Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Nov 14, 2018

Craig is on at the WGAN Morning News with Ken and Matt as they discuss how safe our states' voting system is.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:


---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/14/2018

How safe is your State’s voting system? We compare New England voting technology with Florida’s and come up with some recommendations.

Unknown 0:00
All things technology tech guru Craig Peterson is on right now. On the WGAN Morning News with Ken and Matt.

Unknown 0:18
back again here at eggs in issues live at the Holiday Inn by the bay. This is, of course, brought to you by the PLC family of collision centers. To find one near you log on to PLC collision. com. Also carpet specialist covering your flooring needs. Located at Park Road in Westbrook united insurance, your business is different review your business coverage at United insurance.net workgroup technology partners faster, safer and easier IT solutions and support for main business online at workgroup main. com new Gen Hospitality Management. Proudly providing service selection and value for your group or companies hotel and event space needs in Greater Portland and also universe dedicated to making you a customer for life. With all that said, It's time now to turn our attention to Craig Peterson, our tech guru who joins us now as he typically does. Craig, how are you?

Unknown 1:05
Hey, good morning doing well. I'm down in Orlando. In fact right now,

Unknown 1:10
but maybe you could help them do the spouse and Broward County. What do you think about that?

Unknown 1:16
Yeah, exactly. So I was down in the swamp of stuff going on Elmer the land or stuff going on. It presents really kind of an interesting problem. And although there is obviously political implications and opinions on both sides, what seems to be happening right now is frankly, it's kind of a result of the hanging chads, you remember that back in 2000 I named al gore Yeah, exactly. And, and the problem back then really was that Florida was not using current technology because Chad's were part of punch cards, right. And, and that's technology, frankly, out of the 1800s very old technology. And by the year 2000, we had a lot better technology. Well, we're seeing that again, gentlemen. And what we're seeing is that these two counties that are having problems are using the equipment that they bought in 2002, after the federal government came out with a grant. Now, you know, I said forever, you can't have non technology, people making technology decisions, right? It's, you know, it's just such a complex topic, and particularly talking about these voting machines. So the voting machines they bought in 2002 don't hold up well, in humid conditions, guess what they have in Florida, you meditate, and they can only score one race at a time. Which means if you are trying to, for instance, look at the governor's race, you have to run a all of the ballots through the machines for the governor's race. And now we need to score the senate race. So now you got to run all those ballots through the machines, again, for the Senate, race, etc, etc. And down here in Florida, there's another race that really matters. And that race is the agriculture commissioner. I think that's the title. But in that case, obviously, Florida, a lot of agriculture, but the agriculture commissioner is the person who makes the decisions about concealed carry permits down in Florida. So the republicans are all up in arms with that. So here you go, you've got what is a 13 machines, you have to run all 250 ish thousand ballots through these machines multiple times, the machines don't like the humidity that's in the air down here. So they're jamming and just drawing balance. When they jam, it is a complete mess. And then on top of it, you seem to have a woman in charge of it, at least in Broward County, who doesn't seem to really know what she's doing. It's really a crazy thing

Unknown 4:13
that's putting it mildly. We're talking to Craig Peterson, our tech guru who joins us now to go over the world of Well, I guess the election technology would be the best place to start, since that's really dominated the news right now, you've of course, been talking to us about these machines in Florida. What would be a good option? I mean, I don't know how much you know about election machinery and the kind of ballot boxes they have, or whatnot. But you know, here in Maine, we have sort of, you know, we have a paper ballot, that we fill out the oval with, you know, with a pen, and then it gets run through a tabulating machine. And we have, like, the physical we have the physical thing, it's not connected to the internet early so says, Matt Dunlap. So it seems like we do things reasonably smartly here. What's the best system in your mind?

Unknown 4:59
Yeah, frankly, that is the best system, you know, whether or not the software safe, reliable, etc, is a completely different story. But that system allows for a real manual recount. In other words, you filled out those bubbles, right? You took some felt pen, right, and fill those in. That is something that a human to look at, right, you can, you can pull those ballots out. So the right way to do this is people fill out the ballot, the run through the machines, the machines come up with the tally. And then what you do is you spot checks, machines, spotcheck for one race or two races are all of the races and make sure everything is as it should be. Now, there will be a little bit of discrepancy because a human I might be able to determine intent better than an on him and I because some people instead of filling in that oval will, right, yes, and the machine's not going to understand that and they seize the assets spits out the ballot, and in those cases, those ballots can be looked at manually. Many states are using absolutely insane stuff. They've got Windows XP running a touchscreen. And in a lot of cases, in this election cycle, we've seen voters complaining that they tried to vote for someone and another person on the ballot was actually voted for so. So you

Unknown 6:32
aren't Craig, what's the argument for doing it that way? I mean, when I was in Virginia, we had an all digital machine ballot, and I voted that way. And it went smoothly for me. But I don't understand why you would do it that way. Is it really just to save like, on printing costs? I mean,

Unknown 6:46
it's

Unknown 6:48
Yeah, yeah, for accounting, I mean, what is it?

Unknown 6:52
Yeah, it is. The argument for that is that if you're trying to have 5 million people casting votes, it's much easier to have those voting machines where everything is calculated automatically. Some of the voting machines like that do have an audit trail, that they spit out a piece of paper, most of them, frankly, don't have a good audit trail, and there's no way to manually recount them. So it's insanity. We, you know, and you already know, we do not have any national elections, we have 58 elections, and the states typically leave it up to the counties to perform the voting. So we've got thousands of different jurisdictions that are in charge of voting. So they're going to choose different machines, different versions of those machines, they're going to try and update the software on them. Some of these machines are a little on the complex side, although they're getting simpler for the people working, not the polls, but working the election, the secretaries of states and things. So it's a this is a problem, this going to continue on. And last, everybody switches to what main de because I know New Hampshire uses a similar system. In fact, I think it's the same system throughout New England, we have a lot of those, and they're moving around the country. But that's the only way to do it. And then, of course, the other part that's a real problem right now in Florida has to do with people seeing what's happening. The light of day is the best disinfectant. And when you're talking about having the physical balance, like our us here in Maine, it's fantastic because everyone can look at them. You can have multiple people who are monitoring all at the same time, and they're not letting people in to monitor the balance to monitor the accounts or anything else. So that's the political side of it. Right? I personally think that's absolutely insane thing. Let people in light of day make it so they can be hand counted. And I think everything gets a lot better quickly.

Unknown 9:00
We are going to Craig Peterson Tech Talk. He joins us on Wednesday. 738 let's talk about a little fake news. Um, how easy is it to create fake news Craig

Unknown 9:14
I know this is really an interesting case because we now have the technology where we can put a person's face on to someone else so let's say you wanted to show someone committing a crime all you have to do is have an actor some sort go ahead commit the crime all fake you know and then the computers can now monitor everything that's going on track the whole thing map it and put someone else's face on makes a body look similar. It's absolutely crazy you guys remember Lord of the Rings? The movie series? Of course, of course. And did you ever see the behind the scenes the videos of how they did this with Gollum and he had those white golf balls all over him think

Unknown 10:07
that that's how you used to have to do it today You don't have to do it that way at all. So when you're talking about fake news is that extends all the way out to the video world that frankly some of these videos that you're looking at are fake. In fact, one of the videos on Facebook that got millions of views showed this jet airliner just a passenger plane doing loops and slips just before it landed and it was shared like crazy it was absolutely fake there's no way that jet could do what was being shown and yet it went out to millions of people who believe it happened so we're going to have to be very prudent consumers of news as we go forward because it's so easy to fake right it's easy now fake email addresses this easy to fake phone numbers how many times a day you get a call from one of these spam pies right trying to sell you something or they're from the IRS right lately it's been for me it's been insurance and by car insurance but it's it's so fake and it's something we just got to be aware of. Be careful you really can't believe your eyes anymore.

Unknown 11:26
No, you cannot well, Craig Peterson our tech guru, leaving us with that bit of hope and optimism. Appreciate a Craig we will talk to you again next week.

Unknown 11:34
Take care guys. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 13, 2018

Craig is on today with Jim Polito talking about how technology is helping with our problem with plastic bags and plastic waste and how China has been hijacking the internet backbone of western countries.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/13/2018

Recycling Plastic Bags - How Technology Is Solving The Problem

Jim Polito: [00:00:00] I'm talking about our good friend and our Tech Talk guru Craig Peterson. Good morning, sir.

Craig Peterson: 0:06
Hey, good morning, Jim. You know when it when it comes to plastic bag, there have been some technologies that have come out about that, about being able to because I'm told over and over. Oh, you can't put them in single stream. Because with the other plastics, they'll jam up the machine.

Unknown 0:24
It's like, it's like smart people like you, Craig could figure it out. That's why we have some people like Craig Peterson and others, because they figure out these problems for us. Like they got us to the moon. They got us a smartphone, they got a heart transplant, like oh, that guy's gonna die. Why? Well, he needs a new heart kid. Well, can't you take one from somebody else and put them in there? I never thought of that.

Unknown 0:52
Well, I may a basement stairs guy first off that's where you're like me and Danny. Yeah, yeah, exactly.

Unknown 1:00
Choose a plastic bag with a plastic bag as opposed to a plastic flowers. Yeah, you gotta get done. You know, I will have to send you on a plastic flowery thing. Yeah. Craig. So you can be like the rest of the guys. So that's number one, which is the easiest. You guys are already doing it. But there are a couple of new technologies that are out right now. First of all, and this was only discovered this year, they were digging through some of these massive, you know, trash heaps that are out our landfills and what they found was really really interesting they found plastics that has been degrading now it's not supposed to be great when it down on the ground. Yeah, styrofoam was degrading a few other things with the grading and in various ways. And what they found was there's a bacteria that has now come into being that they had never seen before. According to the research I was reading and this

Unknown 2:00
bacteria will digest any and all plastic for, you know, like it's flat 95% of plastics that are out there. So what they're starting to do is they're, they're trying to make sure, first of all that this plastic isn't about to, you know, studied in our cars or something if they spread it around. But the idea is they'll take this and they will start spreading it into the environment of the land cells and it will start eating up all of the plastic which is really good. So that's number one that is brand new. And number two, that's been around for a while. Most of these small plastic bags that we get from the stores such as Walmart and others are designed to be biodegradable, and if they are out in the open and exposed to the sun, they will break down and break down very quickly. It's only a matter of months. And so those tree is brand new and number two, that's been around for a while.

Unknown 3:00
Most of these small plastic bags that we get from the stores such as Walmart and others are designed to be biodegradable and if they are out in the open and exposed to the sun they will break down and break down very quickly it's only a matter of months and so those trees that have plastic bags in them that you mentioned if they're the newer plastic bags they will just fall apart into pieces very small pieces at first and then completely break down wow the problem is already solved frankly thank you but but no we have to feel good and go out there and say we're going to do that and as I said my town is taking away styrofoam too so I'm gonna you know get my takeout order wrapped in newspaper

Unknown 3:53
you know I mean that's that's basically what it's boiling down to

Unknown 3:58
why

Unknown 4:00
But many times that Intel Penn and Teller did an episode about that on their show and they were actually able to convince people to use I think it was 17 different recycling bands you know one for soil toilet paper one score so no timers at different in court or South that have come in contact with raw chicken

Unknown 4:25
and and it was absolutely amazing to be able to do it yeah

Unknown 4:31
no, I didn't is that from their show which I did see some episodes where you can't say the name of the show on the air yes yes that was a cable show and it was it was a good show and then add in its name it had a curse word which was funny

Unknown 4:49
yeah well then you know they did that and I had a chance to talk to potential at but the reason they did that was that they

Unknown 4:59
you can

Unknown 5:00
You can say someone's line and you can't say someone's misrepresenting or misleading but you can call it that subtle swear phrase. Yeah, be banned. We can say BS. There you go. So you can call it BS and you can't be sued for that. That's right. He said, they spent a lot of time with the lawyers on that whole thing. So that's what I called it, but they would they did this study, they found the original guy that had come up with this study that says we're about to be very 10 three deep with trash from coast to coast. Yeah. And this daddy was incredibly flawed, actually had him bottom there show, unbeknownst to him being on their show. But it was incredibly flawed. And they pointed out how all the trash from the whole country would fit into an area that was like 10 miles.

Unknown 5:57
I mean, you people begin to

Unknown 6:00
And then reporters rewrite it and it suddenly becomes the truth and it becomes accepted. And it's Wait a minute, just like the Did you know the whole eight glasses of water a day. No one can tell us where that came from. And there are many physicians who will say, well, it's important to be hydrated but Who said anything about eight glasses of water a day? I wrote I read a study on that one. Yeah, apparently it came as well as the 10,000 steps a day Yeah. came from a Japanese marketing campaign a lovely

Unknown 6:39
there was no science behind it at all. Yeah, but it was a marketing both own channel marketing campaign. Just like you know, breakfast is the most important meal of the day of baking in a while. I know bread bacon and eggs was a marketing campaign. Yeah, you didn't eat bacon and eggs for breakfast. It was all marketing Yeah, well.

Unknown 7:00
So, yeah, it people tend to fall into this. It's a headline people read, right? If it bleeds, it leads. Yeah. And so, you know, we heard about that barge of trash of New York City. Oh, yeah, it floated out there. And remember that one? Yeah, man. So all these people are thinking that somehow there's no way to dispose of the trash. But it turns out there is a plastic bag many of them now, and that this technology is easy and cheap can biodegrade in the sun. And we've got a brand new thing nature's taking care of it is, you know, factory of it's breaking it all down. Well, if you believe in natural selection, you believe in evolution. You believe in the origin of species, then you know that Mother Nature will find a way and bacteria that wouldn't ordinarily eat plastic. Well, all of a sudden a mutation and DNA somewhere says hey, look at this and we can eat

Unknown 8:00
Plastic and digest it. Just like there are certain bacteria that can eat oil pollutants. Anything else? Craig? We're running out of time. What's a good ad line from what you've got this week? And then we'll get folks the information so they can get on your list and get everything that's going on this week. Yeah, there's a lot that I think the number one thing that you might want to mention real quickly is that a lot of people have been getting on President Trump with him going out and Shane China is stealing intellectual property. talked about this a little bit on the on your show before. Yes. And the reality is now we have found that China has been hacking Now I mentioned the different type of hacking, China Telecom, big telecommunications company out of China. They have a presence in the United States they've been using their presence in the US to reroute our

Unknown 9:00
traffic through China certain companies they will go after company or an internet service provider and I'm not going to get technical and how they do it but they will route all of the traffic of China they will break the encryption they'll capture everything we're talking about email traffic website traffic banking traffic, everything we routed to China them back to where it's supposed to be. People hardly ever notice sometimes it's been six months or more that they've been monitoring a company or in some cases, government offices and sustainability. So so basically

Unknown 9:37
it's basically like in the old days there the rerouting all of my mail that comes to my house through their processing center. They're opening it up. They're looking at it, resealing it and then having it delivered to my house without a gem. Wow,

Unknown 9:55
Craig, you've been a big help today while actually helping us with the plastic issue.

Unknown 10:00
But not just that with this information. And folks, you can get all this information from Craig Peterson. All you have to do is text my name to this numbe.r 855-385-5563 855-385-5563.

Unknown 10:20
That's right. And Craig will get back to you with that information. Standard data in text rates apply. He will not annoy you. He will not sell your name. He won't try to sell you anything. He's just going to provide you with great information. And Craig, thank you so much for your time, buddy. You were a big help today. Hey, take care. Take care. Bye bye. All right, when we return

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 12, 2018

Craig is on with Jack Heath talking about the midterm elections, the voting machine hacking, and China hacking our telecoms networks.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/12/2018

Florida Election Technology - China Hijacking Networks

Jack Heath: 0:00

Craig Peterson, our Tech Talk guy. His show Tech Talk. Craig Peterson joins us now at the Auto Fair listener lines. Good morning Craig.

Craig Peterson: 0:05
A Good morning. I've been following what's been going on with the Florida week count of ballots. The technology behind all of that stuff Jack, it's really kind of interesting.

Jack 0:16
Yeah? Well, interesting is one way to put it. And who knows what the outcome will be Craig. Your guess is probably as good as the people counting the votes.

Craig 0:24
Yeah, exactly. Well, the problem here really seems to be related to what happened in 2014. Of course the hanging chads, the ballots, and problems back then. Florida and a lot of states around the country after the federal government put some funding in in '02, but Florida bought a bunch of equipment and the equipment they bought to count the votes was out of date when they bought it. So now they're trying to count the votes in Palm Beach County and a few other states have the same stuff. And Jack, they can only count one the election at a time. In other words, they have to run all of the balance sheets through the machine that counts for governor and then they have to rerun, reprogram the machine and rerun all of the ballots on the machine again, now to count the votes for Senator, etc, etc. So it's really crazy all of the work they have to go through. And then the machines themselves are having problems. Because, you know, Florida has this whole humidity thing. And you know what humidity does to paper. And with these old machines that are kind of nearing the end of physical life, as well as technical life, they are jamming up the machines, and that caused voting problems, and it is now causing problems with the recount. So there definitely seem to be some reasons outside of the politics for these counts, taking so long and being done so poorly,

Jack 1:55
Could be a coin toss at the end of the day might be as reliable, I just think they could have three different recounts, get three different results. Is that close?

Craig 2:03
Yeah, it does go that way. Many times in some of these recount, and there's talk now in Florida, that there could well be a manual recount. But you know, on top of all of this, there appears to be some incompetence, mixing in folks that were already deemed to be invalid with valid votes. And we know from two years ago, destroying ballots even though the court order they not be destroyed. So there's the person side of all of this, as well as the technology side. I think more than anything else, in order for people to feel confident that the votes count, we've got to keep up with the technology, we have to be secure. In fact, these machines in Florida two years ago in 2016, were known to be vulnerable to attack and not be secure. So we've got to keep this up so that we can count on our election results being but at least partially valid.

Jack 3:03
Yeah, well, who knows? Who knows where that's. I'll tell you it's gonna be quite a process can be quite some time to in the Lago coast, you know, imagine being these candidates and their campaigns and the intensity in and around this is going to show and not dissipate anytime soon. What else is catching your eye from a Tech Talk point of view?

Craig 3:19
Well, we've got some more evidence about China and China hacking. In fact, right now, we're seeing that China has been involved very, very heavily in hijacking networks of US, not just corporations, but internet service companies. China Telecom, you've been involved in this for a number of years now. And the bad part about all of this, and the way China's doing it is people just won't notice some of these hijacks that have happened, have taken all of the data that was going to or from a company, the websites, their emails, everything else, routing them through China breaking encryption and doing who knows what with that data. So again, this is something that the course the Trump the whole Trump Organization is looking into now and the government but just trying to figure out what's happening? Why is it happening? And I think the administration's on the right track China has been really taking advantage of our US corporations and I picked up a new client a few weeks ago they are small manufacturer right here in New Hampshire and their intellectual property. All their designs are everything that they've worked on for decades now is in the hands of the Chinese. So now they get to compete against their own designs from a manufacturer in China because the Chinese People's Liberation Army hacked their systems and they have no idea. This is a huge problem, Jack and something I've been doing some training with the FBI on on those webinars that I run, but it's happening every day. We gotta be careful not to do something more about it.

Jack 5:07
All right. To learn more, go to Craig Peterson with an O-N.com. http://CraigPeterson.com. Thanks, Craig.

Craig 5:12
Hey. Thanks, Jack.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 10, 2018

Are you familiar with Business Email Compromise also called BEC Listen in today and I will tell you why you need to be concerned about this.

Businesses getting hit by other cybercriminals right here.  I will be going through some of my most recent customers and why they ended up calling us.

So what's up with the Chinese have been stealing our intellectual property.  We will talk more about this today in quite a bit of detail

What Browser do you use?  There are many to choose from.  Today I will talk about why you need to be concerned about the browser you use.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/10/2018

China Monitoring US Communications - Stop Using Microsoft Edge - Cellphones Just Aren't Secure

Craig Peterson: Hello everybody Craig Peterson here for another half hour of Tech Talk. You can hear me online Of course on iHeart make sure you tune into your iHeart Radio stations. You'll find my
podcast also out pretty much everywhere and iTunes I really appreciate it when you take a few minutes and make a comment. I read them all over also on my website so you can go to http://CraigPeterson.com/iTunes. Well, today we are going to be talking about a couple of things I think

Craig Peterson 0:34
you're going to find interesting one, we're going to tell you why you don't want to download Chrome, or at least ways not to download it. People are really getting scammed here with cell phones. Are they really secure? What does that mean? China has been hacking the vital internet backbone of many Western countries and MIT This is really interesting. We've talked a little bit before on the show about the whole trolley car dilemma we're talking about a little bit now, too, because MIT has conducted a study and they have completed it, I signed up for it and answered some of their questions. This was a while

Craig Peterson 1:13
back that I did it. I think it was the same study. But anyhow, we'll talk a little bit about that showed our self driving cars kill the cat, the elderly, or the baby, the results of the poll are in and they vary based on where you live. Ultimately, here, we're talking about some pretty exciting and interesting stuff.

Craig Peterson 1:36
Now, also, this week, I gotta warn everybody, particularly small business people, we picked up a couple of new clients again this week with major infections. Now the FBI is warning and they put out a warning here very recently about business email compromise. This is for small businesses who don't really have their security together, their people aren't doing the right term meaning. And even if you are, you might get nailed. There was an article in the news this week about one government employee clicking on a link in a website, I guess it came from a website and ended up compromising thousands of government computers. So it is a real problem.

Craig Peterson 2:20
And most businesses that get hit by this stuff end up out of business, the small ones do the bigger ones typically have a bigger budget to deal with. So in the case this week, it's a small company, family owned second generation. And they make things here in the US, which is really rather cool. And they thought they were safe, because they had three computers, that's all they had a couple of dozen employees who did the assembly of their product. And they were very careful about taking their computers offline off the internet when they didn't need to be on the internet. Well, we found 12 different major infections across just one computer. It's amazing what's been happening

Craig Peterson 3:08
and who knows what kind of data has been compromised from. So just, you know, everybody be careful out there. And we're going to have more training courses, keep an eye out. I've been really busy. The whole thing with the FBI Infraguard program where I'm running their webinars for them now, nationally, and it's just been very busy the last couple of weeks, I'm putting some stuff together, we're talking about a big summit that we're going to do maybe in the spring. In fact, this last week, there was a big head honcho meeting down in Quantico talking about it, but hopefully we'll have the security summit next year. I'm really

Craig Peterson 3:44
pushing to make it so that it's not just for FBI government, in regard people, because that's typically what I'm doing when I'm running these webinars for the FBI, you're just as a normal company person, you can't attend them. So I'm trying to get it so that second quarter next year, we can have this big summit anybody can attend for free. That's, that's what I'm aiming at here. Because I'm trying to get the information out and you'll be able to learn a whole lot. It's, you know, the plan is it's going to be a weeklong summit, we're going to have 50 or 60 different topics, different speakers, and we're going to arrange them into different tracks and you know, the whole big thing. So it'll be a huge, huge, huge thing. And hopefully, the FBI is going to say, Fine, go ahead. But you know, sometimes not, it can be difficult to convince them to

Craig Peterson 4:39
do things even if they don't have to do it. If I'm going to do all my work, all the work in my team is going to be helping out. So hopefully we'll be able to do that because there's so much good information that is available and you don't have to become an expert. That's the nice thing about it. Right? If you're trying to run a business, you're you're busy running your business you don't want to worry about the whole thing cyber thing and that's where we've been able to help out a whole lot with the FBI Infragard program free to join it takes a few months they do a basic background check. They don't call it an FBI background check because it's not but it's the FBI that does it but it's not one of these things where

Craig Peterson 5:18
like justice Kevin Oh, where they're drilling into everything in your background everyone we've ever mapped her anything it's just you know, I more like have emerged anyone recently type of background check so check it out Infragard.org you'll find that out there online you can sign up if you're involved in the critical infrastructure and I think it's important to do because there are alerts coming out from there all the time now let's get down to some of the articles from this week and if you got my newsletter this morning hopefully you did you can read along Of course I spent a lot of time doing commentary you're not going to find that in the newsletter and if you do don't

Craig Peterson 6:00
get my weekly newsletter sign up right now Craig peterson.com slash subscribe that's Craig C R A I G Peterson with an o.com slash subscribe. And right there on my homepage to there's a sign up if you want to be informed about some of these other free business webinars that we're having. Again, no charge people. This is

Craig Peterson 6:23
real. I'm I'm the real thing I'm trying to help out. I've been doing this for decades and decades, very long time. And I really want to help out I want to help you out if you're a home us. In fact, we had another brand new client come on board, she attended one of our webinars. And one of the ones that I did on ransomware a couple of
weeks ago, you know what, I'm going to have to send out a thing, invite you guys on to the replay because we got a lot of great feedback from it. But she's a non-paying client. And that's absolutely fine. Her husband in her had a business and he passed on, she sold the asset, shut down the business and had all of this stuff on her computer, which has, you guessed it - ransomware. So we are hopping on her machine and getting her all taken care of, and she is so grateful, you know, just a listener, I don't have a business can you help me out. And that's what we're here to do. So we're doing a cyber health assessment for her indication of compromise clean up after the ransomware, she has a basic backup.

Craig Peterson 7:41
And I thought this company did a better job than apparently, they're doing, I'm gonna have to look into this a little bit more and do a webinar on backups. But according to her, and it's a name, you all know if you know anything about backups. They only keep one generation for her. So she's not sure the backup they have is also encrypted with ransomware.

Craig Peterson 8:05
So she might be in big trouble. But that's the whole 321 rule. When it comes to backups at all, I'll have to explain. If you're interested, sign up. I will explain this. We do this site and kind of stuff offline because I don't want to drill down too deep on the radio show and lose too many people. But we will do one on backups. We've got some other scheduled to how to treat data at rest and encryption, encrypted vaults and all that stuff. Just trying to make it easy for everybody. So she's really worried because, you know, her husband passed on all of the records, they're all of the business records are there and she got ransomware, 60% of small businesses this year are expected to have a similar thing happened to them.

Craig Peterson 8:51
What would happen to your business do you think that would help or hurt? Yeah, yeah, 60% of businesses are expected to get one of these nasty pieces of nastiness from the bad guys. And of those 60%, 50% are expected to go out of business within six months. So by the end of the year, middle of next year, we will have a lot of small businesses who will be out of business and somewhere helping her out and we can help you out to we're not charging This is free. I have committed the resources to do 100 of these small business cyber health assessments to

Craig Peterson 9:32
toward in 2018, so we still have some left that we will do we the last quarter 2018, there's 100 available. You know, we normally charge for these but for listeners, I really want to help believe me, I want to help. That's why I do all of this volunteer work. I volunteer for the FBI and infer guard program to run the webinars. I am here to help bully me know a lot of people will tell you that I have hundreds and hundreds of recommendations along those lines. So don't don't feel afraid. Don't feel pressured because I'm not selling anything. Okay. I just visit right now. Craig Peterson. com, make sure you sign up to get notified about our future webinars because we'll we'll do more and they will continue on past the backup stuff. So let's get into some of the additional stuff China's doing right now.

Craig Peterson 10:30
Well, you know, China has been very involved in espionage. And you've heard it in the news, some of the news like Fox, etc. They tend to carry the whole story, Wall Street Journal, things like CNN whose viewership by the way down 40% in the last year more people according to the stats I saw this week, more people watch Cartoon Network, then watch CNN. So that shows you how credible they are is a news source. But anyhow, the Chinese have been stealing our intellectual property. And we caught the Chinese red-handed, no pun intended in a company or right here, right here, local, which just totally blew me away that they had three back doors into their systems and they were stealing all of their intellectual property.

Craig Peterson 11:24 
Imagine that right? I mentioned this before in the show, but you spend all this time all this effort with developing your intellectual property, developing your hardware, your software, all the designs, and this particular company again, it was an older gentleman that was running it he'd been running it all of his life, his entire investment, his life savings were tied up in the business and the Chinese were headstone and it also imagine competing against your own designs being made in China. Can you imagine that? Imagine how that would turn out. You are competing against your own designed, manufactured in China.

Craig Peterson 12:05
So China has been very busy in stealing our intellectual property. They really are people, this is not just our widgets better than yours. It's, hey, we made your widget better her reminds me of a joke from the 70s of you know, the Russians us invented something, and the Russians, quote, already invented it and quote, and then the Japanese, of course, made it smaller and cheaper back in the day. And of course, it's not Japan anymore. It is China.

Craig Peterson 12:35
Well, there is a new report out right now talking about a Chinese state owned telecommunications company that's been hijacking the vital internet backbone of Western countries. Now, this is according to an academic paper published just this week by researchers from the US Naval War College and Tel Aviv University. So these are people that really know what they're talking about.

Craig Peterson 13:01
And they're saying that the culprit here is China Telecom. This is the country's third largest telco, and they're an internet service provider, just like it here in the US, right? You might have Verizon or at amp T. Nowadays, Comcast is doing this sort of thing. But in this case, China Telecom has a presence inside North America, and has had presence inside our network since the early 2000s, when it created its first Point of Presence. So how do you think that might affect you, or might affect our networks here, they've been doing this they've had upon your presence for almost 20 years now. And as it turns out, here's what's happening. They've created these points of presence centers, these data centers,

Craig Peterson 13:47
and according to this report, these Chinese data centers are doing nothing more than rerouting internet traffic

Craig Peterson 13:55
between all of the smaller networks that make up the larger internet and are monitoring it now This happens all day. Every day. We do this right. Mike company is an internet backbone router

Craig Peterson 14:10
where we take stuff from archive and smaller networks. And we use protocol called BGP, and we tie all these networks together, and we send it out to the quickest shortest route on other networks. These are called autonomous systems, a SS and now you have huge companies like Google, oh, and Verizon, and others, all the way down through small little guys, you know, university networks, maybe banks, web hosting companies, companies like ours and others that are all doing this.

Craig Peterson 14:42
So apparently, what they've been doing is hijacking BGP announcement and it's kind of interesting because the studies have been showing that China Telecom started abusing this BGP protocol, which is used to route between the network,

Craig Peterson 15:00
China Telecom has been doing it at least ever since it entered into this pact and 2015. Now remember, September 2015, Obama and the president of China entered into this agreement, right, that China was going to stop all government back cyber operations, right. And I laugh as though, you know, really, really, you think they're going to stop it all? Yeah, cuz he asked, right,

Craig Peterson 15:29
no, they didn't stop it. In fact, they ratcheted up right then and there so that this agreement necessitated new ways to them get all the information. So they did enter China Telecom, the research is saying that they've built a route tracing system monitoring, the BGP announcements and distinguishing pattern suggesting accidental or deliberate hijack, you know, we've seen the Russians do this before. And, you know, we really are in a Cold War right now, frankly,

Craig Peterson 16:04
the Chinese are a little more concerning than the Russians are, I don't know if you saw this week. But the Russians biggest dry dock St. And they're only aircraft carrier. The only one the Russians have was damaged when this dry dock saying so Russia is not a huge challenge to us like China is becoming especially in the South China Sea. So they've got a system online, they've been watching it a lot of stat

Craig Peterson 16:32
in October 2016 traffic from several locations us to a large Anglo American bank headquarters in Milan, Italy, hijacked by China Telecom traffic from Sweden and Norway to the Japanese network of a large American news organization hijack to China for about six weeks. Now, the only way people really even notice this is things tend to get a little bit slower February 2016 for about six months routes from Canada to Korea were hijacked by China Telecom and routed through China traffic to the mail server and IP addresses of a large financial company in Thailand hijacked during April, May, July 2017. Some of the hijack attacks by the way, started in the U.S.A, were trying to telecom has a presence.

