an 11-year-old can do. This is kind of scary when you think about November this year, and going forward. Satellite systems, they can be hacked we've kind of known that for a long time, but have you ever heard about people being exposed to microwave signals, and what happens to them? Well, there's a tie there. And, I really am going to have to do a little bit of a rant here, about our friends out in the Bay Area of California, these Silicon Valley developers just don't understand what's really going on. They may have their hippie ways, but they could destroy us very quickly if you have an internet at your house or on your phone. I've got a couple of tips on how to properly check your internet speed, and how to block and report spam calls and text messages. 

[00:01:10] And, did you know Google they are recording your location even when you tell them not to. So, all of that and more, please stick around. We only got half an hour. So, here we go. Well, I'm going to have to start the show this week with a little bit of bad news again. If you have Wi-Fi enabled, and you have more than one hot spot and even if you don't, even if you only have one, I've got to give you a bit of a word of warning. A huge, huge, huge, issue with Wi-Fi, yet again. Check your e-mail from me this week, I'll be sending something out. It's also up on my Web site. You've got to turn off some specific protocols. It gets kind of complicated, but you'll find it here on my Web site. And, in this week's newsletter Craig Peterson dot com. So we'll leave it at that. Now, we'll get back into our regular show for today. Well, I definitely have to get that data, don't I?

[00:02:14] It's over 20 years now, and I don't do as many interviews as I used to. Well, actually I do do a ton of interviews but they're not on the radio anymore. I do a lot of stuff over on the web, on our side. You know I do stuff with the FBI Infraguard program and, in fact, I'm doing at least a webinar a week so, I haven't had any complaints. I think most people are pretty darn happy with what's been happening here with the show I get lots of great comments from people thanking me for it. So, we'll we'll leave it at that. But, I do have to change that, although I'm updating a few things, as you've noticed. And, we're back up to about almost a full half hour. It's really great. Here we are. We are running solid through our whole time since we got to cut back a little bit. Which is nice because I'm just so busy, as it were. All right today. Wow. More security stuff if you listen to my podcast. Craig Peterson dot com slash iTunes. You saw some major things this week. We were talking about Black Hat all week and what they can do with our voicemail, of course. 

[00:03:24] We talked a little bit about that, on this show, last week, as well. So, if you want to find out about your voicemail how it can be hacked and, in fact, even how it ultimately will be hacked make sure you check out my podcast, again Craig Peterson dot com slash iTunes, you can see many of them up there. I think I'm close to a thousand weekly shows. How's that for a long time. We've been doing it. The most recent few hundred of them are up there. Some of the oldest ones are lost, forever. I hate it when that happens. I had a backup but it turned out the backup was bad. It was bad. Has that happened to you before? So, I lost all kinds of show information, interviews, videos that I had done, and stuff. Now, C'est la vie, move on. Onward and upward. Better back up now that I test frequently, just like I do for my customers. You know I've always done it for my customers. You try and restore machines or restore files. Just make sure it works. But, somehow again it's the poppers kids. 

[00:04:29] I mean the cobbler's kids that just don't get the shoes. Hacked satellite systems, we've known about this for a long time, and satellites are all over the world, now. They're just everywhere, in northern and southern latitudes, all the way on up. There geostationary satellites, there are satellites that are moving. Typically the geostationary ones are the ones that we're using for data communications and things. But, here's the bottom line. A lot of these satellites are used by my daughter and by my son when they're at sea. Now, you know I have a daughter who was in the Merchant Marine. In fact, she still is in the merchant marine, right now. She is doing some autonomous ship development work for a company out in Norway. But when they're at sea they use, kind of like cell phones, but their satellite phones you might have seen that if you're a fan of Deadliest Catch, you probably saw Sig Hansen on there he was trying to call another ship to find out, because there are rumors that their emergency beacon had gone off and that little phone that he had, that was a satellite phone. And they're getting simpler, they are getting smaller all of the time and the reason for some of that is that the satellites that we're using for the satellite phone calls are getting closer and closer to Earth. There was a license that came out about five years ago, I think it was and they started flying their first satellites, just last year. 

[00:06:03] That's designed to be able to give high-speed Internet and voice to anyone, basically in North America. That's what it's aimed at, but ultimately worldwide, which is really cool. Well, those satellites are close enough to us, that in certain conditions, you could have what is now being called, a hybrid cyber-physical attack. Here's what would happen. This is according to research presented at Black Hat, last week here in Las Vegas, a couple actually two weeks ago, in Las Vegas. But one of these guys is saying based on his study and based on his experience a number of very popular satellite communication systems are vulnerable to a hack. And, what will happen is that the control systems for the satellite are what are actually hacked, and it goes beyond just leaking information. Did you know that these satellites could potentially be used to microwave people on the ground? Think about what happened recently over in Cuba. We expanded or our presence over there, our ambassador, I think we have a full embassy over there now, and some of the workers were complaining about pains, headaches some of them lost some of their hearing, some of them lost all of their hearing, and that was probably due to a directed attack. We don't really know who did the attack. It might have been sonic, but we're not really sure. 

[00:07:40] Well, think about what would happen, if somebody was out there who was controlling those satellites and aiming their beams at people and running them at high wattage.

[00:07:56] This is a guy named, Ruben Santa Marta, and he did some research that he presented back in 2014, and he said this is a quote "essentially the theoretical cases I developed four years ago are no longer theoretical". So, they're going to be able to use this type of technology connect to the satellite antenna from the ground through the Internet, and then using some security weaknesses in the software that operates the antenna. They're going to be able to seize control of it. So, now the potential damage is going to vary. The very least they could disrupt, they could intercept, they could modify communications are passed through the antenna. So, they could for instance eavesdrop on the e-mails, sent through in-flight Wi-Fi, attempt to launch other hacking attacks against devices connected to the satellite network. That's where my kids come in, because a lot of our vessels, Navy frankly, as well as merchant vessels, are connected to satellites for being able to share data. Now, there are higher risks still, and in some situations for instance in the case of the military, this attack is going to expose the location of this satellite antenna, for the ground equipment or the equipment on the ships that are out there. It could be really bad. Think of the Bond movie The World Is Not Enough, No, Tomorrow Never Dies where there mucking with GPS signals which are used for navigation by the Navy, by our cars right all over the place. Things start getting really bad, and then ultimately they could turn up the wattage on some of these satellite antennas and have them beam microwaves back to the ground. 

[00:09:48] Theoretically, cooking equipment and maybe even people. So, not great news, on that front. Well, we've got another piece of news coming out of the conferences, here just a couple of weeks ago out in Las Vegas Nevada. This particular one has to do with some of the Games they play over at Def Con which is kind of a defense conference and some of the games are as simple and fun as "Spot the Fed", right. Who in the audience is the Fed, and who's not the Fed, out there? But, one of the things that they've been doing, that's been getting more and more popular every year. They have what they call a voting village. Now, this village is where the organizers are setting up decommissioned election equipment, and then they let hackers loose on it and they watch these hackers and see how they can hack in. So, they're finding newer, creative, alarming ways to break in. Well, last year, the conference attendees found some new vulnerabilities for all 5 of the voting machines, and as a single e-poll book of registered voters, over the course of the weekend, was hacked into as well. So that caught the attention of senators, and they introduced some legislation and hopefully, it'll be good, right. Who knows? They just don't understand how this all works. But, this year's voting bigger voting village was bigger. 

[00:11:26] They had more equipment. They had voting machines that ranged from tabulators to smart card readers, equipment that's all currently in use in the United States. Now, they had another little voting village. This is with the little one. This was a room set aside for kid hackers. An 11-year-old girl hacked a replica of Florida Secretary of State Web site. And she hacked it within ten minutes and changed the results. So, what that means potentially is, that if the people who are doing the national tabulations were not directly contacting a known person that the former secretary of state's office. A known person using some form of two-factor authentication. You know like codewords or something. So, they pick up the phone, they call them, the proper code codewords or exchange bidirectionally. And then the Secretary of State of Florida says and here are the election results and gives them to them. So, if that's not what happens. If what happens is they go to the Web site for the Secretary of State's office, and they find the Hacking results, there. Well, now we're talking about some really big trouble. Because if an 11-year-old kid can hack a replica of the Florida Secretary of State's website within ten minutes. And, we are relying on Secretary of State's Web sites to have the national results, tabulated. Wow. That is huge. Now, we heard this week as well, from our friends at Microsoft saying that they had discovered some Russian hackers who had put up fake Web sites. Websites that pretended to be Democrat and Republican Web sites, to try and again mislead people and create confusion. 

[00:13:28] And all. We had Russian hackers attacking 2016, and now already we see them attacking 2018, and of course, they're going to continue to do this. Now, I had this week, the CEO of Black Ops partners on a webinar I did for the FBI's Infragard program and we talked about the hacking that's going on. And, it's even worse than any of us thought. And, there was information that he could not disclose even to the FBI InfraGard team. So, that tells you something here too. But, he's telling us that the Chinese have been actively hacking us and the Chinese were talking about their military, the People's Liberation Army, the communist Chinese military has been covering up their tracks. He said they are using plausible deniability in a very, very big way, versus the Russian hackers that don't seem to really care, frankly, some of these Russian hacks, if you ask me may well be Chinese military hacks, disguised as coming from Russia. The Chinese are very, very, good at this. So, there's been some pushback about this voting village, because it was just so notable, this year. And, one of the largest providers of election equipment in the U.S. sent an e-mail to its Customers, assuring them that while attendees will absolutely access some voting machines internal components physical security measures make it extremely unlikely that an unauthorized person with malicious intent could ever access a voting machine. 

[00:15:15] Yeah, yeah. And, then we have the National Association of Secretaries of State quote "Our main concern with the approach taken by Def Con is it uses a pseudo-environment which no way replicates state election systems networks or physical security". So, you know when we're talking about distributing software, a lot of these systems are using thumb drives. Now, remember thumb drives have been hacked. In fact, brand new thumb drives have been shipped with viruses on them. So, you format the thumb drive. Again, there's so many ways, I know ways that I could do, that would fake it enough, that the election systems could be hacked. Believe me, it's very, very possible, even with people that pretty much know what they're doing on the security front. This is this is very concerning to me. Many people say that you know, hey listen, it's just crazy you can't do this. But, here we go. Matt Blaze, he's a veteran of elections security researcher who helped organize voting village said I think the statement was misguided. Talking about the statements from the various Secretaries of State organizations. "It's only through scrutiny that we're going to have confidence in the elections". "That said, the fact that this system has vulnerabilities in it, even incredibly serious vulnerabilities, is not the same as saying any given election has been tampered with. There's an interesting paradox. 

[00:16:47] We know the systems are wildly insecure and there's been precious little evidence of these vulnerabilities so, far being exploited in real elections. I think we've been very lucky and I think there's been a little bit of a ticking time bomb here". I absolutely agree with that. Unfortunately, our copyright laws have made it very difficult for researchers to legally acquire the voting equipment and mess with its software and test it. I think we need to have exceptions in the law for security researchers. And, there are some exceptions for certain security researchers under the Digital Millennium Copyright Act, the DCMA. But, I think it has to be a little better than it has been. All right we're going to get into China, next. And the hippies in Silicon Valley. How were they threatening our security? The hippies, that is. Well, those darn hippies they're back out in California. You remember me talking a few weeks ago about how Google had, well it started with just a few people saying we are not going to work on any projects involved with the Department of Defense. And, it ended up being what was, it like 3000 of these people saying, we will quit our jobs if you have anything to do with the Department of Defense. And we have seen this in a couple of other companies, before. Now, people are stepping back and thinking about what the actual consequences are. Google has a very big artificial intelligence program, underway, and if you use an Apple device there is machine learning behind it. 

[00:18:42] If you're using an Amazon Alexa, Google home, there's machine learning behind it. Machine learning is kind of a subset of artificial intelligence. Artificial intelligence, AI, where machines are figuring stuff out for themselves, is on its way. Don't, don't get us wrong here. Well, these main companies and I've started calling them MAGAF kind of like Magaf with an F on the end. You know MAGA, President Trumps slogan, I'm using MAGAF to stand for Microsoft, Apple, Google, Amazon, and Facebook- MAGAF. So, now you know when I refer to that what I'm talking about. Well last month, some of these companies the biggest names in technology they officially signed a pledge promising to not develop lethal autonomous weapons. Now, I can see that as being a very good thing, right. In many, many ways. We had Google's project maven, where employees said, We will not allow our technology, our work product to be used by the military. And some praise them for these initiatives, as ethical and moral victories, right. That's the typical knee-jerk reaction. That's the simple reaction. Who wants killer robots right? I thought Arnold Schwarzenegger demonstrated that to us quite nicely with Terminator. Who wants Skynet? Nobody. Well, I guess somebody does, but most people absolutely don't. While a senior adviser to NATO by the name of Sandro Gatien has come out with some really great statements and I absolutely agree with him. 

[00:20:35] Here's a quote straight from him. This isn't a NATO adviser "these naive hippie developers from Silicon Valley don't understand. The CIA should force them to work on this development". Now, he is also the founder of the digital society Institute at this Berlin-based business school called ESMT. But, he came up with some very critical device. And what's really good about this is it's bringing to light a schism, about the future development of artificial intelligence for military purposes. On the one side, you have people who believe the pursuing the development of military AI'S is going to lead to an unstoppable arms race, and frankly, I'm kind of on that side. On the other side, people like Gatien believe that the AI arms race has already begun and that Pearl Hibbett Dean AI research for military purposes will not lead to peace but will give the upper hand to authoritarian systems. Now, that's a good point. So, he's saying if the West wants to stay in the lead, if we want to survive, we need to unify around a concerted strategy. quote another quote from him "Within most military and intelligence organizations, it's a real concern and it's bound to be a much larger concern". So, we've got machine learning tools that are being spread already amongst military devices and we have the Chinese. Now, according to Al Scandia, who's an expert in Chinese military strategy, there is a strong belief that machine learning is going to provide an essential tool, in the Chinese building their military strategy far beyond ours. 

[00:22:33] So, we're talking about superiority across the entire electromagnetic spectrum. So, that means faster more insightful AI. It could enable one side to enhance communications, situational awareness other forces, disrupt degrade or deny the adversaries. Think about some of these things we've talked about before, where you have clouds of AI controlled, little things, like the about the size of a bee, that can swarm and kill someone. What would happen if the Chinese had this technology, and they decided to take out the President of the United States? Think about what just happened in Venezuela. Where a couple of drones flew close to their Presidente and blew themselves up. What would happen if one of these matters to land on the President and work its way around? And we're seeing some of this AI type technology, already being used to try and break its way through firewalls, and other things. So, by having these hippies controlling some of the leading AI technologies, saying no, no, no, we're not going to do it. And allowing now the Red Chinese communists, who are trying to develop their AI technology, for military purposes. How are we going to be able to defend ourselves? How will we be able to defend our allies? How will we be able to keep up our NATO commitments? We could very, very quickly, fall behind in this new arms race, and have these other countries like China particularly selling some of this technology.

[00:24:18] Think about that. If some of this AI technology gets into the hands of terrorists, and they use it against us in our large cities, etcetera. Think about what would happen there. All right, we're not going to have time today to get into these other articles. But, I want to encourage you to go online. We've fixed all kinds of problems with the Web site at Craig Peterson dot com, right now or just straight has news on it things from the show, security news. We're going to be enhancing that, we'll be starting to post some of my webinars up there, and things. But, right now, we fixed the bugs we had. So, you can find the articles we just talked about online. Plus, the ones we didn't get to today. So, how to properly check your internet speed. I've got articles there that are going to tell you all of the details of the different apps, and different Web sites you can go to. How accurate they are and in what ways are they accurate. And that includes for some of us, that have ISPs, you may be questioning are we getting what we're paying for. And, by the way, maybe this is no surprise, but you using your ISP speed test may not be the best way. How to block and report spam calls and text messages. Things are getting worse. More than doubled since last year. Some really good hints and tips in there, including a couple of surprising ones. 

[00:25:46] At least, there's a price and the people I was talking to about them. So, you might find them surprising, as well. And Google. They are recording your location, even when you tell it not to and that's for anything, including iOS devices. If you have Google software on them. So check it out online. Craig Peterson dot com. Lots of great articles up there. And, if you have any feedback, any questions, you can just e-mail me at Craig Peterson dot com or one of the simple things to do is just go ahead and text me. You can do that right now, if you're at the gym or wherever. I love to get feedback! What do you like about the radio show? Tell me specifically, what did you like about today's show? Just text me, 8 5 5 3 8 5 55 53. Any questions, any anything. 8 5 5 3 8 5 55 53. I hope you have a great week. Be safe, out there. Pay attention to what's going on, and if you're a business owner please, please, please, please, UP your security, and I can give you some great pointers on that. I have all kinds of special reports I can share with you. Again just text. Have a great day. We'll be back Monday morning with Jack Heath, and of course, posting that on my Web site, and on iTunes, SoundCloud, Stitcher of everywhere and even tune-in. Take care. Bye-bye.

 ---

Related articles:

*ALERT: New, major problem with WiFi*

Hippies Are Going To End Up Killing Us All! How China Will Win The Deadly Race For AI Weapons

Election Systems Are So Insecure, That Even An 11-Year-Old Changed The Results Of Florida’s Presidential Vote.

Looks Like Google Is Always Recording Your Location -- Even When You Tell It Not To

Spam Phone Calls Are Up 100% In 6 Months -- How To Block And Report Spam Calls And Text Messages

Hacked Satellite Systems Could Launch Microwave-Like Attacks, Expert Warns

How To Properly Check Your Internet Speed

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 22, 2018

Find out how one hacker stole millions as Craig discusses SIM hacking and trends at this year's DEFCON with Ken and Matt

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

3 Trends Hackers At Black Hat And Defcon Are Watching

How A Hacker Allegedly Stole Millions By Hijacking Phone Numbers
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/15/2018

Security Secrets We Learned At Blackhat And Defcon

 

Craig Peterson:[00:00:00] Hey, Good morning, Craig Peterson, here. I had a conference yesterday well actually a webinar. And I was running it. And my guest for the FBI InfraGard's program on the Webinar was a gentleman from Black Ops partners. Now, Black Ops partners is an intelligence firm. They deal a ton with various types of intelligence and they provide information to the government, to businesses, and NGOs all of those people. They had a bunch of warnings for us yesterday, some of that stuff I really can't share with you at this point. But we do know about what's been going on out in Vegas with the Black Hat conference and with DEF CON. So, this morning with Ken and Matt I kind of loaded them up with articles on security and some of the things we need to be very cautious with. Things are boards of directors need to be paying more attention to than most of them are. And, things that you should be paying attention to including I don't know. Ever heard of sim hijacking. Well, I explain that this morning and how this could cause you to lose a ton. Including it already did, One guy lost five million dollars, because of it. So, here we go with Ken and Matt. 