Craig Peterson 17:25
So it's very, very interesting here, China's network, very cut off on the rest of the world. And China is working with Google right now in developing the system to track all of their people even closer than they're being tracked right now very, very closed and yet their routing all of this traffic through their network so they can have a good look at them. So be careful out there. They really are out to get us it's it's amazing. I'd hate to think that some a war-ish stance or posture was taken by China. And they did all of this stuff more maliciously, than

Craig Peterson 18:02
they're even doing it right now. So be Be careful. And we have seen China now in various customer networks here, right here in the northeast United States. And, of course, other people are seeing them all over the country. We're seeing them, the FBI seen them, everybody seen them, China, it is a real risk right now.

Craig Peterson 18:31
Now, you know, I've talked about Microsoft before, you guys know, I have no love loss for Microsoft. Although I also have to say that I have been using some of their services more and more lately. And, and using them with my customers.

Craig Peterson 18:45
Microsoft has a new Office 365 stack. And they have one that even includes the operating system. And I got to say, given kudos here, because they are doing a very good job with it. Now, they're not solving all the problems. Security isn't the best. But it's not the worst. And I think you're much better off with a no 365 implementation than going for Google's implementation. But that has to do with security. And also has to do with keeping your data confidential.

Craig Peterson 19:17
People who download and install Windows, Windows 10, specifically, you notice there's a new browser, Microsoft's Internet Explorer, a total piece of junk that was so far out of date, it was crazy. So many companies have written software that's dependent on so-called features, also known as side effects in the Microsoft Internet Explorer Explorer browser that you have to be careful. So my little word of advice just off of the side here, if you're in business at all, and you're thinking about having a website and having some features on it, do not use Internet Explorer, don't test for it, that's not your target. Nowadays, the number one browser out there by far as Google Chrome.

Craig Peterson 20:09
So if you're designing a website, make sure chrome works on it. If it works on it, you know, good for you, right? But Windows 10 comes with the Edge browser. And most people are thinking that the Edge browser really has one purpose in life. And that is to download Chrome or Firefox, Firefox being the better of the two at least right now. And if you want to be absolutely safe, you're probably best to run the epic browser, okay, will be very careful. Because if you run edge on your Windows 10 PC, and you don't have the URL for Google Chrome, and you

Craig Peterson 20:53
type download Chrome into the address bar. And if you click the first result provided by Bing search, tried, who's ever heard of being before well being is Microsoft search engine and they had been contracting to third parties to provide the results are trying to do it now themselves. But if you go into your new Windows 10, you open up the web browser, it's called Edge and you type in download Chrome, and you click on the first entry. The first URL, you are going to get highly visible Google Chrome ads for months.

Craig Peterson 21:34
Okay, Google and Firefox know this being can't be bothered, apparently, to fix this problem. So be very careful. Okay. The top result for download chrome was Google online.

Craig Peterson 21:51
It's a fake site. It's a pretty good copy of Google's chrome landing page, it looks general enough genuine enough to fool people the downloads called

Craig Peterson 22:02
chrome setup.exe. And the digital signature if you take a close look is signed by alpha criteria limited, and that's definitely not Google. So go to Google.com. And from Google.com, if you need to do a search is probably the easiest way to do a do a search for Chrome and stop using Edge. It is not a good browser. Okay, just don't use it. Use Chrome or use Mozilla's Firefox, something to seriously look at

Craig Peterson 22:37
and believe how fast this half hours going and goes quick, doesn't it?

Craig Peterson 22:41
Well, we're going to hit a couple more articles here really quickly. One has to do with cell phones. You might remember President Obama when he took office, he had his wonderful little Jimmy have a crack Barry, I think it was he had his little Blackberry that he used. And he didn't want to give it up because

Craig Peterson 22:58
he'd been using it for so many years. And he had so many friends on it. And he could, you know, text back and forth and have great messages, emails,

Craig Peterson 23:07
I can get it right. And now we've got President Trump The 4am 2am

Craig Peterson 23:13
is sending a tweet and he's using just regular phones. And there's anybody can tell. Now

Craig Peterson 23:18
President Obama was finally convinced by the Secret Service to stop using his own personal device. And he got a secured government device. But it looks like President Trump has still been using his cell phone since he became president. And that presents all kinds of potential security vulnerabilities. No question about it, even if it's iOS and fits Apple what Apple being much better than Android when it comes to security. But even if it's Apple, you got problems.

Craig Peterson 23:50
Now, the security rules do prohibit them from using a regular

Craig Peterson 23:52
cell phone throughout his presidency. But apparently he's using Twitter on his phone. So the question is, who else is listening in? Who might grab his Twitter account? Who might be able to listen to cell phone calls, who might be able to turn on the microphone in his smartphone and listen in on the conversation or turn on the camera

Craig Peterson 24:15
in it, right? Many companies or companies, many countries are trying to listen in, we know the NSA is listening in to everything they can they do bulk data collection that get as much

Craig Peterson 24:30
cell phone and texting information as they can possibly get from as many people as I can possibly get. And then they use that later on to figure out who spoke with whom. And if this person is a risk, then that person might be. So who else are they talking to? Right? You get into two hops, three hops, five hops away as they try and figure out who's who, right. Well, some of these other countries are going specifically one on one. And potentially there are two there's two basic places that you can eavesdrop on pretty much any communication system at the end point, obviously, which is the phones themselves. And if it's a smartphone, it can be compromised. I don't care who makes the phone and the other is during transmission. So cell phone attacker could also eavesdropping on the cellular network. And we've talked about those devices, Sting Ray devices that can be put up that are fake cell towers that allow a third party to listen in. Obviously, there's problems with all of this right now. 2016, WikiLeaks they published a series of classified documents listing target selectors. So these are phone numbers the NSA is searching for

Craig Peterson 25:50
and they included senior government officials from Germany including Chancellor Angela Merkel,

Craig Peterson 25:54
France, Japan, many other countries now

Craig Peterson 25:59
other countries don't have the worldwide reads the NSA

Craig Peterson 26:01
has but when you consider what we were just talking about with China and China Telecom being able to get into our networks and reroute traffic eavesdropping, including eavesdropping of the President's phone it's not inconceivable that absolutely for sure. Now if you

Craig Peterson 26:21
missed last week, well I did the ransomware webinar I've got more coming up we're going to be doing a webinar on backup absolutely free not selling anything no credit card needed there it goes out enough disclaimers I really want to help out make sure you visit http://CraigPeterson.com right there on the homepage. You can sign up to be notified when my next webinars going to be these are typically 45 minutes to an hour. They are information packed. I will give you replays of them if you attend and we've got a lot of people that are asking about it. So check it out, http://CraigPeterson.com. http://CraigPeterson.com and have a great week everybody. Take care. Bye bye.

---

Related articles:

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'

Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware 

Nobody’s Cellphone Is Really That Secure 

You Might Be Able To Collect $100 From Yahoo’s Massive Data Breach

All the Fun Things You Can Do If You Steal Someone's Identity

How China Rips Off The iPhone And Reinvents Android

Brain Implants Used To Treat Parkinson's Can Be Hacked And Used To Control People, Scientists Warn 

MIT Reveals Who Self-Driving Cars Should Kill: The Cat, The Elderly, Or The Baby?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 31, 2018

Are you aware that Facebook accounts are now for sale on the dark web?

Craig is on with Ken and Matt on The WGAN Morning News talking about artificial intelligence and the awkward etiquette of iPad tipping.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Your Next Appointment May Begin By Talking With An Artificial Intelligence

You Want 20% For Handing Me A Muffin? The Awkward Etiquette Of iPad Tipping

'PAY THE RANSOM - OR WATCH ME WRECK YOUR LIFE': Chilling New Fraud Email That Says You've Been Filmed on An Adult Website

After The Hack: People's Facebook Accounts Now For Sale On Dark Web
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/31/2018

Artifical Intelligence - Tip Shaming With iPad POS - Watching Porn Email Fraud

 

Matt Gagnon: Time to talk to Craig Peterson our tech guru who is on the line right now. Craig

Unknown 0:03
Are you they doing good? I'm down with the heart of the beast today and down in Washington DC

Unknown 0:12
it Halloween? Right? Yes. Waiting ankle deep in the swamp.

Unknown 0:16
So speak about artificial intelligence Oh

Unknown 0:21
gonna be something that we can just have an artificial intelligence in the White House perhaps crack

Unknown 0:27
you know that actually might have

Unknown 0:29
some are we talking about robot president here?

Unknown 0:34
You are under arrest

Unknown 0:38
and Ed tool nine down the street. Yeah, exactly. Yeah, the holy I think is really interesting. And we're already seeing chat box and other things out on social networks where you're trying to talk to a company and you're actually talking to a computer. But we're seeing more and more of this artificial intelligence. Earlier this year, we had a friend over at Google demonstrated in artificial intelligence that could call and make appointments, which is really kind of cool. If you heard those demos. In fact, I even sent them this morning in the email. But it is just amazing where it's going. And one of the things that's really starting to changes of the way we consume our, you know, medical services, right? Do you guys have you ever used one of those online services, we get on Skype or something, and you talk to a doctor remotely,

Unknown 1:33
I've never done that night, but I certainly know that it exists.

Unknown 1:35
Yeah, I've used it before, too, because for as little as like 20 bucks a month, you can subscribe to these things. And if you have something going on, you can just pop on talk to a doctor. And they can actually give some basic prescriptions. And they can also tell you, yeah, don't worry about it, or maybe taking to the emergency room or take them to your physician. So those types of services exist in there cutting some of the medical costs people have, well, when we look far forward, can you know, before the days of the robotic president and learn we're going to be seeing doctors online that are actually artificial intelligence. And the scary thing is the studies that are being done right now for, you know, looking at medicine, looking at computers are showing that computers are more accurate at diagnosing the majority of machine of diseases than the doctors are. So the computers are already doing better in some cases. I guess the ultimate question is, if you end up with something like it at 209 that Matt was referring to where, you know, bedside manner, is it going to be better or worse, if you're working with a computer? I don't know. But it's common. This is gonna be like, the,

Unknown 2:56
this is a nerd alert here, I guess was gonna be like the holographic doctor from Star Trek Voyager. I like this completely artificial intelligence saying treating you arrogant as a terrible bedside manner.

Unknown 3:10
Exactly. But yeah, that's kind of what it's going to be you you'll kind of chat with it. The first versions, you'll chat with them online, you'll describe your symptoms, not like going to the doctor, Google people don't just Google all of your symptoms, because you're going to find it that you are sick, it doesn't matter what your symptom is. And obviously, your heads going to fall off next week. But you're going to chat with them. And they will come up with some basic advice. And then the next step will be that it's going to be able to examine you look at your, the new Apple Watch as you get that, yes,

Unknown 3:44
no, it's gonna be my Christmas present, you know, okay,

Unknown 3:48
well, that Apple Watch today can do some basic cardiac measurements, right. And, you know, give it a few another couple of years, they'll have all kinds of stuff that's they can use that for even the camera on the Apple Watches now are being used to monitor your skin for cancer and various other things. So it's going to be you wearing your shirt to the gym, and your shirts going to be monitoring you telling you, you better stop that treadmill right now, get yourself to the hospital might even call nine one for you. Because I've noticed a major cardiac arrhythmia or your Apple Watch is going to do that it there. Everything's going to change and it's going to be a computer-centric world.

Unknown 4:32
Craig Peterson, tech guru Wednesday morning, 738. It is that time and we're talking to Craig right now. Craig is my Facebook account for sale on the evil dark web right now

Unknown 4:45
here. This is something right. We talked a couple weeks ago about the big pack some 50 million people's accounts were hacked. And we didn't really know what was stolen and Facebook wasn't being totally upfront about everything. And then downgraded at Facebook settle knows more like 30 million people. Just 30 million. Yeah, give her know what they got, what 2 billion subscribers counter something you know. So yeah, what's 30 million? Well yes, it turns out that Facebook has not only been hacked but their information has made it onto the dark web and you can go on the dark web but right now and you can find on the new marketplace you guys know about so grow right yes i did was

Unknown 5:33
i downtown does but I do know I don't

Unknown 5:35
want can might remember the original shirt he's probably old enough yeah what is it yeah yeah

Unknown 5:41
he's doing a legal briefs

Unknown 5:44
reading about matching reading what this thing about porn and fraudulent emails with them and ask them about next. Okay, shut up. Sorry about that.

Unknown 5:54
So. So this is going to interesting because between three and co dollars on the dark web, you can go out and buy the information from the hat accounts. So it looks like this is credible. It's on dream market, which is the new big dark web market, you know, Silk Road went away was it was taken down by the FBI, the guy apparently behind it all in, you know, criminal charges and everything and some jail time. So now dream market is the new market that has replaced it. And if your Facebook information was stolen, it is apparently now for sale online.

Unknown 6:37
Alright, so Ken has a porn question. But you also have the one about about tipping by your tipping when you buy a muffin. So it's, um, it's a toss up what question I will answer. But well, knowing where your mind goes, I'm gonna go ahead and guess that pornography is. So let me get this straight. Some people are emailing us saying I caught you looking at adult website. And if you don't give me money, I'm going to drop a diamond. You basically can expose that to the public.

Unknown 7:04
That's exactly what it is. And when you got that can

Unknown 7:11
I said I don't know what you're talking about. Because I don't look at a website. I did. I did google home early this morning. But that was not on a porn website.

Unknown 7:25
But that is what's happening. But here's what's going on this. These scammers have found people's email addresses and passwords from a various online systems that have been breached. Now, what can trust me what this whole thing tells me is we are not using passwords properly. You know, you're supposed to be using a different password on every website, even a different username, different email addresses, right. So here's what happened. The bad guys got all of us information that was stolen from a bunch of different websites out there, they put it all together into a pot. And then they started mailing out these pieces of mail saying exactly what you said, Hey, we found your user information out on this porn site. And by the way, here's your password. And here's your username, which is typically your email address. If you don't pay us we will let everybody in your contacts and know that you were at this porn site and that you are a member now it's interesting because this is in fact people are getting scared because it is their password but they never visited that porn site.

Unknown 8:43
So sure they have Craig

Unknown 8:47
so what it meant in my case is I was using the same password to each site and that's what's happening out there. People are just you're using the same password and all of these sites and they're getting upset and worried because it is the password that they use but it was not hacked that porn site it was just hacked somewhere else so so you

Unknown 9:08
just

Unknown 9:11
want to make sure since I've never gone to a porn site of course that they look at my camera and be filming me looking at the porn site

Unknown 9:18
yeah well that's possible too well I was down here we did a demo of how it only takes about 90 seconds to hack somebody's computer and just from a drive by download and turn on their camera but yeah that's possible that can happen they can watch you watching porn now for me it's just my mouth starts to water cuz I love that porn but um. There's a lot of different types of poor air might not want to have that app don't visit those bites right there the worst when it comes to drive by downloads and viruses and just all kinds of bad

Unknown 9:57
let me delete hope yeah okay of nastiness would be the right place the right What do you want to ask your muffin question? Well yeah you know you bring this up that you go into a place on I will miss the place but I go in and I give them my Apple Pay or give them a credit card and they turn around and it has a tip on it I got it I mean they just hated me a muffin Why am I turning around and handing me a muffin

Unknown 10:26
something right it's a guilt play my age you feel a little guilty when they interesting my wife said to me one

Unknown 10:33
time when you go pick up the Chinese food do you leave a tip and I never asked don't yet but I've started doing it because I think it will they all put in the mail to you always tip your takeout I person Yeah. So I guess in fact, I actually tipped them Oh, I don't really well. I don't either.

Unknown 10:49
They know who you are, you know,

Unknown 10:51
can I tell your story and Sorry, I'm gonna go ahead and indulge myself here a little bit. But what one of the places that I go a lot, is a famous Daves in Scarborough. Whenever I'm in the neighborhood and they get some get a chicken salad. They're beginning for years. Because I like it. I tip them very well. And I treat them very nicely and they just changed it. Listen to me. They just changed their menu. And like two weeks before they change the menu. They're like, Man, you know, you know that we're changing the chicken. And we want to make sure that we have your opinion on this. So I made you a badge of the new chicken. Would you try it? Oh, wow. Yes, by the way, excellent chicken. But I'm saying you get treated like goals. So if you say you should check them out, your recommendation

Unknown 11:29
is a problem is because they have these little, you know, iPad or tablet and they run your card and then they turn it around to you. Now you're standing in line there are people in line behind you plus the guy that just turned this around to you. And the default tip amounts are like 1520 or 25% for handing them a muffin or grabbing some coffee. You know what what's going on here it is it's really awkward and I've been there myself and for usually just say other and I give them some minor tip like a box or something as opposed to the two or $3 it might be recommending it you know, they're not paid terribly well. But I I think that's kind of tip shaming should go away. That's a part of technology. I definitely don't like

Unknown 12:22
yes, shaming should go but you should still tipping point shaming should go away to

Unknown 12:28
Craig

Unknown 12:29
Well, typically

Unknown 12:30
absolutely as you should. We're going to go and leave it there Craig, appreciate you joining us and we will talk to you again next week. Sir.

Unknown 12:36
Hey, take care guys. Bye bye. Alright, great. So of course

Unknown 12:41
ties into a script doing

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 30, 2018

Your next visit to your doctor may be with an artificial intelligence. Is it a good thing or a bad thing?

Craig is on today with Jim Polito as they discuss this in depth on The Jim Polito Show on WTAG.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Your Next Appointment May Begin By Talking With An Artificial Intelligence

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/30/2018

Your Next Doctor Visit May Be With An Artificial Intelligence

Craig Peterson: [00:00:00] Good morning, everybody. Craig Peterson here this morning. I was on with Jim Polito. And of course he is down in mass covers pretty much the whole state, parts of Vermont, Rhode Island, Connecticut. So it's always fun to be on with him, too. Because not only does he have a lot of listeners, but he's a fun, great guy. Love the guy. Now, he was talking about his doctor's office, and how he thinks they might be using this artificial intelligence to book appointments, change appointments, etc. And he's been meaning to ask me about that for a while. So I had, I think, some great information that many people will be interested in. And I think you're going to be interested in it for real personal reason, this could be happening to you. And if you're in the medical field, or you know, someone in the medical field, you're going to listen to this as well, because there will be huge impacts throughout our whole society. So here we go with Jim

Unknown 0:57
as a topic for today. I'm talking about our tech guru Craig Peterson. Good morning, sir.

Unknown 1:03
Good morning.

Unknown 1:05
Well, listen, here's the deal, I swear. And I've been meaning to ask my doctor's office and the guy is a British accent. So it's either an answering service that answers for them a calling center, or its actual artificial intelligence. And I feel like with the little bit of a delay in the way that he answers that it could actually be a computer I'm talking with, and you're saying we're not doing it could be right. Yeah,

Unknown 1:34
absolutely. In fact, that there's a couple of audio samples in today's in the email. Yeah.

Unknown 1:41
Danny, you know what? Because of my problem with my computer, can you pull up some of those audio, he embedded them right, in the email Craig did. And before we play one of them, Craig, this is actually now possible to have a conversation with a computer. Yeah,

Unknown 1:59
this is happening more and more out. And, and it shocked me. It really it started in a few different websites, for instance, there. Have you ever use this site called Facebook?

Unknown 2:13
Oh, yeah, of course.

Unknown 2:16
Actually. It's open right now on my computer. And but I have a problem with this desktop right now with my email. So go ahead. Yeah, so Facebook,

Unknown 2:26
Facebook Messenger. And there are a lot of companies that have taken messenger now and tied it into what are called bought. So when you send a message to somebody to some company, and you get a pretty quick response, that's almost always the computers that tech has been around for a while you're asking about your doctor's office, which is interesting, because as you pointed out, there's companies like an angel, there's a couple of others out there, that what they do is they listen to your voice. And they have kind of a pre-program, very limited script. In the you're also mentioned that which is, you know, say the extension here calling or tell me what problem you're trying to solve today. And it's obviously a computer. Well, things have changed lately, because of the whole advent of machine learning and artificial intelligence. And it's gotten to the point where, at the very high end, yeah, these systems can have a conversation with you. And that conversation, you really can't tell that it's a computer, and that's the ultimate touring casts you touring was the guy and Bletchley Park over in the UK. Yeah, who came up with the code breaker for the German Enigma machine. So we were able to break the German code for all the last time for so the war and he just a brilliant man, but he said, the ultimate tasks will be can you tell the difference between talking to a human or talking to a computer? Yeah, yeah,

Unknown 4:12
that was just a movie that came out about that it didn't do well. And it was kind of weird, but it was a very wealthy IT person conducting what would be an illegal test to determine that the Turing test Yeah, can you tell the difference? Are you able to know? Yeah,

Unknown 4:33
we are literally just years away from a passing missions pass the Turing test. So in answer to your question about your doctor, your years, probably a pause because the guy probably is in the UK or, or some other place. And so it takes a little while for the data for your voice to get there to come back. Okay. And you notice that on shelves for so for instance, you and I are talking this morning and there is a one or two-second delay, I'm I'm down in Washington, DC in the belly of the beast. Oh, boy.

Unknown 5:10
You feel sorry. Please. prayers for me. If you

Unknown 5:13
don't forget to take a shower before you leave there, you know. Yeah,

Unknown 5:16
so your doctor? Probably not. Okay. There's a great example. Hopefully, Danny.

Unknown 5:25
Danny, why don't you play that audio of this artificial intelligence? having a conversation happening healthier?

Unknown 5:30
Hi. I'm calling to book a woman's haircut for our clients. I'm looking for something on May 3.

Unknown 5:37
Give me one second.

Unknown 5:40
Mm hmm.

Unknown 5:43
Sure. What time are you looking for? Well,

Unknown 5:47
at 12 pm, we do not have a 12 pm available. The closest we have to that is a 115. Do you have anything between 10 am and 12 pm? Depends what service she would like. What services she looking for.

Unknown 6:04
Just a woman's haircut for now. Okay. We have a 10 o'clock. 10 am is fine. Okay. What's her first name? The first name is Lisa.

Unknown 6:15
Okay, perfect. So I will see Lisa at 10 o'clock on May 3. Okay, great. Thanks. Great. Have a great day. Bye.

Unknown 6:23
Now. The computer was making the appointment right Craig?

Unknown 6:28
Yes. Yeah. Yeah. digital system that's it

Unknown 6:32
now nobody all the day did was teach it to make that appointment and but also be able to understand the responses from the woman answering the phone? Yeah,

Unknown 6:43
well, it was a little bit more than that they this was really kind of a first-generation artificial intelligence developed by Google and they had trained is all about phone calls, phone call etiquette. How human make phone calls and all about women's beauty salon. So the AI knew about that. And did you notice that she did a couple of things like she like the artificial intelligence through and some Yeah,

Unknown 7:15
I mean, you could tell it was a little, you know, but there's no way that that woman on the other end of the line was suspicious at all.

Unknown 7:25
No, I don't think she was she was busy with their job. But that's that's what Google's aiming for. And these other companies is, you know, we've got things like Alexa their homes and offices and that Google Home and apple and I, Siri and others, those are all aiming at this will know what you like thing, know what you need, and they will be able to not only make care appointments for you, but think about this thing. Like your doctor's example. your doctor's office might have an artificial intelligence as well. So you'll have to a ice hockey I know

Unknown 8:04
but you know, I was I was actually changing an appointment when I made that call. And that's why I thought this is strange. But anyway, that's very, very interesting. Is the other example that you put in the same as this one

Unknown 8:19
different Apple much more difficult looking at a restaurant

Unknown 8:25
restaurant reservation. Okay, let's try this.

Unknown 8:30
I hear you. Hi. I'd like to reserve a table for Wednesday. The second

Unknown 8:37
seven people.

Unknown 8:39
Um. It's for people for people

Unknown 8:46
Wednesday at 6 pm.

Unknown 8:49
Oh, actually. We need to fill light opera like a five people healthier for me. Well, you can come

Unknown 8:57
How long is the way usually to be seated.

Unknown 9:01
When? Tomorrow week? A

Unknown 9:04
for next Wednesday. The seventh? Oh, nice. Not too easy. If you can cover for

Unknown 9:13
Oh, I gotcha. Thanks.

Unknown 9:16
That was pretty good. Because the woman had a language issue and wasn't answering because of that was giving incorrect answers. And the computer which was the man calling to make the reservation was able to adapt. Wow,

Unknown 9:35
that's something when we're thinking about your doctor's appointment with your kind of how we started this whole conversation. Yeah, we're getting into the point now. Where

Unknown 9:49
I hate to say it. Yeah, but artificial intelligence Now, depending on what the diseases but just generally, the tests that have been done much attentive to the patient needs

Unknown 10:04
gifts, the correct like most Yeah, at a much higher rate.

Unknown 10:11
It's good. It's gonna be like Star Wars, there's gonna be a droid over me taking out my appendix.

Unknown 10:18
That's what's gonna happen. It's when it's like what we're doing. Now. I have a service that I use that I can get on Skype with and cost your doctor and you know, the doctor can prescribe certain basic medications. Yeah, but now the doctor says, Yeah, you better go to the emergency room. Right? Right. You know, so the next step beyond that isn't the doctor on guy, it's an AI on Skype, or the phone or whatever, helping you out, tried to do bit of attack, gnosis have been sending you to maybe a hospital, if that's what you mean. And it's hard to be way for anything we have today. And it's going to be very efficient. And I don't know how the bedside manners going to be. But you listen to these calls, then the artificial intelligence in both cases was very polite. Yeah. And maybe it'll be better. But no,

Unknown 11:16
you never know. This was fascinating. Folks. This is just one topic with Craig Peterson and weekly he provides me with many. And if you would like to actually get the same information that I receive every week, you can do it all the job to do is not the artificial intelligence and text My name to this number 855-385-5553. That's 855-385-5553 standard data and text rates apply. But I promise you, the real Craig Peterson will get back to you not an Android, right. And when I say right, I mean, the Google hardware. I mean, like in the old movies, we used to call them androids, right?

Unknown 12:08
Enjoy Yeah. droids. But Google is

Unknown 12:14
a statement from George Lucas Craig was this was fascinating and so when I get the English guy again, I'm I am going to ask them Are you a computer

Unknown 12:27
question is how should they answer

Unknown 12:29
right yeah, no, Jim I'm not a computer. Yeah,

Unknown 12:35
there are proposed was that says that if you ask and a

Unknown 12:40
half good proposed lot, not there yet.

Unknown 12:45
Open the pod bay doors. How open the pod bay doors how

Unknown 12:51
Craig theaters on our tech talk crew fascinating segment. Thank you, Greg.

Unknown 12:55
Thanks, Jim.

Unknown 12:56
Bye-bye. Bye. Bye. We will be back with a fun

Unknown 12:58
Hey, don't forget to visit online http://craigpeterson.com. Sign up for my weekly emails. You'll get everything that we just talked about with Jim, in fact, a whole lot more because I think I had eight different articles that I curated this week and we only got two one so make sure you visit me online http://craigpeterson.com. Also that's where you will find out about these special free master classes that I have no credit card required absolutely no commitment on your part other than to show up and these are great training. You should see the feedback I've gotten on my webinars. I have hundreds and hundreds and hundreds of positive comments from people so I know you'll enjoy them. But the only way you'll find out make sure you subscribe. http://craigpeterson.com/subscribe. Hey, we'll be back tomorrow. Take care. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 29, 2018

Did you know that there are some major problems coming up with our election this morning?

Craig spoke with Jack Heath today about election hacking and the new technology coming from China that might give you concerns about your refrigerator.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/29/2018

Election Hacking Already Underway - Concerns About Your New Refrigerator

Craig Peterson0:00 Hey everybody. Craig Peterson here. Did you know that there are some major problems coming up with our election this morning? I spoke with Jack Heath a little bit about that we have some hacking going on. And it's going to throw some of the results really into question. What's, you know, what's the way around this? What, what should we be doing ultimately, and also spoke with Jack Heath about something new to him. Anyway, so IoT. You guys know about this, because we talked about the internet of things all the time. But he's worried about more than just a frozen chicken dropping out of his fridge with all this new technology coming out of China. So here we go with Jack.

Unknown 0:40
All right. Craig Peterson, our tech talk guy for a few moments. Sorry, Craig between the elections and Red Sox World Series championship. And sometimes it's a little more interesting than the latest app but who knows after last night there may be an app out of this

Unknown 0:54
window I'd like about the latest app Hey, I just want before something else in about the elections. You've got the as a and the CIA investigating right now because we've seen a major uptick a

Unknown 1:07
workshop where Trojan, excuse me, is always ransomware that seems to be related to the election this year. It really looks like it might be happening. forensic experts are now saying that it looks like China or Russia are trying to hack into voters machines and then use targeted advertising to get them to change the direction they're going so all full court press here on the technology frontier looks like yeah, they're going to definitely metal this time in the election

Unknown 1:43
or try to right Yeah, yes, they can resist

Unknown 1:48
Absolutely. So if you're in Minnesota, Missouri, New Jersey, Florida, those are all targeted though. It's like they're targeting the districts where there is a close competition right now between the Republicans and the Democrats we're not quite sure what to do. And they tried to sway in one way or the other or just cause us to have a lot of confusion about whether or not our election results are justified if it really was tampered with. So we're gonna have a fun two years trying to figure out what happened.

Unknown 2:19
interesting article in the New Hampshire union leader today in the business section. Cyber Security can frighten and it's just one person talking about he has a smart refrigerator or freezer, allowing me to digitally track its contents receive notifications when temperatures get too high, or even low and when I'm on vacation, but it also has to be connected to the internet placing into the category called the Internet of Things, meaning it's one of 11 billion devices, not counting computers or phones wirelessly connected wirelessly connected to the internet all over the world today is mind-boggling.

Unknown 2:54
Yeah, and he has reason to be concerned because a lot of those refrigerators and other appliances are running operating systems that are not only known to be easily vulnerable or vulnerable from the start. But we now have for instance camera companies that are showing cameras from China but you may not even know it's from China and those devices are then being used to launch attacks against you against other businesses so your fridge rater could be used as a launching pad in order to attack you and get information about your account in fact that you know the Facebook has just happened here a couple of weeks ago we have now started seeing your Facebook account those 50 million people your Facebook account is selling on the dark web for about three bucks right now and if your refrigerator tax you your personal information including your bank accounts with all of your lightning

Unknown 3:53
gear and people all right well, I guess

Unknown 3:56
my clothes for

Unknown 3:58
my refrigerator's been attacking my waistline for years or that bank account my big fears when you open the freezer part and you know some frozen is going to be fall and land on your foot. Usually when you don't have any shoes. All right, Craig Craig Peterson with an O n. com. Thanks, Craig.

Unknown 4:13
Take care. Bye bye. All right. Well, we come back

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 27, 2018

Yes, the Chinese are coming after US small businesses. Listen in as Craig tells you about a local NE Company that got hit with Spear Phishing that contained an unknown never before seen virus.

Do you use Facebook? Do you know if your information was stolen during their last hack of 50 million users? Craig talks about how that information is now showing up on the Dark Web.

Are you investing in Cryptocurrencies? Today Craig talks about Cryptocurrencies and Blockchain technology. Warnings and Advantages.

Would you visit an AI Doctor? Would you know? The Future of Medicine will include AI and Google shows how it happens and how you may not even know.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up) On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/27/2018

Chinese Hackers, Future of Medicine and Google AI Chatbots, Facebook Hack showing up on Dark Web, Fake Videos, NIST Security Standards

Craig Peterson: 0:03 Hi, everybody. How's that for a little drum roll introduction. This is Craig Peterson. Glad to be here with you today. We've had a busy week, Back at headquarters. We ran a webinar. Again, another one for the FBI this week. And this one really kind of scared the living daylights out of me. I guess. You know, some people say, hey, Craig, I listen to your show. And I'm always just scared when you're done. Well, listen, I'm scared to. It's crazy what the Chinese are doing when it comes to stealing our technology. Doing it on a government-sponsored basis. You know, I hear from people, that you just can't hide anymore in the world today, unless you've got a government helping you. Well, when it comes to hacking. Think about that just for a minute. Can you protect yourself against the government that's coming for you? And, this week, we had a client, who we got just a few months ago. They were under severe attack, like 5000 an hour, that were directed specifically at them. We are talking about spear phishing emails aimed at them. And they provide, again, some equipment, this is another customer, I haven't talked about these guys before, I don't think on the air, but they provide equipment that is used, ultimately by the government. And it, obviously, it's the Chinese and they're going after this. So, all of our alarms started going off. We were capturing them. The other thing that's really kind of unique, you know, when you think about having your antivirus software and stuff on your computers, and how ineffective it is, frankly. In this case. Obviously, there's anti-virus type software in place. But, we have something that allows a what's called a retrospective pull back. So, we were seeing in the course of an hour, as I said, 5000 attacks coming in, most of those were via email. And, what was really interesting is most of those attacks were with virus type software that had not been seen before. Now, we're not talking about, if you were on my webinar on Thursday, my free webinar, you learned a little bit about what a polymorphic attack is. Where the software is constantly changing itself. And, I found a lot of people didn't even know that was possible. But that's not what was going on with this client. The software wasn't just changing itself, so that it had a different checksum. Because that's how a lot of this anti-malware type software works. It's taking a checksum. It's kind of like your own immune system saying, oh, I've seen this before I know how to deal with this virus. No, it was actually, different ways of trying to get around the protection software. Now, what's really kind of fascinating about this, at least from my standpoint is. this company had approached us a couple of months ago, we actually talked to them about a year ago. And they said, Oh, no, no, we're, we're all set. I think we're okay. We just, we can't afford to kind of try and do this, right. And then they reached out to us two or three months ago, saying, Oh, my gosh, I think we lost all of our intellectual property. We might have lost all the client records, everything. All their stuff was stolen from them. And this is what I warn small businesses about all the time. This is why I'm doing the hundred free cyber health assessments this year. I'm not, you know, I normally charge for these things, anywhere from one to $5,000. But I'm doing just kind of a micro-version for 100 businesses, because I really, really, really want to help businesses. Help them understand what their footing is. Understand what would happen if they got hacked. Well, anyways, these guys came back to us and said, Whoa, is it too late? Is there anything we can do right now. So, we tightened everything up substantially. We put in the proper types of firewalls, not the things you buy at Staples, or that your local break-fix shop that sells your computers to you. Not those types of firewalls, but real ones, professional ones. And professional switches as well, that are all managed, but not just managed. But this all operates as one big network monitor. Everything going on inside of the network is monitored. Everything going on is examined for known problems. And, then it's behavior is analyzed as it's trying to run on a machine or go through network, and further data is gathered. And, it goes so far as we will literally shut down the port that that machine is on if something malicious is happening. So, in this case, what happened is the software came in, it wasn't something that any anti-virus software has seen anywhere in the world. Now, we are tying this in with a billion endpoints around the world. That's a lot of data. And, all of this data is analyzed. And, there's an AI type machine, this looking at it all, plus there's people that look at it. And, in fact, in this case, they looked at it and said, Whoa, wait a minute, because it looked like it might be something going on here. So, we automatically send a copy of that software up for further analysis. And, so the analysis happened and our guys looked at it and said, Whoa, wait a minute. Now, this, this could be a real problem. And so that's where the retrospective analysis comes in. We initially looked at it and said, I'm not so sure about this, we're going to kind of quarantine it, keep an eye on it, make sure it's not going to do anything evil. And if it starts to, we will back it out. And that's what we had to do multiple times this week. Most of that was automated. But just, you know, wait a minute. Now, retrospective is showing that this could be really malicious stuff. And, so we ended up this week, with dozens of different samples of malware that we ended up working with Cisco TALOS on, that they had never seen before. No one has ever seen before. We were debating if we should bring that up with the FBI or not. But you know, that we will let TALOS worry about it this time. But that's what's happening, right now, right here, right here in New England. And, it's happening all around the world, as well. But, this is somebody I know, this is a client, they're coming after us. And I can't emphasize this enough. If you're a small business owner, you can not afford to use that hundred dollar a year anti-virus software and think that you're safe. Because, you're not. So, that's what these webinars for, I'm going to be doing more or less one a week. And we're talking about different aspect of security and, and some of the technology you can use as a business person. I'm not selling anything, okay, people I've been doing this radio show for more than 20 years. And it's all about keeping people up to date. And as a small business person, you've got to stay on top of this. I know you're already losing sleep over it. I know you're fighting with your wife, kids and employees about it. Yeah, you know, who wouldn't be you've got all of your employees online, doing who knows what, all day long. And if you have multiple shifts all night long. And a lot of the times they are causing you nothing but headaches. Because when we talk about the attack this week, we're talking about the thousands of attack attempts against this one company, all it would have taken is that, for instance, just a simple one, one of those emails getting through and one of those employees clicking on that email. Now, in the case of our client, they still would have been okay, because we were stopped it. It could have been backed out retrospectively, if something happened. And clicking on that link and trying to go to another website, we are blocking that proactively, as well, when it becomes a bit of a negative site. So, there's just all kinds of gyrations going on behind the scenes. But it's huge. And then to have an expert that I interviewed on the FBI InfraGard webinar on Chinese stuff. Oh, my gosh, that was just incredible to hear what's going on. And by the way, again, if you're a small business guy or gal, a big business guy or gal, you're involved in any part of the critical infrastructure to this country. This means you're in finance, maybe you're part of a power company, maybe your maybe your law firm that has information or healthcare organization, make sure you join InfraGard. There are chapters all over the country. I think there's like 80 local chapters. Last I checked, you'll find them online at InfraGard or I N F R A G A R D dot org or you can always just send me an email just me, M E at Craig Peterson dot com. That's how you send me an email because I'm Craig Peterson. And I'll point you in the right direction. It's a volunteer organization. We're all volunteers, but to hear what he had to say. And I've got the video done and it's going to be posted up on the Infragard website as well, about the Chinese and the Chinese hackers. But they really are at it out there. It's, it's just going crazy. Let's see, I just had a text come in, and my 855-385-5553 number 855-385-5533 asking who it was. If you want to find out more, you can find them online. The guy's name was Joshua Phillip. He's a senior investigative reporter over the Epoch Times and he's been following China for a long time. And you can find them online at theepochtimes.com that the E P O C H  T i m e s dot com there are some just amazing things that he's uncovered and he was sharing

Craig Peterson 10:14 you know. Unfortunately, the FBI InfraGard webinars that I run are closed, only for InfraGard members. The other ones that I'm running are wide open for anybody, and you're welcome to attend. And we got some pretty cool stuff coming up we're going to be talking next week a little bit more detail about backups and how can you make sure your backup is working. What are some of the backup software packages you might want to look at if you're going to try and do it yourself and all of that? So, it's going to be an interesting time. I'm not sure what day we're going to do it I think we're aiming for Thursday or Friday next week. But I'm traveling next week and the week after so it's gonna make a little difficult but if you sign up on my website Craig Peterson dot com, you will see right there sign up form, and you can get on my waiting list. And I'll let you know when the next webinar comes up. But absolutely free. Just trying to get the information out there and, and help people out. Cause it's a scary world, frankly. Can't imagine some of these people waking up in the morning and having everything stolen. But anyways, mumble mumble right.

Craig Peterson 11:25 Well, we talked how a couple of weeks ago about this Facebook hack. You know about the hack. I'm sure it's been on the news. A lot of media outlets have been talking about it. 50 million users got hacked. And, and Facebook's been kind of slow in saying, Who was hacked? What was taken? Informing people that the hack had happened, right. Well, now we're starting to find out what really happened because the independent which isn't you'll find them online. They're actually based in the UK, Independent co dot uk The Independent newspaper has now found people's Facebook accounts hacked and selling for between three and $12 on some underground black markets. Basically, on the dark web. Now they're being found on dream market, which is probably right now, they are the leading online marketplace for illegal information, stolen information, online. They've got a similar rating system to Amazon. Do you like that? Where they say yeah, these guys are legitimately bad guys. But, you know what, there is honor amongst thieves, so trust us. They are selling the Facebook credentials, and the people that are selling these appear to be pretty well trusted on the dream market. So, the data is probably authentic. You know, we'll have to see. But you've got to use of course these semi-anonymous digital currencies like Bitcoin or Bitcoin cash in order to buy them. So, if they were able to sell them, what would that 50 million Google or excuse me, Facebook accounts be worth bottom line? Well, probably somewhere between 150 and $600 million dollars. Isn't that just amazing when you think about it, personal information is just incredibly valuable out there on the dark web so here's

Craig Peterson 13:31 Bill Connor, he is a security guy out there, and he does a lot of work with the US/UK governments as well. Quote, personal data and personal information is simply too valuable on the dark web as long as stolen data continues to fetch high prices and equip perpetrators with the means necessary to carry out attacks hold victims ransom, extort information, or destroy property, organizations must exhaust all measures to diligently detect and protect their networks, devices, and users. End quote. And then we have what we just talked about, right with China, where we've got nation states also going after all of that data. We got to take this very seriously, I don't, I don't know that we're taking it seriously enough, individually. The federal government has some new rules that went into place in October 2018 this month. And what the feds are saying there is all government agencies have to meet these minimal standards that they have established. And these are basically the NIST standards, but only about half of the federal government agencies meet these standards. And just because they meet the standards does not mean that they're safe. That was another thing we covered on Thursday's webinar. When it comes to you and your business and trying to keep all of your data safe. There are rules, there are regulations, there are standard. So it's also very confusing. Which ones do you follow, and we'll be talking more about that in the open webinars here in the near future. Of course, your listening to Craig Peterson. I'm on these radio stations every Saturday morning at 1130. So, make sure you tune in. And if you want to get a little reminder so that you remember to tune in. Just text me at 855-385-5553, you can ask to be on my weekly email list. You can also ask to get these notifications, and we'll put you on them. I also send out text messages when there is a big countrywide hack or something else going on to make sure people are aware of it. Make sure you know what's happening out there. So we have all of that sort of thing, available and all you have to do is either email or text me 855-385-5553. So, now on to another cryptocurrency problem.

Craig Peterson 15:58

You know, I love the fact that called cryptocurrencies, because a lot of people think, oh, cryptocurrency it's cryptographically secure, right? That's not what it's about. Well, in fact, did a test isn't and if you've been studying cryptocurrencies for a while, you know that. You've got to be very careful. And, there are there's a story that was out this is the Reuters feed this week talking about a couple of Peggy and Marco Lockman. And they learned that some hackers had cracked their 40 character password that was used for their cryptocurrency wallet. And the bad guys took about $14,000 right out of the cryptocurrency wallet. Now these two, Peggy and Marco, just they rolled with the punches. They didn't even bother reporting it to the police and the quote from them, is

Craig Peterson 16:56

there a quote there was nothing we could do. And they also said, we've studied cryptocurrencies for about a year before investing. So, we are aware of the risk. So, could you lose all of your money in your account? This problem that Marco and Peggy had really, it's emblematic for this whole cryptocurrency market. There are some rules, but there aren't a lot. There are some rules about initial coin offerings that the securities exchange commission is trying to enforce. But really, it's it's, it's a scam, right? Okay. I said it, and I know there's people that hate me for saying that. I was at a conference a little earlier this year. And there was someone there who was just totally peddling cryptocurrencies. Now, I love the idea of having a currency that is me spending my money, right? You pay cash, just somebody and hopefully, you can't be you can't be robbed of your cash. And that's the idea behind this, isn't it? And there isn't someone in the middle like a credit card company charging the vendor two or 3% plus a per transaction, charge and everything else. Should we be able to just exchange goods for labor, you know, fair, open exchanges, you know, you know, I'm pretty libertarian about all that stuff. But in this case, we're talking about a fool's errand because the police are never going to be able to catch these people. Look at some of the major thefts, millions of dollars worth of these crypto coins that just have not being caught. These people haven't been caught. And then the 50% problem that we've talked about on the show before where if you are a nation state, or if you're big enough bad actor, you can own.

Craig Peterson 18:51 the cryptocurrency. And we're not getting into all of the technical details of how all that works, but it's decentralized. Everybody basically votes on whether or not a transaction occurred. And if you control 50% of the votes, guess what you control the currency. So, there are some estimates showing cryptocurrency crime is on the rise. I know part of the reason for the value of cryptocurrency is crime. It has been ransomware, which we talked about on our webinar this week as well. Our open webinar. So, you know, law enforcement agencies there's not equipped to be able to handle this very often. It looks like are, you know this is a guess, but that most of these crimes are just not in, you know, investigated. The thieves can be anywhere. They can use your money anywhere. It's not like a credit card that can be shut down. So, be very, very careful if you're looking at cryptocurrencies. It is probably the most speculative market that there is out there. And I know there's people that completely disagree with me. That think it's a great investment. That cryptocurrencies are the future. That the whole blockchain technology is what's going to keep our privacy. In fact, and there are people who are saying we should be using blockchain to identify ourselves as being who we say we are in this day and age of stolen identities. I don't hundred percent disagree with them. I think there's some good opportunity there. But, if you're a little older, and you're concerned about losing everything you have. You just might want to think twice about it. Now this article by the way from Reuters. I put up on my website Craig Peterson dot com so you can read it right there.

Craig Peterson 20:44 Well, next up here, your doctor appointment. Have you seen the ads or heard the ads, I know, I've heard them on some of these stations before. But the ads where there is now an app that you can get for a psychiatrist. So, you're having issues need to talk to someone about it? Well, there's an app for that. And as we go forward, there's going to be more and more of those. We've already seen people going to Dr. Google, in order to figure out what might be the problem. And of course, Google is not a great place for that. It can't ask you questions, It can't drill down. It's not really designed to do that. But there are some apps that are. You've got Babylon, Adda, ADA, your MD, doctor dot AI. But right now Babylon is a front-runner because it's been integrated with the UK is National Health Services. So, it's showing how this type of tech can change the way health services are run, and also how they're paid for. And you've seen the new Apple Watch four which has the ability to monitor your cardiac rhythm to a degree. There are more and more medical devices that are being tied in. On the part of this whole IoT, the Internet of Things. And your next appointment with your doctor may well be, just AI based. I have a medical program that I'm a part of where we get as; basically, you get on Skype, and you can talk to a doctor and get a diagnosis, and they can prescribe basically antibiotics, not much more. I was very disappointed by that. But anyway, but you can find out if maybe I need to go to the local clinic or to the hospital just by hopping on to a website. So, this is the future. And you're going to be able to have a chat back and forth, already chatbots that are running on Facebook, you might even have spoken with one before, and a Customer Support Center and not even realize that you were talking to an artificial machine. Earlier this year we had Google demonstrating, its ability to make a hair appointment for someone. It sounded like a real person. But in fact, the phone call was made by a computer robotic voice got on and made that phone call.

Google AI ChatBot 23:20 Hi. I'm calling to book a woman's haircut for our clients. I'm looking for something on May third. Sure. I give me one

Google AI ChatBot 23:29 Mm-hmm.

Hair Salon 23:32 What time are you looking for around? At 12 pm. We do not have a 12 pm available. The closest we have to that is a 1:15. Do you have anything between 10 am and 12 pm? Depending on what service she would like? What services is she looking for?

Google AI ChatBot 23:53 Just a woman's haircut, for now. Okay, we have a 10 o'clock. 10 am is fine. Okay. What's their first name? The first name is Lisa. Okay, perfect. So, I will see Lisa at 10 o'clock on May 3. Okay, great. Thanks. Great. Have a great day. Bye.

Craig Peterson 24:12 Now. If that doesn't freak you out? I don't know what would. That was the Google artificial intelligence calling the hair salon. This is the future and not the distant future. That was real. Now they did another demo of a restaurant with some really weird questions and things that was kind of interesting. But when you're dealing with a human, you never know what you're going to get, right, when it comes to questions and stuff. So, keep an eye out for this. I think AI doctors are right around the corner.

Craig Peterson 24:51 Now we talked a couple weeks ago about some of the

Craig Peterson 24:57 the fake video that's out there, right and how it's so easy to create a fake video. And paste somebody's face on to it that wasn't there. You know, this has huge implications for the future. And I spoke to Jim Polito about it as well, on his radio shows. It's very concerning, and it's very difficult to stop, and I've got an article up from the Washington post on my website at Craig Peterson dot com, talking about this. And it shows a video that was shared in early September on Facebook. And you might have seen this that the caption said a Capital airlines Beijing to Macau for the flight carrying 166 people's made an emergency landing and Shenzhen on 28th August after boarding the landing attempt in Macau due to mechanical failure, the airline said. So, that's what it said. If you watch the video, you saw this plane, big commercial plane doing a full roll maybe a few hundred feet off the ground. Then it looked legit, but it was not. And Geoffrey Fowler, who's the guy that wrote this article did a whole bunch of research into it, contacted Facebook. And Facebook is saying, by the way, they're going to be adding 20,000 people to their investigative team to help detect this type of fake video, in the future. But millions of people were fooled by it. Hey, that's it for today. Make sure you sign up for my webinars. Okay, these things are free. I'm doing 100 free cyber health assessments for small businesses by the end of the year, this year. So you can find out more just go to Craig Peterson dot com. You can sign up. You'll learn a lot about what's happening out there. I go through in some detail, help you understand it, gave you some tools, some how to's. And above all, a good success path to make it through all of these can be confusing things. So, have a great week. Any questions just text me 855-385-5553 or email me at Craig Peterson dot com. Take care. Bye-bye.

---

Related articles:

Your Next Appointment May Begin By Talking With An Artificial Intelligence

After The Hack: People's Facebook Accounts Now For Sale On Dark Web

Hacked, Scammed And On Your Own: Navigating The Cryptocurrency 'Wild West'

You Might Find Your Next Home on Amazon

I Fell For Fake News. Here’s Why Millions Of You Did, Too

'PAY THE RANSOM - OR WATCH ME WRECK YOUR LIFE': Chilling New Fraud Email That Says You've Been Filmed on An Adult Website

Hackers Breach Healthcare.Gov System, Taking Files On 75,000 People

You Want 20% For Handing Me A Muffin? The Awkward Etiquette Of iPad Tipping

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 24, 2018

 

How is your Wi-Fi?  Listen in as Craig, Ken and Matt discuss why it is going to get a lot better and soon.

Do you travel? Do you use Frequent Flyer Miles?  Craig, Ken, and Matt discuss the newest currency of Hackers.

Keep your PC on, or Turn it off -- Age-old Question.  Craig, Matt, and Ken discuss the pros and cons and why you should probably turn it off.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Huge Improvements Coming to WiFi

Frequent Flyer Miles Now A Big Target For Hackers

Does Turning Your PC Off Every Night Make It Last Longer? This Is What 8 Hardware Manufacturers Have To Say

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/24/2018

New Wi-Fi Standards, Stolen Air Mlles, Turning off your PC

Craig Peterson: 0:00 Hey, Good Morning, everybody. If you're involved with protecting the computers in your business, or you know someone involved in a government office or an NGO, you really need to look into the Infragard. There's no question about it. It's a phenomenal program. And yesterday I ran webinar for the Infragard program and we were talking about the Chinese and what they're doing it is way worse than I ever thought it was. They are really getting into everything. So just a real quick shout out Infragard.org is where you can find them online. I n f r a g a r d dot org and sign up. It's well worth it. They have to do this lightweight background check and it takes a few months usually but then you're going to start getting up to date information that type of stuff I get. So, if you're really into it, check it out. Alright, so today I was on with Ken and Matt. Then per usual, we went through a few different things. We talked a little bit about turning off the power on your PC's. We also talked about the new Wi-Fi six standards that are going to be coming our way and you know a couple of other things. So, we actually had a little bit more back and forth this morning with Ken and Matt. So, we're gonna go with that. Also. I have tomorrow's webinar ready. This is a public webinar about ransomware and about what you can do. So, make sure you sign up for that. Craig Peterson dot com Craig Peterson dot com. So, here we go.

1:38 It is 739 on the WGAN Morning News. And it is Wednesday. Which means Craig Peterson is with us once again to give us an eye on technology around the world. How you doing, Craig?

Hey gentleman, Did you know what the differences between a Fenway Frank and a Yankee Stadium dog, Fenway Franks are still being served right now. Oh, boy, that was perfect. Where's the rim shot? Yeah, I'm done. You can get a Fenway Frank. Yes, you can.

2:04 So, speaking of Fenway Frank's, I'm not going to talk about China and Russia right now, because I'm tired of China, Russia, but I am interested in anything new about Wi-Fi. Because my daughter says it's been like $1,000 to improve the Wi-Fi at our house. Is there hope coming to us? Yeah, we have those little airport-

2:22 things all over the place. Oh, yeah. those are those are actually pretty good. There are some good Wi Fi boxes out there, routers. And, you know, we talked about some of the routers and some of the problems she mentioned with China. But we have new technology coming up for our cell phones. But you already know that right, we've got five g coming out. 5g LTE and Wi-Fi has always been confusing to people. You know, we started with 802 11 A, then B. And then I remembered I think there was a see there is a G, there was an N. Now there's an AX. So, there trying to do two things. One, they're trying to make it a little easier to understand. So they're changing the Wi-Fi logo, you know, that little logo with the three kinds of concentric circles? And it shows you a quarter of the pie. Yeah, in the top. Even Matt, even your Android phone probably has that same logo.

3:20 Yes. My archaic brick of

3:24 that one. Yeah.

3:26 So, what we're gonna do is, to add a little number in there. So now, instead of all of these confusing numbers and letters, it's going to be Pie with a number. So, the current standard will be called Wi-Fi five. And then the older standards, obviously, they're going to go down. But, I think I can see what you're referring to something called Wi-Fi? sec? Yes? Which is the new generation. You're going to need this because do you have a 4k TV right now?

3:54 Yes, I do.

3:55 Yeah. Okay. And do you have like Netflix, or Yes,

3:58 Netflix, and Hulu and Amazon and all those things

4:03 Will get one everything? Well, the problem a lot of people are having with their older WI-Fi is that there just isn't enough bandwidth to be able to run your high def TV at full speed. And, so they come up with a new standard, it's going to be hitting the shelves next year. That they are calling Wi-Fi six. It fixes some of the security problems. Plus, it can run fast enough for your next TV, which is going to be an eight K TV

4:35 forgot?

4:37 Can I even see that?

4:39 You know, honestly,

4:42 one of the things that's kind of neat, if you might not have really noticed this, but a 4k TV looks better with everything because it has some very smart software inside of it. So, you can feed it a pretty crappy old, even a VHS signal, but certainly a DVD and it up scales it to make it look a lot better. So, Matt, in answer to your question. Yeah, you can see it in a very large TV. But, if you're using a smaller TV eight K is not something that's going to make a big difference for you. You know, who really likes are you? Are you a gamer? You can see yourself a gamer at all, man.

5:22 Yeah, man, are you a gamer? Yeah, back in the day, I might have been. But now I have four kids. three jobs and no time. So, now, not really. But I might I do have a PlayStation four. And my son plays it. Yes. So occasionally, once a year or so I might be able to pick it up.

5:35 Well, if you're much beyond Donkey Kong, you're you're going to know about this kind of stuff, you're going to notice the difference. So, all of the all of the Wi-Fi will be faster, it covers your house a little bit better than what you have right now. And it's going to be able to handle all of the future expansion that we're looking at. And frankly, it's needed for the cable companies who are going to have to compete against the cellular networks. Because remember, I mentioned five G, the new standards on cell phones, well, that's going to make it so in most of the more Metropolitan and even suburban areas, you're going to be able to get internet as fast as cable is providing in many areas right over your cell phone. So, they've got to come up with something, that kind of you know, one step further, and frankly, this is a benefit all of this stuff to getting rid of that terrible and you know my opinion on this one, right. But that terrible so-called net neutrality, because it really has reintroduced competition so we're going to see in competition from not just the Wi-Fi devices, but between cable companies and the cellular data companies in the very near future. There'll be some more so it's kind of cool and can get ready to buy that 8K TV

6:55 Do they make it, in I mean I have a 65 inch now, I need a 75 or 80. This is 65 just big enough for me Unknown 7:03 oh they're measuring some of these 8k TVs in feet now. Yeah baby, I found one that's 30 feet or mind you. It was like $60,000

7:19 the Winner in South Carolina can afford that and

7:21 that's exactly

7:22 So, yeah you can get them but you know there's some really big ones and the cheaper lower end ones. Frankly the only ones you might really consider for home use, there only 10 grand right now so you know the rich attorneys probably running out buying them already. Can

7:40 you. Gotta keep up with your show? Yeah, yeah, exactly. Yes. Craig Peterson, our tech guru joins us as he always does on Wednesdays at this time to go over what's going on in the world of technology. So, Craig I gotta be honest with you. I have flown an awful lot over the last 10 years. I, I fly, I don't know dozens of times a year and I never have signed up for frequent flyer miles because I'm an idiot, however

8:04 I haven't been able to use them and I

8:06 have used I just never I never get around to it. But, anyway the point being frequent flyer miles now apparently are are vulnerable to being hacked. What? Tell me about that.

8:15 Yeah, well I'm just saying kind of ice sign up programs. I don't know that I've actually ever used any miles because there are so clever and making them expire on you. When you know multiply. The the largest black markets on the dark web is called dream market, now. There have been a few there's come and gone but they are now stealing and selling people's frequent flyer miles and there's some pretty good prices, if you don't mind buying stolen stuff but the dark web. You can get some you know hundred thousand miles for as little as 30 euros, there on the dark web. So, you got to be kind of careful. Most people just aren't paying much attention to it. So when they disappear like mine do, because the airline decides to just you know absorb them because you haven't used them in time. They a lot of people just don't notice but you can get 200,000 British Airways miles for 45 bucks on this site right now. 100,000 from Delta. British Airways and I mentioned Emirates Skywards, just about anybody. So, be kind of careful if you are a person who's serious about frequent flyer miles, it's kind of a yet another currency that they're using. And, some basic tips here. Don't just leave your boarding pass around about, you know, get rid of it shredded if you have to. Do not post photos of your boarding pass online. I've been shocked at some of the FBI webinars. I've been running for their Infragard, where they're talking about people posting pictures of, for instance, World Series tickets online. Yeah, I'm going to the World Series. And, then people zoom in and on them and they copy them, they print them and then they're selling these tickets, online worlds. You know, suppose it World Series tickets that I have your ticket number. And then you show up and it's just not any good, any market, somebody already used it. So, it's just happening and it's happening all over the place. So, don't have your airline account numbers kicking around, don't post the pictures. And if you have to live in fear,

10:33 live in fear. You say

10:35 constant fear. Constant fear. Yeah, who knows this person in South Carolina might not be the actual Winner. Who knows, right? It's the bad guys are out there. And they're doing it every day.

10:48 We are done, Craig Peterson. He is our tech guru. You know, by the way Peterson saw that coming. Their coming to get all the valuable information directly without even talking to us about it up so quick. I've been told many times to turn off my apple or my PC every night, these little last longer and that's better for and also things do should we be doing that?

11:11 Yeah, it's such a good question. The question of the ages, right? I've always been of the school that. Yeah, you should just leave your computer running because of mental fatigue, you know, turn it on and off, things heat up, cool down and then break. You know, when your computer's dies, it's probably dying, or right after you turn it on or right when you turn it off, because of the surges in power and the heating stuff. There is a great article that I shared up on my website from mandatory.com. Where they reached out to eight different vendors of hardware, each of them had kind of a different answer. And I think my answer today, because also have security concerns is, Yeah, you probably should turn turn off your computer when you're not using it. Because, at the very least, hopefully, you'll notice your computer starting to get busy or get hot if it's a laptop when it's being hacked, being used for mining Bitcoin by some third party with malicious software. And, then from the hardware standpoint, it probably is not going to make an appreciable difference in the life of the divided cell. There you go. Just turn it off now. I think that's probably the best bet.

12:29 All right, ladies and gentlemen, that is your tech update of the week. Craig Peterson, our tech guru joins us at this time to give it to us every week. Appreciate it Craig and we will talk again next Wednesday. Take care gentlemen, thanks

12:40 thanks a lot alright so let's take gives it

12:42 to us every week I heard that Matt. All right everybody take care make sure you sign up for the webinar. You are really going to enjoy this. It's absolutely free, again you know we're not charging for this at all. I'm not selling you anything. This is a give back on trying to help 100 companies by the end of this year. small medium businesses with their security for free. I'm serious. Okay check it out. Craig Peterson dot com. Have a great day. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 23, 2018

Are you ready for Wi-Fi 6? What are the huge improvements coming to Wi-Fi? Does turning your PC off every night make it last longer?

Craig discusses these topics with Jim Polito today on the Jim Polito Show on WTAG.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Huge Improvements Coming to WiFi

Does Turning Your PC Off Every Night Make It Last Longer? This Is What 8 Hardware Manufacturers Have To Say

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/23/2018

New Wifi Standards - Should You Turn Off Your PC

Craig Peterson: [00:00:00] Hey, good morning everybody. Craig Peterson here. And this morning I spoke with Jim Polito. Have you wondered about your Wi-Fi, what the next generation is going to be? How can you keep it straight? Do you even know if you have the latest Wi-Fi? What are the benefits to upgrading? Well, that's one of the topics I talked about this morning with Mr. Jim Pulido, who recently just upgraded his Wi-Fi and his router in order to get around this whole problem that's been happening where people's home routers small business routers are being taken over. So here we go with Jim Polito

Unknown 0:40
here he is the man the myth, the legend, our tech talk guru. Craig Peterson. Good morning, sir.

Unknown 0:48
Hey, good morning. What a show this morning. We got a lot going

Unknown 0:52
on. And I've got some callers waiting. We're going to get to them before the end of the show. Just about plastic bags. policy. Irene Oh, my. I can't. Am I gonna get out anyway,

Unknown 1:06
you know, my local stuff the way they're asking now if we'd like to use if we'd like to have one-time use fake. So they're trying to shame you into. And I and my response was one time use. We keep them. We use them for all kinds. Yes, we have that chicken egg. The number kids. Yeah, one time you

Unknown 1:26
it's not a one time use my Dad,

Unknown 1:30
please. It's just the idiocy. But hey, I've got a question for you. So there's a new generation of y fi coming out. I have two questions. Is Netflix. Going to load quicker? And do I have to get a new router? A new router?

Unknown 1:55
You just upgraded? Yeah. Outer. Yeah, a lot of people have no problem. Because they just their pride. We just had that huge vulnerability that's still going on. In so many routers, yeah. Well, over the years, Wi-Fi has evolved. We started with 802, 11 a.

Unknown 2:12
And then we went to it'll do let them be. And then we had I'm trying to member now G and and and a see you know, and it's all frankly rather confusing to everybody. And when it comes to our cell phones, remember, you've got 4g before that we had three G, right. And that's simpler to figure out. So there's a new standard out there that's coming that's hitting us really quick quickly now, but should be implemented next year. And what they've done is they've decided, Okay, we're just going to make everything ever so much simpler for everybody. And the current 802 11

Unknown 2:54
AC is going to become law, I'm fine. Fine. And then the ones who that is going to be 4321. Okay, as you go through all of these. So they are going to make a change to the naming. And and on your phone. What you're going to see is you know how you have that little kind of a pipe symbol with those three, three lines, right? Yes. So he has Wi-Fi. So it's going to change it's going to happen number in there. So say it'll have a five and bear Oh, is really kind of cool. Yeah,

Unknown 3:25
no, I'm on that.