[00:01:25] Were back again and it is that time of the week again, 738 on a Wednesday means time for Craig Peterson on deck. Craig how are you this morning. 

[00:01:34] Hey, good morning gentlemen. Doing just fine.

[00:01:37] So, now Craig now can they steal information from our love our online accounts through voicemail.

[00:01:45] Yeah listen a surprising. I assume you guys know what two-factor authentication is, right. 

[00:01:52] I do. I wouldn't bet on that. 

[00:01:57] It's hard to say, what it's called. 

[00:02:00] Most of us now are have started using something called two-factor authentication where in most cases we're using our phones and we're getting a text message. So, for instance, you're logging in from a new location, a new browser, etc. and the Web site's going to pop up and say I'm not sure I've seen this device before so, I need to verify you, and in most cases, it sends you a text message. So, that text message comes into your phone and it's got a number and you type that number into the Website and now it knows it's you. Well, we just had a conference going on in Vegas and there were two of them they run back to back every year in August. There is Defcon and there's black hat. These are where there's all kinds of fun games. For instance, they're talking in these conferences about hacking and how to hack in and leads basically to help the good guys understand how the bad guys are getting in, OK. And they have games like well the normal one, spot the Fed. So, they are in a conference talking about something and they try and figure out who the people in the room are that are from the federal government so, that's kind of a fun game. 

[00:03:17] Another big one this year, was hack the voting machines and we'll have to talk about that next week a little bit. But, we had an 11-year-old win this year on the hack of the voting machines, just to show you how great these things are. But in this case, we had a presentation about using that text message type functionality to get into almost any account including WhatsApp and Signal, even. But, your standard accounts from Microsoft and Apple and Google. What they did in order to hack these accounts was they figured Oh well wait a minute now they're going to send a text message. Wow. These places all we're talking with all of your major vendors will all give you the option to call you on the phone. So, all the bad guy has to do if he's targeting you is go ahead and hack your voicemail account. Well, how would you hack your voicemail account? Well, they run a little program and the programs available online that will call your voicemail. Now, you guys I assume you both use voicemail to some degree right.

[00:04:27] As much as I hate it, Yes. And how many digits is your pin? You have to type in a pin right. 

[00:04:33] No, actually no I don't. I have Verizon and I have the visual voicemail thing to call in. 

[00:04:41] I think when I used to call anything I just portion of it talks me. I've got to I've got to I've got an app in my phone that does. Yeah, but when I used to call it it was like four digits, I think. All right. I might have an iPhone Ten I push it and it talks to me. But, I also see that message as well.

[00:05:02] I noticed when you push, Matt, he talks to you too.

[00:05:05] But, anyway here's a couple of problems that are inherent in this system. One is if you call into your voicemail and your voicemail automatically starts talking to you, right, giving you your messages etc. It's probably using your caller ID and that is easily faked. So, for instance, if I wanted to find out messages that came in the Ken Altschuler all I need is a phone number and I can get his voicemail. If you're using an app for your voicemail you may be a little bit safer. But even if you have a pin on your voicemail account, does it back off? So, for instance, Ken when you had your iPhone what was your previous on a, 7.

[00:05:48] Yes.

[00:05:50] So, when you had your iPhone 7 and knew you had to type in the code on the front of your phone and you made a mistake you'd have to re-enter it. 

[00:05:59] Correct, Yeah. And, Matt the same thing with you right with Right. Yeah. So, we make a mistake. It gives you the chance to do it again. Did you notice that it backs off? 

[00:06:11] So, every time you make a mistake you may get ten tries. But the first two tries are right away. Then third try it's going wait a couple of minutes so forth to try it's going to wait many minutes. And by the time you get to the 10th try, it can be as long as a week. That's called an incremental backoff. And the idea is if you've only got a four character or four-digit PIN it's going to take them at least a year or two or three to break in if they're able to do it. So, that's incremental backup. Does your voicemail have that? Well, it turns out most of them don't. So, if they can get your phone number if they're targeting you. And remember the FBI is warning us that they're targeting small businesses and I have another one last week that I was talking to that was targeted. But, if they're targeting you, this little program just sits there and keeps trying pins because most voicemail systems do not back off. So, within a few minutes, the hacker has your voicemail and has the ability to get into it. So, all they have to do is go into your account, online. 

[00:07:20] say forgot my password have it use the voice option. Call it to leave a message on your voicemail with a new pin. The hacker now has full access to your account because they already hacked your voicemail using an automated system. So, there's something more to think about our voicemail systems. Most of them are really bad when it comes to this. Now some of the professional stuff is good, it does a good job but you might want to think twice before using your phone and SMS text messaging. Think twice before using text messaging as your two-factor authentication method, Google Authenticator, and there a company called Duo. If you're really paranoid, like I am because I got to take care of my customer's data right. Use things like Yubi keys. There's a lot, and of course, you can see a lot of this up on my Web site. I've got this article up there for people. We're talking to Craig Peterson as we typically do at this time every Wednesday. 

[00:08:22] Craig speaking of being paranoid about my phone ruining my life. Apparently, a hacker has stolen millions of dollars by hijacking phone numbers I guess 40 victims or so five million dollars. Tell us about this. 

[00:08:35] Yeah, isn't that something you know when you get right down to it we're just confident with our technology, Right. It's like Matt you were saying last week, yeah. There may be vulnerabilities in Android, but you're using it, right. The same thing with having an Alexa in your home or a Google home etc. etc.. This technique came out again here. This is a this is a 20-year-old who is from Boston and he has hacked about 40 different victims that they know of. There were probably some accomplices involved, but this is a different technique called Sim swapping. And, again what happens is they're able to redirect and not your voicemail in this case but your entire phone number etcetera, etcetera to a third party phone. So, this has been happening more and more. We've got alerts out on this. You have to be careful with here. It works for any provider. This is a provider thing AT&T, T-Mobile, Verizon. If they can defraud the carrier into switching your phone number to the different SIM card they can pull off the scam. In this case, it was about five million dollars in cryptocurrencies that were stolen by this guy. So, five million bucks not so bad for 20-year-old although he stole it and it's going to be very bad for him because he ended up in jail you know getting charged and down in New York City. Yes, and may He did a bunch of this stuff so you may get transferred to a different district. But, all would all of the entrepreneur knew whose money cryptocurrency was stolen in this case was his phone stopped working and he didn't notice it until later in the day and then he called up they tracked it down. The FBI got involved. But if your phone stops working you may think you may want to hop on it really quickly and not just think your phone broke. That's the bottom line, there.

[00:10:44] We're on our Craig Peterson our tech guru. You can always go to Craig Peterson dot com and get all of the information first. So, so you know we talk about terrorism and all these horrible things facing America. But, do most people fear are most intelligence agencies authorities fear a cyber attack is that the worst thing that could happen to America.

[00:11:05] Yeah, this is interesting. I ran webinars yesterday for the FBI. Their Infragard program. And I had on the head of Black Ops partners. Now, this is a company that provides a lot of intelligence for the government, for private industry, et cetera and that's all very interesting stuff and it was fun talking to a great guy. But, again there's a lot to be aware of. And, we've got to get boards of directors aware of this stuff. And on top of it. Because, we are talking now about crippling cyberattack that can happen. Now, this is scary because again all levels of government are warning about this but, a well executed cyberattack could knock out the electric grid, shut off power, compromise vital government systems, financial data. We've got General David Petraeus. He's a former CIA director saying this is a quote "What worries me most is the cyber equivalent of a weapon of mass destruction fall into the hands of extremists". "They'd be very difficult to deter and the willingness to blow themselves up on the battlefield and take us with them says a lot". Now, China has been hacking us for a long time. Microsoft yesterday just announced that they had found Russian involvement, where they were pretending to be various U.S.

[00:12:35] based political party sites. In other words, Microsoft caught and stopped the Russians from pretending they were the Democrats and pretending they were the Republicans. They're equal opportunity offenders. This is going to continue. This is the next battlefield. And, as of yesterday BlackOps Partners was talking about this. This is the typical unconventional warfare. Rights were really big. They're really small. Sun Tzu, The Art of War. They have ways of attacking us, they can frankly cripple us. So, we've got to continue to improve. We are improving security with things like power stations. But your business has to improve your cybersecurity. We've got to step up. We need to pay attention even as consumers, because things will get critical, right. Three days after our computer systems go off-line there will no longer be bread in the grocery stores etc., etc. You going to have to go out fishing off the coast to get your food all by yourself. It's very scary, and I can't emphasize this enough, I know we speak about it all the time, but it's very real, very real Ken. We've been talking to Craig Peterson, our tech guru who joins us on Wednesdays at this time to give us an eye on technology.

[00:13:59] Craig thanks so much. We will talk to you again next Wednesday. Hey, take care guys. Bye-bye. We're going to take a quick break here.

[00:14:06] By the way I should mention, if you are interested in getting involved with the FBI InfraGard program go to InfraGard.org or I N F R A G A R D dot Org. Lots of great information you'll be getting some of it's a little bit of inside information that is not shared with the general public. It is not like top secret stuff or anything. But it's important stuff to know. So, check it out Ifraguard dot org. Take care. Have a great rest of the week and I'll be back with you on Saturday. Although, I am starting to try and get this posted my radio show when, I prerecord which I've been doing lately. I try and get it up on Friday, so, keep an eye out for that. We can podcast as early as Friday and you can get there from Craig Peterson dot com slash iTunes, make sure you subscribe. Give me a rating 5-star. I hope, Take care.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 21, 2018

Do you know that you can scare burglars off with Alexa's new skill? 

Learn more about this amazing skill as well as more information on hackers seizing your accounts via voicemail as Craig discusses it with Jim Polito.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa


Hackers can seize practically all your online accounts, and it’s your voicemail’s fault
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/21/2018

Tripping To Italy - Hackers Seizing Accounts Via Voicemail - New Alexa Skill Scaring Burglars

Craig Peterson: 

[00:00:00] Hi, Craig Peterson, here. I was on this morning with Jim Polito. I don't know if you know it or not, but he is doing this guided tour. Actually, it's a professional firm that's doing it and they go over to Italy in March. That would be kind of fun to go over there with them. So, we talked a little bit about that. Did you know hackers can seize practically all your online accounts, and it's your voicemails fault? Well, I talked in detail with Jim about that this morning. Also, that new Alexa skill that's designed to fake arguments and scare off the stupid or burglars. So, here we go with Jim Polito. 

[00:00:36] He's one of the most popular guys we have on the show. He is our tech talk guru, and he is Craig Peterson. Good morning, sir. 

[00:00:46] Hey, good morning. You know that trip to Italy it sounds fantastic. I went to the home page there on iHeart radio for the radio station. I clicked through and I looked at some of the pictures. Now, I've got to say there's probably a lot of people who have never been over to Europe and I have. I don't know if you've been over there before. 

[00:01:03] I've been to England and to France, but I've never been to the to the motherland, you know for me, Italy or Ireland my other motherland. 

[00:01:15] Well, People were afraid about the language and I got to say if you are in these places, especially with a tour group like this where you've got a professional tour, it is fantastic because everybody that you're with of course speaks English, right they are all from our area. And the tour guides speak English and people in the cafes are speaking English. And that was always a concern of mine because I only speak French and English, so Italy I have problems. 

[00:01:42] I have problems because you're a Canadian. 

[00:01:46] Craig. Yeah, exactly. It was funny, I was up in Toronto for a wedding here last weekend one of my nieces got married and I started speaking French, because I knew my sister speaks French and she went to French high school like me and one of my sons speaks French and I just assumed that I'm in Canada everybody speaks French but I've forgotten no. This is Ontario.

[00:02:10] They don't speak French don't, they don't. That's frankly Craig I like Ontario better. Oh, Did I say that? I know. Just kidding. No. Right. Right. But they still have to have everything bilingual there. I mean I do. I just love when I'm in Canada and you look at the packaging and they have the language police you know like it's in English. It's got to be in French. Same size same font. You know, it's even worse.

[00:02:41] And in Quebec, did you know that you could not you couldn't move your business with a name that sounded like it was English. Yeah. And in fact it was so crazy, Jim, that they had stop signs in Quebec and now stop is a valid French command to stop. But the language police in Quebec decided it didn't sound that English didn't sound French enough so they changed them all to Arret and then pass the language police said you know really that's bad grammar so, they changed them all back to stop thinking of the tens of millions of dollars just came up some silly of waste. 

[00:03:15] A complete waste of time. Kerry is telling me well, there's folks in Italy who speak French too in northern Italy. 

[00:03:24] You're right don't worry about it people if you're thinking about going, Go. You are going to enjoy this. The language isn't going to be an issue. You'll have the time of your life. The only drawback is I heard this Polito character is going to. You know I'm going to be.

[00:03:40] You're going to have to be with me. You don't have to room with me. You know, my poor wife is going to have to do that. You don't have to room with me. 

[00:03:48] But the food will all be gone.

[00:03:51] I'll be gone. No, I promise not to eat all of the continental breakfast at the hotel before we start the day. I promise. So. anyway. hey, you've got some great stuff for this us this week. And, I want to get to the one that really caught my eye. I want to start with this, OK. 

[00:04:10] Hackers can seize practically all of my online accounts and it's my voicemails fault. This one scares the heck out of me. What's going on here Craig?

[00:04:21] Yeah, this is a real problem for people. We're aware that hackers try and get into our accounts, right, just normally. So. a lot of people have been talking about two-factor authentication. Now, do you use that at all? Jim, are you familiar with that. 

[00:04:37] Yeah, I do now because remember was it was it Instagram that had the big hack. And, they said hey you should go to two-factor identification and, I said all right I don't want somebody posting stuff on my Instagram account. 

[00:04:51] Exactly. So, that's one type of two-factor authentication is where you might give them your phone number and they text you, right. And that's probably the most common and it's very hackable, frankly. 

[00:05:06] But, if they want to go after you, right, there they're not going to cast a wide net and pick you up because of the text messages. But, if they are going after you and we're finding out now the FBI is coming out with all kinds of warnings about this that small businesses are being specifically attacked more and more.

[00:05:26] But, if you give them your phone number and them be you know the Facebook, Microsoft, Google, etc. Give them your phone number where they can text you. Here's where the problem starts coming in. Now, many of us use WhatsApp or we use signal. Signal is a great app for communication right back and forth and a keep your data safe it's all encrypted. And, with those as well many people have given their phone number. So, here's what hackers are doing. There is a big conference out in Vegas, here just about a week or two ago. Two of them. There's Black Hat and Defcon. And, at these conferences, they were talking about the new techniques the bad guys are using. Well, what they're doing now is, these places including Whatsapp and Signal have your phone number and, they give you the option if you want to verify that it is you. Yeah, I did forget my password. Yeah. Give me a new password. They have the option of calling you on the phone to see where this is going. 

[00:06:31] Ok. Yes. 

[00:06:33] So, all you have to do, now were protecting many of our systems but how many offices are protecting their voicemail system. So, here's what happens. All you have to do this takes about 30 seconds to as much as three or four minutes. All they have to do is say OK, I'm targeting this financial planner, OK. This company over here and they know what the phone number is for that company. So, they find that number within that company that's going straight to voicemail and then they know the person's extension they might want to get to. They then have a little program that keeps calling that number and, it calls it, it gets into the voicemail system and it just sequentially tries to all of the passwords, because of voicemail systems don't have a limit on how many times. 

[00:07:26] Oh that's right. My my my my iPhone right. You try 10 times you're locked out. Right. Right. Right. 

[00:07:35] Yeah. Gets longer right. So you do the first few times or correct the third time that way a and then it's five minutes. So, they don't go back and try. It's a week later. OK. It's time and you out. Voicemails, don't do that. He demonstrated here on the stage over at Defcon, that he could brute force almost any voicemail system in the world. And, he was ensuring the calls were straight to voicemail. All automated right he didn't have to do anything. And then we went to the Web site, did a password reset process, using call me feature.

[00:08:09] It called him. Now, these systems that are calling you to reset your password and verify it's you. The systems will leave you a voicemail with the new password. 

[00:08:21] So, you have to do is go there. The hacker, all they have to do is go there and get it.

[00:08:26] You already have the voicemail password, right. Now you have a secret code, you are in the account and boom there it is. Yeah ok. 

[00:08:34] Not good. We're talking with our good friend Craig Peterson tech talk Guru the end of this segment. We will give you a number you can text my name to. And he'll provide you with this information plus more, standard data and text rates apply. 

[00:08:47] Ok. There is more work around here Jim. OK. go ahead. 

[00:08:51] Well you can use don't use your SMS as your phone number for verification. There are other ways to do this. You can use things like Google Authenticator. There's another app called Duo. There's also things like Yubi keys. Ok. It's getting complicated at this point. But, if you have any money to protect, you might want to pay attention, if you send me a note or write something up and send it off to you.

[00:09:17] Excellent. All right, Craig quickly I do have my lights on timers at my house to make it look like there is somebody home or to protect from burglars. Also, have lighting around the perimeter to make sure that a night nobody sneaks up to the house. But, you're saying that Alexa can take care of this for me. 

[00:09:37] Yeah, this is kind of cool. Alexa has the ability to learn what it calls news skills. So a skill can be, for instance, I Heart Radio has skills and many other Web sites. Now there's hundreds of thousands of these things. My wife made a skill for Alexa to drill one of our grandkids in some of that history lesson stuff. So, it's really cool. Alexa has a new skill called away mode, and what you can do is go into your Alexa app on your phone. Look for the skill called away mode instead of turning on your lights and turn them off or making noises. 

[00:10:14] Alexa can do by the way right. 

[00:10:17] It is. It has real and completely ridiculous conversations. These were penned by comedy writers from Saturday Night Live, It's Always Sunny in Philadelphia and others. There's a really kind of cute thing that it's doing, for instance, the gems are a couple has a breakup while also trying to watch TV two average guys discuss what's unique about themselves, so they can start a Podcast. Emergency PTA meeting to discuss memes, fidget spinners and other teen fads. And, this is my favorite, Jim, conversations from a book club where no one discusses a book, and a mom walking her daughter through Ikea assembly over the phone. 

[00:11:01] So. So the burglar comes in the House. Oh, there's somebody in there. There's people in there talking. There's a guy. I mean as opposed to the old they used to have those things it was a recording of a barking dog, people would have, you know. And that was supposed to scare people away, but now you had a conversation, of course. I think if the burglar sticks around long enough if it's that much of a joke, now they might not get the joke because people do have absurd conversations like that.

[00:11:30] I get to read this quote here. Hand me the rule book. No, the rule book that's the rule and reference no. Learn to play guide. 

[00:11:38] That's the quick reference. That's pretty good.

[00:11:42] Now that's realistic, that's realistic.

[00:11:46] Having done that. You know what else is realistic. Craig Peterson offers you all this information for free. He doesn't go and sell your name. He doesn't give you away to hackers. He does it all for free. 