Unknown 3:27
Yeah, exactly. Now, you asked about Do I need to replace my router? Yeah. And the answer is, it kind of depends, but not for at least two or three more years. So basically, the expected like over your router. Because Wi-Fi 6 is coming. And this is going to be crazy fast, just like the new cellular standards are going to be crazy fast. And it's designed to be able to handle in your whole 8K TV at full speed. Oh, yeah. Yeah. So it's going to be absolutely crazy how fast this stuff's going to be. It has some major security fixes as well. Because we know about problems with Wi-Fi that we have out there. But it's going to be fast, it's going to be reliable. And it's you probably won't be able to upgrade to it, you're probably going to have to buy new equipment. But like for instance, what you have is is an 802 11 ac, which is going to be called Wi-Fi 5. Okay. Frankly, unless you are getting one of these crazy, Super duper high definition right now, these TVs cost you $10,000 more, don't worry about it.

Unknown 4:46
Okay. So So and by the way, folks are talking with Craig Peterson. And we'll give you a number at the end of this segment to be able to get this information and more. So the 4k TVs are pretty much the price on 4k TVs have stabilized. You can get a decent 4k TV, which is a really nice picture

Unknown 5:10
the eight k which is still very, very expensive. But I guess Craig, like everything else, the price is going to come down at some point.

Unknown 5:21
It is absolutely is. Yeah. And you talk to you have Netflix at home. Yeah, yeah, a lot of people do. And it's really very cool. It's very nice.

Unknown 5:30
Here's the trick. A lot of people don't know about the new 4k TVs that are out there right now. And this is important to remember when you're thinking about maybe upgrading your TV. Yeah, the 4k TVs have some extreme computing power in them. That allows them to do what's called an op sample. So for instance, they'll take a regular high def video signal, yes, coming from Netflix or from wherever, and they will turn into a much more beautiful 4k picture. So in other words, if you were to going to take that video stream coming in from that, but you ran it on your old TV, and you took the exact same stream and ran into brand new 4k TV sitting right next to it where data rates the same everything's the same that 4k TV will look stunning. Because of the logic it has some you might even call it artificial intelligence with overstatement. Okay, but it's it is very smart. And it is amazing. Some people might not be aware of it. But you might have a 4k TV in your home right now. And because of your internet bandwidth, that TV might only be getting a 720 p signal at bath. And yet it looks stunning at that's not an optical illusion. It's not your checkbook talking saying you paid for better TVs, you've got a better picture. It really is about better picture without having to have more bandwidth. So from that standpoint, you know, the 4k TVs look amazing. I don't have one. You know, maybe it's just because I'm an old guy. And I don't care, right? Yeah, the but the gamers love them. Because the again, the resolution and the 8k is going to be even better. Again, saving new bandwidth. So you know this slide five six is coming out. You can wait on for quite a while unless you learn to someone who has to be on the bleeding edge.

Unknown 7:31
All right. Well, that's good now. Danny's all excited. Because Danny, you're a gamer. And you want 4k Yeah. And even with the TV I have now the 4k TV and already lot of the games are in 4k coming in 4k. So it's nice that it will look at him. Hmm. We're talking with our good friend Craig Peterson Tech Talk crew. And at the end of the segment, we're going to give you a number you can text My name to and standard data in tax rates apply. Craig will get you all of this information and not just that other stuff. When things go wrong. She's there to tell you what to do. All right. Here's the other question. And people still have PCs. I mean, people have laptops and people start PCs. PC typically sits there on the table. It's on all day long. It's on all night long. I just never think about it. Should you turn it off? Does that extend its life? Should I turn it off?

Unknown 8:39
That's the that's the question. Right? We've had forever. The answer in general is kind of it depends. Because you're PCs using power us not to city that they're going to build your for that and most expensive power, right. Yeah, you know, what's the cost of the power versus breaking the PC, turning it off and on is going to break it right. And that's the tradeoff as they were trying to figure out. So I for four decades now, I have recommended that people just leave them on as the most stressful thing you can do to a computer is turned it on. Because now all of us think of that little teeny tiny wires, if you will, by the chips. So inside the chat. Even though it's a piece of silicone, it has a little wires that go from the silicone to the ends of the chip, and then connect to the board. So what happens when you run electricity through a wire ever, ever felt an extension or flogging, you feel it's

Unknown 9:41
warm, it's warm,

Unknown 9:43
that's what happens when a wire starts having like to see going through, it gets a little bit warmer. And when things get warm, they expand when they get cold, they contract, right. So So the idea is, if you're turning it on, first of all, you have a surge of power to some of the devices, devices, components, like the power supply, and others. But secondarily, now you're causing some stress, a mental fatigue on some of the components. So that's been my position for decades. And there's a great article that I snuck up on my website for mandatory.com, they reached out to other I guess it was about 10 different companies out there, including a who's and crucial. Crucial is one of the top memory makers and they Seuss makes great computers. But in ask them their tech support. I turn it off, so I'm not turn it off. Now. In every case, the tech support varied a little bit in their answer. Yeah, but most of them are saying, Yeah, just don't have any turn it off at night. But some of them said, you know, yeah, he might cause a little bit more aware. But we're not sure that really makes that much of a difference. However, all of these guys sell computers and maybe they have an ulterior motive. Maybe. Maybe they want you to buy computers. Yeah,

Unknown 11:06
yeah, turn it off. But you're nowadays you've also got security worry about right. Right.

Unknown 11:11
Because of its own right. It's more susceptible. I get it.

Unknown 11:15
Yeah,

Unknown 11:17
you might be better turning them off. All right. My new mantra.

Unknown 11:23
All right. Well, it's good enough. Look, folks, you've heard it, and you can get more of it. And it's free. And he's not going to try to sell you stuff. He's spreading the good word to those of us who don't understand the tech world. And for those of us who do understand the tech world, he'll understand it better. So text My name to this number

Unknown 11:45
855-385-5553. In fact, on Thursday, we've got a free no charge. You're not selling the thing of webinar on ransomware and what to do. Oh, great. Text me up. How you about that, too? Yeah, 855-385-5553 and stayed your standard data and text rates apply. But you when you're on that list, you're covered. Craig, thank you so much for your time. Always a pleasure. Hey, thanks, Jim. Take care. Take care.

Unknown 12:19
Bye. Bye. Hey, guys. Don't forget this Thursday, we are talking about ransomware. This is the first in our free series. It's absolutely free. I'm not selling a thing where we're trying to help small businesses. In fact, I've committed to doing some of these evaluations I typically do for larger businesses, but I've committed to doing 100 of them for free before the end of the year this year. So we're going to talk a little bit about that on Thursday. Make sure you sign up http://craigpeterson.com. Have a great day. We'll be back tomorrow. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 22, 2018

Craig is on with Jack Heath today and talked about Jamal Kashoggi in the Saudi consul. Did his Apple Watch record his murder? They also discussed why should we share our DNA.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Is Your DNA In A Database? Doesn’t Matter. New Study Finds That DNA Databases Can Send The Police Or Hackers To Your Door – Even If You Didn’t Submit Your DNA

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/22/2018

Kashoggi In The Saudi Consul - Did The Apple Watch Record His Murder - Why Should You Share DNA

Craig Peterson0:00 Hey good morning everybody Craig Peterson here this morning on iHeart Radio with the Jack Heath I talked about this whole situation in Saudi Arabia. You've heard about Kashoggi and what may have happened to him what may not have happened to him while we debunk the myth about his iWatch he has an Apple Watch 3, at least he did and what happened there and get into a little bit of DNA some people including Justin just don't want to give their DNA up but why would you? What are some of the greater good arguments for that so here we go with Jack Heath.

Unknown 0:39
Joining us down the Auto Fair listeners lines Craig Peterson, our tech talk guy with some tech talk for our Monday Good morning Craig

Unknown 0:45
Hey good morning I don't know if you've heard about the rumors about the Apple Watch and Kashoggi's disappearance. Have you heard about the recordings and thing no I have not well it's interesting because there's a pro Turkish Government newspaper that has been reporting that they have audio of what happens as part of the showpiece disappearance there in the Saudi embassy in Turkey and there are a few people that have done a little bit of research into this because we know to show he had an Apple Watch read and the Turkish Government has been using this whole Apple Watch scenario as a reason for them to have audio of exactly what happened inside of the embassy from a technology standpoint because of all the circumstances surrounding this that sounds like that's just absolutely not even possible and is probably actually kind of indicating here Jack that the Turkish Government has monitoring equipment at least audio equipment inside the Saudi embassy and they're using the story about the Apple Watch it does cover up the fact that they've been spying on the Saudis interesting this

Unknown 2:00
is like this is getting all this is getting more mysterious by the hour the Turkish leader now saying that video that will show over the next day or two just what happened to show you this is getting to be almost like a international mystery mystery spy whatever but it's it's unfolding in a very awkward way for the Saudis

Unknown 2:20
it is it absolutely is and the thing hard video probably the only way they got that video is again by having fun because if the I want I agree wants to record it. Yeah, it's the I watch was to record it. There's there's almost no way that the Turkish government should have gotten their hands on it.

Unknown 2:39
I would agree. Alright, what else is catching your eyes? We begin our week on the tech side. Craig Peterson. http://craigpeterson.com.

Unknown 2:46
Well, there's a few different articles I sent out this week. One of them that I think is really interesting to most people is that DNA side of thing, many of us at myself included have used some of these services, particularly 23 and me have you done that before Jack? No

Unknown 3:04
DevOps. But

Unknown 3:06
I don't know if you would probably know if you had sent it in. But more than 60% of Americans now who have some European ancestry can be identified using DNA database for jack, can you if you haven't

Unknown 3:20
submitted the DNA of you send it to Senator Elizabeth Warren's office yet

Unknown 3:25
By the way, did you know that apparently some reports that I've seen show that the gentleman who came out and said yes, indeed she does have a drop of Indian blood that sheet that that gentleman who is a DNA researcher and Senator warns husband apparently had gone into business together before. So there's some interesting ties there. But even if you have not submitted your DNA, more than half of Americans now that our European ancestry can be identified by their DNA. So your DNA was founded a crime scene Jack would be in trouble, but it's the same with almost anybody of European descent. So it's an interesting world we're living in today. And the Golden State killer of course, was identified by his DNA many years later, he was a serial killer and also a conflict the time even though he has not submitted any

Unknown 4:23
Bill Burr the comedian he's talking about this, Craig, this is the biggest no brainer of all time, I'm just gonna give someone my DNA so they can put it in a database not to put a tinfoil hat on. But no way now you're not getting DNA.

Unknown 4:35
Yeah. And there's good reasons to not share with people. They are using it for research, however, and some things I think are ultimately going to come from this because they're using the DNA, they're asking questions. For instance, with me, they've asked over 800 questions that are kind of health related, because when it comes to DNA, it's a guessing game. They don't really know what each strand of DNA each piece does. So they have to have a huge database of information with DNA, put it all together to come up with these new drugs, and eventually drugs that are created specifically for you in order to help you get over all kinds of diseases. So it's two sides to this, Justin. One is that yeah, it is certainly going to kind of play with your privacy. But secondarily, this will save lives in the future.

Unknown 5:29
I correct provocative stuff. Great to tied to the local stuff, and the situation with the console at the Saudi consulate in Turkey. Thank you, sir.

Unknown 5:36
All right. Take care when we come back.

Unknown 5:40
Hi, everybody. You know, I've committed to doing 100 of these cyber health assessments for small businesses 100 free for before the end of the year, okay, so you got to sign up right away. But these have a look at your computer, your we're trying to figure out where your problems are. And then we're going to be providing you with a bunch of stuff. We're going to continue to try and help you with your small business security. Now, I'm not selling anything on these webinars. It's absolutely free. Obviously, no credit card required. We've got to help you out. And I understand you're busy, busy. Most people are writing most people listening to this podcast, in the gym, in the car, etc. But you've got to sign up. You got to understand this stuff. A lot of it applies to home users as well. So you're welcome to attend. But small businesses have the most to lose. And being a small business guy for more than 40 years. I know what will happen to small businesses when they get hacked. And it is when nowadays I don't want it to happen to you. So go to http://craigpeterson.com make sure you sign up for my webinar right there. We're going to have a whole series of different webinars starting this week. So sign up and we're going to have one probably every week through the end of the year as we try and explain all of these issues that small businesses have and what you can do about it there's going to be a good How to section of all of this too so stick around. http://craigpeterson.com. Keep an eye out and join me you know, again, free quick short, we're getting you the information and the how to I'm going to show you some of the free software that you can use some of the things you already have the tools you have, how to use them the tools on Windows, the tools on your Mac what you should be doing what the settings should be all of that http://craigpeterson.com. Hey, have a great day. We'll be back tomorrow with Mr. Jim Polito.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 20, 2018

 

Wow,  Wi-Fi is in for some major changes! Today, I will talk about some of the huge changes to our Wi-Fi system and what it means to you.

Chinese hackers are at it again.  I will tell you about their two new targets and why you need to be on extremely careful if you own a business.

Google - Friend or Foe?  I will discuss something that Google is doing that should scare the “bejesus” out of all of us.  Have they turned into Janus? Seems maybe so.

Have you had your DNA tested?  Listen in as I explain why most of us of European Ancestry can be identified even if our DNA is not in any of the DNA databases.

Do you turn off your PC at night?  Listen in as we discuss what six of the top manufacturers have to say about turning your PC off at night.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/20/2018

Chinese Hackers, DNA Databases, New Wi-Fi Standards, Google in bed with the Chinese and more

Craig Peterson: Hey, Good Morning, everybody. Craig Peterson here every Saturday about the same time. So, I hope you continue to join me. We're going to be talking about some of the technology that's going to influence you, the movers and shakers, as it were in the technology field. And, there are quite a few of them. Things keep changing all the time. In fact, today we are going to be talking about the next big change in Wi-Fi. You know, we've talked about the new fifth-generation LTE for our phones before. This is huge. We've got two new targets for hackers, two new big ones, will be talking about today. And, that includes anybody who uses outsourced IT vendors. Yes, indeed, we'll be talking about that. In fact, that article both of those should be in your newsletter that you got this morning. If you didn't get it, make sure you subscribe. Craig Peterson dot com slash subscribe. We've got a really kind of an interesting turn around here for Google and the white house when it comes to China. Yeah, is Google two-faced will no that, that's not possible. Turns out maybe they are. DNA databases. I know a lot of people who have done DNA research, they've submitted their DNA. And I know many people who refuse to, of course, we just had DNA in the news with Senator Elizabeth Warren and her claim to having Native American ancestry. Turns out she has less Native American ancestry than the average European American. I thought that was pretty funny. But, even if you did not submit your DNA to one of these sites, they can probably track you down. This is interesting, almost any European American now can be identified by their DNA, even if, they didn't put it into one of these DNA databanks. How's that even possible? So we'll talk about that. And, we are finally going to put the nail in the coffin. Well, maybe? About your PC. Does turn it off at night? Make it last longer. Boy have I had a lot of discussions about that over the years with clients and friends and employees. So, we'll get right down to the bottom. We've got answers from six of the top manufacturers of computers. And, we will discuss what they had to say about our devices. Should we be turning them off? And, you know, I kind of wonder, do they have a bias, right? Are they going to tell us the wrong thing so, that our computers break more quickly? Hmm, interesting question, isn't it? Anyhow, Welcome. Welcome. Craig Peterson. And of course, this is Tech Talk. So getting into this, we'll start with China, of course, Communist China, Red China, whatever you might want to call it is very central government controlled. I think most people know that. I kind of wonder about some of the younger kids. It seemed to think that just this panacea, it's a democracy where 98% of the people vote, but that's not this show. But we do know that China has been very active militarily. Their main goal of the People's Liberation Army, when it comes to conquering another country, right now, seems to be cyber warfare. It's something that they can do, inexpensively. It's unlikely that they would lose lives, in the process. And, they're also using their cyber warfare technologies in order to make some bucks. Yes, indeed, China is hacking. Now, I told you about a client that we picked up here just a few weeks ago, who lost $180,000 Right from the bank account. Stolen right out of that. As part of the business email compromise, The FBI is telling us has yielded 12 billion plus dollars to hackers. Money, real money, okay. This is not, "Oh, 12  billion in lost productivity". And, you say, "Well, how do you figure that out"? Is that kind of like, wait a minute now, 20% of our employees are out sick on Fridays. So, there must be something going on? Well, but you do the math. Okay. 20% on Friday? Well, Friday is 20% of a work week. Okay. So there's, there's the math that that used right in the statistics, damn statistics and lies. And then there's a math that in this case, means $12 billion stolen from

Craig Peterson  4:31
companies.

Craig Peterson  4:32
And, I know companies where this has happened to, right here. And when you're talking about $12 billion stolen in the last 24 months,

Craig Peterson  4:41
we're talking about companies, all over the place, cause that's a lot of money. And, in this particular case, hundred $180,000 was their operating capital all gone, overnight. So, they thought it was a Chinese hacker. The police investigated found it was a Chinese hacker. So, they flew over to China to file police papers, which they did. And, of course, nothing happened, nothing's going to happen. It's impossible to get any of that money back. Well, the US government on Wednesday warned that there's a hacking group

Craig Peterson  5:18
that's known by the name cloud Hopper, and they are attacking firms

Craig Peterson  5:26
in the United States. But, they're specifically launching attacks against one type of firm.

Craig Peterson  5:31
Now, I've had a hard time in and I'd love it. If you'd help me with this. You can just text me directly 855-385-5553 with your answer, cause I'd love to hear from you.

Craig Peterson  5:44
But

Craig Peterson  5:44
the specific type of firm I look at my customers and my customers have tended over the last 30 years to be smaller companies that have grown. And they've grown to the point where they're IT their information technology. isn't enough for non-professional to handle, but they can't really afford to hire the right kind of person. And, of course, in this day and age, it's impossible for a small or medium company to hire someone that really understands security. It's changing daily, it's just, it's crazy. So, what do you call a company like that, you know, the mid-tier, where it used to be that the office manager would bring in her husband and kid to do some work on the network. Install a new little firewall, they went down to staples, they bought a switch, but now they're too big, they've had problems. Maybe they got sacked with ransomware, and they realize they need more help. So, it's kind of I always thought a "tweener", right? It's a 'Tweenie" company. But I guess, you know, that kind of sounds negative, doesn't it? Because that's like a “tweenager”, somebody who's not quite a teenager. What is that? Like, the 12-11-year-olds? They're tweens. Not quite teens yet. And so they're not quite at the point where they can have their own professional IT staff, but they kind of need them, what would you call that? I'd love to hear from you. I'm trying to figure out how, how, how, what, what to call those types of companies.

Craig Peterson  7:13
And, when we're talking about that, and that type of a company we're talking about someone

Craig Peterson  7:20
that typically outsources to what's known in the industry as a managed services provider. And, that's what we've been doing since the early 90s. Since 91, we've been doing managed security services and managed Computer Services. And that's where I think they fit. You've got the small company, they're too big for, you know, Uncle Jack to come in and help them anymore, or the nieces and nephews. They need more than that, but they can't really afford a professional. And, in this day and age, there's no way you can get a professional you might think you are but you can't afford them. Because true professional now was going for well north of $100,000. 120

Craig Peterson  8:05
and $180,000 a year. So, they turn to companies like mine. Managed security services, or just straight Managed services. And, these companies come in and they help with figuring out what computers do you need, you need to do an upgrade, they'll fix something that's wrong. And, hopefully, they'll manage the security by getting into the computers and messing with them, as needed, doing the updates, doing the changeover into the new security software, right all of that sort of stuff. Well think about those companies here for just a second and I'm talking about these managed security companies. The outsourced IT people. Well, the Department of Homeland Security issued a technical alert saying that this group from China is engaged in cyber espionage and theft of intellectual

Craig Peterson  8:59
property

Craig Peterson  9:01
against these outsourced IT providers. A very, very big deal. Two prominent US cybersecurity companies are warning, that the Chinese have been caught by them hacking, actively trying to get in and that had surged, and that this whole thing is part of the escalating trade war between Beijing and Washington. So, what this means is, your managed services provider your outsourced IT company is being attacked and maybe even hacked. And what does that mean to you? Well, think about what they do for you. You call them up and they hop on your computer, right? We do it all the time for our clients. That means they have access to your network, your outsourced IT guys have access your network, right. They have access to you a file server. They might have the master administration passwords for that file server. They have full access to your network.

Craig Peterson  10:02
So, why wouldn't China try and hack

Craig Peterson  10:05
these managed services providers? Why wouldn't China try and hack these IT providers? This is a very big deal for them because then they get access to all of the companies that work with that managed IT, provider. Do you see where this is going? You see the problem.

Craig Peterson  10:23
Now

Craig Peterson  10:24
I mentioned this company that had lost $180,000, it was stolen and it's gone in 90 seconds. It's just its toast. Right? It is completely gone. So, I mentioned them and think about this for a second, How did they get into their bank account?

Craig Peterson  10:42
Well, although, this company security was abysmal, as most smaller companies are. They got their information stolen via their accountant.

Craig Peterson  10:55
Now an accountant, in this case, it's very similar to an outsourced IT provider, isn't it. The accountant had all of their banking information, right. All of their tax returns. Had access to all of this. That makes it a real problem. That makes it just a huge, substantial problem. And, in the case of this client of ours, this new client. They didn't do anything wrong, particularly, right. They weren't protected. But, the Chinese got into the accountant's system and then went after all of their clients. Now, we have another case where we're expert witnesses and this one is an interesting one, as well. Its kind of similar guess what they are, they are an outsourced IT provider. And again, I'm not naming names here, because there's lawsuits pending, as you might imagine. Then, in fact, as I mentioned, we are involved in a case where we are witnesses. So I am and helping with

Craig Peterson  12:02
with an insurance company in this case, because there's insurance claims.

Craig Peterson  12:05
So, they had an outsourced IT firm, and the outsourced IT firm was not doing their job. and was not keeping the security up to date. So, who's responsible then? Is the company that got hacked responsible? Because their systems weren't up to date. Or is the assumption that the outsourced IT provider was keeping things up to date. Is that good enough? And that's again, what the courts are going to have to decide. Because they're looking at the contracts, okay, the agreements. Were the people involved up to date? Were they doing their job under the contract? And, I've seen this also when it comes to break-fix shops. And the break-fix shop is where you call when something breaks. So, they don't have to keep anything up to date. They have no obligation to do the software updates. Or to keep an eye on the logs, right. Because all they do is respond. You call them, they respond. They'll show up. They'll fix a hard drive or a monitor. They'll give you something. Maybe they'll help you install some software. But, they have absolutely no duty to respond. But, now we're getting Homeland Security telling us that these companies, that I have seen hacked over the last two months, myself, because we've picked up new clients that have been hacked, right. These companies are the ones under direct assault and that's a very, very bad thing. Something I think we need to really pay attention to if you're interested I have

Craig Peterson  13:48
business process agreement, that I will be glad to send you. I've had it for and I give it away for some of the bonuses and some of the webinars that I do. But it if you reach out to me, you can just send email to me at Craig Peterson dot com or text me at 855-385-5553, I will send you a copy, just a sample, you have to take it to your lawyer, right like all contracts, but a sample agreement that

Craig Peterson  14:17
you

Craig Peterson  14:18
can put in place with your managed security provider, or your managed services provider, or your break-fix shop. Whatever it might be. So, that they now have responsibility and they know it. And you have a contract that says that they are responsible for keeping your systems safe. Because it's getting really bad, and when you've got Department of Homeland Security coming out, right now, with a statement. This is DHS official, Christopher Krebs, these cyber threat actors are still active, and we strongly encourage our partners and government and industry to work together to defend against this

Craig Peterson  14:57
threat.

Craig Peterson  14:58
I can tell you now unfortunately that the Chinese are back. We've seen a huge pickup and activity over the last year and a half. There's there's just all kinds of great quotes. And, of course, in some of the FBI Infraguard webinars I've been holding, we've been talking about cybersecurity 2.0 and even 3.0 and what you have to do in this day and age. And, I know, I hate to have to tell you this stuff because I know you're trying to run your business. I see it all the time. I'm trying to run my business, right. And, I was trying to run my business. I thought I was doing fine. I thought that I was secure enough. I helped, remember, I helped to develop the internet, right. These protocols I implemented for companies for major firms, AT&T, NCR, RCA Astro Space, I've had all kinds of clients over the years. Digital Equipment Corporation, of course, HP client, USAA, all of these guys, right. So, here I am thinking I know what I'm doing. I've got the anti-virus up to date, I'm all set and I got hacked. Now, for me, this was 20 years ago. But I've paid close attention to it ever since then. And actually, it's more than 20 years ago now 25 years ago.

Craig Peterson  16:15
And, I understand that you think you're good enough, but I doubt you are. So, pay good attention. If you want a copy of that business process outsourcing agreement, let me know glad to send to you. You know, I'm not going to charge you for something I found, that I thought it is worth sharing. But, I'd be glad to let you know about that. Also, want to mention that I am doing webinars this coming week public ones, I'm doing one for the FBI Infragard as well, which is not public, this week. But a public webinar where we are going to talk more about ransomware about solutions. I'm going to do some serious training, no credit card required. I'm not charging for this. This is not a big sales pitch. In fact, I'm not even going to make an offer. So, it's content rich. And the way to get in signed up for that is to go to Craig Peterson dot com, and we will be more than glad to sign you up. You will love it. We've had tons of great feedback from people about these webinars. So, what's next when it comes to Wi-Fi. We've talked a little bit about what's next when it comes to our cell services. But, man are there gonna be some changes next year,

Craig Peterson  17:31
We've got five G LTE that's hitting the streets, we've got a big fight between all of the major carriers, who's going to win. We've got attempted mergers going on so that they can afford to do these massive rollouts of Five G. Well 5G is the next evolution, here of LTE. And, it's going to be amazing, because you're going to have incredible

Craig Peterson  17:59
coverage.

Craig Peterson  18:01
Incredible speeds. Most people will probably just get rid of their cable modems, frankly. And, switch over to this, if you're in, you know, suburbia, or obviously the city. Cause it's going to be so cheap and so fast. Well, we've got a new version of Wi-Fi coming out too, and that's going to help the cable companies maybe, survive. The problem, The biggest problem, that we're trying to fix in both cases with the new Wi-Fi and with the new five G LTE on our phones, is that we have a ton of new devices getting introduced. We're talking about millions of devices a day, sometimes. Think about it, I I ordered some light bulbs from Amazon that are Wi-Fi connected. Now in my home and in my office, I have an IoT network. I have a network specifically dedicated to all of these Internet of Things devices where it's heavily monitored, heavily controlled, where they can go and has no access to anything else, right. But, I do this professionally. You as a home user, right, you're not a professional, you're a small business, you're not a security professional, your obviously your professional what you do, you wouldn't have a small business. But, you should have this. But you know, frankly, I'm not expecting you to have this. But, they're trying to solve the problem we've got too many devices. And a lot of these devices don't need a lot of bandwidth. But they need bandwidth, often. And then we also have a lot of devices require, a lot, of bandwidth. Think about the big users on the internet. We're talking about Netflix. Most of the time, Netflix is the number one user of bandwidth on the internet. I read a book, written by, I forget what her name is, she was one of the head people, C-level, over at Netflix. And, and they came to realize, whoa, we're going to be using one-fifth of the internet's bandwidth. And it just kind of drove home how popular the company was. Of course, now it's one half or even more. So, we have the mix of devices, that one a lot of bandwidth while you're streaming a movie or video on YouTube, or you're watching one of my training programs, right. Or, you have devices like clothing or light bulbs that needed to connect to need to have, you know, some activity, but there are a lot of them. And, 5g is where it's at when it comes to the cell network. So, Wi-Fi has to compete. And, I love the version number games, right? Oh, my phone's better. Because it's a Samsung eight versus seven and an eight though it isn't as good as an iPhone 10. Because 10 is a higher number, right. So, they all have to play with these numbers and Wi-Fi over the years, if you remember and boy do I remember because I've been using it since day one. We started with 802 11

Craig Peterson  20:59
A. Then we went to, what was it it was B, and then we moved from be on to N. We have AX,  AC, all of these different Wi-Fi standards. And today 802 11 AC is the standard. And it's quite fast. But it's going to be nothing like what's next. So what they've done is they've changed the nomenclature around the current Wi-Fi standard 802 11 AC is going to be called Wi-Fi five. The previous standard which 802 11 N is going to become Wi-Fi four, etc., etc. So, you're going to start seeing new logos as well. So you know, the little Wi-Fi and logo almost everybody uses. And that's those concentric circles you see one-quarter of that right like a slice of the pie, one-quarter of the pie. That's going to change it's still going to be that corner of the pie. But it's going to have a number on it. So it's gonna say six or five or four. And, that's going to make it easy for you to spot what kind of digital connection you have to the Wi-Fi network. Now they're already talking about the devices are going to be supported on this. And one of the reasons is having to introduce this is, remember I mentioned Netflix. Well Netflix streaming at 1080P, which is high def, is bad enough. But think about the new 8k video that's out right now. 8k video streaming, that is nuts. We're talking about support for transport rates that just blow everything out of the air. Right now get it out of the air Wi-Fi. So, what they're doing is they're taking the bands that are already allotted to them the 2.4 gigahertz band where they will have four streams available at 1.1 gigabits and the five gigahertz band where they think they're going to be able to have about 8 five gigabit streams, isn't that amazing. And, the technologies redefining the usage and what they do with collisions and things. And they're working on refining it before the full launch next year. But, it looks like they may be able to get 10 gigabits worth of speed out of the Wi-Fi. That is huge. When you think of most people aren't even getting 50 megabits, nowadays. So, it's going to require more electricity. It's going to hit on your battery, as well. If you're using these new standards, Wi-Fi six, for instance, even though it has improved efficiency.

Craig Peterson  23:41
If you are streaming real high bandwidth you're going to be using more battery. But, if you are content with watching videos on your iPad at the same data rate at the same quality they are today. You will find that you will actually be saving on battery life you'll save a little bit on your electric bill. But, it's going to be interesting because Wi-Fi six is it hasn't yet been finalized, we'll we'll keep an eye on this for you, as we continue to, you know to move ahead in technology and that's what the show is all about.