[00:11:59] All you have to do is text my name, Jim to this number 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5 55 53.

[00:12:12] That's right. Standard data and text rates apply. And then if there is ever an emergency like a massive hack. Guess what your on Craig Peterson's list to notify and he won't try to sell you anything, won't annoy you, Craig. That was a great segment. And what do I say? Oh yes.

[00:12:30] Avoir. 

[00:12:34] Thanks, Craig.

[00:12:37] Bye. bye-bye. Bilingual. Craig Peterson okay. Don't go anywhere. A final word.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 20, 2018

 

Do you use your voice as part of your security?  It is an option in some situations.  Listen in as Jack and I discuss what we learned from the two big security conferences held last week in Vegas.

These home assistants are becoming quite popular.  Today, Jack and I talk about a new skill for the Alexa home assistant.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Hackers can seize practically all your online accounts, and it’s your voicemail’s fault

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/20/2018

Audio Hacking and Alexa skill that may stop Burglars.

Craig Peterson[00:00:00] Hey, Happy Monday to everybody. Craig Peterson here. This morning, I spoke with Jack Heath about a couple of different things. We've got a new skill from Alexa. Do you have one of these things? You'll probably end up seeing and maybe ultimately on Siri, or on one of the other devices like the Google home. But, this is used to protect your house that's really quite cool and an innovative way to do it. Who thought the comedy writers over at Saturday Night Live, and It's Always Sunny in Philadelphia, would be able to help protect your house. So, anyhow we have them coming up. We also have a couple of different things from the Black Hat conference and DEFCON. Three tips and trends that you really need to be watching when it comes to your security, and in this case audio hacking. Who knew that they were doing that? That's a bit of a surprise, isn't it.

[00:00:54] Here we go with Jack this morning. Joining us now the Autofair listener line with some tech talk and perspective, Craig Peterson. His show airs Saturday mornings, right after movers and shakers, he joins us on the Autofair listener lines. Good morning, Mr. Craig. 

[00:01:08] Hey, good morning Jack. We've got a few interesting stories today. You have a unique voice. You recognize my voice. It's a pretty typical thing. We all can use voice recognition to identify each other. Did you know that your bank is probably using that as well Jack when you call in? They're picking up the voice.

[00:01:31] I do know that some of these scams I've heard of, and I am not talking about your bank. 

[00:01:34] But, some people try and get your voice like they call your cell phone and say Is this Craig Peterson and you'll say yes what's your name. You'll see Craig Peterson, Craig Peterson and they'll take that word, Yes and your name and they'll try and use it to prove certain things where the voice is kind of part of your security. 

[00:01:49] Yeah, it is. And, in fact, what's happening is the banks are using something called voice I.D. now, to verify customers. So, when you call in you know they go through that anti-fraud thing where they are trying to get your Social Security number. Parts of it and other things to verify you are who you say you are. Well, they're also analyzing your voice while you're doing that. So, the next time you call in that voice I.D. and voice print if you will can be used to help verify you. Well, we just have a couple of really big conferences out in Vegas, called Black Hat and Defcon, and these are the conferences where all of hacking techniques are discussed by the good guys and the bad guys. And, for cybercriminals now they are looking at how they can spoof some of these voice-based services. 

[00:02:41] And, they really are providing quite an enticing target. So, we're seeing some major changes now in how the bad guys are going to hack us. We've got mobile, mobile devices are moving up the list of the attack vectors. 

[00:02:56] We've got the internet of vulnerable things, basically all of our TV's and now refrigerators and stoves etc. They're all getting hacked and audio hacking is now a thing. It's really kind of a scary thing when you get right down to it because of some of these hacking techniques.

[00:03:14] You have no idea that you've been hacked until your bank accounts been emptied. We got another really interesting thing out there, Jack. You have one of those Alexa things in your house. 

[00:03:27] I do not. I'm not saying other people don't in the house, but I don't, and I do not use it, but I know more and more people are talking to this thing all around the house. Hey, who won the Red Sox game? Or did they lose last night? Hey, you know what's the weather today? And you got this thing talking to you. I tend to try not trying to become too dependent on technology.

[00:03:45] Well, they are handy. There's no question about that, and we know about some of the problems they've had previously.

[00:03:51] David, are you, Hold on Craig. Are you like a subscriber? Yea, Google home. Google home. 

[00:03:59] Yeah, Same basic thing. And, of course, we're talking about these devices that go in your home or office wherever they might be that are constantly listening to what's being said, And then they have an activation word that you use now and they wake up basically and they send the audio up to the internet where it is recorded and we have a number of cases of police department having subpoenaed the records those audio recordings of those devices are making. Well, there is a new skill Alexa has the ability to have new programs new apps if you will installed on them, And in the Alexa world, these are called skills. And, who is doing this skills are absolutely funny, they're hilarious. Again, Jack to you and I probably over the years we've got those little light timers that you put on your lamps so that when you're out on vacation it looks like someone's home.

[00:04:55] Right. I'm sure yeah, you've done the right to light traps Yeah, yeah. 

[00:04:59] Well, Here's a new skill for your Alexa. It's called away mode and instead of lights and maybe even some noises like leaving your TV or radio turned on. Now, you can keep your home safe by having the Alexa play these lengthy audio tracks. I like the real and completely ridiculous conversation. So, you watch your way mode and the Alexa is going to play one of these seven audio tracks that were put together by some comedy writers already Saturday Night Live. It's Always Sunny in Philadelphia and others. So, here's some of the gems Jack that you can play in your home. Couple has a break up while trying to watch TV, Two average guys brainstorm what's unique about them so they can start a podcast, an emergency PTA meeting to discuss memes, fidget spinner's another teen fads, and more, Really, really funny including I love this one, a mom walking her daughter through Ikea assembly over the phone. So, these things are designed to make it sound like there's a real conversation going on in your home. And, to keep the burglars out. Kind of an interesting twist on the Alexa technology. Now

[00:06:13] Just a quick question going back to what you were mentioning about you know wanting to subpoena some of the audio. Have they been successful in doing that? Or are Google and Alexa kind of being like Apple is, where they want to unlock a phone, they won't give you any information, subpoena or no subpoena.

[00:06:29] No, they have been successful. Subpoenas have been served and they have been fulfilled. So, the company that Amazon for instance or Google have provided the audio. But what's interesting is that the cases that I'm aware of David, and Jack have not actually yielded any real results. Because what they're doing is they listen for the wake-up word. For instance, you might say Alexa or google home or whatever the word is you have programmed, they listen for that word and then the audio from a few seconds before that word for about 30 seconds, give or take, is sent up to the cloud. So, unless you're having a fight and threatening to kill someone or whatever it might be and you're asking, maybe you're you know like the old Siri where can I hide a body. At the same time, there is nothing that stored up in the cloud from these devices. So, yeah they have honored them, but they really haven't really yielded any results.

[00:07:29] Craig, make it a good Monday. Thank you very much, Craig Peterson, with some tech talk and tech perspective. Thanks, Craig. Thanks, Jack. All right some of the other stories that are trending. 

[00:07:39] Quick reminder if you have any questions or comments send them directly to me 8 5 5 3 8 5 55 53. I had quite a few actually over the weekend. I was surprised for my Saturday show 8 5 5 3 8 5 55 53 and by the way, we're trying to get the Saturday show if I'm pre-recording it, up so that it's available on iTunes by Saturday, as well as Soundcloud etc. etc. Let me know what you think about that, too if you think that's a great idea. Take care. Thanks again. Bye-bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 17, 2018

 

Cyber attacks are getting more sophisticated and are being perpetrated on everyone and more often than ever before.  Today we are going to discuss Security and Two-factor authentication schemes and what you can do to protect your self.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/018/2018

Two Factor Authentication. Security and Highlights from Defcon Conference

Craig Peterson: [00:00:00] Hi, there everybody, Craig Peterson here, and as usual I've got a ton to talk about. We've got a special report about America's greatest threat. They're calling it a hurricane for cyber attacks. We've got an interesting hacker out there, who has allegedly stolen millions of dollars by hijacking phone numbers and in turn asking kids parents to send some money. Isn't that something. Another trick here. Your Voicemail. Did you know that hackers are seizing practically all online accounts just using your voicemail? We'll tell you how some practical security here for the prudent American, great little article that came out in medium, we'll be talking a little bit about that. Everything you want to know about VPN's but didn't want to ask. In fact, I had a request from one of our listeners this week about the VPN stuff because he's heading out of the country. I love this new Alexa skill, I've been playing a lot with my Alexa. You know about the timers, that people have been using for years to make their lights go on and off while they're out of the house. Well, listen to what you can do with your Alexa. And three trends that hackers, a Black Hat and DEFCON are watching. Did you know that just happened to hear about a week ago? So here we go. Of course, you're listening to Craig Peterson, right. So, we're playing around with some different things, let me know what you think? We've got some different bumper music and beds and things, and you'll hear some of the same stuff we've always been using, as well today. But, you know it's been years since we changed any of that stuff so, we'll just let it go for now, OK. So, our special report, to start things off here today. 

[00:01:51] We know about the security vulnerabilities, we've seen the vulnerabilities, we know what's up, and many of us have been hacked, right. Have you been hacked? You may not even know it. But almost every computer that's online that's running Windows has been hacked. If you've been online for more than a year. Well, what is ahead when we go forward? What are we looking at here? I did a really interesting interview this week for the FBI for their Infraguard program. It's with a company called Black Ops partners, and you might want to look them up. They've got just a ton of cool information. It's headed by the guy who started IBM Corporation's whole security division, which is really kind of neat here. He's won the cybersecurity excellence award, and everything else. So, he and I were talking about cybersecurity 3.0 and where's it going. What should we be doing? And, you know it's really interesting when we get right down to it. But, the bad guys are out there. They are coming after us, and they're coming after us in a big way. We've known that right. We've we know the Russians are coming after us. We know the Chinese, in fact, this customer I just picked up. We've been cleaning things up, and just yesterday we installed a brand new Next-Generation Firewall filter and Security Operations Center support for him. 

[00:03:19] And, this is just a small family-owned company. But, he had been compromised. They were able to get past his firewall, he had a great firewall. Yeah, yeah, yeah, I've heard that story before, and the bad guys got past it and got into his accounting system, found all of his clients, and managed to steal hundreds of thousands of dollars. It's just crazy what happened. He ended up going over to China. To try and find out. So, can we get our money back because the money got transferred over to China? Tens of thousands of dollars later and, of course, now there's lawsuits and legal fees involved and it's pretty crippling. So, that's not surprising, right. It's just like President Trump going out and saying something crazy on Twitter, right. We're used to hearing that new thing that he says out there, but it is not going to change our opinion about President Trump, right. If you had a pro-opinion, you have one after if you had an anti-opinion, you have the same one after, right. That's not going to change things. What changes things is a surprise. What changes things is wow, that's just not what I would expect. And if you had another President in there that didn't normally do the types of things President Trump does, you would be surprised maybe your opinion would change when he did something on Twitter that just shocks everybody in the whole nation or the whole world, 

[00:04:48] right. You kind of get used to it. Well, here's the big picture. The bad guys aren't just going after your money. They're not just trying to get at your clients, and not just trying to get that information. It turns out that the bad guys include nation-state actors. It's not just some kids in the basement somewhere over in Ukraine that is trying to hack in now. And, we're talking about the risk here of a crippling cyber attack. The Homeland Security secretary, Kirsten Nielson said just this last week, that the U.S. is in crisis mode comparing the dangers of a massive attack to a Category 5 hurricane looming on the horizon. You heard that right. Category 5 hurricane, and there is no graver threat to the United States. An interesting article that I posted up on my Web site by Axios. You can find it there. They've got some quotes from General David Petraeus. He's the former CIA director, and he's quoted as saying, what worries me most is a cyber equivalent of a weapon of mass destruction falling into the hands of extremists who would needless to say be very difficult to deter because of their willingness to blow themselves up on the battlefield and take us with them. Leon Panetta, of course, who was President Obama's former CIA director. 

[00:06:20] Quotes and On and on and on. But, the bottom line here is we not only have to protect our businesses from these bad guys that we're familiar with, that have been out there for a very long time, but in fact, we've got to protect our businesses from the nation-state actors, as well. Now, I know the FBI has been working closely with businesses to try and secure our infrastructure and headway is being made there. But, it's shocking to me more and more as I get into it, how many hospitals, clinics, doctors offices, small banks, et cetera don't have what's needed. And, they are part of the critical infrastructure. So, again looking into the FBI Infragard, if you're involved with one of these businesses and see if you can't join up if you can pass the Infragard background check and start getting some of this information firsthand that I'm providing and other people are providing to the Infragard members. It is so critically important. And if you're a regular business guy is, I'm just a business regular guy, What do people care? Think about losing everything. Think about your retirement caught up in the business. What's going to happen if that's all stolen from you? And that's what's going to happen, by the way, it's guaranteed. It's going to happen. It's happening every day. And you've got to reconsider your whole security infrastructure. 

[00:07:55] You've got to work with the company that knows what they're doing, and just a funny note here. I've got to add this in. I got an e-mail this week that came from a mailing list that I'm on, and they were promoting this two thousand dollar course, become a managed security services provider in six weeks. And, you know I have to chuckle because people have a hard time differentiating, right now. How would you differentiate between my company, Mainstream, and one of these guys that six weeks later puts up a shingle, saying yeah I'm a security services provider, right? And I started adding up the hours. And this is the part that really shocked me. Of course, it helps to be a little bit older and having done this for a long time. I have more than 100,000 hours in the I.T. business doing network related stuff including security. Personally, me personally. This isn't our company has a combined 20 years. Me personally, 100,000 hours and I have I just laughed when I saw this. Are you kidding me? People are going to be out there peddling themselves as security providers when all they have is a couple of certifications under their belt and a six-week course. Oh, man anyhow, so now let's go over to our next topic here. 

[00:09:33] Well, we kind of started out by talking about hackers and what they're doing. We've got a new problem up there, pretty darn big problem. frankly, and this is a phone hijacking now. 

[00:09:45] You know I've told you before that these two-factor authentication schemes that are using your phone where they send you a text are not terribly secure, right. In fact, they're not secure at all. Well, this is something that's just a little bit different. We've got an article here from Motherboard, talking about California authorities who are saying, that a 20-year-old college student has hijacked more than 40 phone numbers and stolen five million dollars, including some from cryptocurrency investors. Wow. OK, wow is all I have to say here. Here's what's happening this guy Joel Ortiz, he's a 20 year old from Boston. He's alleged to have hacked these victims, using some accomplices who are unnamed, at least as of yet. And, this is the first reported case against someone who's allegedly used a technique known as Sim swapping. So, in Sim swapping so, you know you get a phone, you have an unlocked phone you have a sim that Sim has your contacts and other stuff on it. And, that sim also was used to authorize you to the cellular network. So, now that's what you use to identify your phone, right. So, when someone calls your number it uses the sim, to identify you. That's how that all works. With sim hijacking what happens is they basically steal your sim. Now, they don't even have to have access to your sim. All, they have to do is trick your provider. You know like AT&T, T-Mobile, Verizon, and whatever trick your provider into transferring the target's phone number to a SIM card that's controlled by the bad guy. So, once they get that phone number and there's ways to do this, this is really, well documented where they will call up and pretend they're your wife, or your husband or even you.

[00:11:52] And, so many of us are posting information online that makes it possible for them to be able to very easily impersonate you. So they know your wife's name your kid's names your dog's names where you work where you were born where you graduate from college. So, they can pass the so-called anti-fraud stuff when they call up the provider. So, once they get your phone number the bad guys are using it now to reset your passwords and break into your online accounts. Because remember I was saying that using a text message is not true two-factor authentication. In some cases even working, if you do have a separate type of two-factor authentication. And, its called a port-out scam. It's relatively easy to pull off, it's become widespread and that is where they say, yeah I am transferring my phone number from T-Mobile to Verizon, just as an example, right. And, you arrange for that. You're transferring your phone number and when you do that, you have to have a new sim. In many cases you have to, in this case, you'd have to have a Verizon type sim. And, obviously, you'd have to be working on the frequencies Verizon uses et cetera but easy enough to pull off. So, this guy Ortiz was arrested at the L.A. International Airport was on his way to Europe. He apparently had a Gucci bag that was part of a recent spending spree that, of course, they seized because they're alleging that it was financed by some of these scams. He's facing 28 charges, 13 counts of identity theft, 13 counts of hacking, and two counts of grand theft, according to a complaint that was filed. They're going after some of his co-conspirators apparently they have access to millions of dollars in cryptocurrency. 

[00:13:50] And the interesting quote in here, that I'm not going to quote because it is full of all kinds of nasty stuff. OK. So it's interesting. Think about that. There's a sim swapping community that's out there on the dark web, where people are swapping the information back and forth. At least three of the attacks that happened, he stole more than a half million from a cryptocurrency entrepreneur including a million he'd crowdfunded and an initial coin offering. And, you know I am absolutely against putting money into these things. I don't look at them as an investment. I look at them as highly, risky. It goes on and on. So, bottom line DO NOT tie it to your phone, into authentication for any of these Web sites. Use some of these some of these apps that are out there like Duo or Google authenticator, if you want to learn more about it let me know I'd be glad to put together a special little free mini-course on it, as to how to do all of that. But, that's what we do. We go even further. We not only use those types of apps, we have physical keys that we have to use in order to get on to certain Web sites. In fact, we're expert witnesses right now in a case involving a managed services provider, that they obviously they didn't go to the six week course or they would have known better, who messed up, and wow, major stuff, can't really talk about the case, but similar type of thing that happened with this other client, that we were talking about that we just picked up. It's happening every day. Now, you've got to pull up your socks and pay attention. All right. So, let's get on to the voicemail and how that ties into all of this as well. 

[00:15:46] Well, remember I was just saying that if you use your phone for authentication, where they send you a text message to make sure you, because you're logging into a new browser or you're logging in from a place that they're not familiar with, right. So, they'll send you a text message and then you enter that code in. Well, the same type of problem exists with your voicemail. Your Google, your Microsoft, Apple, WhatsApp, signal account, they all have an Achilles heel. Now, Signal is interesting because it is designed to keep things secure. WhatsApp is supposed to keep things secure, not as secure as Signal does. But, here is the weakness, and that weakness was disclosed this last week again in Vegas. In case you weren't aware of it, there was the Black Hat conference. And at that people were talking about different ways to hack, new things they found, Defcon as part of that, right. One right after the other, these two conferences out there in Vegas. So, this particular one was by Martin Vigo. He was over at the Defcon convention, and he explained how he managed to reset passwords for a whole bunch of different types of online accounts. So, he took advantage of the weakest link in the security chain which is. believe it or not, your voicemail. 

[00:17:17] So, what he did was he requested a password reset on some of these services, like WhatsApp, because you have the option of requesting you receive a call with the reset code. So, that's more than just receiving a text, it's actually a phone call. So, people think OK, well that's safe right.

[00:17:40] Well, no it's even worse than getting a text message because all he had to do was hack the voicemail account first. 

[00:17:49] How does he do that? Well, he just wrote a little script that just brute force attacked the passwords. All right. Most people are using a four-digit password. And most of the voicemail systems don't have incremental backoffs, where they time out. You know where you get it wrong the first time you have to wait five seconds, you can try again, if you get it wrong three times you have to wait five minutes. Yet are wrong again. You might have to wait an hour etc.. No, no. They just let you hack, hack, hack, hack, hack, hack, hack. And, in fact, he did get access to the account's password reset codes. And, ultimately he got control of the account itself because they sent a reset code via voicemail called up your reset code as 1 2 3 4, and he had previously hacked that voicemail account, and many people it's easy to find. I was on again research for this case, where we are acting as a consultant to the law firm and we may end up on the stand, as an expert witness. But in that type of a situation, all that has to happen is you go to the website, you can find that person's password, you can be again password reset information by just finding what is their phone number. Because people are posting their personal cell phone numbers on websites, or they're posting their business work number on the website. Then I get it right. You 

[00:19:22] Want people to be able to contact you. But in this case, he got into all of these accounts and he was able to reset them because he got the password via voicemail reset. 

[00:19:32] Oh man, some of the stuff just never ends does it? All right. So let's talk a little bit about practical security. Got a lot of kids going back to school. 

[00:19:47] You've got college kids, of course, going back to school. We just had a client bring in a hard disk that was being used for backup. You know one of those pluggable USB drives and guess what it had failed and apparently, their daughter's dissertation was there on that hard drive. And so we took it apart, the case and everything and it looks like it's actually a problem with a hard disk itself might be the voice call. You can hear clicking. So, hopefully, that's what it is it's only going to cost about five thousand dollars to get that a hard disk fixed. We're going to send it out to a lab. We don't actually do that in-house right. Let the experts deal with it. So, guess what doctoral dissertation. Because the machine went south and the backup wasn't working. We hear that all the time. It's incredible. That's why you have multiple layers of backup as well not just one backup. Because in this case her machine failed and she didn't realize her backup wasn't working. Oh man. Anyhow it's really distressing when that happens to you. We've got kids now that are starting to get involved with politics for the 2018 election cycle, the same thing is going to be true with the 2020 cycle. We've got of course harassment hate campaigns. There's doxing going on. Russian hackers going on, and these same people that have been involved in trying to disrupt our elections, are going to be busy again this year and in 2020. 

[00:21:24] So, anyone who touches sensitive confidential documents, financial records, voter data, you have to protect yourselves. And you might not have thought about that when it comes to these kids, that are working as volunteers may be in election offices that are out there, right. Their favorite candidate left, or right, or center, whatever they might be. 

[00:21:47] There is a ton of bad advice out there because most of the security folklore that's out there in the I.T. industry really is wrong. It can be even dangerously incorrect. The security world five years ago, today, It's not the same thing, right. So, there are a few things you have to do. I've got a special report. You can no longer get it on my Web site. But it's all about passwords, PASSWORD managers. I give some reviews in there we have some links to using them if you want to find out about password managers e-mail me or just send me a text 8 5 5 3 8 5 55 53, send me a text asking for it. I'll send you the PDF. 

[00:22:33] I think it's like five or six pages, it's pretty detailed pretty in-depth, I'll send to you. It's something I use with my clients. But, you can you can get that from me. But number one user password manager again if you missed it 8 5 5 3 8 5 fifty-five fifty-three. So, anyhow you've got to generate passwords. Get a security key, a Yubi key is probably one of the better ones out there. But, be careful of using the security keys make sure you know what you're doing because you could break your computer completely if you lose the key. OK. It's kind of crazy but you know Yubi key is out there. There's a lot of other things there. Chrome browser has some really good extensions. HTTPS Everywhere is a good extension to use it. You can enroll Google's advanced program protection and a good article and Medium that I have put my Web site Craig Peterson dot com. You can go there and read up a little bit more. Well only got a few minutes left so, let's kind of whip through these last few things for this week again you will find all of this and more in the newsletter. Now, we sent out the newsletter on Thursday this week as opposed to Saturday morning. 

[00:23:51] We want to see if that's a little better if you guys pick it up that way. I think a lot of people are subscribed to their work e-mail address, which means you might not notice it when you come in on Monday morning. So, if you check your e-mail you'll see it's from me at Craig Peterson dot com. All of these articles with direct links to them so you can find out more. We also have special offers, from time to time, like a couple of months ago we offered that password special report, as well. But a VPN is very important. We use them all the time. We have our own VPN. And, the whole idea behind it is you have a tunnel, hopefully, a secure tunnel. Be careful where you are going, when it comes to VPNs. Geo-blocking is a good thing to get around with a VPN, but as I mentioned at the beginning of the show I have a client that is heading over to Europe and he was asking about VPNs and what he might want to do what he should do. So, I got good advice on that as well. I know I can send you more information. There's a cool new Alexa's skill. 

[00:25:02] Is really really neat. It's plain these fake stupid arguments to make people burglars think that you're at home.

[00:25:10] Ok, so one of them is an emergency PTA meeting to discuss Memes, fidget spinner's, and other teen fads. There's another one where couples having a breakup while also trying to watch TV. Another one-two average guys brainstorm what's unique about themselves so, they can start a podcast about that. Oh man. There's another one that they can play where they have conversations from a book club, where no one discusses the book. A mom walking her daughter through Ikea assembly over the phone, a stay at home mom losing her mind, and an argument over a board game. Very cool you can. You can find those for Alexa. Great article in Slashdot. You'll find it on my Web site and cool for burglars keep them out of your home. Three trends that the hackers a black hat and DefCon were talking about and what they're watching. Mobile devices have moved up the list. The Internet of valuable things, IoT has become very, very big deal. I should do some special stuff on some of this for people and audio hacking. It is now a thing. So, you can find all of this and more details. CRAIG Peterson dot com check your e-mail if you're on my list. Also, I've been trying to send it out via a massive few are on my text list, a link I send out to everybody with this week's articles but you'll find all of this. Craig Peterson dot com, any questions any requests. Just text me. I've been answering people all week long and fact to getting more and more every week 8 5 5 3 8 5 55 fifty-three and I'll send you I'll put on my text list and let you know about current events what's happening and little reminders about the show and stop 8 5 5 3 8 5 55 53. Have a great week and we'll be back again next week and I'll be sure to let you know if anything big is hitting the fan during the week. Take care. Bye-bye.

 ---

Related articles:

Hackers can seize practically all your online accounts, and it’s your voicemail’s fault

Practical Security for the Prudent American

Ever left your lights on a timer to scare off burglars? Now you can use your Alexa

Special Report: America’s Greatest Threat Is A Hurricane-Force Cyberattack

How A Hacker Allegedly Stole Millions By Hijacking Phone Numbers

Everything You Wanted To Know About VPNs (But Didn’t Want To Ask)

3 Trends Hackers At Black Hat And Defcon Are Watching

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 15, 2018

 

Is someone spying on your through your computer?  Listen in as Ken, Matt and I discuss how it can happen.

Omarosa!  Yes, Matt asked me about this and we discussed how these recording work and the problems with them.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is anyone spying on your computer? How do you know?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/15/2018

Computer Spying. Does Recording Conversations Kill Free Speech?

Craig Peterson: [00:00:00] Hi, Craig Peterson here. I don't know. Did that get political, this morning? I guess you'll have to decide. I don't think every discussion where people disagree is political, right. You could agree or disagree with me on economics. You could agree or disagree with me on policing strategies. Does that mean that it is political? I don't think so. I think we've gone far too far on the political realm. This morning when I was talking to Matt, it was interesting because he was asking about technology and some of its effects here. And I took all of that and I really ran with it this morning. So, there were a couple of quick, one actually kind of quick question before that where Ken Altshuler was asking a little bit about the computer spying on us. So, I did talk a little bit about that at first but then, Matt Gagnon and I talked about a subject that is going to change the world. Has changed the world. Does that make it political? Am I wrong for having brought this up, or what do you think? Let me know 8 5 5 3 8 5. Fifty-five fifty-three. Am I wrong doing this, right? So, many people, you know I get fed up, when you get Hollywood or you get musicians out there with political stands and there are obviously political, right. You're going out against President Obama or President Trump, and you're just slamming them for things that are where there is nothing to it. That's political. Where is that line? This is a really interesting problem, and something obviously I'd thought about because I was able to respond to Matt and I love to know what to think. Anyhow here we go this morning with Ken Alschuler and Matt Gagnon then up in Maine on WGAN a.m. 560 and FM 1 0 5 5 and I guess there's a couple of repeaters as well. Anyhow here we go. Thanks, for listening. 

[00:02:12] It's that time again. It is a Wednesday at 738 which means Craig Peterson is joining us, as he typically does. Give us an eye on technology, Sir. How are you this morning?

[00:02:20] Hey, that's me, doing good.

[00:02:23] So, I'm sitting here working on my laptop and sometimes it's a little light up, on the top and I keep thinking somebody is looking at me. Am I just being paranoid? 

[00:02:34] Braggers, somebody play that somebody still looking at me. 

[00:02:39] Well, in your case, yes, your just being paranoid. Who would want to? Exactly, yeah spying on computers is a problem.

[00:02:47] You guys remember the L.A. Unified School District and the problem they had with their laptops. 

[00:02:54] I actually do not. No, what was it? 

[00:02:57] Ok. Well, it turned out that the laptops were issued by the school district two students had spyware on them and some of the young ladies would have their laptops open in their bedrooms, while they were getting changed et cetera. And apparently, some of the IT people in the L.A. Unified School District decided that it might be kind of fun to watch. And that's kind of the long and short of it. That happened maybe what now a couple of years ago, and the whole thing obviously backfired, and I think they pulled back all of these laptops. But, Ken it's not unreasonable to be concerned about that. You've got the actual spying where you're talking about a camera that might be on. And, even though the computer has a little light that comes on when the camera is activated, that's not 100 percent positive indication that light that the camera is in use or is not in use. In other words, there are ways particularly with Windows computers, not so much with Macs. There are ways to have the camera active, but not have a light on. And, we're not going to go into details here but it is a concern. There is a lot of people that are concerned about it. The employers may be spying on them while we were at work or in the case of an L.A. County unified. Maybe these school district people spying on the kids while they had their computers at home. Now, in both cases usually what you end up seeing, is people are are saying, hey listen we're just trying to track these laptops so, we know where they are. So, they don't get stolen. But, there are some real privacy concerns there.

[00:04:45] So, there's a great article that I found on Popular Science that posted it up on my Web site, that talks about how to secure your systems, not just from the camera watching you but all of the software that might be on your computer that might be spying on you. Because we know we've got more and more activity by the Chinese the Russians the North Koreans and others to try and get into our computer. So, this article goes through and talks about the layers of security that you have to have. Bottom line, this is not the world that was even just five years ago. Things are getting more complicated. You and I are getting caught in the crossfire, between these countries that are out there trying to come after the United States, and just having an anti-virus isn't enough. So, this article goes through talks about some of the different layers of software you should have, A it gives you some links so you can buy some of the software. But bottom line, if you're a home user it's going to cost you two to three maybe four hundred dollars a year for the software, that you should have on your computer. Now, that's a huge jump from you know where we were before where you were using free anti-virus although it does have a link to some free antivirus software. There's more to it than that. And if you're a business you should be spending about a hundred fifty dollars, a month on software and services to keep your computers up to date and to keep them secure. It's a much, much, different world out there, Ken.

[00:06:26] Craig Peterson, our tech guru, joins us at this time every Wednesday to give us an eye on technology. So, Craig, I'm going to go a little rogue here and I'm going to ask you about Omarosa because I'm not sure if this is even a question, Craig but I just want to talk about it. So, she's recording, secretly people in the White House, not just the president, but you know aides, who are having certain discussions and she's clearly you know running around just trying to get as much leverage as possible, in the event she got fired, which she did. It's kind of weird new world we live in, isn't it? I mean you know I have an app on my phone. I almost never use it. But just in case I have an app on my phone, that will record my phone calls, right. So, that I can have that kind of thing recorded. Usually, I would use it for something, I want to keep notes or something but, I mean I can absolutely see that being you know almost a weapon when you call somebody up in hope that they say something crazy, that you can then have on recording and then use it against them later. Then you know you can have a pen that has a recording device on it, you can have you know any number of devices now, that have this type of thing on it. 

[00:07:30] How do we live in a world like this, especially if you live in the White House and work in the White House? And, be secure that anything can ever be, sort of, private, ever. 

[00:07:43] Matt, That's is a good question right? We just had the governor on, you know you've got senators on, you've got all kinds of people on the radio, when you're calling into a radio station, There is a basic assumption you are being recorded, but you're right the rest of your life isn't. And we mentioned that whole two-party consent thing before on the show, I think it was even last week, there's 15 states in the country. I think it is about 15, that have two-party consent laws, which means you can not record the other party if they are in a two party consent state. Now, let's get to an interesting way to look at it. For instance, Washington D.C. is a single party consent for that district area, which means that all would have to happen as one person says I'm going to record this conversation by themselves and they start recording, and it's all legal. But let's say Omarosa is there in Washington D.C. and the President is in Florida. Well, Florida is a two party consent state. So, what happens to them is she has committed under Florida law a felony by recording the president. 

[00:08:57] So, if he was calling her from the golf course in Mar Lago or something. Yeah, yeah, yeah, exactly.

[00:09:03] She's in serious trouble if that was the case. But what we're talking about is a little higher level than that. You know Omarosa, he brought her into the White House. I was a huge fan of The Apprentice. It was just so much fun. It was fascinating seeing how they approach marketing problems and things, right. She was the villain on The Apprentice. And, from what I've heard on these tapes you know I think the White House is certainly just fine. They're in the clear. But I don't know that Matt. What do you do? You could potentially have a device that is set up to make sure there's nothing around you electronic, you could go that far. There are some devices that are out there. There is a case for your phone for your iPhone and that iPhone case monitors what your iPhone is doing as far as the broadcast goes, or the electronic sounds, if you will coming out of it so talking to the data on the cell towers talking to the voice on the cell towers. So, you know hey listen wait a minute, there's something going on with my phone but Matt you can't be certain anymore. Now, you have to be careful and you know what that's going to do. This is the same problem we have with the fascist movement. Where you have fascists out on the street beating people who disagree with them. And, that is people just are watching what they're saying and that means you can't have an honest discussion. You and I cannot disagree on some subject. 

[00:10:42] You can never I can never risk saying something offensive anymore so everybody's so guarded that nobody's actually exploring any issues, anymore. Nobody's, actually getting into depth on anything. 

[00:10:52] Yeah, the opposite is what we need right. Exactly. We need we need to protect the type of speech that offends us more than any other type of speech. And when we're talking about one party or two party consent laws and states under the federal government any federal agency it's always considered to be one party so they can prosecute in the federal system with one party. So, what can happen is the police are investigating. They've got an informant they say Mr. informant, I want to call up your drug supplier and let's get them on tape. So, the feds can do that in any state. However, in a two-party consent state, they can use that, in court, if it goes down to the state courts. Law enforcement prefers a single party because they really don't have to get much permission when it comes to recording. You know my feeling on this I think that in the performance of their public duties that officers, you know police officers all the way down through town clerk et cetera, it should be legal to record them. But, in this day and age shouldn't you should assume you are being recorded, right. How many times have we seen a news broadcast, and there's 50 people with their iPhone and Android smartphones up videotaping something that's going on? Even in a two-party consent state. That has to be the assumption, and I don't know what to do.  It's bad, it's not good. I think, frankly, to have a single party consent in most cases I think both parties should consent. And, I think we've got to stop saying all speech is political because it's not. We have to stop beating people with medieval weapons like clubs with nails coming out of them when we disagree with them.

[00:12:51] The left has gone, far too far, and when we're talking about this whole thing, we know when it comes to the right when it's when it's too far. When someone is being racist it's too far. When someone is like David Duke it's too far. But there's very few of those people, and everyone on the right rejects that type of speech. And, we see that every week. When is it too far on the left? When they cross the line? You know the Antifa movement is out there. They're wearing black masks and black clothes et cetera. And, they are shutting down free speech whenever possible. They're breaking windows, cars, setting fires. Is that too far? I don't hear most of the media talking about that. And because they are stopping the free speech we are in a sad, sad, position in this country. So, this I put this all in one bucket Matt because I think it's all very, very related. We're concerned now, about what we say back in the day someone could be yelling the N word all day long and assuming they weren't a rapper. You could reasonably assume that they were racist. Right now the racist can hide. And they do hide and the free speech is certainly still, kind of there. But I think everyone's being careful. You have to watch it. You know you can be a teenager, teenagers do stupid things, right. You're not an adult really until you're well into your 30s, most people. Those stupid things you said, are going to show up when you apply for a job because people the first thing the hiring managers get to do is search for you online. So, this is a huge problem and I don't know where it's going to end up. 

[00:14:44] Matt, Craig Peterson, our tech guru joining us every Wednesday. We'll talk to you next week. 

[00:14:51] Take care gentlemen. Thank you, sir. All right, we're going to a quick break here.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 14, 2018

Do you use Facebook?  Do you want them to have your bank account information?  Listen in as Jim and I talk about what Mark Zuckerberg has in mind for Facebook and you.

Computers watching you? Yes, but good news if you listen in Jim and I will discuss an article that you can use to guide you through the process of protecting your security.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is anyone spying on your computer? How do you know?

Facebook wants to know your bank balance and track your accounts

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/014/2018

Zuckerberg Wants Your Bank Account Information. Keeping Your Computers Safe From Spying.

Craig Peterson: [00:00:00] Hi, Everybody Craig Peterson here. Today, I spoke with Jim Polito, and we talked about a couple of different things. One that we talked about was how to tell if someone else is spying on you, via your computer. A Really, great article referred to in there and went into some detail about Mark Zuckerberg what he's trying to do in the financial arena. Did you know he's trying to get access to your bank account? Yeah. He's, you know, he's been in trouble. Stock down 20 percent. You saw that right. A couple a few weeks ago. Well, this is his answer to getting more eyeballs on his site, for a longer period every day. So, here we go. 

[00:00:46] He is the man you need at your side to protect you in cyberspace. I am talking about our tech guru Craig Peterson. Good morning, sir. 

[00:00:59] Hey. good morning Jim. Quite the morning. 

[00:01:01] Yeah, it is. A lot of news, lots of stuff going on, but hey, I always turn to you. In times of uncertainty. So, Facebook. wants to look at my bank account. Whoa Whoa well good luck. Good luck there.