Craig Peterson  24:15
Wow, we are drawing quickly to an end of today's show you're listening to Craig Peterson and of course this is Tech Talk we've been on the air now for more than 20 years, as well long time eh. We really appreciate all of our listeners and we appreciate the listeners that right in a little note of support to the stations that were aired on it really does help a lot to hear how much you guys appreciate it. And I love to hear myself just a note to me at Craig Peterson dot com. I love to hear what it is you enjoy about the show. What you're learning. What you'd like to hear more about.  And, a lot of people just say, hey Craig, you you've been great at selecting the topics just keep it up, right. You're so much ahead of anything else that they're listening to or reading. So, I appreciate those, as well, because it lets me know that I'm doing the right thing, frankly. But we've got a couple more things we need to watch out for. First of all, your frequent flyer miles are on the target of hackers, out there right now. Thousands, In fact, hundreds of thousands of points and thousands of accounts are currently on sale. Delta sky miles. British Airways are the most commonly listed and these are being stolen. So, for instance, you can find out there on the dark web, right now. A hundred-thousand British Airways points for 34 euros. You can get 200,000 somebody selling them for 45 bucks. British Airways executive club 100,000 miles for 884. So, the prices vary dramatically. But just want to let you know you've got to protect your frequent flyer miles. And then that means shred your boarding pass after a flight. Don't ever post a photo of your boarding pass online. I had a really interesting webinar for the FBI Infraguard and it was all about these people that are making threats and then they post their their picture of the game, right. So, the threats against maybe the Commissioner of the NFL or someone else that's going to be at the game and they post a picture of their ticket and of course, again, track that way. But keep an eye on your accounts. The White House is calling on Google to abandon their project. Did you know Google is in the process right now of making the search engine for the Communist Chinese people. People's Liberation Army? That is going to be used in China and allows the government to track everything everyone's searching for? What they're saying online. It apparently even goes as far as to tie people's searches and a website visit back to their phone number in China. So, that is very, very scary. 1984, totally here in China. And Google's doing it. They won't provide technology to our military but they'll sure as heck provided to the communist government. I don't get it two face, two face. So, more articles you'll see up on my website. I could ruin your business, right now. This is a sim jacking. We actually have a recording of it. You can listen to what these people are doing. American Express card used to pay $39,000. It just goes on and on DNA databases being used to track you down even if you don't have your DNA filed. And I'm sorry I didn't get to this point you have to read it online. Craig Peterson dot com does turning off your PC every night make it last longer. We've got the answers from the experts Craig Peterson dot com and join me next week for my webinar. Again all of that up and Craig Peterson dot com. A webinar its open, no charge. No credit card. We're going to teach you more about what's happening with ransomware, business email compromise, and the hackers take care we'll chat with you next week.

 ---

Related articles:

Your Information Technology Provider Is Now The #1 Target Of The Chinese Military

Huge Improvements Coming to WiFi

Frequent Flyer Miles Now A Big Target For Hackers

White House Calls On Google To Abandon Chinese Search Engine Spy Project

'I Could Ruin Your Business Right Now': A Sim-Jacking, Account-Stealing Ransom

Is Your DNA In A Database? Doesn’t Matter. New Study Finds That DNA Databases Can Send The Police Or Hackers To Your Door – Even If You Didn’t Submit Your DNA

Does Turning Your PC Off Every Night Make It Last Longer? This Is What 8 Hardware Manufacturers Have To Say
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 17, 2018

The holidays are fast approaching, should you give android or Apple products for gifts? 

Craig is on with Ken and Matt on WGAN discussing how should the government be coming down on things like data loss versus vulnerabilities if you have software that could be breached.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Breach, Bug, Hack. When Does A Business Have A Responsibility To Inform Its Customers?
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/17/2018

Android vs iPhone For Gifts - How Much Security Do You Need - Breach vs Theft - Who Has Liability

Craig Peterson: 0:00 Good morning Craig Peterson here this morning with Ken and Matt we talked about well two different things first of all and these are different things too because you know oftentimes between all of those radio shows online there's some overlap but no overlap this morning so with Ken and Matt I got into some of the security stuff that we should be concerned about. Ken's gonna be getting a new Apple Watch for Christmas, he said a little earlier on his show. So if you're giving a gift this year, should you be giving Apple Android what's out there? What are the considerations? And then from a legal perspective, this is a different topic, but how should the government be coming down on things like data loss versus vulnerabilities if you have software that could be breached?

Unknown 1:00
Do you have an obligation to tell people that their data might have been breached? Even though there's no evidence that data was actually stolen? It's an interesting question. And it's a kind of a question for the ages. So we get into that as well. This morning. Matt brought that up. So here we go. We Craig Peterson on with Ken and Matt 738 is the time and man is Craig Peterson. He's our tech guru. He joins us every Wednesday at this time to tell us about what is going on in the world of technology around the world. Greg, How are you this morning?

Unknown 1:34
I am doing well. Yeah, what is going on crazy, crazy, crazy

Unknown 1:43
horse faces out there. Just saying.

Unknown 1:46
So I'm

Unknown 1:49
Mr. Peterson. Is it equitable that we can be is everybody going to eventually someday be at no matter what we do? Well, I I kind of say.

Unknown 2:00
So and it's interesting know you're talking about getting the new Apple Watch for for Christmas and and a lot of people of course over the holidays for various celebrations are going to be getting all kinds of new gizmos and gadgets and I cannot emphasize enough and I know Matt you're going to disagree with me on hits at least to some degree but I cannot emphasize enough the importance of trying to keep your information secure all of the data secure and when it comes to devices and security there is no question Apple is it it's where it's at and Google Android it's all well and good but it is not secure not anywhere near as close to Apple's iOS well if that's the case should not beating myself a blackberry I mean

Unknown 2:56
you could go to a feature phone they I think they help

Unknown 3:00
Right. If you really want security, you don't put your data anywhere, right. But you don't put your cursor and it'll, it'll be secure and become the unabomber in the woods somewhere. Just kind of unplug from society. That's my that's my option. That's your

Unknown 3:18
way. Yeah, that's what he did. It was.

Unknown 3:23
It was. Yeah, I was. I was somewhere. Yeah, it was a shack in the woods,

Unknown 3:28
wind and rain. And but that's no way to live. Is it right? It's just, you know, you can't survive today without technology. Which leads us to what Ken was just kind of inferring here, which is that you have to set up everything all of your financial accounts, all of your equipment as though you're going to be hacked because you may have already had your information stolen and then taking a look at what happened here with the experience that was

Unknown 4:00
Very long ago, Facebook, hundreds of thousands of people apparently lost all of their personal information from this Facebook breach from what we're learning here just this week. So it's really good practice, especially if you're a small business person. But you know, heck, if you're a retiree, you've got money and accounts, you've got money, hopefully, and investment accounts of 401k or savings account. So types of accounts, that information is being stolen all the time. We went into a restaurant chain just last week, they asked us to come in and have a look. And they're using Android tablets for all of their orders, right, and to process credit cards, and they've got a whole system set up and it's quote, cloud-based, unquote, point of sale system for restaurants. And so we go in we have a quick look at it. The Android tablets are

Unknown 5:00
are completely wide open. They're in developer mode. They, they have all kinds of different software on there, including the ability to go out on the internet and visit the Facebook page, which apparently when we did a little investigation, some of the servers and even some of the management we're killing and there are cases, known cases by the hundreds or someone who is malicious, puts a little scraper on that machine. And now every credit card fits one. Yeah, it's going up to the cloud. Yeah, it's being processed. Yeah, it's it's secure when it gets to the cloud. But every credit card swipe done, that Android point of sale system was being captured by a little app that was installed on an Android device and all that interaction was stolen. We had locally here where I live in my town a restaurant that was shut down because the police

Unknown 6:00
arrested the manager that a small restaurant right here my hometown, the rest of the manager because that's exactly what they were doing. They were grabbing all of the credit cards they were reusing them, people were seeing charges and to wanna and other places. So we've, we've got to consider that we are under attack. The FBI just last week came up or two weeks ago, I think it was come out with a new announcement saying managed services providers are now becoming the number one target for thieves. So your IT company is the target are they secure this this whole thing, just some simple common sense stuff is going to save you a lot of time. Never ever use Android. Don't use Windows if you can avoid it, which means unfortunately, use Apple I don't own any apples to help Okay, I was on animals born

Unknown 7:00
For three years on their advisory board for three years, maximum term, okay, I'll tell you that but I did it because I wanted to help them improve their products, but

Unknown 7:11
consider that as a business person as a retiree as just a regular homebody. You've got to look at everything from a security standpoint. Because even though Experian can survive a hack, 60% of businesses are going to go out of business. If they're hacked, and you and I have that money stolen, the odds are will never ever get it back. So obviously, I've got my soapbox under me, or is it a stump today, but this is a huge deal. I can I see it all the time, people's lives destroyed.

Unknown 7:47
Speaking of hacks, of course, we're talking to Craig Peterson, our tech guru Craig when something happens in a company which is what we've seen happen over and over again, whether it's like you know, one of the credit agencies being hacked or you see the day

Unknown 8:00
app get hacked or somebody has a bug somewhere or something happens with a company or tech organization of some kind. What exactly are the rules for telling people about that? I mean, can can realistically, you know, if Facebook got hacked, like it just did, and like if 50 million users had their their, their accounts compromised in some fashion can ever keep that under wraps. Should they ever keep it under wraps? Or what duty do they have to tell us about this kind of thing? Yeah, that's a really good question. Because it's, it's our information, right? It's our lives and you know, what, what do they happen tell us when do they have to tell it to us is really kind of the question and it varies from state to state. And there are some federal laws about it, but there is a big difference between having for instance of vulnerability in your software and having had your systems breached right, so you

Unknown 9:00
Usually the line is, hey, if you know you were breached, you have a duty to report it. And in some cases, you have to report it within 72 hours. Well, Matt, how many businesses know they've been breached? The average time to figure out you've been breached to six months right now. Okay. It's absolutely huge, huge, huge. We had Google Plus Google. Just shut down. Google Plus, you guys. Did either of you ever use Google? I was actually an early adopter plus. No idea what it didn't believe it or not. Yeah, yeah. Well, the thinking back then was, hey, listen, Google's going to do social network it's going to be fake, fake. Fake. Right? And so you tried to do it yeah, I gotta do it. But I started using it early and then I you know, as as the participation in it kind of declines, so did mine But yeah, it's still existed for years afterwards, even though nobody used it. Yeah, it did it and I also was one of the earlier chapters I thought while but just

Unknown 10:00
going to take off is just because it was Google, right? And there was no real engagement there. And my friends weren't really there. So I kind of dropped it. But to your point, man, Google Plus is now get shut down. Because they had a problem with what's called an API, which is what programmers use. This is an application program interface to time to Google Plus. So you could use a developer to develop some software for your Android phone, and you go into that app on your phone, Mac, and you, you now are posting stuff into Google Plus account. Well, that was found out that API was found out to be extremely vulnerable. Now, there were only about 400 people who actually taught a license from Google and might have used the API very few people actually used it. So in that case, we're talking about a half a million users

Unknown 11:00
By the way, Matt back how many people have registered apparently with Google Plus 500,000 people? So you're right. There was like, no engagement, but 500,000 people's data that could have been compromised because of that API. But should that be reported? Should you be told, hey, listen, your data might have been stolen by someone. But we're not sure. So fence the line. That's that's the difficult part. But with technology, the law the rules or regulations always like behind technology and where it's at, and we've got to decide when this is a really big question. When should businesses be reporting Do you report a vulnerability you report an an absolute breach? Do you have a responsibility to be able to tell which consumers what data was stolen? It's it's going to be well before we figure this all out.

Unknown 12:00
Google's case they didn't bother to tell a soul. It was about six months ago when they figured this out. And they, you know, they closed up the whole of six months ago. And now they're shutting the whole thing down. Should they have told us should they have told regulators and Google's attorneys are saying, No, no, no, we didn't need to tell anyone, because we're not certain that there was a breach. We don't know that someone use this extremely vulnerable API to still everybody's information. I don't know, right. I really don't know if the laws that wrap around unauthorized access to user information to personally identifiable information access versus they've actually got it some of them are unclear and the lawyers are certainly coming down on the side of Hey, we don't have to tell nobody unless we know personal data was actually lost.

Unknown 12:56
Our tech guru Craig Peterson joins us every week on Wednesday at 730 and you can go to his website but peterson.com get all the information you don't have to wait till Wednesday just go anytime you want thanks for joining us Craig will talk to you next week

Unknown 13:11
all right Take care guys next

Unknown 13:15
we

Unknown 13:23
I wish I had noticed can make in that squeak sound I would have made a little bit of fun at him and he now take care we'll be back this weekend with my normal radio show as heard on the air am and FM stations carried by I heart Take care. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 16, 2018

Craig is on with Jim Polito on WTAG as the discuss how a fake video could start a war as well as what you need to do before and after you lose your phone.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

 

Everything You Should Do Before—And After—You Lose Your Phone


DEEPFAKES 2.0: Computers Can Already Create Convincing, Fake Videos Of Anyone
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/16/2018

Could Fake Video Start A War - What To Do About Lost Phones

Craig Peterson: [00:00:00] Hey, good morning, everybody. This is a little late. Sorry yesterday. I had an injury with Jim Polito as I do most Tuesday mornings and we talked about a couple of things. First of all, what are the implications of these newer pieces of software some of them are absolutely free that allow you to manipulate video and manipulated to a degree that you could make a video showing people doing things that they never did and have it be very convincing so I really great, very interesting topic with Jim this yesterday morning. And then we also went into one other topic kind of quickly and that's all about your phone and what to do before and after your phone is stolen. So some really good tips today for everybody whether you're in business or retired, or just a regular old home. Bobby's Oh, you

Unknown 1:00
Here we go with Mr. Polito. Here's the guy who made things like I Heart Radio possible. While because of the internet, he actually wrote code that is still in use today. And I'm talking about our good friend Craig Peterson. Who I just I think I just hung up on guys. I I I really think I just hung up on Craig Peterson. I mean, how do I do that? When you put an idiot in charge? That's what you get. Right, buddy?

Unknown 1:35
You know it. I really have to feel sorry for you. And for so many other people, because it has just gotten way too complicated.

Unknown 1:46
Too bad. It's not complicated. Actually. Smart people like you have made it easier for us user-friendly as they say. And now I just hit the wrong button. And that's all that's all it takes. Greg. That's all well hey, listen.

Unknown 2:00
We've got a lot of stuff to discuss today. And don't forget, folks at the end of this segment, Craig's going to give you a number. If you text my name, you'll get all this information plus more standard data and text rates apply. Craig, I want to talk about this because it is something that scares me in this day and age. I think it's cool. But in terms of fake news, politics,

Unknown 2:24
terrorism,

Unknown 2:27
the deep fakes 2.0 a computer that can already create condensing fake videos of anyone I've heard glenn beck talk about this. And while it is really cool, I mean, in the wrong hands, it could be deadly and I mean that as well. You could take video you could make a video of President Trump burning the Quran and then distribute it.

Unknown 3:00
What kind of an impact would that have around the world? And that's what this computer can do. So why don't we talk about it?

Unknown 3:08
And then and then dropping people into, shall we say, adult material and videos? Explain to us what this is about.

Unknown 3:18
If you think back a little bit, Jim, can you remember Lord of the Rings? Of course. Oh, yeah. Moving. Yeah. Oh, sorry if I read those great popular books when I was in college, but did you ever see behind the scenes that guy that played oh man document for the name of the character the meal or what did he call himself precious? You know, I'm Oh, yeah, yeah, yeah.

Unknown 3:45
Yeah, I know. I know. You're talking about the place. Yes. Yeah, exactly. Yeah, we're gonna get about a million text. I know. I know we will. But if you saw behind the scenes, there was an actual actor.

Unknown 4:00
Who ate that part made all of the movements and actually of course that the boys and they have those golf balls all over him when they were filming them. Did you see that? Yeah I know that because I was just at the Shriners and they use that same technology you know the suit with the little white golf balls all over it and then you the person moves in that suit and then a computer can analyze that movement or in the case of what they do in movies, then you can have an animated character moving just like a human because you have mapped that human at the Shriners, they use it to help kids with mobility issues and with constructing artificial limbs and things like that. But yeah, so you take something like that. Sure. Ya know, that's something I think we can kind of relate to that yesteryears technology

Unknown 5:00
Nowadays, right? And it's you know, it took them 10s of millions of dollars to to just do that one movie with that, that character moving around in the movie, right and you know it's continually getting better you know there's more animation actors are very concerned that within the next 10 certainly 20 years most of them will be gone. Alec Baldwin won't have a job anymore. It's it's, it's all going to change is going to change in a very big way. Because now there are programs factors deep in some apps that are available that do this type of analysis that used to require those little golf balls on the suits. In other words, they can pick out a face or for instance, you've got a smartphone. Yeah, and you've taken pictures of people. Have you noticed now how there's a little square around people's faces automatically on your smartphone where it is

Unknown 6:00
recognizes that there's a faith there, and then it focuses on that face. That's the type of tech we're talking about. that's available today. It recognizes faces. And it can also recognize movement of faces. The again think of the new Apple iPhone 10 and the ability to use it John Locke the phone. So with these new app, they are able to have very convincing for almost no money, very convincing videos that allow you now to do exactly what you've been talking about this morning on the show, you know, you could put Elizabeth Warren's face on a tribal pile participants and you would not really be able to tell them unless you got right down into it that it wasn't really Elizabeth Warren that had the Indian blooded

Unknown 6:55
yeah and and it'll match the skin tones it'll match the facial expression.

Unknown 7:00
it'll match the body movement and the facial expressions jam that's the magic that's the hardest part of all of this and it's available now you can you can do all of that stuff you can have it done on some of these websites out there like fiber and pay a couple hundred bucks and now you have a convincing video that's going to you know it's not going to convince the guys in the FBI crime lab but it is going to convince the people on you know the six o'clock news yeah and not just the six o'clock news so I could use it against a political enemy but like I said you could use it in an international incident you know remember but Ghazi Hillary claimed it was a video record she was lying but you actually could make a video and you could stir up unrest and a country you could start a war anything it's gonna happen Jim you're right with

Unknown 8:00
Why, you know, it could happen today. This is the type of thing to think about how World War One started, right? We all had alliances all of these countries. Yeah, one lower ranking guy was shot and all of a sudden we are engaged in a world or and you could have convincing videos of the beheading, that didn't even harping right with people involved that weren't anywhere near the site. So today it's people's faces being plopped onto porn actors. And isn't that funny? Yeah, but it's it's a scary bit of technology. And today for you know, $50,000 you could very easily have a video made that's going to convince all but the absolute best tech people in the world that's $50,000 down from what was millions just a few years ago.

Unknown 9:00
Yeah, we're talking with Craig Peterson, our tech talk guru and we'll tell you where you can get all this information at the end.

Unknown 9:11
This is something I wanted to discuss, because it does happen to people frequently losing your phone, and you've got a little tip here on everything you should do before and after you lose your phone. And it happens to all of us.

Unknown 9:31
Yeah,

Unknown 9:33
absolutely true. I've got the article up on my website, but there are about 10 different steps things you need to do before and then after great article up on wired.com. But here's the bottom line you in this day and age you have to assume a couple of things. First of all, you have to assume that you are going to be hacked. Okay.

Unknown 10:00
So when you set up those financial accounts, when you're trying to get your retirement accounts in order, assume that you're going to be hacked or the to have been hacked when you're setting them up. So yeah, same thing with your password your phone, assume that you're going to lose it. So make sure you've got a really great little passcode on that phone. a four digit passcodes. Not enough anymore. Yeah, I use the cloud. It should passcode. Maybe I'm a little paranoid. I don't know. You know, you're you're in the business, you know? Yes, absolutely. And managed services providers, which is what my company does. The FBI just came out and said, We are the number one target because we have access to our clients, competitors, right. Right. So I get to you that I can get to all of your clients. Exactly right. So they're going after me now my business so on our phone we not we have these 12 digit passcodes because

Unknown 11:00
There might be client information on them. Everything on the phone is encrypted. And then on top of had we have everything inside of encrypted falls on our phones and on our computers, and that's something by the way, if you have any personally identifiable information about clients or other thing and you're an accountant or your lawyer or you know, the list goes on and on, you have to have a higher standard or security. So make sure if your phone is going to be lost, and it will be right eventually it's going to be stolen or alive. They can't get into it. And if they do get into it, make sure none of that information is useful at all to the to the bad guy and make sure you have backups. I do not accept my phone to the cloud. I back it up encrypted backup to my local machine so that I have it and I can restore at will and if you have an iPhone make sure you turn on

Unknown 12:00
Find My iPhone, right? Because that lets you remotely wipe your iPhone. And that's frankly, that's a really good thing. Here's the bad guy who has your iPhone sitting there looking at it and all of a sudden it comes up with the Apple logo because it's been completely wipe. There's no way for them to recover it and there's no way for them to use your iPhone without your iCloud password. So it's useless to them. So there's a few real I think, really good tips here. It's going to be lost. Make sure it's secure, and make sure the data on it secure. same trick for your laptop. Yeah, make sure that it's that way. All right, Craig. That was very, very helpful. Very, very helpful. So folks, if you want to get this kind of stuff and you want more and you don't want to be bothered, though, and be tried to be sold something or you don't want to worry about getting hacked is very simple all that you do.

Unknown 13:00
Text My name to this number

Unknown 13:03
855-385-5563. That's 855-385-5553. That's right. Standard data and text rates will apply. But you're gonna love all of the information that you get. Craig, that was a great segment with you really appreciate it. We'll talk to you next week. Hey, thanks, Jim. Bye bye. When we return

Unknown 14:00

Hey, by the way, next week, I'm going to be running webinars on Monday, Tuesday, Wednesday, open to the general public. I have a closed one for FBI Infragard on Thursday. But Monday, Tuesday, Wednesday, we're going to be going through that really kind of an assessment here. Where's your business hat? What's your security standards? What should you be doing? So we have all of that up on my website just go to http://craigpeterson.com. You can register at the home page. Take care. Have a great day. And we will be probably putting out two of these today because I already was on the stations up in Maine with Ken and Matt. So we'll probably be talking to you very shortly. Take care.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 15, 2018

Elections are coming up but security is still a mess.

Craig talks with Jack Heath today about election security and online scams on WGIR.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Election Security Is A Mess, And The Cleanup Won't Arrive Until 2021

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/15/2018

Security And Online Scams

Craig Peterson0:00 Hey, good morning, everybody. This morning I was on with Jack Heath who's now covering most of New England states. It's, it's kind of cool, but I was on with him. We were talking about security and safety and what we need to do. There's a lot of scams going on. Many of them are aimed, frankly, at our more senior population, and they are doing just a ton of harm. So we talked a little bit about that. I was surprised at how much jack new and kiss I guess he's been briefed right, paying attention. Good, jack. So here we go this morning with Jackie and talking a little bit about security. What you can do right now with the scammers, especially the guys are coming in on your phones. I gave him an app that I use that I think is very useful. In fact, everybody that I've told about that's installed it has absolutely loved it. So here we go with Jack. 

Unknown 0:53
right now. The Tech Talk update go on the author. Let's find Craig. Peterson on his show Tech Talk. And of course, Craig Peterson, with on on Peterson.com. Craig joins us now on the listener lines. Good morning Craig.

Unknown 1:05
Hey, good morning Jack. What a busy week again, that like there's news to talk about. Well, you know, I guess you heard Kate Martel with the hill. Same it's kind of quiet

Unknown 1:15
except for the Trump President Trump interview with 60 minutes kind of quiet. But anyway, Craig, what's going on?

Unknown 1:21
Well, we got a lot of things here on the tech side, that's for sure. You mentioned elections coming up. There's a great article that I put up on my website that came from CNET talking about how election security is an absolute mess in some states frankly it's a disaster we've got a pretty good setup here in New Hampshire we've got some good checks and balances some auditing going on but Illinois for instance is saying that they don't have any federal funds Republic clean up their election system so I think we may be looking at at least until

Unknown 1:58
we may be looking at some contested election over whether or not something was hacked or people's votes were actually cast properly

Unknown 2:08
alright tomorrow I want to mention to the to its credit union weekend tomorrow we're gonna have a special focus on credit unions and we're going to be also going to be moderating a lunch and and conquered as they talk about things like scams and New Hampshire, elderly financial abuse is really prevalent in terms of some of our aging folks who are victimized too often with these financial online scams. Craig you know, you can't, you know, it seems like this is the one I love, you know, you get a number, it's a new hampshire number. So, you think it's, you know, you're going to answer yourself and it says something, you know, that they're trying to call you to extend your warranty and your car or you know, something about your, you know, here's a chance to do this for more credit, or here's a chance to settle college debt or call this number if you want to, you know, make money on that. I mean, it's just unbelievable. The number of scams, they really are scams out there.

Unknown 3:00
Oh, and there are a lot and they are hitting the elderly but they're hitting everybody to i gotta tell everyone who's listening about an app that you might want to check out for your smartphone I was getting dozens of calls every day and what they're scammers are doing is they're just randomly picking up phone numbers that are similar to yours so it'll be like say your numbers six old 3566 something you'll get a call from 603566 something they'll be impersonating one of these local phone numbers and they'll do everything you were just talking about so have a look at this app there's a free version of paid versions called Hiya, H-I-Y-A, Hiya, H-I-Y-A and what that does jack is that has a whole database behind it have about 300,000 known scam phone numbers she's it is done what's the app for me it's called Hiya, H-I-Y-A. Hiya, H-I-Y-A. And it's a phenomenal tool because it does block a lot of these scams and as you said there everything and they sound so legitimate I wanted to so well how do you spell that age what age I y and the other ones India Yankee alpha okay the other one I will ask you because we did get a listener to ask you about this there's an ad that's on I think it's for Experian to find out until you've seen the ad when you're watching the game some is your social security number on the dark web you can go on to do you recommend that are not well yeah there's a couple of things you can do but the here's the bottom line jack in this day and age thanks experience a huge gave the bad guys all of our social security numbers. So the odds are in this day and age that your information has been compromised, it is on the dark what should you do? It has been well there's nothing you can do to get it down. You need to make sure you change your password and we have to make an assumption jack I've got a great article about this right now up there. You have to set up all of your financial accounts like you're going to be half man that you have been hacked. The That's the truth. I agree. And we're gonna have more on this at this credit union event tomorrow and conquer. But Craig The other thing is, many people know the bank or the credit card carrier that they they have the thing that you're the expert, not me. But don't fall to this one. If you get an email and it looks like it's from your bank or credit card

Unknown 5:29
company don't assume it is because they can make these emails look like it's from that and then they want you to verify some account information and ask you a question. If you made discharge over the weekend. That's a scam as well. If you're not sure call on the back of the card or your back. Call them and ask if they are reaching out to you. So you can't even trust an email these days. It seems all right. No, thank you. We gotta run online. Jack. Don't click on anything in an email. Don't open that you Craig. Great. Peterson and we come back some businesses

Unknown 5:57
Hey guys. As always, thanks for listening. We're going to have a little bit more to about our webinars. Keep an eye on your email boxes. And we've got another one coming up. Are you interested in backups? Right? What's the number one thing you can do in order to protect yourself? Your company from ransomware. And that's backups. But do you know who has the best backup? What's reliable? What's not reliable? Do you cast these things right. So step by step, what would you like to know about backups we're going to put together a master class on that one as well. Just check it out. Send me an email me@craigpeterson.com. Love to hear from you. Take care. be back tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 12, 2018

New Cyber Security Rules going into effect for the Federal Agencies next week.

Financial Accounts are going to be Hacked.  It is time to set up all your financial accounts like you are going to be hacked. 

Infant Social Security Numbers are worth the most on the Dark Web -- this is because they are unused for 10-15 years during which time someone can use their identity. 

DOD Weapon System cybersecurity and how the DOD, just isn't grappling with the scale of these vulnerabilities.

Do you know what data you have?  If you don't know what or where the sensitive data is then how do you know what you need to protect. That is why it is important to have a Cyber Liability Assessment done.

The Importance of Changing and Managing Passwords can't be stressed enough.

Have you guys heard about Deep fakes?  This is quite terrifying what the future of AI and fake news may bring.

Where was Microsoft's QA department? Can you believe Microsoft released an update that deletes your documents folder?  They have pulled the Windows 10 update now.

Have you rented an Airbnb lately? Apparently some Airbnb Hidden cameras in your Airbnb rental

Did you hear what students are willing to exchange for free coffee? Wow!  It is downright dangerous for them.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/13/2018

The Importance of Cyber Liability Assessments, Changing and Managing Passwords, Deep Fakes, Microsoft pulled the Windows 10 update, Digital IDs, Hidden cameras in your Airbnb rental, The danger of no Cash options at Coffee Shops

Craig Peterson: 0:00 Hey, Good Morning, everybody. Glad to have you here. We've had a very busy week. This week, we managed to do our three webinar series. Hopefully, you had a chance to attend. This as part of our master class, for small businesses, about security and the types of security things you need to be doing and paying attention to, kind of being careful of. So, if you didn't get it, we will be having other little series as time goes on. And, you know, I keep trying to do this, maybe one a week, maybe less, maybe more. But you know, time will tell. So, keep an eye out, we'll be doing more. We had a lot of great feedback. We've started doing some of these cyber liability assessments. Again, these are free things we're doing for listeners of the show, and people who attended the webinar. So, that we can tell them where they're starting. Isn't that the biggest problem? How can you get to where you want to go, if you have no idea where you're at, right. So, that's the whole idea behind this cyber liability assessment. And those are underway, we just did one for one lady that was really quite a shocking, at least to her I'm sure, a listener to the radio show, where there was well over a million dollars in liability if the data got out. So, we're thinking maybe one of the things we should do in the very near future is put together a little special report on how to keep that data safe. Especially, with the new regulations that are starting to go into place now. That is kind of following the whole GDPR thing over in Europe. So, that you know, the protection if you will, of your personal information. California already has them in place, they're moving over to the federal side. And it looks like the Department of Homeland Security is going to be adopting those some going into effect next week. In fact, federal agencies are special, and want to be compliant already, but, apparently, about 50% of them is all that really is ready to comply. So, we will be talking about this as time goes on. Probably put together a little master class on some of that stuff. What you have to do in order to comply with these new regulations. We've already been doing some stuff for GDPR for those businesses that are trying to do stuff, internationally. So, today we are going to talk about some of the articles up on my website. We do curation every week in fact, it's me going through a lot of articles hundreds of them every week, really we kind of skim through try and find the best. Some of the best this week that you'll find up on the site, everything you should do before and after you lose your phone. I had a conversation this week with a gentleman who just two weeks ago got ransomware in his computer and ended up taking it into the local Geek Squad over at BestBuy trying to get them to fix a few things up. Hopefully, that's all going to work out for him, but it really brought to mind that I've got to put together a little masterclass and special report on this very topic. How do you prepare yourself for the inevitable? And, that is one of our articles for today, let's see if we can find that there's so much stuff here. Election security is a mess. Microsoft pulled the Windows 10 update, the October update. and we'll talk about that and why really bad news, frankly there. Digital IDs extra harmful here way worse than you might suppose. Finding hidden cameras in your Airbnb rental. No cash at this cafe - What students are doing in order to get free coffee?

3:48 Terrifying future. Deep fakes. Have you have you guys seen this article? It's up on my website. Deep fakes 2.0, the terrifying future of AI and fake news.

3:59 Weapon System cybersecurity, The DOD, just isn't grappling with the scale of their vulnerabilities. The breach that killed Google Plus, wasn't a breach at all. I want to talk about this today. We'll get into it a little bit of detail. But, what's a breach? What's a vulnerability and what's in between? At what point do they have to report. Right now they have to report when they have a breach of personal information. Well, how about

4:25 if they don't know if they've been breached? If they found and closed some sort of a

4:29 vulnerability. As I was just talking about. You'll see this up on my website, as well. And this is how to set up your financial accounts like you are going to be hacked. Because you will be hacked, right. Isn't that kind of the bottom line? Isn't that what we've been finding. It's it's bad news, but it's the news, right. It's a real thing, frankly.

4:54 So let's get into this now. Your financial accounts and what to do about it.