[00:01:21] No no no they can't.

[00:01:25] They can look into my but they look into my bank vault. Hello. Hello. Anybody, anybody. Yeah. No, Facebook wants to see our bank accounts. What is this?

[00:01:38] Well, Jim they can handle negative numbers, so. You know they might be a problem, I don't know. 

[00:01:49] You know. I don't know I'm sure you follow this a little bit but, Facebook about two weeks ago had a massive dive. Their stock sank more than 20 percent. And the reason for that was fewer people are using it and, in fact, Facebook CFO came out and said that they're expecting revenue growth rates to continue to decelerate in the second half. So, they're saying hey listen our growth is going to decelerate, the hard numbers are showing their users are leaving, and there's a lot of people that attribute that to the fact that Facebook was spying on people, Right. And, that's a that's a bit of a problem. So, Facebook is presented right now with some really interesting dilemmas. How do they get people to stay on their site? Now, I want you just think back a little bit. Think back five years, maybe ten years to your use of the computer. What was on your home page? I mean when you first run your web browser.

[00:02:50] What site came up? Google.

[00:02:53] Yeah, it would be Google or AltaVista. I'll tell you not yet. Yep yeah yeah. And there were some others out there Yahoo, of course, is kind of a portal, and some people had America Online et cetera. 

[00:03:10] Today, what do people have? Well, when opening the browser I don't know what do you have? What does Danny have? 

[00:03:17] Well, I still have Google here, because I'm going to start searching. I'm going to start doing things. But, other people here who use this same computer if they're login is still here on this computer, in the studio. Guess what some of them it's Twitter. Some of them it's Facebook. They go right there. I mean they don't they don't mess around, they're right there, that's their landing page. 

[00:03:42] And, that's where the value is. Because now you are going to that Facebook page or that Google page, etc.. That's what they want to control. Many people have YouTube now, as their home page, in fact, that trend right now. 

[00:03:59] Does Danny saying he does. Yeah, he as YouTube as his homepage. 

[00:04:05] Exactly. The trends are showing that number one is that Google out there online the number two search engine is YouTube which is owned by Google. And, then, of course, you have facebook etc.. So, right now the top sites are Google and Facebook depending how you want to look at it, Right. But, YouTube is about to pass Facebook. If these trends continue. Wow 

[00:04:30] Mark Zuckerberg, Yeah, they've got a real problem. Ohh Zucky. 

[00:04:38] One of the things Mark is Looking at that is he wants to be involved not just as your home page as to how you start your Internet experience but, he wants to be on the financial side too. So, he's been playing with block technologies. Think of bitcoin, for instance, he wants Facebook to be a currency, as well, that you use online.

[00:05:02] And a step towards that. Now, he has come out and Facebook is saying, hey listen we want to have your bank information. We actually kind of want to be your bank right. 

[00:05:16] Isn't it enough that Jeff Bezos has my bank information. It's true. Is Zuckerberg going to have it too? What does Elon Musk want it now, after him? 

[00:05:27] Well, he's been approaching Amazon, Google and J.P. Morgan Chase, Bank of America, and others and he's saying hey listen we want to move the financial services from the ATMs to Facebook. And, of course, Facebook could make more money in the process. People would spend more time there. They could send the money through Facebook, they could pay their bills. The bills would come right into Facebook, so, Facebook would become essentially the clearinghouse even more than an ATM. Now everybody is still kind of talking with Facebook. The banks are not sure if they want to do this. Bank of America has said forget about it. It's not going to happen. But, that's the next step for Facebook, if Zuckerberg gets his way. 

[00:06:15] Wow. Makes sense. Taking over the world. We're talking with Craig Peterson, our tech guru, and at the end of this segment we're going to give you a phone number and if you text my name Craig we'll get you this information with a lot more detail and a lot of other information and he will not annoy you. He will not try to sell you things. It's all just good information helping you too, to not be so alone in the in the outer space that is cyberspace. All right I want to get quickly to the computer. 

[00:06:45] I'm looking at it, but it's looking back at me. Whose in control of that. 

[00:06:53] And, yes we do we know about the L.A. County, the L.A. Unified School District, and how they were spying on girls getting dressed in their bedrooms because they had their laptops open. We know that can happen, and in that case, they have specifically installed, kind of like spyware on your on their computers. Now, there are ways to stop this. I've got a great article up on my site. And, I've been thinking maybe it's time to do another webinar, where we walk people through how to do this themselves. I've got a great article on my site from popular science where they go through and talk about it. It's no longer good enough to have an antivirus, right. McAfee himself, John McAfee the founder of McAfee, which of course makes hantavirus products said, McAfee, is the worst thing for viruses we have. We have Nortons Symantec, saying essentially the same thing. Right. You can't just have one anymore. It has to be layered. It has to be like an onion or maybe an ogre if you're familiar with Mike Myers movie, and you have to have all these layers. So this goes through it, you know, including things like AVG free maybe Windows Defender or malware bytes, Avast. There's a lot of them out there, spy search and destroy. It is no longer enough, to just sit there with an anti-virus product. We have we have another business client we just picked up, Jim. And it was just absolutely insane and this client called us after they had already lost 180 thousand dollars to a business. 

[00:08:42] E-mails compromise OK. 

[00:08:45] And, I would love it if we could stop it right. Great to come in after the fact and clean up, I can charge more. Right. Right. You know do it right the first time. Some of the software I'm talking about costs here's a few bucks. OK. It has this is popular science that has links to buy these things. But you know for an average business, to have everything you need including all of your software updates all the stuff that makes sense. You know, it's going to cost you north of 100 maybe 150 dollars a month per computer to do it right. And if you don't do it right, I can tell you a horror story after horror story. It's not enough to have anti-virus, anymore. And that's true for home users, so if your home user. Have a look at this article from my site. If you're a business user. Have a look at this article from my site. And remember this is not good enough. You've got more money at risk and more liability because in the Commonwealth you could really get in deep trouble with fines, and in some cases, even jail time. If any personally identifiable information gets out. gets out. 

[00:09:57] It's a big deal. That is a big deal and it's great that we have you on our side folks, Craig Peterson will provide you with this information. And again he's not going to try and sell anything to you. And, if there's ever a big crisis like a hack or breach. He gets notice out to people and tells them what to do. So, if you text my name, to this number 

[00:10:19] 8 5 5 3 8 5 55 53 that's 8 5 5 3 8 5 fifty five fifty three. He will send you this information in more. Standard data and text rates apply. 

[00:10:33] Fantastic. Craig, always a pleasure to have your expertise. 

[00:10:38] Hey thanks, Jim. Take care.

[00:10:39] You too. Bye-bye. When we return a final word Thursday's.

[00:10:44] Now for those that are interested if you want to reach out to me. Find out more about how to secure your business or maybe you want me to do another one of those free webinars, kind of walking through it. Let me know. Just text me again that same number 8 5 5 3 8 5 55 53. That really is my number. This is one of those services. And let me know. Thanks. Take care. Have a great day. We'll be back tomorrow bye-bye.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 13, 2018

 

Did you have a Lava Lamp when you were younger?  Listen in as Jack and I discuss how those crazy devices are providing high tech security.

Do you wear a fit bit or other fitness tracker?  Today Jack and I discuss some of the reason that the Military is putting a kobash on their use.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Fitness trackers are dangerous. You know that, right? Finally, the Pentagon woke to the dangers and restricts the use of fitness trackers, other devices

Lava lamps as a cryptographically secure source? How a bunch of lava lamps protect sites from hackers

 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/13/2018

Military Dangers of Fitness Trackers. Lava Lamps for High Tech Security

Craig Peterson[00:00:00] Hey, Good Morning to everybody out there. Craig Peterson here. We've got a couple of things that we talked about this morning with Jack Heath. One is the dangers of fitness trackers. Yes indeed, these things are dangerous, particularly, if there might be a predator after you. And we talked about the comeback of lava lamps. How lava lamps are being used for security. Who knew that it was such a high tech thing. I love those. I got to get them to get a lava lamp here. Those things are so cool. All right. So, here we go with Jack Heath covering what today most of New Hampshire and parts of Maine and Vermont and Mass and it's fun I enjoy being on with Jack even though it's usually a quick hit. As we bring in Craig Peterson, our tech talk guy on Monday morning Craig's show airs on Saturdays on the weekends here.

[00:00:51] Craig joins us now to us finds Craig. It's not really, I guess it's, I don't call it high, high, tech but have heard about in Southern California Have you ever heard of these bird electric scooters. There all kind of skateboard scooters. have you seen these things? No, I haven't. So, they just kind of like motorized little scooters, basically not like a motorcycle be kind of stand on it and it's electric cars about 10-15 mph. For whatever reason but why are you surprised, because it's southern California. People who don't like him anymore. Basically, throwing them out in public places and even throwing them into the ocean or burning them. Because that's what you do if you live in Southern California, I guess. If you've had enough of the bird scooter. I'm looking it up right now online.

[00:01:35] But yeah that's dangerous, isn't it?

[00:01:38] Not only for the "I love the big call for the environment" and they throw them into the ocean. OK. What else is what's going on in the high tech world. 

[00:01:49] This is really something that. I'll have to look at this. Oh, we've got a few things that are kind of funny. One is a flashback and, of course, here remember lava lamps, Right.

[00:01:58] So, David has one. David's using words like, Swell, in his traffic reports, he's going retro. These things are very cool.

[00:02:07] You know the 60s and 70s, I remember them I always wanted one. They had a bit of resurgence here in the 90s. One of the problems that we have in the computer world is, how do you generate truly random numbers? Because, computers, of course, are kind of running in lockstep and it's it's hard to generate random numbers and we need these random numbers in order to keep things secure. Because what we're doing, Jack, is we are using them to do public key exchanges in order to keep things safe. So, every time you go to a Web site and it's a secure site there are these massive random numbers that are used, in order to keep that session secure. So, because computers aren't great at this, what's happened is one of these computer companies that do some of the security out there CloudFlare has decided that they are going to use a special kind of random number generator. They have 100 Lava lamps that are sitting there in the foyer. And these things are completely unpredictable. You've got the oil, water, wax moving around in them and so they have a camera watching these 100 lava lamps and how they're moving randomly and they're using that in order to secure the websites help to secure the internet. Who thought lava lamps would be used for some of this high tech security. I thought that was pretty cool.

[00:03:38] Yeah, well you know everything comes around, right. Everything you know just when you think have it's gone it will make a comeback right back to you. 

[00:03:48] What else is going on?

[00:03:50] Well, get the big thing I've talked about a few years ago that these fitness trackers. We had some bad guys down in New York City in Central Park who were putting out receivers on trees and so they were using these because the fitness trackers are broadcasting our phones are pinging and being pinged. So, they were using these little receivers they put up on trees to track women, where they were running in the park. And when they were running in the park and the whole idea behind it was to assault specific women. They could track them. Well fast forward a couple of years and we started having even more questions. You know we've got something called heat maps that are showing a lot of activity in different areas and many people are using these fitness trackers to compete with other people. So, you can keep track of your run, how fast you're going, where you went. Hey, I went ran the same area faster than you did, even though you don't even have to run together. It's just all recorded and compared on the Internet. So, problem have now and I checked this out myself. Is that you can go to some of these Web sites, see where people are running, where most people are running, and you can see where our military personnel are running the perimeter of the bases, of airstrips of some of the towns there are in, including secret bases overseas all because of the use of fitness trackers. They have to GPS whether or not it's a device on your wrist or on your phone. And now the Pentagon has finally started restricting the use of these fitness trackers. Because some of our secret bases have been revealed, again. You know the technology not quite thinking it at all way through. Thank goodness, now the Department of Defense has kind of wised up to this stuff.

[00:05:50] All right good stuff Craig, on a Monday morning make us think about that on the fitness side in terms of who's seeing what. Thank you, Craig.

[00:05:57] Thanks, Jack. Bye-bye.

[00:05:59] All right another top college.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 11, 2018

 

Have you heard of random number generation?  Well, listen in today as I tell you about the unique method that the company CloudFlare is using.

The military finally sees my point of view on Fitness trackers. If you have been listening for a while you will know that I discussed this a year or two ago, but just recently the Military has begun to agree with me and has now recommended judicious use on bases.

Would you trust Facebook with your financial information?  Listen in as I explain what Mark Zuckerberg wants banks to do?

What is the effect of social media on our kids?  Listen in as I discuss some of the latest research on this subject.

Are your suppliers serious about their security? Today, I will tell you about what can and did happen to a company and what it could mean to you.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/011/2018

Lava Lamp Security. Fitness Trackers. Social Media and Mentality. Two Factor Authentication.

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. Everyone is listening around the world its really kind of cool to see some of these stats. We've got people in Ireland, of course, the U.K., in France, and Belgium, and Canada. Just really all over the world, Australia and Russia, it's very cool. So, welcome, of course. this is Craig Peterson. We've got a lot of stuff to talk about today. One of the things I think is so cool we're going to talk about is lava lamps, and you might be asking yourself what does that have to do with technology? Isn't that from like the 60s or 70s? This is very, very, cool what's happening with lava lamps. One of the world's top security companies says social media is giving children the mentality of 3-year-olds, and it isn't just kids that are having these problems. Facebook is trying to expand, and part of that expansion is trying to find out what your bank balance is. The Pentagon. This is so long overdue, they are finally restricting the use of fitness trackers and we'll tell you why these two-step or two-factor authentication schemes have some major major holes. If they're using your cell phone, we'll tell you why, and how you can get around that, and keep your bank and other information secure from places, not just Facebook. Computer viruses, yes they do cause major problems and they've just hit one of the big companies when it comes to tech. And that is Apple. We'll tell you how Apple is affected by this massive virus, and how to make sure no one is spying on your computer.

[00:01:40] If that's of interest to you, or if any of these articles are, you can text me right now I'll send you a link to them. My Number 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5. Fifty-five fifty-three. Let me know what articles are of interest to you. We will send you a link to that. And this one, making sure people aren't spying on your computer actually has links directly to some of the software. So, here we go stick around. We're going to spend a little time on this lava lamp thing because I think this is absolutely phenomenal. There are a number of companies out there, of course, and their only purpose in life is to help you in business and government with security. And that's something I've been doing for almost 20 years. Of course, for my business clients is really making sure their networks and computers are safe secure and working, Right. You don't want to put in some massive security system and not be able to get your work done, Right. Putting everything in a vault - is that really going to fix your problem and turn off the power. No, no, it's not. So, we have to walk this line between security that is functional and useful and security that is just going to get in your way so much that people are going to resent it and not use it. Just like last week I was on the radio, and with Matt Gagnon and Ken Altshuler.

[00:03:12] But, anyways with Matt and I explained some of the major problems that are happening right now with smart TVs. These smart TVs are using Android and I explained why it's a problem, what they're doing, how they're watching us, monitoring us how bad guys are using the information. And he shrugged his shoulders well whatever I don't care. I'm still going to use my android stuff. And, I just had to shake my head. Now I understand that some are, just so useful. And, in fact, for the first time ever I have an Amazon Echo in my house and I've never had one before. There have been major security problems but this tech has been out there now for a couple of years. They've gotten rid of some of the problems. Locally the machines figure out when you're calling their name their wakeup word that I am not going to use right now. But for Amazon or Apple et cetera. So, it isn't streaming up to the cloud like they did when they first came out. Now Apple didn't do that. But we're not going to get into any of those details right now. So, that's been a major security problem for me. And now that problem solved I have it in the house and I am finding it just to be amazing, really useful, really fun. And bottom line, I'm so glad I did it. You know I got this little Amazon Echo and it's unfortunate, that Apple's fallen behind Amazon is beating them like crazy, like a rented mule, right. 

[00:04:41] Amazon's beating Apple because the Apple stuff is more expensive, it's harder to tie in. Amazon, now from your Echo you can control basically anything in your home. There's devices that attach into it. It's just phenomenal what they've been able to do. They've made it extremely useful and the price point is fantastic. In fact a bit of a side note. A study came out that said basically Amazon can give these Amazon Echo devices out for free, and still make money, because the average person that has these things is spending over 400 dollars a year with them on Amazon. And you can use them also to order things, it just makes life so much simpler for you. So, you know problems, problems, problems, but it's all security related. We have to watch what's going out from our homes, from our offices, what's coming in, and how do you do that. Well, this one particular company called CloudFlare does it with lava lamps. Now you remember these things. There is a guy from Britain who came up with them and what was his name. Edward Walker, I think Edward Craven Walker that is it. So his lava lamp made it into the late nineties cultural comeback but he didn't see what happens now because inside the San Francisco offices of Cloudflare they have 100 lava lamps on shelves. So, there the right on top of each other shelves. It's really kind of cool. And of course the lava lamp. Think about what's in it there you've got I think it's oil and water and wax and it heats up and it swirls randomly and it's really kind of peaceful to look at. 

[00:06:24] I've always enjoyed lava lamps. Make a nice little present. I had one or two more recently that ended up breaking and I didn't have. Remember they used to have a light bulb underneath them and that's what was used to heat it up. Nowadays, they're not used in the light bulbs but if you think about the patterns in the lava lamps, they are continually changing they're continually morphing. And when the light comes in from the outside window and heats up or the temperature in the room rises or drops these are all factors that influence what that lava lamp is going to do. What the wax inside and that's what you're typically looking at is going to do. So, they figured at CloudFlare. How about we just put hundred of these things up and get them running. We'll put them in the lobby and then we will put cameras, shoot video of these lava lamps and use that as kind of a random number generator because random numbers are pretty darn hard to generate just in general. So, you can use things you can use background radiation and that's been used for a long time it is really, rather random. We can't predict any of that type of radiation, the background radiation. But they figured this is probably just as good maybe even better. So, they are watching these things. 

[00:07:48] Any change in the video, causes a change in the random number generation, and what used to maneuver or manipulate, it is called a salt and it uses all of that. So, if you're walking in their lobby you're part of that randomization if the sun's coming in as part of the randomization. 

[00:08:10] Now, they've taken a couple more things that aren't there in that lobby so, it can't really be hacked and can't be predicted. But it is really, really, cool because there's never twice the same scene. It's virtually impossible, statistically impossible with 100 of these things running so, really kind of cool and it's super-powered way to generate these cryptographic keys. I'm just, I'm tickled pink because it's just such a real cool way of doing it. OK. Next, here we're going to talk about kids and social media. Now, what we know about kids, right. We've we've been kids, were around kids some of us have kids, grandkids and kids like to play with things. When I was young we used to go outside, and we'd get kicked out of the house if we were in the house. We'd have to go outside and we'd play and we'd have just a gas. And in the summer living up in Canada up north up, in Canada, it would barely get dark at night. And so we'd be out playing. I remember kicking the can, I've shared this story before at about 10 o'clock at night 10:00 11:00 o'clock and we think it's just Twilight it's starting to get dark and probably should think about going home and my mom coming out and finding us and getting upset because we were out so late. 

[00:09:34] Well, I didn't have a watch. Did you expect for me, right? Well, kids love social media. They love playing video games and when we're talking about kids here we're not just talking about really young kids. I know a lot of 30-year-olds that play a lot of video games, and to me, that's such a waste of time. But anyways, that's me right. I'm a much older generation. Well, there's an interesting thing that came out this week in The Daily Telegraph over in the U.K. where Baroness Susan Greenfield. Now, she's the former director of the Royal Institute of Great Britain, said that social media and video games have left children unable to communicate with one another and unable to think for themselves. Children who have been raised around these devices, much worse than when we were raised, and we had some TV, right that we were plopped in front of. But, these kids are constantly looking for something to distract from and she's predicting that and "here's a quote "I predict that people are going to be like 3-year-olds, emotional risk-taking, poor social skills, weak self-identity, and short attention spans." Now, that's really something since.

[00:10:52] Look at her background here. She's a senior research fellow at the University of Oxford. She has supported her claims by looking at a study that was conducted by psychologists a few years ago at Virginia and Harvard Universities. She found that students are she didn't But, these studies found that students who would prefer to give themselves an electric shock, they'd prefer to give themselves an electric shock than to be left alone to think without distraction for 10 minutes. That's just crazy. She went on to say and this is an interesting article. Daily Telegraph they require a subscription. But, the study says. According to Her, people need a constant stimulation from their environment. Every single moment that implies they are no longer able to be left to contemplate their own thoughts. And that's something I've had to do many times, right. Think about your thoughts. There's a digital detox expert also out there she's the author of Stop staring at screens and her name is Tanya Goodin and she's claiming that reducing the use of digital devices can offer significant benefits to children. I could not agree more with Baroness Greenfield she tells the independent. A study from UCLA found that children who had all digital devices removed from them for a week were better able to read nonverbal communication and others than a group of children who carried on using screens.

[00:12:19] And so think about this when you thinking about your kids or grandkids or maybe even yourself. This is a real problem. What's the first thing you do in the morning, right? How many times have we heard this test? The first thing you do in the morning. The last thing you do at night if it has anything to do with touching your smart device there is a problem and we've got to deal with that problem.  As humans, we've got to deal with each other. Now many people are saying while over time we're just going to have our brains hardwired directly into some of these machines, we're not going to have to communicate with other people, we're not going to really have to think for ourselves. I don't buy any of that. People buy things from people, and you have to understand people, you have to have relationships with people, you have to have a relationship in order to build a family, have a family, right. We've got to watch this and we've got to watch it with our kids. All right let's talk about Mark Zuckerberg and what he's up to here? what does this all about? He wants to know our bank balances. Wow. 

[00:13:28] Well, we know Mark Zuckerberg has been out there trying to make money.

[00:13:31] You saw a couple of weeks ago a massive plunge in the market value of Facebook, their stock went down. What was it 20 percent or so? Really, really big. And Facebook has announced that they expect over the foreseeable future. Bottom line here that they are going to continue to lose eyeballs, so people are starting to leave Facebook. They're not paying as much attention to it. And I think that really when you get right down to it they've done it to themselves in so many ways and started complaining a couple of years ago when they made a massive change to their programs, where the programs were at that point, starting to not show you articles from people you follow even though you wanted to see what they had to say. And frankly, it's just gotten worse and worse. So, I would expect just like every other big company Facebook's finally going to fall out of favor here, at some point. So, they've also struggled with some concerns about data privacy. You certainly heard about that, and what happened when he had to testify in front of Congress. We also know what happened with the Obama campaign getting the information on pretty much every user in the world. But, certainly, the Obama campaign from Facebook got information on everyone in the United States that was likely voter. And, then how the Trump campaign got some information on tens of thousands. Nowhere, near what Obama's campaign had. But by that time people were sensitized to it, right. 

[00:15:06] Obama didn't get any criticism for it. But I think that even though he did a much much worse thing people just weren't paying attention, much worse than what Trump had done in the 2016 election campaign. So, now people are sensitized to it we don't want it to happen again. And, yet there are some other articles in the news this week, who won't be really touching on but they are talking about how Facebook is having major problems trying to identify, who it is that is putting out these fake news, and ads out on their Web site trying to influence campaigns. Now, used to be pretty easy you'd look at an ad and the wording would be bad, the grammar would be bad, There might even be spelling mistakes, and you say this is this is obviously fake. Now, they're going to regular U.S. based Web sites and just stealing the copy from those putting them into the ads. I don't think things are going to improve much in the 2018 or 2020 cycles, because the bad guys are just getting better at hiding, and you know where they are, and what they're doing. When we're looking at Facebook it has become entrenched. Many of us are paying a lot of attention to it. I am involved in a few different groups on Facebook and we're helping each other out with things and I help people with security problems and stuff. In fact, I had a closed group that really I know we had about almost 300 odd people in it.

[00:16:33] And I just plain didn't use it. So, I shut the group down and maybe we'll bring it back to life at some point. But what we're talking about right now is Facebook, and where they want to go, because Facebook has warned analysts that active users could decline, the number of active users could decline and the amount of time they're using it for the foreseeable future. And they also came out with another announcement which was Facebook is planning on tying into your bank accounts. And even though they lost 20 percent in one day from the first problem, the second announcement drove shares up about four and a half percent. So, they approached apparently some large banks, Bank of America said forget about it. We don't want it. We don't want to have anything to do with this. Other banks are taking a kind of a wait and see type of an attitude which I think is a really good way to do it. Facebook is saying we want to integrate your bank accounts into messenger so that you can check your bank account balances. You can send money to receive money. They really want to be in that financial business. Now we talked about that before and how Facebook has been experimenting with blockchain technology, in an attempt to do a few things, solve a few problems, one of which is they want to be involved in every transaction. And one of the things they're asking the banks for is what are you buying.

[00:18:06] So, if you have a credit card, a bank account, checking account whatever you're using to buy things they want to know everything you're buying so, that they can offer you ads for that category of stuff. Do you want Facebook to have that? We've already got privacy concerns with Facebook, right, Do you know about those. Those have been high in the news we know about hackers trying to get into all the systems out there. Do we really want another area of exposure? You know I I really don't know. OK, fitness trackers why you may not want to use one. And finally, why the Pentagon has finally come out and said, No. We talked about this a year maybe two years ago. You know we have people using the fitness trackers that they're really kind of cool. And they have GPS built into them. Some of them some of them use your cell phone to get the GPS so you can track your runs, right. That makes sense. Easy to do. It's kind of fun to do. You can compete with other people. So, hey I did that same run as you did. I did it faster. You can keep track of how much exercise that you've had how far you even walk to right there not necessarily only for running, but here's the problem. We have had cases, for instance, down in New York City down in Central Park where the bad guys, in this case, potential rapists and others, have been tracking the movement of cell phones and the movement of fitness trackers. 

[00:19:48] So, they know who was running by a tree, for instance, So, they'll have the little receiver up there listening for the Bluetooth signature or the Beacon or the Wi-Fi signature or the beacon. And, that's obviously a real problem. That's a problem I think everyone should be concerned about if you're using the fitness trackers. Well, there's another one the military has, that we talked about well over a year ago, and that is some of these fitness trackers are uploading all of your data all of your runs to a Web site up on the cloud. Now, that's kind of interesting, right. So, you can see a global heat map I pulled it up I shared it with you guys a year or more ago. It's published by the GPS tracking company called Strava. S T R A V A and they use the satellite information that they're getting from these fitness tracker companies, in order to track where you. So, heavily populated areas are going to be well lit. But, when we're talking about the war zones like Iraq or Syria they're showing scattered pockets of activity, which could denote military bases or government personnel using fitness trackers, as they're moving around because the locals there are not using them. So, it's a reasonable assumption. And, so I use that data you can go into the heat map yourself and have a look at it and I was able to see circles right on Oval's really running along airstrips at air bases, running around the perimeter of bases, on the inside walls or even outside the walls. 

[00:21:29] So, you could see where the military personnel were. Now, we have some secret bases and those secret bases were outlined, as well by this GPS information from these heat maps. So, the Pentagon has come out now with a policy, finally, that was obtained by The Associated Press and it stopped short of banning fitness trackers or these other electronic devices that can be linked to cell phone apps that can do the exact same thing. But, it didn't ban them but it did say these devices presented a significant risk to military personnel. So, those capabilities must be turned off in certain operational areas. So, under this new order, the military leaders in different areas have the ability to use their discretion to figure out whether or not troops under their command can and should to use GPS function on their devices. And, that's obviously going to be based on the security threat in those areas are on that base. Good. Good article. Interesting article a lot of different opinions out there. Well, we're not going to be able to get to the two-factor authentication stuff and how texting you a login code, just isn't enough. We're not going to be able to cover this computer virus that's crippled iPhone chip maker out there. The big guy the number, one contract manufacturer of chips in the world. 

[00:22:51] Yeah, they got a virus right. What would happen to you? I betcha this has hurt the Apple stock, right there. But, you know they got back online because they had the right stuff in place, even though they got infected in the first place. And, then I think maybe the most important article is something you're going to have to read. And this is how to make sure no one is spying on your computer. Great article. You'll find it on my Web site. Craig Peterson dot com or as I mentioned the very beginning if you have any questions at all. Go ahead and text me. You can call, as well, but texting will get through. Phone calls are going to probably end up in voicemail 8 5 5 3 8 5 55 53 I answer all of the questions. We go directly. This is my number 8 5 5 3 8 5 55 53. More than glad to help you out, but this article goes through some of the software that you probably should be using for yourself to protect yourself. And if you'd like me to put together a special little master class on that I'd be glad to do that. We've done them before free webinars. Let me know more than glad to do one for you guys who are listening, right now. But you have to let me know you'd like to see it and then I'm more than glad to spend a few hours in putting it together and online with you.

[00:24:15] I think actually the last webinar, took me out a week to put together. But let me know 8 5 5 3 8 5 55 53. Have a great week and we will be back with you again next week. And, usually Monday Tuesdays and Wednesdays I release a podcast as well so keep an eye out for that. Craig Peterson dot com slash iTunes or just search for me in iTunes or SoundCloud or wherever you get your podcast. Take care. Bye-bye. 

 ---

Related articles:

Is anyone spying on your computer? How do you know?

Fitness trackers are dangerous. You know that, right? Finally, the Pentagon woke to the dangers and restricts the use of fitness trackers, other devices

Do websites send you a text message to verify it’s you logging in? Well text authentication isn’t enough to keep your accounts secure

Facebook wants to know your bank balance and track your accounts

Social media is giving children mentality of three-year-olds, warns researcher

Lava lamps as a cryptographically secure source? How a bunch of lava lamps protect sites from hackers

Could your business’ suppliers lack of security cripple your business? Apple just found out…

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 8, 2018

 

The whole world can be watching you while you watch on your Smart TV or while you are on your way home on an Uber ride. Are they allowed to do this, and how do we know if we are being recorded?

Find out more on CraigPeterson.com

---

Related Articles:

How to Stop Your Smart TV From Tracking What You Watch

Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)

Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/08/2018

Uber Privacy - Smart TV Surprises - Russian Grid Hacking

 

Craig Peterson: [00:00:00] Hi guys. Craig Peterson here I was talking with some Maine as this morning up in Maine. Actually the stations cover mostly southern Maine but I guess are some repeaters that go up to the center of the state. So if you're listening from Maine here to my podcast send me a shout on shambled. I'd love to know how far north it ends up going. So this morning I spoke with Ken and Matt we talked about Uber and the problem with drivers videotaping you while you are in your uber smart TVs some of the problems behind those and a couple of things more included something I think they found very surprised. I think you will too and it will change the way you look at some of the technology out there. So here we go.

 

Matt Gagnon: [00:00:46] We're back again and this time on a Wednesday 738 means it's time to talk to Craig Peterson our tech guru joins us now. Craig are you okay. Good morning. Doing good. How are you guys.

 

Ken Altschuler: [00:00:57] No complaints at all you know every day we talk about the Russians the Russians turn off our electricity now.

 

Craig Peterson: [00:01:05] Oh man maybe that's what happened last year. My father went out of my house and storms. Did you guys have that boy crazy last night. Yeah. All of this is from a story from the Wall Street Journal here last week. And what they're saying is that yes indeed apparently hundreds of rhetoric's station. You know these guys that control the grids the various grid points have been hacked by the Russians and it's kind of interesting when you look at it and look at what's happening right now with Iran and the potential of them trying to hack cash and what are they trying to do. What's the ultimate goal and obviously the goal is kind of similar to what they were doing during the election that is just really kind of confuse everybody and everything that's going on. But they could shut down our power grid and we've seen problems with that before. But I've got some good news here gentlemen that is you first of all you know I work with the FBI the infrared guard program I run their webinars. And the good news is that our power grid nationally is improving their security quite substantially. There's been a big effort in trying to get the Russians out of the grid out of our water supply because we remember those are all computer controlled as well. They're called it controls but really tighten it all up. So hopefully knock on wood we're not going to know that the Russians are coming for us because all of a sudden we all lose power. But I have my strong suspicions that last night it was probably more due to some sort of a storm that might have come by than the Russians.

 

Matt Gagnon: [00:02:53] We're talking to Craig Peterson our tech guru who joins us at this time every Wednesday to talk about the world of technology and Craig I've got a smart TV, am I smart though I don't know how smart it is it might be a little too smart if you know what I'm saying. So is it tracking what I watch and is it telling anybody what it is that I watch?

 

Craig Peterson: [00:03:10] Yeah it's interesting because it's not that it's not just smart in that way a lot of these smart TVs are crazy smart. And when I say crazy smart I think you're about to be very surprised because first of all these smart TV's most of them are running a version of the Android operating system and Matt. You know what I think about Android. I do. OK. They're running a version of Android and they have built into them things like they might have Netflix Hulu etc. and I assume your TV has something like that as well?

 

Matt Gagnon: [00:03:46] He does. Yeah.

 

Craig Peterson: [00:03:48] And the idea is pretty obvious I think to everybody that if you're using your smart TV you've connected to the Internet so that you can stream the programming and the TV monitors that you're on Netflix for instance. And that's kind of a given. Obviously you can know you're on Netflix because it's running Netflix for you right? But these smart TVs are using some specialized software that goes further than that and it can monitor what you're watching on TV. Now it's interesting how it does because these smart TVs can be hooked up to gaming systems and Matt you're of the age. You probably got some sort of an x box or something right?

 

Matt Gagnon: [00:04:30] I do. Mostly for my son. Oh yeah I got time to play video games good.

 

Craig Peterson: [00:04:36] Come on. What was interesting about it is that it monitors not just what channel you're on or what inputs like that but it actually watches what you're watching. So some of these TVs can tell that you're playing as certain video game how long you're playing it for. We talked before about some of this Martini's having cameras built two of them and they have facial recognition software so they can see who's watching the TV. They know what games you're playing up there on the TV and it's used for marketing and you know that it's probably OK. Right. If I'm going to buy a car I don't mind seeing car commercials because I like to figure out what's going on. It's annoying when i get car commercials when I'm not going to buy a car for another ten years. So from that standpoint it's all pretty reasonable from a marketing standpoint. But where it gets really really concerned is you know a week doesn't go by we're not talking about some hack or another. Right. So what happens when our TVs are hacked and they have been hacked and they're hacks going on right now and the TVs have all this information about us and let's say those hackers might want to know when you're on vacation when you're not home when the kids are home alone so that they can come in and burgle your home or even worse we're putting these smart TVs into our businesses into the lobbies into the cafeteria areas and they are being hacked.

 

Craig Peterson: [00:06:11] So the bad guys can watch to see when there's someone there in that building and businesses have been broken into and have things stolen because the hackers knew what was there because of these cameras in them so you might want to opt out of this viewing information service that's on your TVs. They're in. It's in their Samsung. That's in your Sony is algae's videos all of these TVs many others. You can turn them off and even if you have a Roku and external Roku there can be problems. My general advice and what I do is I use Guess what an Apple TV but I also have a Roku on one of my TVs but I use an Apple TV it's the safest. Apple is not selling any of this information. I make sure it's all turned off on my smart TV. And in fact I do not connect the TV to the Internet. So there is no way for it to get hacked and there's no way for that information to get out of it. So if you're if you're really concerned you might want to do what I do and I don't know maybe I'm a little paranoid but I've just seen these hacks happen just too frequently.

 

Matt Gagnon: [00:07:22] You're never going to get me to care about that. I'm going to do it anyway. I'm going to go home today. I'm going to put Netflix on the wall streaming from my phone.

 

Craig Peterson: [00:07:30] Yeah. It's a matter of days it's just so easy to do. Right? But I got to tell you I picked up another client last week a small business. They had two hundred thousand dollars stolen from them and it had to do with this type of stuff where the information is just too easily available and the bad guys found it and used it again. And it's a small business. They don't have a whole lot of money I think they have 10 employees. And the business is probably going to go under. Now this is a guy that 10 in my age and he's been building this business his whole life his businesses his retirement. That's what he's counting on. And now it looks like they're going completely out of business. So you know there are concerns about it but you're right man. You know who's going to make a change. It's just it's so darn convenient.

 

Ken Altschuler: [00:08:23] We're talking to Craig Peterson our tech guru by the way you can go to Craig Peterson dot com. You want to get all his vital information on a newsletter and e-mails and all that kind of stuff. So before we let you go right cheers I'm still a fan of Uber but I don't really have any. I mean people live streaming me when I'm riding in the back of the Uber?

 

Craig Peterson: [00:08:44] Well it's mainly two party consent state. When it comes to recording No I don't I don't remember. OK.

 

Ken Altschuler: [00:08:50] It's just one party. It's one party.

 

Craig Peterson: [00:08:53] So here's the trick. Here's what's been happening Uber drivers many of them have been live streaming because they've they've got their phone up on the dashboard. They're using it in order to get the directions to pick up rides et cetera et cetera. Right. Well some of these guys and gals are also live streaming now. They're saying that it's for their safety. And I can see that right. You're picking up who knows. This is true for taxi drivers as well. Who knows who's getting into the back of your taxi or your Uber. So they're live streaming streaming and then some of these people are using the service called twitch which is designed exactly for that for live streaming and they are going one step further than just having their wife husband significant other whoever it may be wanting for safety purposes. Right. I can kind of understand that. So it's on in the background on some TV in the House and we're making sure everything's OK. Or maybe it's being recorded for playback in case something nasty happens later on. But apparently some of these Uber drivers according to the St. Louis Post Dispatch have been broadcasting hundreds of trips on Twitter Twitter I should say they have now been explicitly obtaining consent from the passengers and they are charging for the Twitter feed. One of these guys is reportedly making 500 bucks a month extra by people paying him to watch the live streams. So this this is a little weird that this is a problem with single party state where only one person has to give consent in order to have a recording occur. I personally think that any public servant in the line of their duty should be recordable even in a two party state. But this is a matter of concern that some of these guys are putting stickers on their window like in Missouri. They are. Most of them have a little sticker saying that this may be monitored for safety for passenger and driver safety but it's announced just a little creepy to me. And you should be aware of it. So don't do anything in the back of the Uber seat. You see that too. Maybe wouldn't want broadcast.