5:05 Now, you might want to spend a little time looking at this article up on my website. In the past week. And I'm talking about right now, October 2018. We have more reports about hacks. So, the big companies. Now the small companies, as I explained in the master classes this week, those free master classes. The small companies, we don't hear about, because who cares, right. But bottom line, it's a big deal. Well, in the past week alone, we've seen Experian, Facebook, and Google, have all had hacks. Now Google's case and we'll talk about this a little bit more, here but it's kind of interesting because the hack happened seven months ago. And, that brings up some other privacy problems, but now you know there have been thousands of hacks over the last 12 months. It just continually going on. I mentioned a guy who was on my masterclass this week who was hacked. Who got ransomware. It's it's just absolutely crazy about how that all happens. So, I went through the anatomy of a hack and the Anatomy of an attack, just because what you got was a virus, for instance, and that infected your computer and spread to other computers, doesn't mean it wasn't a hack. A hack is kind of a broader term we're starting to use. We're using the term hack because of doxxing. Now doxxing made the news again this week and the reason doxxing hit the news again this week had to do with a couple, apparently here, of Senate staffers, Democrats Senate staffers who were getting the personal information the home phone numbers, etc. of congressmen who were voting for President Trump's nomination to the Supreme Court Brett Kavanaugh. They were posting home phone number cell numbers addresses, everything information about the senator's spouses about their kids. The just crazy stuff they were doing. By the way, yes indeed, they got arrested for all of that. But doxxing isn't just reserved for democratic senate staffers. Doxxing is also used by the bad guys to find out information about you, about your family, so that they can then use that to manipulate you into doing something they want you to do. And that, as it turns out, has been a $12 billion dollar business over the last 24 months, according to the FBI. That is huge, huge money.

7:45 So, we know that hacking occurs. We know that we are getting targeted. Every week I help companies and even individuals who have been hacked and help them understand what's going on, what to do about it. But, I much prefer this and in case you're wondering, listening on the radio, I am doing this also online. If you go to my website, you can watch the video of me here on the air. But, at Craig Peterson dot com, of course. But this, why not set everything up in advance as though that cloud service, that vendor, that customer, is going to be hacked. Because the odds are, with thousands of breaches that they could be. This is based on an article from Shira Frankel over the New York Times, and she goes through it as well. This particular article I put up is from life hacker that sometimes has some excellent stuff. And this is one of those cases, starts with the obvious stuff. I had I think it was about 70 people this week, Text me asking for my password special report. Because we had this Facebook hack this week. I spent some time going through that during this week's master class, I may try and post that up on my website. And I'll let you know if that ends up going up. On how to tell if your Facebook account was hacked this last week or if it has been cloned or if there's something else fishy going on with your Facebook account. So, we covered that in this week's master class. But, if you really want to protect yourself, obviously change your passwords, and make sure you're using a good Password Manager, pulling it all together. And if you did not get a copy of my special report on passwords. Where I go through everything about how to create them, how to choose a really good Password Manager for yourself for your business and how to use that. If you didn't get that make sure you text me, just send me your name and email at 855-385-5553 you can just text me right there. 855-385-5553. So, number one, use a great day password use something like last pass or one password, we use one password really great for businesses the last pass has some great features as well. But I like one password with the integration to DUO, you know two-factor authentication. So number two, make sure you check your credit report, look up your banking statements, maybe tie all of your accounts together or something like mint dot com. So, you can kind of keep track over all of this. And we had Mint's CEO on the show some time ago. You're going to want to freeze your credit too. Your kids, you know, nowadays they are issuing social security numbers, when the child is born, the government wants to track them from day one. You know, back in the day we applied for them. When we got our first job, right. Now you're born you get a social security number. One of the most valuable social security numbers out there is social security numbers of infants. Why infants? You might ask, why? Why would anybody care about an infant social security number? Well, the answer is actually rather straightforward. That infant is not going to notice, the social security number has been stolen for what, 10-20 years. So, they have that period of time to misuse and abuse that so security number, maybe the name, the date of birth, all of that sort of stuff, but the date of birth, they can manipulate, right. They're just going to lie about it. And now they have a way to work in the US and bank accounts and get it all of this stuff. So, one of the things they're advising is not only checked your kid's credit report but make sure you put a freeze on their accounts, as well, at the three main credit bureaus. Now, I mentioned what was this about a few weeks ago that freezes are about to be free, thanks to a bill, President Trump signed a number of months back. Those should be in place already, and double check with the credit agencies, but they should not be charging you for freezes or, un-freezes anymore, which is actually a really good thing because Equifax didn't seem to care, right, that they lost all of our personal information. And then kind of the last thing is two-factor authentication, if all you can do is two-factor authentication with your phone, getting a text message. Okay, I get it. I understand. It's complicated to do it with other devices. We have physical Yubikeys. We also have the one password that we can use and use that to do validation with one time passwords, using one password. So all of that again, up on my website.

12:50 This next one that brings up some interesting questions. And this is about a breach that killed Google Plus. Now, you might remember Google Plus when everyone was worried, you don't know it's going to take over from Facebook, because Google Plus is a social network and well, Google's behind it, right? So why would it not take over? Well, very few people ended up using Google Plus. And it turns out there was a major problem with the security on Google Plus. Now, this is where the interesting question comes in.

13:23 They had an API on Google Plus that could theoretically be used to access the personal information of as many as about a half a million users of Google Plus, actual hits. That's probably the total number of users of Google Plus, there just weren't very many of them. I had an account, but I never really used it. It never got traction,

13:44 right? They really never did.

13:47 So, this vulnerability would allow people to get in and get all this private information. But, there were only 432 people who ever registered to use the API on Google Plus. How's that for a slap in the face for Google? You know, Come on, guys, obviously, people just aren't using your platform. So why keep it up? Well, about seven months ago, they found this vulnerability and they fixed it, in March of this year. Now, did you notice, they didn't tell anybody? This vulnerability was never reported. Because the Google lawyers apparently looked at this. And this is a great article, from the Verge, that I put up on my website. But they apparently looked at it and said, The law requires us to report data thefts, data breaches. In this case, we don't know if anyone used this API, this programming interface. We don't know if anybody used it to steal personal information. Therefore, we're not going to tell anybody about it. We're just going to close the hole and not bother mentioning it. The Wall Street Journal found out about this when it got its hands on some memos. And that's what got this particular ball rolling. So Unknown 15:14 what here? Where's the

15:16 disconnect? What do you call something like this? Is it a bug? Is it a breach? Is it a vulnerability, the laws that are in place right now, and California has one of the strictest ones, none of them address this type of a problem? So, companies are kind of confused over, What they have to tell regulators? What they have to tell their customers? Because, Would you like to know that your data might have been lost? Unknown 15:47 You know a company doesn't really want to tell you your data might have been

15:50 lost. Because, if your data might have been lost, you're not going to be very happy with them. You know, we're looking at statistics right now, that says, 60 plus percent, in some cases, as much as 80% of people do not want to do any business at all with a company that had a data breach. So, if you're a small business, and you're not sure if you had a data breach, because small businesses, how often do you have loggers in place, that track things like potential data breaches? potential data losses? Right? Small businesses don't usually have those now, we've helped a lot of small businesses put those systems in place because they're required to by law. So, depending on what business you're in, you may or may not be mandated to have those systems in place. But, you probably don't know if you were breached. And if you were breached, and you found out which, by the way, on average, is six months if you found out six months later, and could you tell them what was lost or what might have been lost. So, businesses are just keeping silent about all of this, understandably, right, because most people will not do business with you again if you lost their data.

17:05 So, that makes all you know, a lot of sense, I think you probably feel the same way as

17:09 I do. I wouldn't want to be doing business with somebody that lost my personal private information. So, when we're talking about this, as the Project Zero guys over at Google, they're looking for zero-day attacks. We've got white hat bug hunters, who are out there looking to build the reputation. What, you know, Facebook just fell from grace, just a few weeks ago, 50 million-plus accounts were hacked, they were exposed. Look at what happened last week with, Did my account get hacked? I got this weird message. It said I should forward this and a friend did not accept my friend request, you know what's going on right

17:55 Industry is still trying to figure it out. It's yet another example of how we just I don't have the laws to keep up with

18:03 the technology, nowadays,

18:05 right? I guess that shouldn't be a surprise to anybody.

18:09 I've got to bring this one up. We've got a lot of weapons systems that are being developed, nowadays. I was reading some interesting stuff about World War Two technology and what was being done by the Germans and the Russians and others. And, you know, and it was very mechanical, right? The torpedoes back in the day had wires they ran all the way back to the submarine.

18:33 Interesting stuff. Today, wow, the Department of Defense now is trying to protect everything. We have some Department of Defense sub-subcontractors, as clients trying to help them out these huge reports they have to do. The training they have to do? Physical security, as well as computer security. So they're trying to tighten it up, but if you look at something like this and I'm holding up to the camera just a quick picture showing one particular weapon. And all of the computers are on board we're talking about something that's really a computer, right? It's not a missile it's a flying computer on a, you know, on a flight platform, frankly. In operational testing the DOD has routinely found, what they're calling mission-critical cyber vulnerabilities, in these systems that were under development, absolutely huge. Great article from gao.gov. They found that using simple tools, simple techniques that the whole - Are you familiar with the Red Team, Blue Team thing - Where you have a competing cyber team, someone's trying to defend the network while another team is trying to break into the network? The military does this all the time. We do this with private businesses, where it's intended external scan is kinda like a penetration test, but you, you're actively trying to defend, actively trying to hack, so that you can see how effective both tools are and you can't defend properly if you don't know a hack right isn't that kind of the bottom line, here. So they were doing it and they found that most of the time the bad guys quote unquote could get into these different and pass these defenses in these defense systems without even being detected. Now that's a very bad thing so the DOD has recently taken some steps are trying to improve the weapon system cybersecurity. They've got new policies, new guidelines, out there to incorporate cybersecurity. We found that some of our clients are there just manufacturers of widgets, basic widgets, things like wires or you know modules that might go into one of these DOD systems. Even down to that level where there's there's nothing active. There's no computer systems active at all. So even at the level of a wire, the cables and connectors the DOD is now going to those people and saying, hey listen you need to up your security, here are the new standards, and they have to meet these new NIST standards and others. A very big deal, very scary deal frankly. And we've we've got to pay attention to these systems and now we know why. The GAO the General Accounting Office has found that the DOD systems are severely lacking in security. Which is scary when you consider that we have potential adversaries, such as China or Russia or even North Korea, in Iran Who all are are very good at hacking all know how to get into systems and it couldn't be very bad frankly. Could end up being very bad.

21:57 next article

21:58 real quick you're going to want to go online and have a look at this. This articles from Wired and I have it up on my website as well, at least a link to it, at Craig Peterson dot com, but everything you should do before and after you lose your phone. It's really great. It goes through the features that you can use, from remote tracking, exactly how to do it. Where the settings are, protecting your lock screens, backing up data, face ID, passcodes, thumbprint readers, their preemptive measures, and what to do, contacting your carrier. Very good advice. Something that you probably should have a look at out there.

22:42 This is terrifying,

22:46 frankly. And, this is the future.

22:53 Now, we know about AI,

22:55 right? Artificial intelligence, machine learning, which is kind of the precursor to artificial and machine learning is kind of where we're at now. There's no real artificial intelligence by the strictest of definitions, but

23:09 it's coming

23:10 In this article is about something called Deep fakes. Have you heard about this before you've heard about the fake news, right? So what's a deep fake, a deep fake, as it turns out, is a video in this case that looks like it's someone doing something else. And these deep fakes were discovered over on Reddit, which is a bulletin board, some really interesting stuff. But, what they had done is they had taken some porn video and had a computer, analyze it, and had taken some video of Emma Watson and had the computer analyze that. And, of course, when it comes to celebrity, there are lots of videos, you've got all of the facial tics, the way they express themselves away, they move. The computers are analyzing their gate, you know, as they're walking, their vocal patterns, etc, etc. And these deep fakes, now have gotten so good that they've been able to take Emma Watson's face and stick it on another body and create a whole new video. One that never existed before. So, Emma Watson never did any of this. Remember, Watson was not videotaped performing any of these acts. Obviously, somebody was, today, but it looks like it was her. Absolutely amazing. Now, I went on to Reddit. These have been taken down, its against Reddit policies to have that type of stuff up online. But deep fakes, are only the first step in a chain of technology that's coming our way, and coming our way fast. We can now do all kinds of stuff. Think of Gollum for instance, from Lord of the Rings. There was an actor that was moving, did you see that any of the behind the scenes stuff on this, he was moving, he had these kinds of balls all over him, so the computer could track his movements, and it did very coarse movements. If he'd move his arms, the computer can move his arms and you saw the computer animation with this kind of turned him into a stick figure so that they could make Golem move basically the same way. And then they went in afterwards. And then they tried to do the face, make the face just write a move just right, don't have to do any of that today. Today, you can just take a video, just a regular video. And from that regular video, put it on top of another regular video. Within its expected here. And this is an article from Daily Dot. And it's quite fascinating. But it's expected that within the next 10 years, this sort of thing will be extremely easy to you to do.

26:03 It's this article goes on for about eight pages. But this technology will end up being used for producing clones. You'll be able to use these in when with a psychiatrist where you got issues with your mom or your dad or someone else they can in a virtual world, today eventually, maybe not even a virtual world but today they can bring that person in and have you chat with them. That you know barely, right 10 years from now. It will be pretty, darn good. And 20 years from now it may be indistinguishable from reality. Just like you're talking right now with some of these chatbots, online. Where it's just you typing back and forth without really a computer the other end. In the near future it's going to be like you're on Skype with someone but then the person at the other end isn't a person. It's a computer, a computer program. So there's a few more we did not get to today. I hope check them out online. What students are doing to pay their tab. Hidden cameras at Airbnb rentals. Digital IDs, very scary things. Do not install Windows 10 updates, before you have a good backup. They are, Windows 10 updates I've been deleting all your documents. And not fun and election security is an absolute mess. But we can't get today so visit me online Craig Peterson dot com. Make sure you sign up for my next master class. Sign up for my email list just Craig Peterson dot com slash subscribe. Love to see you there. We'll keep you up to date. Every week we send out these articles to everybody that is a subscriber. Craig Peterson dot com slash subscribe or text me anytime. Any question. 855 385 5553. Have a great week. We'll be back next week and in fact we will be podcasting on Monday again. Take care bye-bye.

 ---

Related articles:

Face It! You’re Going To Be Hacked, So Set Up Your Financial Accounts Like You're Going To Be Hacked 

Breach, Bug, Hack. When Does A Business Have A Responsibility To Inform Its Customers?

Weapon Systems Cybersecurity: Looks Like Our Weapons Are Easy To Hack

Election Security Is A Mess, And The Cleanup Won't Arrive Until 2021

Millennials Will Give Away Their Personal Information In Exchange For A Cup Of Coffee

DEEPFAKES 2.0: Computers Can Already Create Convincing, Fake Videos Of Anyone

Everything You Should Do Before—And After—You Lose Your Phone

Use Airbnb? How To Find Hidden Cameras In Your Airbnb Rental

Microsoft Update Has Been Deleting Documents

Digital Ids Are More Dangerous Than You Think
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 10, 2018

China is at it again - The Peoples Liberation Army is using our hardware to hack into the government and our businesses.

Testing the Presidential Alert System and why it that test is important.

What do you think about Youtube replacing textbooks?  Well it is happening in many schools.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The Big Hack: How China Used A Tiny Chip To Infiltrate Major U.S. Companies

Why Didn’t I Get an Emergency Presidential Alert Text?

YouTube Is Replacing Textbooks In Classrooms Across America

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/10/2018

China Hack, Youtube replacing Textbooks in schools, iWatch4 and Presidential Alerts

Craig Peterson: 0:00 Hey, Good morning. Craig Peterson, here. We've talked about a couple of different things this morning including Ken went in to check out that new Apple Watch. So, if you have older eyes, you're going to want to hear what he had to say about it. But, today we talked about the Presidential alert system. Did you get one of those alerts this week? A YouTube study that came out from Pearson Education, this is absolutely going to affect your kids. And this, China hack - did they hack our hardware? Who's at risk? What's really going on here? Its smaller than a grain of rice. It's just amazing what's happening what's going on out there today. Also, the third webinar today of our little webinar series, its the last one. It's for Small businesses on cybersecurity and we're offering one free cyber security, cyber liability, actually, sigh liability assessment. One free for small companies. So go to Craig Peterson dot com sign up for the webinar. Webinar attendees will get one free assessment. This is something that normally cost hundreds of dollars and thousands if you're doing it across the company. We've had a lot of great feedback from people on this who learned a lot of things. I appreciate everybody who's there so check it out Craig Peterson dot com and here we go with this morning Phil and Ken because Matt is out, well on vacation

1:36 I wonder if this theme song is nominated the rock and roll Hall of Fame. I wonder if Craig Peterson is a nominee for the rock and roll hall of fame. I suspect not. Craig, nothing personal. Maybe the Technology Hall of Fame? Certainly. I would agree with that. Hello. Unknown 1:51 How are you? Great job. I don't know if we have those. You know, the jocks end up working for the geek. But the geeks just never manage to get their own hall of fame.

2:01 Yes, that's true. They are prejudiced against geeks

2:06 The geeks and running in the world, what are you talking about?

2:08 So, I have to tell you, Craig, my wife is not a big fan of Donald Trump. And when she got this Presidential Text, she literally screamed. She really thought that the President was texting her directly, and then thought that was gonna be followed up with another text or a Twitter from him about something because of they

2:27 don't we, it's not

2:28 Don't we run the risk of the president being able to just kind of send something out to everybody, whether we like it or not? Or is that not a risk at all?

2:38 Wouldn't that be something?

2:43 Was it sounds like xo, xo or anything on the end? Or?

2:46 No, I doubt it.

2:50 Yeah, well, we've, you know, we have an Emergency Alert System. And if you're living down in the coast right now, there's probably hurricane sirens going off to warn everybody. And you might have seen before weather alerts that come into our phones right, here, If there's a heavy storm, flooding expected, etc. And so typically these things are run by the state. Do you remember? A lot of this was early on, I think in President Trump's presidency, or maybe it was under President Obama, that in Hawaii, all of the air raid sirens started going off because there was an imminent inbound missile that was going to hit Hawaii. Do you remember that one? Yeah, yeah. And, you know, so those things are typically run by the state. In the case of Hawaii, of course, it was it was a false alarm. But, this what you had last week was not President Trump reaching out to all of the women in the country

3:48 What it was was an emergency presidential text alert. The same types of messages that you've been getting from the state, historically now, the Feds can do. And this is the third time they've run a test it's been a little while since I tested it last time not everybody got these alerts and the idea is if there is something imminent, something urgent that happening and everybody needs to know about it that's how the messages going to get out because most people have a cell phone all of the major carriers are participating in this. and you know Ken we remember his kids learning "duck and cover" right, because of the Soviet threat at the time, when we were in school. This is kind of the modern-day version of this Now, they are calling this a presidential alert. It really is a federal alert but yeah not everybody got it which is kind of interesting and that's the reason they're testing it. In order to make sure that everyone does get it. So, that the in the event that there is some form of a national emergency and everyone needs to be notified right away they'll be able to to use it. So tell your wife, Don't worry about it he's probably she's probably not going to get another personal message from the president. We're talking with Craig Peterson our tech guru that man over there is Ken Auchulter

5:14 Yeah, you like the godfather of the WGAN morning news I'm, I guess I'm the guest today Filling in. Craig let me follow up on that for just real briefly because there's other things I, I'm curious to get your opinion on. My understanding is that not everyone got that presidential alert text, I, I'm I'm one of them. Maybe it's because

5:36 I didn't care at all about you. Sometimes, it's about someone else. Well, frankly, it was only the important people Unknown 5:48 Not everyone got that. In fact I was on a phone call, when it came in. Because I forgot that it was coming right or I would have waited and my phone call was completely interrupted and the alert came through. And then it was reconnected after a few seconds. And then the guy in the other end of the phone cut the presidential alert. So, I know it leads to people that got it. But yeah, there are still some number of people that didn't get it. And they were on various carriers. So, some Verizon people got it some didn't to some T- Mobile got it from didn't. I'm not sure of all of the details as to why some got it and some didn't. Other than some glitches in the system, which is why they felt they had to test it again.

6:34 Let's go to a different place. I'm really eager to get your opinion and analysis of this story that came out about an Unknown 6:42 tiny chip in China

6:45 equipment that's now infiltrating US Companies. Yes, please. Tell us. Give us give us to tell us what's happening. Craig? Well, this is there. Wow. Intrigue, okay. I don't even know where to start with this one. This is fascinating because of a story came out in Bloomberg last week. And Bloomberg was saying that major US corporations, and they named specifically Amazon, and they also named Apple. That US corporations had been infiltrated by the People's Liberation Army, at least their equipment had been. The Bloomberg story when it is some detail about it. And we've had over the weekend now, absolute denials from Amazon and Apple about this. Now, this is let's talk about the accusation. And then in fact, this week, there have been more confirmations that have happened. Apparently, China has this little teeny tiny chip that may be about the size of a grain of rice. And the allegation is that the Chinese military has been embedding these chips into computer circuit boards, into the motherboards of certain computers made by a server manufacturer, that that I've used for years called Supermicro, they make some really good stuff. They are a Taiwanese company like guy that owns it's based out in the San Francisco Bay Area. And they've been around for very long time. And apparently what this chip does is when the computer when the server boots up, it basically just opens up the phone line to China and gives them complete control over the computer. Now, the Bloomberg story said that Amazon figured this out, and started removing these pieces of equipment from the network's. Same things true with Apple, they figured it out, as well. Although, as I said, both companies have denied it. And this week, we have a company that says they have a examined these systems. And yes, indeed, there are spy chips on all of these devices, including devices that are used by the military and the federal government, including things like cameras, video cameras, and others. So, this is really kind of interesting, at least from my standpoint, because you know, I love the security stuff and figuring it all out and helping businesses with it. But we're talking about potential infiltration by the Chinese military of the CIA, as well as divisions, major divisions of the military, and maybe even some of our major corporations that are handling all of our data. And I frankly, I wouldn't put it past the Chinese to do something like that. We have

9:57 been talking to Craig Peterson, our Tech Guru who joins us, every Wednesday at 738

10:04 YouTube. I watch you to all the time, you know, I'm a, I don't know if you know, this big pickleball player and I, I go to YouTube all the time to learn, how to play pickle a ball. So if I can learn pick up all by YouTube. Can't our students learn their lessons in school by YouTube?

10:22 It's an interesting question. And my grandfather plays Pickleball, by the way, Ken Unknown 10:28 say that ages me doesn't it? Yeah,

10:30 yeah, there. There you go.

10:34 Yeah, YouTube, it's an interesting thing. Because there is basically everything you want out on YouTube, the quality of what you're going to learn is always a little bit questionable. But we're seeing more and more, online learning going on. You know, my wife and I, we homeschooled all of our kids. And you have eight children? Yeah, you have eight children. Oh, my

10:58 god, you're a saint

11:00 today, we homeschooled them all the way up to college. Then there was no YouTube, right? There wasn't any of this stuff. And it was a different world. You know, we use Texas Tech and some other things to help with the curriculum. Well, now we're finding that YouTube is replacing the textbooks and lectures in a lot of the schools, nationwide. And some studies have been done looking at the different generations of students and have found that millennials prefer to learn from textbooks, 60% of them, but it's switched now the next generation, which is called Generation Z, is preferring to learn from YouTube, about 60% of them. So Ken you have something in common with Gen Z. There you go. Yeah. So, and we're talking about Gen Z, we're still talking about the young kids, right, early high school all the way up through through college, frankly. But this, is going to be happening more and more, hopefully, they're vetting it properly. But, it really brings in an interesting question about our future and the future of our universities and our schools, high schools. There's a lot of lot of kids here in Maine that are living in very rural areas that are using online curriculum. There is some incredible stuff out there from every major university. So, I think that's a good move I think its overall a good move, let me put it that way. The study that was done by Pearson Education I had some good and interesting numbers in it I've got it up on my website as well as these other articles. But this is the trend of the future, guys Unknown 12:50 All right, our tech guru joins us every Wednesday 738. By the way, Craig, I saw the iWatch four I went to the Apple Store to look at it. Yeah, It really looks impressive and I don't even wear a watch but I yeah I think I think it's on my Christmas list now

13:06 Can you see it? Can you read it well enough?

13:07 You know, I believe it or not I look at the 40 and the 44, watches the 44 just looked too big on my wrist because I've got, you know, I'm small, I'm five feet five. So, I looked at the forty and you know frankly, yeah wasn't that hard to read. I mean it's not it's not the same as my iPhone Xs max, which I love by the way I love by the way, but I love the right just the iPhone particular with cellular service now, you don't have your iPhone I think it's really been a quantum leap forward Unknown 13:41 Yeah, nice. Nice good recommendation there yep. From Ken Auchulter also there you go.

13:46 Thank you next week.

13:48 Bye.

13:51 Don't forget register early register often Craig Peterson dot com you'll get into today's webinar and we do have a replay that's going to be up for a few days if you missed this it's so important for small businesses. Small businesses, you are the target. Small-medium businesses, because you just can't afford the people that frankly you need in order to keep your system safe. And, you also have a lot more at risk a look at the list. There are dozens of things that you have that are your business assets that if they were unavailable to you or stolen would be just a horrific thing. So, make sure you register and maybe you can get into the next series that I put on probably coming up in a few months. Craig Peterson dot com. Have a great day. Take care guys. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 9, 2018

50 million Facebook accounts were compromised, was your account one of them? Find out more as Craig and Jim discussed the recent Facebook hack as well as some great advice on how to create the perfect and secure password.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The Best Password Advice Right Now

 

PHISHING WARNING: One In Every One Hundred Emails Is Now A Hacking Attempt

50 million Facebook accounts were compromised. Was yours?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/09/2018

Facebook Hack Clone Messages - Have You Been Hacked

Craig Peterson: [00:00:00] Hi everybody. Craig Peterson here I have some feedback from yesterday's podcast about the the whole Facebook the hack the cloning, everything I went into a lot of detail on that are right here walk you through how to verify if your accounts been hacked how to check if your accounts and cloned what were these messages that you got from messenger and then while you're in there change your password so I got some password advice as well all of that and more this is probably one of the more important segments for you to listen to. I think you'll find it very, very helpful to help make sure all of your stuff

Unknown 0:40
is safe. So here we go with Jim

Unknown 0:43
if there was ever a moment when we need Craig Peterson This is it. I can't take getting any more of these messages on Facebook joining us now. The man the myth, the legend Craig Peterson. Good morning, sir.

Unknown 1:00
Good morning, Jim.

Unknown 1:02
Yeah, so I'm getting these messages. Okay. Over and over again. It's they're all the same. Hi, I actually got another friend request from you, which I ignored. So you may want to check your account, hold your finger on the message until the forward button appears. Then he hit forward and all the people you want to forward to. I had to do the the people individually. Please do not accept a new friendship from me at this time. What is this? What is this? Am I hacked? Or are they hacked or people just sending around the same stupid message?

Unknown 1:40
That's a really good question while he asked them know, here, here's what's going on. Facebook did just have a really big hack. And you know, we know Zuckerberg was part of that at least 50 million users. Right? We talked a bit about that last week. Yeah, yeah. And people are consuming what's going on here now was I one of the 50 million people that was hack there's another problem that's been floating around Facebook lately and that is people have been cloning account someone. Someone will create another gym Polito account and we'll put your happy smiling face on it and some other things and and basically pretend they are you. So what's going on here? So it's a kind of an impersonation thing was I have, etc? Well, the Azar No, you weren't half However, you can check to see if you were hacked. And the easiest way, Jim, if you're on the Facebook page, and anybody listening the one double check right now Go Go to the Facebook page. Okay, and Jim Polito show.

Unknown 2:52
Yeah, I got to so can I go to gym? Pulido first.

Unknown 2:57
Yeah, you're gonna want to check each one of your okay. Not not just Jim. So in the top right hand corner of the computer of the screen there. Now that you're logged into, there's a little menu icon? Yep, I got it. Okay. So click on that. And if you're on a phone, by the way, you're going to select Settings, because you're not going to have that little menu icon. Ok. So now you can click on security. Yep. And then underneath security, you're going to see something that says where you're logged in where you are logged. Yes. And wait. And wait,

Unknown 3:35
hold on.

Unknown 3:37
You see, messenger. Wait a minute. You know what? I'm on my I'm on my desktop. And when I click on the little the upside down arrow doesn't give me security says activity log news feed pro settings. settings. And then go to security. Yeah.

Unknown 4:00
username. Contact that account temper

Unknown 4:04
snack. Giving me security. Oh, security and login. Sorry. Yeah, yeah, I'm holding up everybody here. Like, everybody's like, Jim, for god sakes. can see Danny in there. Okay, go ahead.

Unknown 4:17
For now where you're logged in. This is the important one day if you have to go to this later on today, just whomever you want to get in the settings and security and then we're locked in. Because that will show you if someone else's logged into your account, which means you have an in house

Unknown 4:38
don't freak out. If you see yourself logged in from a different town does not mean that it's it's that you've been hacked, necessarily, hey, so our internet addresses, which is how Facebook's figuring out where we are. Our internet addresses aren't like a street address. So your internet service provider and Facebook take an educated guess as to where you were last year. So if if you're her in the Forrester and it's showing you as lost in in Boston, I might be a little bit worried or in Springfield might be a little worried about if it's a neighboring town. Yeah, I wouldn't want to worry about it too much. Now, what you can do is you can tell Facebook there to log off all logins all of your accounts. So if you log off everybody, then you're going to have to log back in again. So that that's the safe thing to do. And during the half last week, that's what Facebook fit for you. Okay, they lost you off of all of these other machines. All In fact, every machine that was out there, yeah, so we're talking about two different thing. Well, three different six. Really. Okay, so that's how to check its use in half. Now, obviously, while you're in security, make sure you change your password, you know, you should be using two factor identification sometimes called to essays or to fit

Unknown 6:09
the you know, so that's going to get a code from your phone, which is reasonable thing to do. If you're a business, you might want to get fancier. But turn that on. So right now, while you're in there, change your password, turn on your two factor authentication, have them send you a text when you're trying to log in. And you can also turn on alerts but unrecognized locket. Okay. So that's Hack number two is clone. So the next thing you're going to want to do is go up to the search bar. Yeah. And you're going to search for your name.

Unknown 6:42
Yeah, so just put in me.

Unknown 6:44
Yeah, they'll put in me or Jim Polito. I put in Jim played all fibers

Unknown 6:50
Yeah.

Unknown 6:52
And now search to see if there's any other pages that come back claiming to be you now there might be another GIMP Leto in the billion accounts. Yeah.

Unknown 7:02
Yeah. Cuz he got Jim Polito. You know, when they could ask you. If you I think it was for email or whatever, you know, you want Jim Polito and I didn't put it in quick enough. So I ended up with Jimmy Polito

Unknown 7:17
oh yeah yeah I thought Craig Peterson back in the day and then I didn't really pay attention to it and somebody stole it from me that's not good anyways yeah so if there is another gym Toledo pretending to be huge. Yeah, when you get on that page, you can click again on the menu button. And you can say reports this page Yeah. Now Facebook is telling us that they have right now have basically a 24 hour guarantee if you report somebody as cloning your page and other words for tending there. You they've taken content from your page, maybe your picture et cetera, and they put it up on a different page. If you reported clone, then Facebook says within 24 hours, they will investigate and reboot the page. Okay, then. so helpful. We're talking to Craig Peterson, our tech talk guru, just about this whole Facebook thing.