 

Matt Gagnon: [00:11:18] Good advice for all. Thanks. Craig Peterson our tech guru joins us at this time every Wednesday to give us an eye on technology. Craig appreciated again we'll talk to next week.

 

Craig Peterson: [00:11:27] Hey, gentlemen. Take care. Bye bye.

 

Matt Gagnon: [00:11:30] All right. Break time.

 

Craig Peterson: [00:11:31] Hey thanks again to everybody that listens to this podcast. I've got finally everything in place. Almost four for the security packages we've been talking about for the last year. We've been working with some of our vendors with the client to get the business class the authority of business class security together and make it affordable for the small medium business marketplace and we're getting close on that. So make sure you are on my mailing list or you find out about it. We're going to have some free classes on security associated with this and this offer I think is going to be fantastic. Everybody that we've offered it to so far has gone for Solloway it's going to be good. It's going to be great. Well let me tell you it's going to be huge. So make sure you're my mailing list you can find that. Craig Peterson dot com. Have a great day. We will be back on Saturday as we have my weekly radio show when we post on that as well usually goes up Saturday about the same time that the radio show airs. So you can listen to it in the same place listening here which is of course iTunes or SoundCloud or Tune In or almost anywhere except I heart. I don't get that. I Heart Radio stations and they still don't have me on their streams. Anyhow, have a great day. Talk to you later. Bye bye.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 7, 2018

Do you know your SmartTV is tracking what you're watching and the video games that you play as well?

Learn more about how to stop this from happening from Craig as he speaks with Jim Polito about SmartTVs, the Russians hacking our power grid, and how he is finally able to sit on his back patio and enjoy it.

Find out more on CraigPeterson.com

---

Related Articles:

How to Stop Your Smart TV From Tracking What You Watch

Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/07/2018

How To Keep Mosquitoes At Bay - Russian Hackers In Our Power Grid - Stop SmartTV Tracking

 

Craig Peterson: [00:00:00] Hey good morning everybody. Getting ready to do my rest of my day today. It's been a real fun time lately. You know shutting down some of the bad guys I guess. I guess I shouldn't be happy about that but I am. I love it because all of these poor people write these business people who've been building their businesses their life savings tied up in it and they get stole and being able to help them out in fact we've got a new client that's an attorney who's hired us for an insurance company because a company did fall prey to one of these hacks while in this case it was a business email compromise and about hundred thousand dollars in cash was stolen. It's absolutely incredible and so now you've got all the insurance guys fighting with each other as to who's going to pay what for what. But being able to stop the bad guys before it even happened that makes my day. And even if I have to come in afterwards and clean up and make sure it doesn't happen again. Wow. In fact I found out this week because we were of course we're working with some of the top people in the industry when it comes to security. But I found out this week that we are the only company that they are aware of who has not had any of their clients hit by ransomware. Isn't that amazing. So that made me feel really good. None of my clients. Wow. How long has it been now. Twenty five years. I think that I've been very focused on security. We haven't been hit by anything at all or our clients and none of them hit by ransomware.

[00:01:37] So I guess that's really good I should feel good about myself. That's kind of my goal in life right now is to stop it right here I am staring down retirement trying to figure out what should I be doing here when I retire and came to realize that in fact I can help other people who are just like me who have their businesses who have been building their businesses who really want their businesses to survive and do well and be a retirement for them and maybe even pass it on to the family because my business is basically a family business as well. So that doesn't make me feel really good. And we've picked up from 1 to 3 or 4 6 6 new clients in the last month. So it's been a very busy time anyhow. Today this morning I got to speak with Jim Polito one of my favorite appearances on radio and this morning with Jim we talked about how I am now able to go sit on my back patio and enjoy it. How's that for a change. We talked a little bit about the Russians and what's happening in the power industry with them and kind of you know what we're doing to defend ourselves. I think that's a really important thing frankly for everyone to understand because these Russian hackers you know could be devastating. And then how to stop your smart TV from tracking what you're watching and the video games you're playing. So all of that and more with Jim and here we go.

[00:03:05] Here is our good friend and his weekly segment that is very very popular. He is our tech talker to tell you about my friend Craig Peterson. Good morning sir.

[00:03:21] Good morning. Do you like this weather.

[00:03:24] Well I know it's basically killing you. You may have to be hospitalized if it gets above 60 degrees. Craig Peterson goes in the shower.

[00:03:35] I've been inside for the most part. But you know what I did this year Jim I did something I've never done before and I've been talking about it forever and ever never ever. And that is we we have a patio out back here. The house it's really nice it's all nice.

[00:03:50] Brick patio and we've had it now for probably 15 maybe 20 years and I never go outside because I get eaten alive. Yeah.

[00:04:01] And I I've been debating back and forth. You know I've the technology out there and I've tried a few things like those little things that make sound just keep mosquitoes away and they didn't seem to do much good. But this year for the first time ever we bought mosquito magnet. Now I didn't want to buy one because the mosquito magnets to read about them online and they fail. You know actually yeah it's somewhere item right. So it is good for three out of maybe five years and it's not cheap it's a few hundred bucks. But I put one out at the beginning of June I think it was and I followed all of the directions right as to be downwind and everything. And I did all of that. And I this year for the first time ever have sat outside on a patio in the evening even when the mosquitoes are usually out and I haven't had any problems.

[00:04:58] It is called Hundert if not thousands of flies will the beginning yeah and hundreds and hundreds of mosquitoes. This is the first ever cell technology that's been around for a while but I've been reluctant to use. I got to say wow I am impressed. I know there is no light. It's not like Jim. I don't get paid for mentioning things on the air. No I know that. Yeah but I was just really impressed or a little word of advice if you've got the same problem as me and you maybe you want to sit outside in this weather I don't get it.

[00:05:35] But it may be one side. This thing has been amazing.

[00:05:40] What's the name of it again.

[00:05:43] It's called a mosquito magnet magnet. And they were bought by another company a few years ago and so I wasn't sure you know what to call it going to be like. And you put an LP tank on it. But you know have your barbecue. Right. And a little 20 pounder and that lasts about three weeks and it goes through. I wanted to doing this and basically burning the gas to make carbon dioxide which is what makes you scratch them.

[00:06:12] Yeah exactly. And then there's a little you and you've got to do this. I try it without. But there's a little scent packet that you put inside of it and it's bait and it really drives him right to it. So the carbon dioxide brings him in from a distance. They get close they smell the bait. They go in for the bait. And then there's a slight vacuum that's running all of the time and they get sucked into it and into the trap.

[00:06:40] And you have to keep it running at all times. Just keep it. You do. OK. So that will clear your area because what you're getting around do is you know that you know you want to clear your area. Mosquitoes aren't going to travel very very far. Their life cycle is not long may need standing water to breathe right and like. So you basically set that up and you cleared out the Peterson backyard.

[00:07:08] It takes two or three weeks and it Yeah it's pretty much cleared out and you're right. Mosquitoes who knew this right are territorial and so they don't go very far. As you said and they don't has been it has been a life changer Jim and it's ending with a blackflies.

[00:07:26] Early on in the season you know and I get these welts from back blackflies to yeah almost like a bees thing.

[00:07:35] So it was wonderful wonderful wonderful. So next year I think the Peterson family may get one for the front yard as well walk out the door and you get eaten alive. The front door right now I can sit on the patio.

[00:07:50] I like that. Craig some see look at that and doing an endorsement even though he's not being paid for it and giving you advice so always giving us advice. I want to ask you about something important here. Russian hackers may have penetrated the U.S. electricity network and could turn off power. I read a little something about this but I want to get it from you which basically means talk about war you don't need a missile you won't need a tank you will need a gun. All you'd have to do is come into the United States and shut off all of our power.

[00:08:27] And believe me that would be a lot worse than dropping an atomic bomb on a major city and harder to trace right away with this. This is a report that came out of the Wall Street Journal last week. And there have been debates you remember of course the 1984 blackout. I mean had 2004 back to back in the 80s up in Quebec.

[00:08:51] But there were questions whether or not that was a hacker and most of the security community we seem to think that in fact it probably was a hacker and they didn't mean to bring down the electric grid but that's what happened. But right now the Wall Street Journal is reporting that a group who is known as dragonfire energetic bear now interject has been doing all kinds of nasties lately but they've gained access to many of our power grid centers. Now they're talking about hundreds of them that they have gained access to and they're using the standard tools that you know were constantly seeing in businesses these spear phishing e-mails business e-mail compromise right watering hole attacks and they're tricking victims into it. But it is absolutely crazy what they're able to do out there and what could happen that they really could turn off the power. I got a grandkid here.

[00:09:48] Hi Susan.

[00:09:52] I like that shirt and R2 D2 shirt on here. CATHERINE Not me. That's pretty cool.

[00:09:59] So so yes think about all of the people who are who are dependent on electricity of days like today. And you know with the heat we really have death.

[00:10:09] If we don't have air conditioning we get the heat waves all the time.

[00:10:14] So look you know you use. You can make a living out of going to companies and saying here here's what you need to do to protect yourselves. Please give me some hope and I know in other industries you haven't been able to do that. Give me some help that they're really working on this to try to reach.

[00:10:34] Yeah they really are from this particular problem. They really are working on it. There are all kinds of controls that electrics that are electronic that are all over the place. These are called skater's systems and they are upgrading them. They are adding security to them. The plants themselves are upgrading the systems now. You know I work with the FBI and the unforgotten program right which is an infrastructure program they have and I I know myself because I've run webinars for the FBI on this topic. So all of these guys are very engaged in this and I think this problem is going to be pretty much fixed within the next year or two. But you know opening salvos of war could well use this type of stuff with a hack and they shut down power grids they shut down power acts. I mean that water facilities and stuff but you know they could do an incredible amount of damage to us. We have to use these types of techniques against other countries before we certainly use them with Iran in their centrifuge programs. This is the future. However this problem is being actively worked on.

[00:11:46] So that is good news which I agree with Craig Peterson. Craig I just want to get something very quickly from you before we have to wrap up. How do I stop my Smart TV from tracking what I watch. And why do I want to do that.

[00:12:02] Yeah most aren't aware of that but if you have a TV that has built into things like maybe Netflix Hulu or whatever yeah you and I have most of those TVs including Sony for instance. They're running Google's Android operating system in the TV. OK. And that's a problem to begin with because we know about Android vulnerabilities but in most of them I've got it up on my Web site. You can go there all of the major brands are covered by the TVs smart TVs don't just know that you're on Netflix. They don't just know that you are playing a video game on an external box right so you've got your x box or whatever it is they actually watch the content they can figure out what game you're playing and are streaming to the TV. So they've got all of this information but you can go in on all of these TVs and turn it off. You have to go to your setting and use the user agreements and other things all the details are up on my Web site. But you should opt out of it. Now in some cases you're going to have to turn off the smart TV function which I think is a great idea.

[00:13:13] Anyways I use always an external box like a little rogue who use my Roku you don't use the stuff that's already embedded in the TV.

[00:13:24] Exactly because when was the last time that this software update on that. Did you ever apply a patch to your TV.

[00:13:31] No. No. Actually now that I think of it. No I have not.

[00:13:36] Who does is right. And most of these TVs people don't even hook up to the Internet or they may so the quick and easy workaround.

[00:13:44] Pull the plug on the TV spots on the Internet side.

[00:13:48] Ok but then all of your special smart TV functions are going to go away if you do turn off the internet on it by using the external box that gets updates that you know is safe and the safest by far of course is the Apple TV although it's the most expensive as well.

[00:14:05] You said that. See this is all great stuff. We have from mosquitoes all the way up to your smart TV and you can get more of it. Well right. Because next Tuesday our friend Craig Peterson will be back.

[00:14:19] But if you text my name to this number 855-385-5553. That's 855-385-5553.

[00:14:33] Craig Peterson will send you a weekly update after his segment with all the information we discussed. Plus a whole bunch of other stuff. And then when there's some type of hack some type of a big problem guess what your friends list and he will send you that information yes and sell your name. He doesn't pester you. It doesn't do anything like that. Standard data and tax rates apply. This is a great thing to get on board with Craig as usual a great segment and I look forward to talking with you next week.

[00:15:03] Hey thank you. Take care camera.

[00:15:05] All right. Mosquito Magnet mosquito magnet.

[00:15:09] No money has exchanged stands but Craig Peterson brought to you by the mosquito man. Thanks Craig. We'll see you next week. All right. Don't go anywhere. Final word when.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 6, 2018

 

Have you ever taken an Uber?  Listen in as I talk with Jack about what some Uber drivers are doing, and why it can land them in some legal trouble.

What do you think about drones flying overhead? Today Jack and I discuss the reason that airspace is tightly controlled over certain political events and other venues.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)

A Day of Violence and Confusion

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/06/2018

Uber drivers live streaming rides. Drone Assassination Attempt in Venuezula.

Craig Peterson[00:00:00] For those who are listening, and who wonder how I normally get my radio interviews out here. The simple way is I just take the live stream, of course, Craig Peterson, here, and iHeart Radio has terrestrial, as well as, of course, now apps and streaming audio that you can listen to. So, I'm on the terrestrial radio stations, well the station I was on this morning took a lightning strike over the weekend, a direct strike. So, a lot of their systems were down. So, today we were talking and I was recording my side of the conversation, today, so, you'll get to hear Jack Heath, in this case, being the caller, as it were, and me in the studio. So, it's kind of fun to listen to. This morning we talked about a couple of different things. We talked about what happened with that drone attack, that attempted assassination, which is a really big deal. Of course, as drones are in the news and it gets pretty dangerous, and you know when you think about sporting events and what could happen there. And, we also took a few minutes and talked about Uber. Uber drivers are making a few extra bucks, and it turns out maybe at your expense. So, here we go with Jack. Oh, one more thing. As you listen to me talking, and to Jack responding to Jack at the very, very, beginning, and then you'll hear this. Yes, That's what the stations send to me, or I need to let them know that their audio is on and you're on the air. So, listen for that. OK, here we go with Jack. 

[00:01:38] Well, joining us for some tech talk perspective our regular contributor Craig Peterson on the Autofair listener lines on this Monday morning and he joins us. 

[00:01:45] Craig, Good Morning, sir. Hey, Good Morning. Have we got audio? There we go. Good morning, Jack. 

[00:01:51] Were kicking up, high tech. 

[00:01:53] Mother Nature always is the boss, as you know, we had a lot of strong systems, Friday, Friday night. 

[00:01:59] Back in our studios, in downtown Manchester, they took a direct hit as they say. 

[00:02:04] So, a lot of the electrical computer and digital stuff is being tested, but we're getting back to normal. In a lot of areas some interesting weather, but what's going on in the tech talk world. 

[00:02:12] Yeah, it's interesting too, when you're talking about getting struck by lightning because there is so much power in the lightning. It's been over 100 years since there has been serious work on lightning. But, did you realize Nikola Tesla was really big into trying to harness the power that came from lightning? Of course, that static electricity, it's a little more difficult to manage. But, while talking about a source of power we've got a few things people are worried about out there right now, Jack. For instance, we've got Uber and Lyft and I assume you've used those before, correct. 

[00:02:49] Uber, yes. 

[00:02:49] Yeah, well they're kind of the same. Uber tends to not treat their drivers quite as well as Lyft does, at least according to the drivers I've spoken to. Well, it turns out that there is something going on here. New Hampshire is a two-party consent state when it comes to recording. That means both parties have to agree, to being recorded. There are other states out there, however, that are not two party states and apparently what's been happening is that some Uber drivers have been live streaming. Now, when you get in the car you can see they've got their phone up on the dash. Typically, they're using it as a GPS or are using that to accept riders and to kind of meter everything, if you will, almost like a taxi. Well, some of these guys and gals, apparently, have been using live streaming software such as twitch, to now live stream the whole trip. Now, if you're a driver on Lyft or Uber and you're out there using your car, you don't really know who's getting in your car. So, some of these drivers are saying they're doing it for safety purposes, so their family, for instance, can be watching the live stream on Twitch while they're driving around and they know that the drivers are safe, right. Their family or their friend is safe. But, some of these guys, according to the St. Louis Post Dispatch, are being paid for the stream, in other words, twitch lets you charge people to watch, and they've had people like this one guy who was making five hundred dollars extra a month by live streaming. He was charging on twitch and your ride, whether you knew it or not, is now being sent and, paid for by these people that want to watch you in the back of the Uber car. I don't get it. There are legality issues with this, again depending on where you live, written all over it. 

[00:04:50] Yeah, yeah. Oh. Now, did you hear about Venezuela. In Caracas, Venezuela, President Nicolas Maduro I haven't gotten much verification, but I guess apparently, there was an assassination. 

[00:05:02] that he survived with drones, that were packed with explosives, during a live TV speech did you hear about this. 

[00:05:09] I did. I saw the video, in fact, of this whole thing going down. And, he was doing the speech, of course, Venezuela is a socialist country and is on the verge of complete collapse. 

[00:05:20] And, so right behind Venezuela. 

[00:05:23] Yeah, exactly. All of these guys out there, it has never worked and never will, but that's a different story. So, people are trying to kill, as has always been the case right. The President of a country whether they're left or right or center. It's always happening. And, in this case, you're absolutely right. The video shows him giving his speech, the military in front of him, I mean tons of military. This was an honor. In fact, of their military, he was giving this speech and in come, apparently two, and, this is just absolutely amazing, frankly, but, two drones, and they blow up you can see him look up, to the side, and then all of a sudden people start running the military parade that was in front of him completely disbanded, ran off apparently some of the military personnel were injured. I think it was nine or ten of them. He seems to be just fine. He is now very upset because it was, apparently, an assassination attempt that was, somehow didn't wasn't pulled off quite right. Why didn't they bring them closer, before they blew them up? But, it's a real problem and shows why the Secret Service is controlling all of the air now around the President. And, we have equipment that can be used to jam those drones as they're trying to come in, as well as, knock them out of the sky. There's some pretty cool guns, that are designed to do just that bring those drones down if they are threatening someone.

[00:06:55] Interesting, yeah. And I. Wasn't I wasn't stunned or shocked when I saw that, because I understand, you know technology's not going away, but you know you think of sporting events and all that, and these drones that are buzzing around and you know when you see and you're wondering you know who's flying them around. 

[00:07:13] It seems a little bit, a little bit odd, in how to regulate or keep an eye on them. Not, that I'm a regulation guy, but sometimes you need to know what's up there. 