Unknown 8:14
So okay, that's good. That's too easy ways. And you know what, I passed the test. And because Danny told me where our corporate login is. And that's on my, on my desktop. I'm logged into the corporate. And then the last time my mobile was logged in, it was logged in, in my town. So I'm good. I mean, I'm good. And there's no other Hey, come on. When they when they made me they broke the mold. Craig, you know that

Unknown 8:49
too. So that's good folks are Craig Peterson, our tech talk guru getting us up to speed. This is the kind of stuff and at the end of the segment, when I give you when you gives you a number, you should text My name to it. And it will help you to get all this kind of information during the week. And no, he doesn't try to sell you anything.

Unknown 9:10
One more thing on this data production, which goes back to your original question. Hi, I actually got another friend request from you like these messages that we've been getting. Yeah, and I got them as well. And I got them. In fact, I got one from a mutual friend of ours, this is a whole, okay, this is this does not mean you were hacked. This does not mean that the sender's account was hacked in the, you know, the generic sense of the word. So the thing to do with these is just ignore them. Okay. It's just like you receive a spam, email of phishing attempts, etc. Just ignore these types of messages and emails. And I'm going to be talking more about those on the webinar today, because I'm doing those three free trial webinars on small business security. If you haven't signed up, make sure you go to http://craigpeterson.com, there's a sign up right on the homepage. But according to the FBI, Jim, you look at this message. Okay. Yeah, and it's not a hoax. And a lot of people recognize the grammars kind of poor and wait a minute, this looks weird. But according to the FBI, $14 billion has been stolen from small businesses because of this type of thing. And I mean dollars from bank accounts, not $14 billion worth of loss work, $14 billion stolen from businesses in the last two years. So when you get a message like this one that came in over the weekend, primarily on Sunday from Facebook, or you get a message like this in the email, do not respond to it. Do not click on it early, if it's from your CEO, okay? Or somebody else telling you to make some sort of final manful transaction don't do it. Okay. Simple enough.

Unknown 11:05
Alright, so you'll get all that information folks at the end of this segment. And you'll be able to

Unknown 11:12
get that webinar Now, before I let you go. The important thing passwords, passwords that are to protect you from hacking, what are they and how do you do it?

Unknown 11:25
Well, good timing, because, of course, as we just said passwords on Facebook. Um, here's the trick. For years and years, the advice has been Make sure you use our complicated password and you change it every 90 days, like uppercase, lowercase numbers, who have special characters and all this other stuff, right? That's what you're supposed to have done. However, not and by the way, that's still what the HIPAA standards say. And that's still what others standards is saying. So the federal government has not caught up to the National Institute of Standards and Technology. Two years ago, they came up with this bottom line us a few words strung together, so have a phrase three or four words that don't normally go together as a good way to do it. So pick four, right kind of random ish, we're use those as your password six dash or number or something in between them. That is the most secure password that studies out right now shows us the old advice of you know, forcing people to change their password using random letters and everything else. those standards have now been proven to make passwords left the cure know it's used for work together. You're going to string together like I hard Jim, Danny, have, you know, Craig? Any new password, right?

Unknown 12:54
Yeah. And. And then that is overriding decades of old advice. It's simple, it's easy to remember, which is important. And it's almost impossible for computers again, because there are so many characters involved. Just you just think of that one particular string, it's got to be 2030 characters. Wow. So that's the best kind of password. That's the best. That makes sense. That makes that makes a lot of sense. words that don't go together the hyphen, stuff like that those symbols, and how often should you change that password though?

Unknown 13:35
Danny said, How often should you change that password?

Unknown 13:38
Oh, well, the beauty is, it's such a good password, and you don't have to write it down that you can get away with that password for a very long time. We're talking about a year, two years, even three years, as long as you don't use it on any other system. Okay. Now, this is this is general password advice, right? Yeah, you're right. One of my FBI compatriots are different,

Unknown 14:03
right. But for the normal

Unknown 14:04
for the average person. Yeah, yeah, exactly. Home user. That's the best possible advice that I think you'd get anywhere. Wow, this was a great session. Craig. Craig Peterson, our tech talk guru, everybody. Okay. So what you do if you want to get this kind of information on a regular basis and warnings on a regular basis and you but you don't want somebody to try to sell you something or pester you He won't do. It just checks to my name, Jim to this number.

Unknown 14:40
855-385-5553. That's 855-385-5553.

Unkown 14:45

standard data and text rates apply and you'll get all this great information. Craig, I want to thank you so much for your help. Today was invaluable.

Unknown 14:55
Hey, thanks, Jim. Take care. Take care

Unknown 14:58
when we return a final word.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 8, 2018

Facebook accounts are being spoofed.  

Find out more as Craig talks with Jack Heath on WGIR.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 


---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/8/2018

Fake Facebook Accounts -- "I have been hacked"

Craig Peterson0:00 Good morning. Craig Peterson, here. This morning I talked a little bit about this whole Facebook hack over the weekend. Did you get an email from your friends, telling you that "oh, my their Facebook account had been compromised"? I got a couple of those, or something and message asking in just kind of odd English, asking you to forward something along or like something. Well, that's what I talked about this morning with Mr. Jack Heath. Also, a quick reminder tomorrow. Tuesday is day two of our mini-webinar series, so make sure you tune in for that as well Craig Peterson.com sign up right there in the homepage. So, here we go with jack Unknown 0:46 Welcome back to our show. Craig Peterson, a little bit later on this morning. and Craig I believe it's Craig right Justin, Craig, Good morning. How Unknown

0:55 Craig, How are you, sir.

0:57 doing great

0:59 and let me ask you about this. Up over the weekend, Justin I was just talking about this number of people I noticed people that have contact with the show "saying that it was not them" sending a friend request from Facebook with instructions that they have been hacked. Was there a little bit of hacking over the weekend for Facebook? Cuz I saw about three or four different people post that today.

1:19 Yeah, I saw that as well this weekend. I started digging into a little bit, and a lot of people are concerned because of the big hack that happened just about two weeks ago where 15 million Facebook accounts were hacked due to just incredible incompetence on the part of some of these people over at Facebook. It was a very very sophisticated hack, but still, they should have known better. These messages that you've been seeing, and they pretty much peaked yesterday, on Sunday are something that you can ignore. These accounts have not been hacked. There were all of these messages going out that you might have gotten asking people to click on things and talk to about accounts being cloned. If you are worried about your Facebook account being clone the easiest way to tell if it's happened is just search for yourself on Facebook. If you see another account in your name, that maybe has your photo, it is a fake account. If you see that, there's a little button that you can click on that other account and report it as fake. Facebook has stepped up their enforcement actions, and they say that within 24 hours they will delete it, but very few of these accounts were cloned. This appears to be related to the hack of Facebook that happened recently, and just like some of the business email compromise emails that you're getting. The best thing to do is to don't click on anything. You just ignore it and move on. You're probably just fine. Yeah, it is so hard to keep track of all this. Then and then half of the time, I don't know about if this just happens, but once in a while, it'll change your username and your password just from time to time, to mix it up. Half the time, half the time though this problem is, we

3:09 think we remember things, half the time when you go to do, it says you got to put in your current password, people you can't remember, right.

3:15 Craig. sure my password should be something different than 1234. That's Not a password, Yeah, you should follow the advice of the Democrat Party and use password as the password

3:29 on that right now. Oh crap. funny one. Craig does these. He's had his Wheaties, this morning. On Monday morning. Columbus Day.

3:37 Yeah, the best advice for passwords, nowadays. This changed a couple of years ago. Although, Congress has not updated the HIPAA regulations or others. But the best passwords, nowadays, are phrases using a few words strung together that's much better than a random password we found that these passwords that businesses have been enforcing where their password to be letters and numbers and special characters. These have become less secure, because of how people handle them. So, the best advice, Justin and Jack and everybody listening, is stringing together three or four random words with a dash or number between the words. Use that as a password and please use different passwords on every website. Use a password manager too. Yes, send me an email if you want more info on passwords I wrote up a special report about that.  All right, great stuff on business on great business Appreciate it. On Craig Peterson, dot com Thank you, Craig. As well and by this 

4:40 The first episode of our webinars, a little mini-series is up. We've got this masterclass going on, and we covered the Anatomy of an Attack. I think I'm going to end up having to add one more thing to this because there were a lot of questions. So, we may end up with two or maybe three more little webinars as part of our masterclass. I am not selling a thing this is all about giving stuff away. So make sure you sign up Craig Peterson dot com. I want to help 100 small businesses by the end of the year minimum. Okay. And, a lot of them have already signed up. I have the resources for it, and I want to help you this is true. I want to help. So, make sure you sign up at Craig Peterson dot com Take care. Have a great day. We'll be back again tomorrow as well as with a webinar tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 6, 2018

The Chinese are at it again!  Now they have been caught implanting spy chips in the server motherboards they have been manufacturing. Listen in while I explain why this is a big deal and why it proves the point that President Trump is making about the Chinese. 

Why isn't anyone adopting the NIST Password Standards?  I will explain why they are easier to use and more secure. 

Why are schools using Youtube for Teaching?  Listen in and I will explain the thinking behind this and why it is a bad idea.

Airlines are continually under attack.  This week another one is breached.  Listen in as I discuss why they are targets and how they can stop it.

They tried something new for Alerting the Public Nationwide.  The Presidential Alert System -- There were some issues.  Did you get a text at 2:18 on Tuesday?

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.comoard

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/06/2018

China implants spy chips in popular server motherboards. Password Advice. Textbooks are so old school, Now its Youtube in Classrooms. Airline Hacks. Presidential Emergency Alerts. 

Craig Peterson: Hey, welcome of course you're listening to Craig Peterson. I am live on the radio every Saturday morning on some of these Northeast I Heart Radio Stations. So, I'm glad you're joining me. Hopefully, you join me every week. If you want to get a notification about the show, make sure you send me a text. I'll make sure to send you one when we go live every week, or if there is a big emergency. And, unfortunately, there have been a lot of emergencies, lately. Did Did you get one of those texts this week? Yeah, we'll talk about that, as well. These new presidential alarms. Well, text me 855-385-5553 with any questions, we'll try and get to them in the show, or I'll respond to you directly. Usually, within a couple of days, we can, I am usually busy doing some other things. So, it's hard to say, Well, today we are going to be covering a bunch of subjects. We have eight different subjects, you'll see them in this morning's email of my show notes to you. We've got YouTube replacing textbooks in classrooms. What do you think about that, huh? What you do with passwords. Turns out that the old advice is bad advice. And, there have been a couple of updates and we'll talk about, as well. A huge warning about our emails out there, something you might not be familiar with and I think you should, frankly. A bit of a an analysis here for the British Airways hack. If you're bigger business, you might fall for this same ploy, I got to tell you about this one, as well. Man, we're not going to get to all of this today. But, China, they've done some amazing things. Right now, there's some accusations about some of the stuff that they have done in order to spy on some of America's best corporate citizens. We've got new phishing scams, voice phishing scams, they're more clever than ever. And, the Fed here looks like for the first time may have broken into an iPhone x, well they got into it anyways, and will tell you about how that all worked, as well. Stick around, because here we go.

I guess this first article should not be a big surprise to most people. If you're familiar with the online world, in the least, you've heard of YouTube. I remember interviewing the founder, a young kid, of YouTube years ago. Well, it's become very big. Of course, now it's owned by Google, and it's replaced a lot of online, not not always, excuse me, as replace a lot of TV viewing. We have a lot of people who go online now in classrooms across the country, even. And, maybe even around the world. But, the classrooms are using YouTube. Now, remember when I was a kid and we would watch filmstrips, right now, it may be the occasional movie, they'd bring a projector and I was the guy that always set it up, because that was kind of cool. And, then we got these reel to reel recording machines. It was just really kind of cool. It used video tape. And so you'd string that tape between the reels and do all of that. It was really neat. And you edited it, just like we used to edit the audio where we take a razor blade to the tape and cut it up and tape it back together. We made our own videotapes. Yeah, that was just so cool. Later years of school for that one. But, now YouTube is where it's at. We're not watching those films in the classroom, filmstrips, boy, it has is changed. They are using YouTube. And the Generation Z has grown up with YouTube. Now, you might ask who's he was? Well, you know, the millennials, and then you had Generation X. And then Generation Y, and generations. Y name Y's name that became millennials. So, Y is millennials and now of course after y comes z. These are students that are the ages of 14 to 23, right now. So, they are getting into college, maybe even getting out of college and into high school. And, they're finding that Generation Z students preferred to learn from YouTube, versus books. Millennials like to learn a little bit more from textbooks and Generation Z it's down. So, it used to be 60% of millennials. Well, in fact, it still is preferred textbooks now, Generation Z, 60% of them prefer YouTube online. Now is not something, YouTube launched in 2005. So, most of these Gen Z kids grew up with it. 85% of teenagers say they use you to more than any other social platform. That's kind of interesting to. I don't know, there's anything terribly scary about this certainly a shift, I think it might be a shift in the right direction. Since now, you can get so much great information online on YouTube. You know why why not use it, frankly,

if you're a business, you probably have a server, a file server, we were helping them in fact, just this week as small accountancy firm, they have a few accountants, they have a Microsoft server in the middle of all of this, and they have all of their accountants data on that server, right. And they're trying to keep it safe. So, what did they do to keep it safe, they went ahead and they put VMware, which is really quite advanced for most small companies. But, it's a phenomenal tool if you use it, right. Of course, they weren't using it quite right. But they, they had an encrypted desk. So, the thinking was, wow, you know, we, when we boot our machine, even though it's in the VM infrastructure, we still have to give it the key in order for to boots, therefore, all of our data is safe. And, of course, we went in, and we did an analysis for them risk analysis, and we told them, okay, well, here's what we found, you're keeping your windows up to date, they're using Windows 10, and they have the professional versions, and they have auto updates turned on, which everybody should do. But none of your other applications were kept up to date. So, there are tons of potential security holes, there. And just encrypting the hard disk is not going to protect the data on it. Unless your server stolen, physically stolen,


What are the likelihood of that happening, right? It could happen, but it's not very likely. So, how do the bad guys get into these machines? And we discussed that a little bit with him. And there are a lot of routes in. Well, this route in just came out on Thursday morning, Bloomberg was reporting this. And that's kind of the amazing part. But, wow, wow, wow, wow. Chinese spies have reached almost 30 US companies here, including the big guys Amazon Apple, and it could be a lot more than 30. And, what they've done is they've compromised the technology supply chain. So, for instance, when we go into a place, right, we're going to a business we're trying to help the business and how do we help them? What's the best way to help the business out? Well, first off, we do a risk analysis, try and figure out if the data was lost, what would the risk be? What would their exposure be? And what do they need to protect, here ultimately, in order to keep their business safe? I think that makes sense. So, you go through this whole process, then you figure out, Okay, what are our priorities? What do we actually have to keep safe? And then how do we keep all of that safe. So, those servers are made by a few different companies, one of the biggest companies out there has been having some serious problems, for a while. And ,we've used their servers for a long time the company's name is Supermicro. And, it was founded by a Taiwanese guy, it's based in the US, out in California, they do all of their designs out there. They make these machines that are used for servers around the world. It can be a Windows Server could be a Unix server, it could be doing almost anything, for almost any company. But what appears to have happened here, and we're still waiting to hear confirmations from various companies. But, this is as Bloomberg is reporting it. They're saying back in 2015, Amazon began quietly evaluating a company called elemental technologies as a potential acquisition. They're trying to help with an expansion of a streaming video service. It's now called amazon prime video. So, elemental made software for compressing these massive video files, like the movies and TV shows that are part of amazon prime video. And getting them for different ready for different devices, and that's called transcoding. Well, it was kind of interesting, when they started doing the research, they found a course they done the work for the Olympic Games, which is pretty impressive, making sure all of that goes around. They've done stuff for the International Space Station. They had drone footage for the CIA that have been funneled over there. So, it's kind of cool. And it turned out of course, because of the drone footage elemental had some national security contracts. Well, it was really interesting, not going to go into a lot of details here. But Supermicro computer. A company we've used for years, apparently, had been infiltrated. At least one of their suppliers had been. Nesting on some of these servers motherboards that Amazon examined apparently was a tiny microchip. Not much bigger than grain of rice. And it was not part of the boards original design. Apparently they hid it inside the PC board itself, the printed circuit board right inside it, it's just nuts. These elemental servers can be found inside the Department of defense network, CIA drone operations, onboard networks, for Navy ships and elemental was one of hundreds of companies that use these Supermicro computers. So, they had a top secret probe, that still open apparently after more than three years. But, it determined that the chips allowed the attackers, to create a stealth doorway into any network that included any of these altered machines. Absolutely phenomenal here. So, an interesting article, you'll find it up on my website, along with all of the articles for today, of course, Craig Peterson.com , make sure you visit me online. Be glad to see you, there. But this is scary, because we have now, bad guys altering the guts of the computers. Oh, by the way, who were the bad guys, kind of looks like it was the People's Liberation Army. And not only did they find the chip, they found what the chip did, how it embedded itself. And in fact, it was sending traffic out, that the companies, in this case, Amazon and Apple, just weren't expecting to go out. So, both companies apparently have had a little program in place, quietly replacing all the SuperMicro Machines, but are denying in fact that they have them at least so far. We'll see where that ends up at.


Well, let's move on to the best password advice. This is one of the top questions people have asked me, we have a special report dive prepared on passwords. And if you want a copy of it, and you want to know how to properly generate and maintain your passwords, I've got some emails, you have some of the top password programs out there password managers and things, you can just go ahead and text me let me know my direct text number, its toll free 855-385-5553. Of course, you might have text rates or data rates that you might have to pay, but I'm not going to charge ya, 855-385-5553 and just ask for my password special report. Be glad to send it to you.


But a few years back, and NIST which is the National Institute of Standards and technologies, they submitted some, digital identity guidelines. In other words, these are the guys in the government that come up with the password advice. And they had some new recommended password policies that were frankly running parties, contrary to decades of previous advice out there. And then that's shall they said, instead of having these long, complex, frequently changing passwords, you should do something different, because they found that if you have long and complex and frequently changing passwords, companies were at greater risk, because it increases the odds that people will reuse those hard to remember passwords and multiple unrelated security domains. Okay, so the compromise of one domain or one machine can more easily lead to another. So, what's NIST saying now? Well, they've got more than two decades of compromises, backing them up, they've captured logged on credentials, logged on credentials, as well. Otherwise unrelated security documents and domains. They've cruised the dark web out there to find out what's going on. It's almost impossible to count the number of compromise that have happened. But it's easy enough to look at the passwords. And here's what their guidelines are, keep them easily remembered, use multiple words. Most of our passwords nowadays are three or four words randomly chosen, and some combination with some special characters in there as well. But none of the major computer security regulations or guidelines, including HIPAA, SOX, PCI, NERC and CIS are recommending the newer password policy advice, after years now, since NIST came out with this new advice. So, should you obey the HIPAA policies if your small medical practice or the NIST guidelines, I think you'd be on pretty good footing, but you might want to talk to your lawyer frankly. But I think you'd be on pretty good footing if what you decided to do was follow the NIST guidelines, it's going to be easier for your employees. They are going to have better passwords and you are guaranteed to have better security.

Alright, well, back in the "Can they unlock them or not category" we're going to talk about the feds and an iPhone x. Well, this is a huge problem, frankly, for well, bad guys. And it might be a bad problem for yo, too if you are trying to keep your information safe. Because, ultimately, if the Feds can get that information, maybe the bad guys can, as well. And that's obviously something you don't want to have happen. So, an iPhone x is different than many of these other phones that we've had in the past in that it has the ability to use your face, right? So, you just hold it up and it recognizes your face and then unlocks. Well, we know that some courts have upheld that they can force you to give your fingerprints, right that you have to give your fingerprints they are taken anyways, when you go ahead and you are arrested, right when you're in jail, or maybe not quite in jail. But in the police station. Well, how about your face? Do you have the right to keep your face private to keep it I don't know, safe, whatever you might want to call it that kind of the bottom line question here. What can you do in order to keep your iPhone 10 locked or locked, I should say? Well, there's another investigation that Forbes had come up with here recently about a child abuse case. And Forbes, was was able to uncover the first known case in which law enforcement used Apple face ID facial recognition to open a suspects iPhone. That by the way, is by any police agency anywhere in the world. They did a bunch of research to try and figure out, Are the police doing this? Can they force you to? This happened in August, it was an FBI search of a 28-year-olds home in Columbus, Ohio. And that month, he was also charged with receiving and possessing child pornography. So, they went in with a search warrant, and this federal investigator told him to put his face in front of the phone, which he did. And that allowed the agent to pick through his online chats, his photos, whatever else he deemed worthy of investigation. So, this is a pretty significant moment here. Where we're talking about whether law enforcement can or should, be able to force you, frankly, to be able to unlock your phone to unlock your device.


We'll see we'll see what happened. We still have two companies that are saying that they can unlock all iPhones, including the iPhone 10.
It's a device, here that costs 15 to $30,000, that they can buy in order to break into iPhones. see GreyKey and the other Yeah, the other one Cellebrite. So, now facekeys been used for the same purpose, We'll see what happens using a person's face as evidence or to obtain evidence is normally considered lawful. How about when it's used to unlock something? We'll keep an eye on this for you will let you know what ends up happening, as we go forward. And of course, as the case progresses.


This week, and it was something interesting happened has never happened before. Because it's never existed before. I was on a phone conversation. And right in the middle of that conversation, my phone came up with an alert. Did you get that alert? This is part of the Federal Emergency Management Agency, and they put a whole new service in play. And, it's called FEMA's new wireless Emergency Alert System. Some people didn't want to get the message. But they got it any way. Steve was on a phone call at the time. And while he's on the phone call, of course, what ends up happening, this alert goes off. And the guy on the other end of the line also had the alert go off. So, that's a bit of an issue, right? Having that alert go off in the middle of a phone call. So, not only did the alert go off, but in on top of it all, it cut off the phone conversation now didn't hang up. But the audio from that phone conversation stopped for about two seconds, while he was on that phone call. Well, some people got it. And there wasn't a warning that went out before. I don't know if you heard that they were going to do this. I certainly did. But four staffers at Wired magazine, who published an article about this, did not get the alert at all. And they were all on major carriers. I was on T-Mobile at the time. Verizon and T Mobile both had users that did not receive that alert. So, this is a whole new tech, we've never really had this before. Brand new phones insome cases didn't get the message, others did. And that's why you run a test. I just like, remember in Hawaii last year, before President Trump was able to stop North Korea from sending all of these missiles over Hawaii

In Hawaii last year, they accidentally sent out an alert. In fact, they I think they even sound at all of the sirens, air raid sirens and everything else. Well, you don't know if it's going to work unless you try it. So they tried it. And, the whole idea is to improve the warning delivery. So, if there is something major about to happen, you just might get an alert, you should also be getting them if you're in an area that may have a flash flood warning or some severe storm activity. I've gotten them before, that's controlled, in most cases, by the state's themselves. So, the state's decide what they want to send out. What they're not going to send out. And, this case is the only one I know of where the feds have tried to send something out. And they can, by the way, they can send these things to just individual localities. So, there's a tornado that hit as it's moving, they can send out warnings, tornado, you probably know it's it's on your doorstep. But that's usually done by the states. And who knows what the feds can use it for. So, you may have gotten that this week. You may not have gotten it, this week. But I think it's kind of cool. It's a good use of our cell phones for emergency presidential alerts.


So next up, we've got a phishing warning. Now we've talked about phishing. This is the pH fishing. And this is a very big problem. And it's it's huge, and the hugeness of it I think will become pretty apparent to you here shortly.


But this is where an email comes in, and it looks legit. Now as part of my webinar series I'm doing right now. And in fact, you can even watch the replays. Still, if you're interested, just let me know I'm doing free webinars for small businesses, telling them some of the secrets here behind small business cybersecurity, things that need to be aware of, and things I can do to fix the problem ultimately. So, it's continuing on this week, we'll have a couple more sessions. So you can just email me at Craig Peterson dot com here if your interested, But part of what we covered was the anatomy of an attack. And when we're talking about this type of attack, you know, most people, this is different. Most people think of, oh, there's a hacker and they're sitting there and they're trying different passwords, and they're trying software that's cracking their way into our organization. No. In most cases, that's not how an attack happens. And we're talking about a huge attack vector. The FBI says that $12 billion dollars has been stolen from businesses using this type of an attack. That's, that's a huge deal. I'm very, very big deal. It's not theoretical either. So, the Department of Justice just published some documents, and it's showing how email played a key role in the 2014 Sony Pictures breach, remember that one. Remember the hack of the DNC, the Democratic National Committee, where they said the Russians hacked them. It wasn't hack, either. It was this type of email phishing that was happening. And it only takes one of these malicious phishing attacks, to destroy a small business. And about 50% of small businesses find that if, if that small businesses hacked if they lose their customers data that in about half of the cases their customers don't want to do business with them anymore. So, that's a pretty, pretty big deal. So, researchers are out there, here's a stat that's going to surprise you, over a half a billion emails were examined by researchers over at Fire Eye they're looking at emails that were sent just the first six months of this year, isn't that amazing? A half a billion emails they have access to. And they found that 1% one in 100 emails
were out right malicious. Now, we're not talking about regular spam, where someone's trying to get you to buy this special pump, that's going to help you out right, we're talking about malicious, nasty email. The whole goal of these things was compromising a user or network. And when you get rid of the spam from that pool, so in other words, when you consider all of the messages that weren't spam, only one third of emails were considered clean. So, two thirds of non-spam emails, were malicious in nature. So, we're talking about a huge problem, a problem that can absolutely kill your business. And, that this isn't just true for businesses, right? This is true for individuals in their homes and everything else because you get email too, not just businesses, 10% of these are blocked, typically. 90% of them don't involve malware in the initial attack. And with my training I'm doing this week I'm showing you how exactly it happened. I walk through a woman who is doing exactly that. And she is not using malware, she is not using viruses, she's not using ransomware to get her nastiness into the businesses networks. So we walked through I'll show you exactly how it happens. Be careful this is a brand new article it's on from ZD net and it's up on my website as are all of the articles today, that we're talking about. Quick hit here before we run out of time today. Voice fishing is becoming even more prevalent than ever has before. Its easy to forget that we have got scam artists out there, but they're using your your voicemail. To fool you up, here's a sample of female voice explaining the credit union, to block phony looking charges in Ohio made to his debit ATM card. And, then she read him the last four digits of the card. It he pulled out this card from the wallet it was the correct last four digits. So she he told the lady need to replacement card immediately because he was going to travel out of state without missing a beat. The caller said he could keep us card and the credit union would simply block any future charges, that weren't made in either Oregon or California. Okay, so this struck that guy's a little off and a little research happened. So, be careful of phone calls. You never know. They may or may not be legit


Hackers, here they got into British Airways defenses and they got behind the doors. They disclosed British Airways, a little bit about what happened. But, we're talking about a data breach impacting information from roughly 400,000 bookings that were made just 400,000 over the course of about month. Three weeks, actually, it's crazy. So, names, addresses, email, sensitive information, pay card details, it looks like even some passport information was all compromised. Why? Well, because they had a problem on their website. This page that was compromised, hadn't been modified since December 2012. So, we're to the wise of your business person. And if you have a website and you are not maintaining it properly, or applying patches to it, making sure its using the latest, greatest code, you could have your information stolen. And, like British Airways, and so many other businesses lose customers. Because remember what I said the latest stat 47% of people will not do business with any business that has had a compromise. So that's frankly, I think that's a big deal. There's a lesson to be learned there for all of us. So thanks for joining us today. Again, if you want some more information, make sure you sign up for my webinar. It's you're going to be coming in in the middle because this is a webinar series but you'll find it right on my homepage at Craig Peterson dot com, this is free, no credit card for registration, right. I'm not I'm not stealing your money from you. But I can going through explaining this stuff and how it applies to small business. Because small businesses, they are the backbone of our economy. They are the job creators in this country. We need to make sure they're protected. And frankly, they are amongst the least protected of everyone out there. Well, with the exception of homes and in most cases homes, then you might benefit from this, as well. But we're really talking about small businesses, I really hope that somebody's going to come up with a great solution for homes. But still, the costs are too high. I'm unable to get them down for small businesses. But as far as homes go there, they're still not in the right price range. But at least all of this wonderful code and software that's been available for the fortune 500 companies for all these years, is now available through small businesses or for small businesses I should say through us. So, anyways, this is all free. I'm trying to help, you're going to learn a lot. You can take the replays of the previous sessions, if you'd like to, and you can ask some questions, you can get on as we have a couple more sessions this week. I'll be holding more webinars as time goes on. But Craig Peterson dot com register right there. I'm not a spammer. I'm not going to sell your information. Anyways, have a have a great week and we'll chat again next week. Bye-bye.

 ---

Related articles:

Feds Force Suspect To Unlock An Apple iPhone X With Their Face

The Big Hack: How China Used A Tiny Chip To Infiltrate Major U.S. Companies

Why Didn’t I Get an Emergency Presidential Alert Text?

PHISHING WARNING: One In Every One Hundred Emails Is Now A Hacking Attempt

YouTube Is Replacing Textbooks In Classrooms Across America

How Hackers Slipped By British Airways' Defenses

Voice Phishing Scams Are Getting More Clever

The Best Password Advice Right Now

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 3, 2018

5G is almost here. Craig talks with Ken Altshuler and Matt Gagnon about how everyone is getting ready for it, about Cyber Security Awareness month, and how interesting the new Apple Watch 4's new features are.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

 

5G Cellular Data Service Is Almost Here — Here’s How Everyone’s Getting Ready
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/03/2018

FCC Chairman Ajit Pai - 5G Cell Rollout - October Cyber Security Awareness - Small Business Security

Craig Peterson: [00:00:00] Hey, good morning everybody. I had a good chat this morning with our friends up in Maine. It's kind of cool they do this I think what about once a quarter least every six months, they have breakfast. It's kind of a politics and eggs type thing. So Ken and Matt were out of that. But we still had our little conversations we talked a bit about Ken's, new desire for the Apple Watch for a little bit about Facebook. And we talked also about Ajit Pai who is, of course, the new chairman of the FCC. He's been there for about a year or so now and he came to Maine and talked. So we talked about the new 5G rollout some of the things Ajit had said at a small conference that they host it up there and I talked also about this really important cybersecurity thing I have going on for small businesses. So we talked about all of that we've got it all put together and it's it's all here and if you have not registered for this, I do have replays available for the next week. So you can send me an email or text me and let me know that you're interested. I'll be glad to follow up with you just to me@craigpeterson.com or you can text me at 855-385-5553 Hey Have a great day and I will be back for my live radio show I Heart Radio show of this weekend.

Matt Gagnon 1:35
We are here live at the Portland Regional Chamber of Commerce's eggs and also some.

Ken Altshuler 1:41
A lot of people here today.

Matt 1:41
There are. We're here at the Holiday Inn by the Bay and yeah, there's filtering in but they did slow down which means that the program is probably beginning soon. So...

Ken 1:49
Did you notice every gubernatorial candidate came over to our tables?

Matt 1:53
They did. I got a handshake from Janet and everything.

Ken 1:54
Yes. Yeah. And Shawn was very friendly, and Karen didn't really chat with us.

Matt 2:01
I got a wave, as he walked by.

Ken 2:02
Queen's wave. And we got high five from Kerry. exclamation points.

Matt 2:08
Side five. High five. Well, anyway, let's go back to Craig Peterson, our tech guru who joins us as.

Ken 2:11
Well we can't go back if we haven't gone to him yet.

Matt 2:13
Good point. Let's go to Craig.

Craig 2:15
Well you're with me last week, right?

Matt 2:17
Yes. There you go. Thank you, Craig. Absolutely. We're back. Back to you, sir.