[00:07:20] It's difficult. It's tough. Remember, it was a Black Sunday? You remember that movie from the 70's, a big football game and they were going to use a blimp. 

[00:07:30] Yep, Not a new idea. 

[00:07:32] Good memory. Well you know that's nothing. It all just comes around. It all just comes around. Craig, Thank you. You make it a good one and stay cool today on this Monday.

[00:07:41] Take care. Thanks, Jack.

[00:07:44] And in case you're wondering how it ends. That's how it ends. Right. They hang up on your but. It's radio. The listeners don't, the listeners don't get to hear that. Now you did, right. That might be the first time for many people who are listening to the podcast. That's how it works when I am calling into a radio show. Now, TV is a little bit different but, we're not covering that today. All right, well have a great day, and we'll probably be back tomorrow, hopefully. Jim Polito is going to be on, and I'll be on with him and we'll be talking about some of the latest in technology news. Have a great day, and enjoy the rest of the summer. It is going by quickly. Bye-bye. 

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 4, 2018

Have you seen the Samsung S9?  Listen in to hear what Craig thinks about it and if it is worth getting.

I don't know about everyone in this audience -- but many of you I am sure love to learn and so do I.  Today, I am going to tell you about a new Google learning venture.

Have you ever taken an UBER or a LYFT?  I am going to tell you about what some drivers are doing and why?

More news out of Google! I am going to tell you how Google has prevented phishing in its facilities.

There is so much to talk about that I ran out of time so be sure to check out the related articles below.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/04/2018

Samsung S9 Struggling. Free online business courses from Google. Ridesharing live stream dangers. Google Titan Security key.

Craig Peterson: [00:00:00] Hey, Good Morning everybody. Craig Peterson, here. We've got another show this next half-hour or actually 25 minutes. We'll see what we can squeeze in. But, we're going to talk about your smart TV how to stop it from tracking what you watch and what video games you're playing. Did you know they track that as well? Russian hackers, a little bit more about them and what they apparently have already done that most of us just plain aren't aware of. Google, Now, I've talked about this a little bit before but they've got their own security key. We've got an update on that, and why you should consider that, right. Ridesharing. Did you know you might be live streamed? It depends on the state that you're in 

[00:00:42] There are people that are paying to watch people taking rides in Uber and Lyft. These free online courses from Google may help you boost your career. And why is Samsung's Galaxy S9, their brand new flagship phone, struggling so badly? So, here we go 

[00:01:09] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:19] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of US First. Steve Forbes, I appreciate what you do with Forbes magazine for all these years. It's one of my first go to places. We're going talk right now with the guys and gals behind Siri and we're joined right now by the director of Digital technology. We're joined right now by the CEO of Ebates, Kevin Johnson, on air for more than 15 years.

[00:01:43] Over 20 million podcast downloads. This is Tech Talk with Craig Peterson. 

[00:01:53] Hey, everybody. By the way, if you get my e-mail I send out a weekly with hot items of the week. All of these articles are available to you. There is no chance of getting to them all today, right. But, all of these articles are available you can just click through it'll take you to my website at Craig Peterson dot com. You'll get a summary and then if you want to read more you can click on the read more link at the bottom and that will take you to the original article that I am quoting. Of course, many times these articles are written by me or a member of my team. In which case you, you're gonna see the whole thing right there, and you don't have to hit the read more button. Well, Samsung you know has been selling phones and smartphones for a while and their success came when they switched to the Android operating system. Android, the number one worldwide, as far as installed units go, for mobile device operating systems. Also, the number one world-wide worst operating system for a mobile device if you want security. So I know people who love Android, they've just become hooked on it. They know it well, they don't want a change, and they just kinda of sit there with their fingers in their ears and they say I can't hear you. Can't Hear you NAH NAH NAH NAH

[00:03:12] And they're still using Android, I just don't get it right. So, for my customers, I always advise them don't use Android. Use Apple use iOS, iOS two years ago was finally approved by the federal government for military use. You're not seeing that with your standard Android phone that you're buying at the local retailer. So, if you want security, stay away from Android. But, that doesn't answer the question here about Samsung. Samsung, of course, they are probably, if you're going to buy an Android phone, they're probably the best ones to buy them from. Huawei has out a new phone that's got some really great camera features on them. But, we also know that they're blocked from the U.S. market, at least a large part of it, because the government, now won't buy them, won't use them won't sell them in the NEX/PX on base. Because of potential spying problems that were revealed in Huawei designs and chipsets.

 

[00:04:16] You might also remember on the show we talked about how they had more than, I think, it was north of a billion dollars worth of fines, which is a pretty hefty fine if you ask me. So, Huawei's kind of out of the market, here. You've got some others, HTC, I'm trying to think of some of them over the years. A few of them are actually out of business, now. Samsung's it, right. They're the big guys, South Korean outfit. They make pretty decent hardware. So, what's happening now? Obviously, the sales are not what Samsung or its investors were hoping for. They added some cool little silly things if you ask me. Which Apple did too, right. You saw with the release of the iPhone 10 you know these emojis'. That will take on some of your facial expressions on iOS. Which is just stupid really. Really, that's going to sell more phones. Who buys a phone for that. Well, Samsung did much the same thing, and they were pretty jazzed about it, right. They have images that look like you, which I think is really kind of cool, but it's no reason to spend eight hundred bucks on a phone. If you asked me, or twelve hundred bucks if you get a fully loaded iPhone Ten. The electronics division over at Samsung just said, that they "had lower than expected sales of the flagship Galaxy S9" and that's the main reason because it wasn't just the nine but their overall profitability was hurt badly because people just aren't buying them 

[00:05:54] You know it gets to a point, where you're good enough, right. Do I really need to spend money on another device? And, the answer to that is, probably no. I usually wait for two major releases before I buy a new one. So, like right now, I have an iPhone 8. Before that, I had an iPhone 6, and the iPhone 6 I was using, my wife now uses because she's just plenty happy with it, doesn't need any of the newer features, or you know that new speed or memory stuff that I tend to use. You'd expect that right. Yeah, that's it. That's the reason that's why I got a table saw for Christmas last year. But, you know the newer phones are faster, I can run the newer apps on them so I can test them out. And I have more security stuff because I do use it with some of the clients that I have and there's some information I don't want to get out. So, this handset the S9 was launched in February, and some of the critics are praising these new camera tricks. You know really, really, really, super slow motion.

[00:06:59] What? What's that going to buy you? Are you going to buy a phone because it has super slow motion, really? I don't think I've ever used slow motion on my phone or any of my video cameras. Would you use that? I don't understand it. Here, but anyways despite the speculation in the S9 sales have been the weakest since the Samsung S3. Samsung still not disclosing any of the real numbers and they have a 20 percent revenue drop in the division. Why, are they struggling to stand out? Well, frankly the physical differences between the 8 and 9 are almost nonexistent. Which makes you wonder about Apple? So, many people complaining about that. You know the top center of the apple screen where they've got the camera. So there's this little divot, at the top and people make fun of it. In fact, Samsung came up with some ads making fun of that feature on the iPhone. But, it looks different, doesn't it? It makes it visibly different. Well, there's not much of a difference between the S8 and the S9 as far as looks. A little bit of a difference in the position of the fingerprint sensor. They have a dual aperture lens, which is you know kind of cool. But if you're not a photography geek. Why would you care?

[00:08:22] There just isn't the differentiation.

[00:08:25] We've got the Chinese rivals, also out there, and frankly I think one of Samsung's biggest problems is they're paying too much attention to Apple. All right there's a lot of innovation in the Android space, I'll give you that Samsung's always been able to outspend their competitors on marketing. But I think they're just focusing too hard in trying to, really overstep Apple. And what Apple's doing in the U.S. market. And even with some of the criticism, Apple's been having lately, it just doesn't make sense, it's not worth all of the effort all of the trouble. Samsung, just go ahead and make a difference come up with a really great device that everybody wants and Why don't you let Apple start chasing you for a change. So, on the S9 verdict isn't probably worth your time or your money.

[00:09:23] Hey, if you're looking to learn a little bit more, an uptick your job and your earning potential 

[00:09:30] It's always been around learning, hasn't it. I don't know that it's necessary to have a college degree. I certainly don't think it is in many, many, careers. I think most of the H.R. people are just taking an easy out, by looking for that checkboxes, says yeah you've got a master's or a bachelor's degree. I think they're taking the easy way out. It's you know I think it's kind of insane. What matters are the skills? What skills are you bringing? Oh, you've got five years experience fighting malware on large networks using great Cisco hardware and software and you've been providing tech support. And everybody says wonderful things about you. Well, that's worth way more than a bachelor's degree, that's worth way more than even a certification from one of these companies like you know the Cisco certifications. But you know what are you going to learn in them. This is a good opportunity for you, you'll find these links up on my Web site. Craig Peterson dot com.

[00:10:31] I've got a link to a great article from Inc. magazine. You'll find it online there, as well. But, they've got a class on getting your startup started. Now, all of these classes they're called Class central. They're all pretty darn basic. And, you know if you ask me, a lot of stuff so basic. So, I don't know maybe it's advanced to you, but it's really aimed more at startup people. People who are just learning. So, this particular course on getting your startup started is going to help you with your mission and vision statement. Find mentors team members. Find financing for your business. Pitch deck to try and get customers or VCs on board. By the way, I would advise getting customers. You need people paying you money, once you have people paying you money, then you can go and find your investors. Frankly, I think that's a way that should work in most cases. I never cheated and went to VC or angel route. But it's a self-paced course takes about three weeks. They've got another one, on App Marketing. If you've got the best idea for the app store or Google Play store. Wow, this is going to be great for you, right. Apps, I don't know there's not that much money in them anymore, unless you are making apps that are aimed at a particular company's internal customers.

[00:11:51] You know their supply chain, but an app marketing course, so you can learn about creating and launching an app. It sounds like can be pretty useful for anybody doing online marketing. So kind of any business owner might want to take this. It's about a two-week course, again from Google. App Monetization. This is a course is targeted at people who want to create apps or some free online content and have it generate income. But, depending on how much you know, it might not be very useful again. It's kind of a beginner thing if you're out of school and you're thinking about maybe making apps, it's a free thing, about a month is what it takes. Product Design. You've got a great idea for a product, that can help you with your idea, create a mock-up design, and quickly connect with potential customers. Check with them to see if your product can be viable. And, of course, the only real test, I go right back to this is, someone gives you money, because people will say they're going to buy it, but they don't, OK. So, it's a good thing to check out, to ask and get a little direction 

[00:13:01] But, if you can get people to pay you money, even before you develop your product, you'll be much better off. In fact, there's a company. What's it called G.T. Solar I think is the name in Merrimack. It was founded and he made he grew some chips for silicon wafers and things in order to make solar panels. And, he was able to fund his company, entirely, from his customers. So his customers were going ahead sending him a few bucks and that few bucks then went the extra mile, frankly because he had his customers fund him as he built all of his systems out. Product Design. Strengthening your LinkedIn network and brand. Again, this is part of the entry level grow with Google curriculum. So, if you're seasoned already as a networker or LinkedIn user it might not be great for you. But these courses and a lot more if you're thinking about doing a little entrepreneurial thing with the market doing so well. The economy doing, so well. Check it out you'll find links to this up on my Web site. Craig Peterson dot com. Look in today's email. It'll be right there for you. You can just click right through and find out anything that you might need, right there.

[00:14:22] Hey, did you hear the news out of New York City this week, if you are a cab driver or wannabe cab driver and you may be doing something for Uber Lyft. Make a few extra bucks with your car. It's really kind of a nice thing. There have been some instances where bad things have happened with Uber and Lyft but I've had bad things happen with regular cabs, as well. Well, in New York City, apparently they passed a new ordinance, that is basically going to ban Uber and Lyft from their streets. We're not going to go into that right now, that's not part of this show. But, you might have a hard time finding Uber and Lyft next time you're in New York City because of that. Well, what we're going to talk about are called live streams. Now, there are a few kinds of cool sites, out there, that you can use in order to live stream. Twitch is one of them T W I T C H and we use it with US Robotics. I don't know if you're familiar with that, great program, if you're not involved. Make sure you get involved and you'll find them online. I think it's us first dot Org. I know they changed its name but anyways I think you can still get their US first dot Org. They use twitch in order to broadcast these competitions that are held all over the world which is really, really, cool.

[00:15:47] I love that thing. Well, when you step into one of these ride-sharing cars, do you realize that you might be on video? Now up on the dashboard, there's usually the little smartphone right and might be Android it might be iOS. And on that, they're running the app from Uber or from Lyft, and that app is tracking where they're going that lets them say you'll pick up this rider and lets them score the rider after, the fact, right. It lets you do all of these things. So, you know there's one other thing that's been happening, you might not have expected. And that is that some of these guys, apparently, have been live streaming on Twitch. So, you get in the car and the whole ride is live-streamed. Now, I can see one side of this, which is it's a safety factor for the driver, because now it is out, in the ether, his wife or her husband or family, whoever can watch it at home make sure everything looks safe everything's good. And, from that standpoint, I think that's really kind of a neat safety feature. Depending on which state you're in, that may or may not be legal. There is something called two-party consent, and that means that both people who are being recorded need to give permission. And, it needs to be explicit permission. Now, I record people all the time from my radio show from my webinars.

[00:17:20] You know, the FBI webinars I do, all of these things. So, all of that is legit because they know they're being recorded, right.I even will say, OK we're going to start recording now, just so I have that. Well, in this case, this particular guy Jason Gargack, I guess it is. He's an uber and Lyft driver and he's been broadcasting apparently hundreds of trips on twitch without explicitly obtaining consent. Now, he's taken steps to protect passengers, so he mutes addresses moderating lewd chat comments, at least some of the customers said they wouldn't have entered the car or if they knew they were being live streamed. And it's certainly possible to identify some of the passengers based on the details that are there in the archived videos. But, he's asserting that the streams are legal. He's in Missouri. Missouri has a one-party recording consent law which means you only have to have one person who consents to the recording. Now, I personally go back and forth on this I think of it's a public official in the performance of their public duties or under the color of law. I think it should always be recordable. Always. It's a public official whether it's a town clerk, a police officer, a fire hydrant inspector, a federal agent, doesn't matter that should be recordable without the consent of the public official. And, many times you see that happening even in two-party states where you have a whole bunch of people out there with video cameras on their smartphones videotaping a police officer in the performance of their duty.

[00:19:07] Right, you see that sort of thing fairly frequently. Well, in many cases it's illegal in my home state, here. It's illegal to do that as well. So, what's happening here? Well, Missouri allows him to record other people without their consent. He has a sticker on his car that tells passengers that they're consenting to be recorded if they enter the vehicle and he describes it, as for security. Now, that's the part I mentioned earlier I think that kind of makes sense, right. Well, here's where things get a little bit fuzzy. Apparently, he is charging some people to get his live stream. Now, his live stream remember is going out on twitch and twitch does allow you to sell access to a stream. So, apparently, there are at least according to one report he's been charging five bucks or more a month. He's got more than 100 paid subscribers. It's really interesting. Uber had shut off his access to the driver's app while it "evaluates his partnership". So, even though live streaming might be legal in Missouri, Uber guidelines bar any kind of inappropriate or disrespectful behavior including comments on appearance. So, who knows, right. Twitch wasn't commenting on it. But, you can find this article up on my Web site as well. OK, so, one more article here for today and this is about security coming out of our friends at Google.

[00:20:52] Now, Google has been using this technology in-house here for a while. And, remember they have tens of thousands of employees and they have not had a single case of a successful phishing attack since they started doing this. That's pretty darn cool, frankly. Google has been following the standard that's out there. It's called The FIDO's specification. But here's the bottom line. It's a key, it's a USB key. It has some smarts in it and it allows a web page to authenticate you. It allows your laptop to authenticate you. Your desktop to authenticate you. So, you have to use this key in order to get your machine to allow you to log in. They've had this by the way since 2014, so that's pretty substantial that FIDO specification. And Google has been supporting it the Google accounts have. So, this titan key is something Google has now released. Anyone who is using their cloud services, the Google Cloud Services, has first dibs on it. You can go out and get it. I've had a couple of my clients now asking about it because they've been following my weekly e-mails and I've been kind of hinting that this is going to be coming and we're probably going to use a different kind of key here. The, you know, the Google Key is now quite yet.

[00:22:20] And some of these other ones are well supported as well. Also, follow the FIDO log in specs. So, we're starting to move some of our customers over. We're already using some of this technology including, DUO, which by the way, I think it was Google just bought this week. So, that's kind of cool, we're once again going to be ahead of the game in keeping our stuff secure. But, this is all available you can check it out Google's advance protection program. I've got a link to all of this up on my Web site. Craig Peterson dot com. And, of course, it's also in this week's newsletter, which you can sign up for also at Craig Peterson dot com slash subscribe. We've got subscriptions open, again. Well, there's other stuff we didn't get to today. You might want to check out. We've got Russian hackers. Looks like they may have penetrated hundreds of U.S. based, electrical grid networks. That's a very big deal. Apparently, they could turn off the power, at will, and cause some major havoc here. A lot of victims. This is bad. Your smart TV may be tracking you. If you have a smart TV and you can tell because they have built into them things like YouTube or Netflix or right your Hulu access to those TVs not only track what you're watching because it's easy enough for them to know, but they have a special software that's built into them and did you know even know this existed?

[00:23:49] It's called automatic content recognition, by SAMBA TV, usually. And, this automatic content recognition even recognizes video games that you're feeding into the TV and tracks your use. So, I've got a very detailed article from the New York Times that's up on my Web site Craig Peterson dot com. You can go there and have a look, it's got instructions for all of the major smart TV brands and what you can do to turn that off. I think it's important to do, although, you know the marketing side of it, I can see it's a great thing. I personally would rather only see ads for cars, when I'm looking to buy a car right. Well, they show me things that I'm interested in. But, the problem comes in when the bad guys get their hands on this information. This stuff's eminently hackable. It's been hacked before, it will be hacked again. So, be very, very, careful. You'll find it all. Craig Peterson dot com. Hope you have a great week. We'll be back next week with more. Until then if you have any questions just text me directly 8 5 5 3 8 5 55 53. How many people do you know to give you their phone number? That's me 8 5 5 3 8 5 55 53 with any questions at all, during the week have a great week. Take care. Talk to you next week. Bye-bye. 

 ---

Related articles:

---

How to Stop Your Smart TV From Tracking What You Watch


Russian Hackers May Have Penetrated US Electricity Network and Could Turn Off Power, Officials Say


Ridesharing live streams on Twitch raise privacy worries (update: Uber cuts access)


Google announces its own security key for stronger logins


These Free Online Courses From Google Will Boost Your Career No Matter What Business You’re In


Why is Samsung’s Galaxy S9 flagship struggling?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1 2 3 4 5 6 7 Next » 21