Ken 2:22
Craig, I was gonna ask you about the Facebook hack. But I must tell you. I've been I've been reading about the iWatch 4 and this one looks spectacular. I think I'm gonna buy one.

Craig 2:36
Yeah. Yeah, a lot of people are really excited about this, iWatch. iWatch 4 is kind of a first watch that maybe Apple is going to have a bigger hit with, you know, when we're comparing all four models, right? The iWatch e or the Apple Watch 1. It is not really an iWatch Ken. They call it an Apple Watch. But it's, it's the most popular because there's no big wins in two or three. But four is absolutely phenomenal to watch. And I played with one last, no, two nights ago. And I really liked it. I, you know, I'm thinking about buying one as well. But I have the same problem you do. I have a hard time seeing small things. So it's, yeah,

Ken 3:21
And we were able to, I had a friend who has who actually has the iWatch 4 now. And it looked like it was a little big one you can actually see some of the stuff on it.

Craig 3:30
It it is and you can increase the font sizes and you can have to scroll. You can do a lot of stuff with it to make it a little better for those of us that have presbyopia you know that have the problem seeing things up close as we age. So I think they've got a winner on their hands. There's no doubt about that.

Ken 3:49
So let's let's get to some serious stuff though.

Craig 3:52
Yeah, exactly.

Ken 3:56
Facebook.

Craig 3:56
The whole thing about the Facebook hack is really interesting because this month is Cyber Security Awareness Month. So we've got to thank the Zuck for bringing this to all to our attention. They get out there because Zuckerberg's account was hacked. As we're a minimum of 50 million other people's Facebook accounts. Now I'm saying a mil, a minimum of 50 million. Because at this point, we don't have full disclosure from Facebook, they're still trying to figure everything out. It's a real problem. very sophisticated hack, I have to say whoever did this really knew what they were doing. Because they had to use three different bugs in Facebook systems and use them against each other in order to get into these accounts. So this may well have been a nation state actor. In other words, China or Russia, China has been very busy lately in attacking us, our infrastructure, our computers, etc. So may well have been China could be some other countries. Who knows Iran and North Korea, they both have big cyber attack facilities as part of the military is out there. But if you were hacked, you're going to have to kind of wait a little while to find out because we don't know exactly what might have been stolen. And it's going to be on a by person basis if anything was stolen. But if you had to log into your Facebook again this week than that probably means your account was one of the ones that was compromised because the attack use these tokens that Facebook what's on your computer to know it's your computer so they don't have to log in every time. So kind of a big deal.

And I've got to mention too, because it's Cyber Security Awareness Month. And because the FBI, his newest statistics that came out about a month ago are saying that about $12 billion has been stolen from business, $12 billion cash stolen from business over the last 24 months. And since most small and medium businesses just cannot afford to have the technology help that they need when it comes to the cybersecurity I'm doing a couple of free webinars here, actually a series of three, one starting this afternoon. So absolutely free. There is going to be a ton of great information, I'm going to go into a little bit more depth and everything. Obviously, I'm not going to try and turn it into a cybersecurity expert. You got a business to run, right. That's part of the reason that you're having troubles with your cyber security, you have a real life but the bad guys are coming after you more and more and more so this afternoon at 4pm. I'm going to be doing the first in a series of three webinars for small and medium businesses to help you with awareness help you know what to do help you know how to fix these problems. So if you want to attend hand, it's absolutely free. No credit card nothing. Okay. This is information packed. Just either send me an email just me@craigpeterson.com. me@craigpeterson.com. Send me an email, let me know you'd be interested in attending. I'll send you the link and stuff or you can text me so obviously if you're driving, you're going to have to call back to this station and ask Danny for the phone number okay to text. But you can also text me at 855-385-5553. Believe me, this is a great service. Everyone's been telling me I did one of these last summer and I'm probably going to do some more this fall. But just text me 855-385-5563. We're going to be talking about the security problems that small businesses have. Here's Zuckerberg got hacked, right? Mark Zuckerberg accounts on hack Facebook got hacked they can afford with billions in the bank. They can afford to have the security people cover everything up, take care of everything. You as a small business person. And then this is happening every day when you lose your data. When you're busy. When that data is disclosed and your reputation is hard that enough is enough to destroy your business. So you've got to make sure you understand security that it's being taken care of properly. We'll talk a little bit about outsourcing it to local it firms, etc. What kind of questions should you ask them will cover all of this stuff over the next three webinars which are over the course of a week but send me an email just me@craigpeterson.com. I'll sign me up this is it could not be more important.

Matt 8:51
We're ralking to Craig Peterson, our tech guru who's joining us as he always does at this time every Wednesday to go over some tech topics. Craig, I'm going to name drop. Please don't please don't hold it against me. But Ajit Pai who is the chairman of the FCC joined the Maine Areas Policy Center my organization for a big lunch and talk a few weeks ago. And when he did I had a chance to talk to them a little bit. And he told me all about 5G. He kept talking about 5G deployment. 5G here how we're going to get it here. How are we going to do it here? What it's going to mean for you know, the country in general, and how we use the internet and all that kind of stuff. So 5G is a topic of conversation to say the least. And it is something that we all have an eye on for the future. Is it is it quote unquote, here yet? I mean, do we have 5G? Should we look forward to this very soon?

Craig 9:39
Yeah, yeah, it's interesting, because 5G is not going to start out as 5G, basically, they adopted a standard, it was accepted last December for a new 5G standard, which is basically just an enhanced 4G or LTE that we're used to right now. It's going to roll out, it's going to roll out pretty quickly, it's already rolled out to some kind of some test markets to see how it's all working. But it's going to be absolutely phenomenal. This is a fifth generation of cell networking, it's going to provide a lot more data bandwidth at a much lower price. So this is going to be something that's going to kind of hit the cable companies who have been providing us with internet and, and also the phone companies. Because in depending on where you are, if you're out in the middle of the woods, this isn't going to help you much. But if you're near an area that has a lot of people in it, they're going to be installing a ton more cell sites or the little micro sites, there will be a probably four or five of these micro sites for every cell tower. It's going to be less obvious, it's not going to make this guideline look worse. And it's going to allow all of our devices to have incredible network conductivity.

Matt 11:04
And not to interrupt you, Craig, but from what I understand about this is what you when you're talking about the deployment of these things, instead of these giants cell towers, it's essentially something the size of like a pizza box that's going to be able to provide this connectivity, right. I mean, so that by itself, you know, it helps deployed in more places, because that way, you don't have the same resistance to it with this giant tower, you know, that you used to have to put up you know, now you just have something that nobody even barely even notices, which might help clear up some of those dead spots. And also with faster.

Craig 11:33
Yeah, it doesn't looks like trees, right?

Matt 11:36
Yeah. Big trees.

Ken 11:38
They're very attractive. Like Christmas trees.

Craig 11:40
Yeah, yeah, you're right. Those are the micro sites and the micro sites they need a lot of them and small businesses that own buildings are going to have the opportunity to host one of these little pizza boxes basically these micro site they will be everywhere. They aren't going to spread very quickly which is nice as well it's not going to be ugly and you're not gonna believe the tougher because everything you know our cars need this in order to coordinate for the autonomous vehicles out there the new clothes like Levi's came out with a new Levi's jacket that has built right into it sensors and they can be network connected. You know your coat is network connected but you talked about this 4G phone.

Ken 12:29
You mean the coat's talked, your Levi's coat's talk to other Levi's coats?

Craig 12:35
Yeah exactly. That's what it is. And the Levi's coat can control your other devices right from a sensor on your wrist in the coat. Okay, so everything is about to change. We've got Apple working on these Google Glasses type things. Of course Google is as well. Other companies are you'll be able to be walking around have alerts pop right up, you'll see them like a heads up display. And and for all of this, we needed bandwidth. And that's what 5G's going to provide. That's why we've got sprint and T Mobile are trying to get together they're trying to do a merger waiting for all of the regulatory approvals in order to compete in the 5G marketplace. But everything changes and and Matt, anything else that just said, because that guy is really on top of it.

Matt 13:29
I said a lot of things. I was one of the more interested ones I thought, you know, we talked an awful lot about net neutrality, which I know we've gone over the program more than once
and sort of what we've seen you covered that a couple weeks ago, I thought about the change in the sort of internet speeds and our ranking internationally and how it's starting to lead to some investment in that kind of thing. But you know, generally speaking, things like that. Yeah, he was he was definitely a good talk. It's very interesting.

Craig 13:52
Yeah, yeah, good guy. So everybody, don't forget today. I'll give it out again right now phone number to be able to attend this series of free webinars. It's informational, no credit card needed. It's all about how to secure your small business, how to find someone to help take care of your small business security and it's all going to be via webinar and you can find out more just email me@craigpeterson.com.

Ken 14:23
Our tech guru Craig Peterson joins us every Wednesdays at 7:38 this not being an exception. Craig, thanks for joining us. I may go look the iWatch this weekend. So I'll give you an update next week.

Craig 14:33
Oh cool, thanks Ken.

Ken 14:36
Talk to you later.

Matt 14:37
Alright, so we're gonna take a quick break here. We'll come back.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 2, 2018

This morning, Craig talks with Jim Polito about the latest Facebook hack. Was your account compromised? Find out more about this new hack and how to remove yourself from people search sites and erase your online presence.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

How To Remove Yourself From People Search Sites And Erase Your Online Presence

50 million Facebook accounts were compromised. Was yours?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/02/2018

What Data Are Websites Keeping - How Do You Scrub Yourself From The Internet

Craig Peterson: [00:00:00] Hey, good morning, everybody. I'm putting the final polishing touches here on today's webinar. I've got this series going in case you haven't heard this week, three absolutely free webinars, no credit card required. Nothing all about security for your business. So I'm trying to raise awareness. It is Cyber Security Awareness Month. And hopefully, we'll have a lot of people learn a lot of things from this. This is not a big sales job. We've got three webinars. I do have an offer at the end. But there is a ton of important information. And people that have attended these webinars in the past have said some really great stuff about it. So this morning I was on with Jim Polito, we talked a little bit about the Facebook hack. But we also went into quite a bit more detail about something that I think affects us all in this is our information, where's it stored online? What are they doing with it, and how can we opt out so all of that and more right here with Jim Polito if you want to attend the webinars you gotta let me know and let me know right away. Just email me@craigpeterson.com. That's probably the easiest way to do it. me@craigpeterson.com.

Unknown 1:23
The man with all the answers. I'm talking about. Our good friend at Tech Talk guru Craig Peterson. Good morning, sir.

Unknown 1:32
Good morning, Jim.

Unknown 1:34
So much to talk about today. I want to get through all of it. Let's start with Facebook.

Unknown 1:40
Be afraid. Be very afraid. Right?

Unknown 1:45
Yeah, you know, here's Facebook and company that we all we trust.

Unknown 1:50
Yeah,

Unknown 1:53
yeah, you know, we talked about Facebook before now the monetary and everything and spiking as well. Facebook investigation is still ongoing. In case you haven't heard of. They were hacked. Least 50 million people. There's doubts now. But it was a few as 15 million people's accounts were hacked, including Mark Zuckerberg himself,

Unknown 2:15
his own his own account.

Unknown 2:19
Whoo. To find a now

Unknown 2:24
we've got a Canadian Thanksgiving coming up. So gotta get the A's out there.

Unknown 2:30
Okay.

Unknown 2:31
Hey, okay. Boy.

Unknown 2:34
The world was watching TV the other day, and it was claiming to be Canadian. And he had no Canadian accent at all he didn't face. So rewrite

Unknown 2:46
that story instead of sorry, how did he say? What did he say? You know, when somebody said, What time is it? It's a boot. Nine o'clock. Did he say that?

Unknown 2:56
You know? Yeah. No, he didn't. He said. Schedule instead of schedule. Schedule. Yeah.

Unknown 3:04
All kinds of things. You know, what's going on with didn't see process in place of process.

Unknown 3:11
Yeah, exactly. He actually said, we're making progress.

Unknown 3:16
It was the thing he didn't get a single thing.

Unknown 3:19
Canadians. Now we can't have it. It's it's all part of this new rework of NAFTA. Too many fake ad. And so Facebook. What? What's going on?

Unknown 3:30
Yeah, well, this was a very sophisticated hack. And I'm not gonna go into the details because it's like crazy sophisticated, the, to some Oh, off to tokenize basically cookies and, and how to fake out the website. And they had to use three different bugs that Facebook ad in order to make this hack work. And Facebook did catch it hard to tell exactly how long it went on. They still haven't decided to all of the details, at least announce all the details yet. But if your account was hacked on Facebook, the there is a sign there is a way to tell. Okay, that is what they were using for the hack was the automatic login, right? You go to a lot of sites, and they recognize you based on the machine you're coming from. Right. And they'll just walk you right in. Right. Obviously, bad idea for your bank. Yeah, and various other places

Unknown 4:30
that don't do that.

Unknown 4:32
Yeah, exactly. That type of an automatic login is what was used. So Facebook went ahead and expired those tokens on all of them accounts that they think we're half and that means you would have had to have we logged into Facebook this week. And that's where the tell you were hacked. it it's it's hard to say what they got from Facebook. Yeah, we'll know more over the next week or two and more information comes out.

Unknown 5:01
Alright, so what should I do right now, Craig,

Unknown 5:07
if you use the same login name or password on Facebook, if you use that same one on any other account, it's time to change your passwords again. Because what they'll what they'll do is they'll use the information they gathered in order to hack you another something else that's happening right now. And this is called a business email compromise. And what they're doing is they're mining data about people. Now, the FBI just came out with some new stats about two weeks ago and said that over the last 24 months, over the last two years, the bad guys have stolen more than cloud billion dollars out of business bank account.

Unknown 5:54
That's that's what you told us about that email before too.

Unknown 5:58
Yeah, exactly. So what you can worry about with a Facebook hack here is the bad guys are going to try and trust you, they're going to send you an email, it may appear to be from your boss, or someone else, you know, it might be from a friend or using this also for various types of extortion. So you may get a phone call or text or something else that looks like it's from your friends saying that they've been taken hostage, right, and that you have to pay or maybe they're in a hospital, they need some money, wire graduate. All of these tricks are part of that $12 billion, it's stolen. And you should be careful because Facebook now are the bad guys. Now how your information from Facebook about who your friends are. Remember, you uploaded your contacts to Facebook. Many people did this.

Unknown 6:53
Yeah. And now the bad guys may have access to it. We just we don't really know yet. And it's going vary from account to account as to what information they might have taken. But it's a big math and will keep up to date. All right, password change. And speaking of keeping you up. Today, we're talking with Greg Peterson, a tech talk growth the end of the segment, I'm going to give you a well, he's going to give you a phone number, you text My name to it. And he will keep you updated on all of this stuff. And he won't sell your name. He won't give it away, won't try to sell you something. And so you might want to consider doing that standard data in text rates apply. All right, let's get on to this other thing, which I really took advantage of as a reporter. These people search sites and a lot of them are free. You don't have to pay I go in there. I put in Craig Peterson or Robert Peterson. And there he is. I get a lot of information. Where is he lived? How old is he? I can sometimes get phone numbers. Other things. How do I you know, I liked it as a reporter. But now as private person, how do I protect myself from these sites?

Unknown 8:05
Yeah, they are used by a lot of people. Again, it goes back to what I was talking about a second ago with the whole problem with business email compromise, you gotta be gotta be super careful about this. But how do you protect yourself, the easiest way is you go to Google and you do a search for yourself, and find where your information is out there. So that you can ask for to be removed. Okay, I've got a great article up in it. It's from ZTE. NET on how to do this on my website. But bottom line, Google is your friend. If you're in the EU, you have the so called right to be forgotten, and citizens can request the removable Movil any information from Google as well as other Google own products and many other sites. But you and I, you just can't do that sort of thing. So you really want to do you want to do privacy check up on Google. Okay, that's your first step. And Google has just searched as Google for privacy checkup. And it'll go, it'll open a page for you, it'll tell you about what information they have about you, it'll allow you to remove a lot of it as well. They've also got a security checkup and others. So that's the simple way to do it. There's more complex and will constantly ways to do it as well. And by the way, this article goes on for pages and pages. Yeah, but there, there are services that you can pay to remove you from pretty much everything. Now, the NSA isn't going to remove your data, like they're going to keep all of your phone records and everything else they've gathered. But basically, pretty much every site out there will remove you except for the credit reporting agencies, you know, it's like Equifax will keep talking about No,

Unknown 9:59
no, I know that was awful. But I can understand that one. Now. Who's are they reputable. These folks who are going to do it, Craig, if I go to them and pay them because I can understand out there are some people, maybe a woman, maybe a man who is being stalked by someone and they want they don't want it to continue, or are they they don't want information out there about them, I can understand that. So they go and they want to pay for this service. But how do you know they're reputable?

Unknown 10:32
Yeah, that's, that's always a bit of an issue. Let me give you one or two right now that might want to look at, okay, one of them is called account killer.com. Okay. And this goes through every site there, they have little buttons right on their homepage, at account killer calm that you can click on the button. And it will give you instructions on how to get rid of your data that site so very good that it's very helpful site for you, again, you're going to have to do it yourself. There's another one out there as well. That's called the seat me d s EA t as in remove my seats, my hair dc ac.me, okay. And they have some services that you can use. So this is kind of on the other side of that allow you to now just let them help take care of it. They have a kind of a cool tool@dc.me that allows you to just sign in with your Google account or with your Microsoft account. And DC me will tell you all of the associated websites that you signed up for. Because, you know, you go to a site you see right there, sign in with your Facebook account, you click one button or your Google account or your LinkedIn account or any of these solid find them with some other account. And now you're information is associated with even more and more and more places. And, and with this with this business, email compromise, you just got to do it. You've got to clean this up. Yeah, I got it. I got it. Okay. Now that makes sense. So

Unknown 12:14
I Greg and I think you're the same. I mean, in terms of, we want our stuff to be spread out there on social media and things because, you know, that's how we earn our living, you know, in terms of getting publicity and advertisement, but I can see people wanting that done and wanting that check. Okay, so folks, here's what you do you text My name to this number

Unknown 12:44
855-385-5553. That's 855-385-5553 Okay. Standard data and text rates apply you will get actually

Unknown 12:58
pretty close to the same thing that Craig Peterson sends me every week when we have our conversation and more and when there's a big problem. You'll hear about it from Craig and you'll hear about what to do and he will not try to sell you anything or sell your name. Craig Awesome job. Let's hear it for truth amongst Canadians we want to make we want verification that if you identify as Canadian that you actually are Canadian correct.

Unknown 13:32
You need to be able to be Canadian at the very least yeah I got one more quick thing Jim Oh sure. For for business people out there. There are a lot of people in business who had just like we talked about today with how do I get rid of my stuff online a lot of people in business wants to know how to protect themselves what are the attacks that are going on so Wednesday tomorrow afternoon I'm having again this is a free webinar where I'm not selling you anything this is this is to get you up to speed okay so I'm going to have three of them because it's Cybersecurity Awareness month this month so business people can join up I'll send you the link to the webinar and we will teach you what you need to know this is going to be about three hours maybe a little bit more over the course of the next week and we're going to bring you up to speed all free all information it's kind of like the stuff we talked me right here on the air Jim you and I we go into more details more of the business side of it I'll tell you what the FBI is doing right now what they're reporting so that you understand it and and to do that to get on it just text me a webinar or whatever in fact I'll send out a text later today to anyone that signed up what's you know okay

Unknown 14:54
Crawley for the small businesses are getting nailed we don't want

Unknown 15:00
we don't want that. By the way. That is the bread and butter of the support of the show. So we don't want that to happen. Greg, thank you very much. We'll talk to you next week.

Unknown 15:10
All right. Thanks. Take care. Jim. You too.

Unknown 15:12
Bye. Bye. All right. A final word when we return something that no veteran should ever have to do. You're listening to the Jim Polito Show. Your safe space.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

 

Sep 28, 2018

What happens when companies are breached?  Listen in as I discuss the effect of a breach on their customer base.

Walmart is going to use blockchain to help to secure our the food they sell customers.

Why are we seeing such an upswing in Spear phishing? Tune in and I will explain it in more why it is now more dangerous than ever before.

Sale of Information on the Dark Web is increasing.  Today I will talk about why we are seeing more activity and higher prices being demanded.

It is coming, 5G is a huge leap.  I will discuss how this technology is going to change how we access the internet.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/29/2018

Breached companies lose customers. Spear phishing more dangerous than ever. Dark web pricing trends. 5G is going to change everything.

Craig Peterson: [00:00:01] Hey, WELCOME. WELCOME. Craig Peterson, here, joining you as I try to every Saturday morning. Thanks for joining us today. Hey, we've got a lot, as usual, to talk about in a short time to talk about it. We are going without commercial breaks, again. We have so much to cover and I got to thank, of course, I Heart Radio for airing this show on their stations and it's kind of fun. I was just adding it up. You know, I'm almost at my 1000 weekly episode. That is a lot, hence, a lot of airtime some of those shows were three hours some even four hours long. I used to do an interview format show. Now, it tends to be just me talking about some of the stuff that really matters to everybody out there in the news. So thanks to Iheartradio for airing the show again. Now moving on to, wow, close to 20 years I guess. Really weekly radio appearances by yours truly and of course, then a lot of television over the years, as well. I also want a quick shout out thanks to everybody that responded to my survey. You should have gotten an e-mail last week on Saturday. Maybe you opened it up during the week and then a reminder on Wednesday, please just take about two minutes, that is all it takes.

[00:01:23] Click on the link, right in there. I really do want your opinion. I'd like to know what it is you'd like to hear about here. I'm also doing another master class. Remember, last year it was in June, I did a three-seminar class that went on for about eight hours. It was on securing your computer, no charge for anybody involved. We're going to do some more teaching, but I really want to know what you guys want. What do you want to hear about what you want to learn about? The only way to let me know is to tell me, so if you haven't filled out that survey please do. If you don't have a link to that survey, just go ahead and send me a quick note. Just me at Craig Peterson dot com or you can text me as well at 8 5 5 3 8 5 fifty-five fifty-three. If there is any question, that you would have about security, that you'd like me to have a masterclass about. All at no charge text me at 8 5 5 3 8 5 55 53. Anybody, that answers the questions you are guaranteed a free seat in that class. And of course, I have courses as well for my clients that are out there.

[00:02:32] And who knows, maybe it makes sense for you to become a client, but for most people who are listening, you're probably too small, you're probably not too concerned about your business assets. You know you're not worried about somebody breaking in and stealing things or losing your client information. But for everybody else, there maybe there's some stuff we can do. OK, so big stuff today. We've got 5G coming out we're going to talk about what the carriers are doing how they're all getting prepared for this new technology. It's going to completely change the way we access the Internet and the way our devices access that, as well. We've got an interesting statistic that came out of the Black Hat Defcon conferences, just about six weeks ago, that I hadn't noticed before. We'll be going into that. If you're a consumer you're probably affected by this, as well, right. We had our data that was stolen from Equifax. Equifax is still in business we don't have the option of not doing business with them right. Well, technically we are. Once again the product right Equifax is still in business still doing great and we are still messed up. Those tickles in your throat when that happens. But, we're still in big trouble right because our information is out there. They're not issuing new social security numbers but they are issuing new credit card numbers and new bank account numbers.

[00:04:02] Right. But, Equifax is still out there they're still kicking around. Well, businesses that people don't have to do business with, have a different story. Even though Equifax is still in business. This is this is incredible here. Other businesses that don't have 48 percent of consumers avoiding services after a business has a data breach that is absolutely huge. Nearly all organizations that have been hit with a security incident report a long-term negative impact on both revenue and consumer trust. That is absolutely amazing. Consumers are getting frankly asking for a higher and higher standard for where they store their data and the how all of their data is protected while it's there in storage. And in this digital age you know you've got to right, you've got to be very careful about your data where it is and what they're doing with it. 80 percent of consumers are reporting is very important or crucial. Their personally identifiable information is protected online. 86 percent say a high level of data protection is a priority in choosing online services. That's from a technology and Frost and Sullivan So you know very reputable company there about half of the organizations report involvement a publicly disclosed data breach of those nearly all say they have experienced a long-term negative impact related to client trust and or revenue. So, it's absolutely huge you've got to pay attention.

[00:05:40] You have to be safe. This goes back to my survey I found that the majority of people that have so far answered the survey said the things that matter to them are protected. Protecting their data, protecting their bank accounts, their company bank accounts. By the way, It's come in is number one in the survey. Your own company's bank account. Number two is the customer's information. So, those are the top two in my survey. And I thought that was really kind of interesting, that's what people are trying to protect out there. So, it's very important or crucial, if you're a business you just can't afford to lose the consumer's trust because you will eventually go out of business. In fact, the statistics are still terrible. Customers are, excuse me, our customers but businesses that have been breached are likely to go out of business very, very quickly. So, that leads us to kind of our next story, actually does do this. but spear-fishing here you know about Russian attempts to meddle in the election while wow spearfishing has really become quite the science. Now, in case you don't know what it is. Fishing -  ph I sh ing - phishing is where the bad guys go out there looking to try and find data, try and find information, and then use it against a company or an individual. And that is exactly what it looks like.

[00:07:04] That is what happened to the Democrats last time around that all of these e-mails were disclosed because of the phishing attack, where you basically get an e-mail back in the day it was you know terrible language or wasn't worded properly and it was purporting to be from your bank or career I.T. people. Well, it turns out, that even though Podesta who last year had a password that was password. Oh my gosh, and lost all of the Democrats e-mails its' just kind of crazy. And by the way, the Russians weren't just going after the Democrats they were going after the Republicans and they're not just going after political parties, they're going after everybody out there, and they are using spearfishing. These are e-mails that have had hyperlinks embedded in them to go to a fake Web site and we just had news that was about a month ago you remember this reported quickly on this. But Microsoft blocked six fake Web sites that Microsoft thought were probably going to be used by Russians in order to meddle with our election. Now, we've got news coming out that the Chinese are also in the process of trying to meddle with our election, which of course, is a very bad thing as well. So, in this case, they send an e-mail. It looks legitimate enough and it has in it an embedded link, people clicked on the link.

[00:08:34] Now, it will take you to a Web site that usually looks legitimate. So, the e-mail might be pretending that it's some you know, PayPal or whatever, it might be some bank etc.. And it's not, frankly just about a month ago the Israeli Defense Forces IDF reported a social media phishing campaign that it was attributing to Hamas. So, they were trying to get the IDF troops to download malware, again, using fake Social media profiles on Facebook, Instagram, WhatsApp. What's more Facebook and Twitter have both blocked profiles linked to Iranian Russians and Chinese operatives used to try and spread misinformation. But, it really is helping to reveal a critical weakness of these influence campaigns because they're using overlapping profiles on multiple platforms. So if a social media company notices something then they can go ahead and talk the other social media companies and basically take out these bad guys all at once. I think it's really good. The whole concept of walled gardens and trying to keep things separate just doesn't fit in with this thing. Also, one of the things people complained about is that you can go to a Web site and it looks like it's the right Web site. We ought to mention that. But have you noticed the certificate you know a lot of people have been trained that if it has that locked in the corner by the R-AL they've been trained that OK well that means it's safe?

[00:10:09] I mean it's a secure server. Now, I can't emphasize this enough. A secure server is not a secure server. In other words just because it says that this is a secure server certificate and this has been validated it doesn't make it so. Two things that I want I want to make really clear, everyone needs to remember one it does not mean that the data on the server is secure. It has nothing to do with that, whatsoever. So your data might be secure in transit, but once it gets to the other side, it's not the not the right guy. The other thing that it does not mean anymore is that it really is the entity you're looking for. So, if you're trying to go to I'm just picking on PayPal. Here PayPal has a really good track record of being secure so, I'm just using them as an example one might know. So if you go to a Web site and it looks like it's PayPal and it was up in the corner they're up by you are the little lock indicating OK's to a secure server and if you click on that lock, it'll tell you the details about the security certificate. Those can be faked and they are being faked. In fact, the research that has been done recently shown that these sites that are being used maliciously to spread false information.

[00:11:30] Those sites are in fact being used with valid secure certificates, SSL certificates. So, just because there's a certificate does not mean that it's safe. OK. Everybody needs to remember that. So, it's a big deal. They are meddling with the election already. I heard a rumor, I should look this up but I think it was West Virginia, but apparently, some state is now allowing you to vote via your smartphone, which is absolutely idiotic at least as far as I'm concerned. Why? It's just almost impossible to secure that sort of stuff, so be very careful out there. OK, so let's talk about removing yourself. What information do these social media and other sites have about you? We already know Equifax has way too much about these other guys. Well, we had a couple of guys I think it was about a half a dozen that went out online and they did a little bit of searching online for their own data. And they found a bunch of very interesting things out there of some very very interesting things. Well, bottom line Google is your friend when it comes to finding your information online. Because even though Google does not index the dark web, they do a very good job of indexing the rest of the web.

[00:13:00] So, they wanted to know whatever information is out there. And what does it mean? And they found a lot of information about them, as you might expect, but then they decided let's take this to the next step and you'll see this article online. It was published ZDnet. There is a ton of great information. We definitely don't have enough time to get into all of it, today. But, they decided hey what happened in this day of GDPR are which is the European data privacy law. And, in the U.S. We have some privacy laws, nowhere near as strict as what they have over in Europe. But, in this day of so-called data privacy how much privacy do we have? What can we find out? You're supposed to be able to request from these companies, information about you. What do you have on me, out there? And of course, that's a very good thing to know, right. You'd want to know what businesses might be keeping about to, et cetera, et cetera. I know, I do and I have asked before. So, that's what these guys did. They went online and they started to poke around a lot and in some cases, they tried to request the removal of their data, and it was interesting because they got various types of responses from some people and some businesses out there.

[00:14:19] Google has their privacy checkup, which obviously you should pay some attention to go online to a privacy checkup. There are services online like delete me. There's a paid subscription service and it goes ahead and tries to get your data removed from online. Some of these Web sites, have what would amount to hundreds and hundreds of pages of information, about you. Some of the data brokers the data miners are really going crazy and some of them claim to have over 100000 data points on every adult in the United States. Think about that one. So, it's a scary world. If you're concerned about this. I'd love to know. But check this out, it's on my website at Craig Peterson dot com. And, if this is something you'd like me to cover in a masterclass, let me know as well and just put the subject of master class to send e-mail to me at Craig Peterson dot com, or you can text me at 8 5 5 3 8 5 55 53 and I will be more than glad to talk about and give a little class about that and a couple of other things we have up our sleeves. Next stop, here we're going to talk about 5G and a new use for blockchain. This is going to be surprising, I think, to a lot of people.

[00:15:40] Now, you probably heard of block trading. And most people when they think of blockchain they're thinking about bitcoin or some of these other cryptocurrencies that are out there. The whole idea behind block chain is to have a ledger. 

[00:15:55] And, you know remember we've seen Ledgers for years, if you ever watch A Christmas Carol you saw Legers being used in the accounting office, right. Who owes who money, back and forth and ledgers can be changed. And that's been a problem over the years. How do you know your bank's Ledger is correct? Good accounting practices use double entry ledgers to help correct and catch mistakes, but how about the malicious things that can happen and that do happen that are out there. Well, it gets to be a real problem and that's what blockchain kind of things hoped to solve. And I say kind of, because they haven't really solved it ,and I've been extremely disappointed in the massive adoption of the blockchain technology because the idea behind blockchain is if we have a thousand people all maintaining the same ledger and we assume that they're pretty much all valid maybe there's a few people trying to mess around but if there's a thousand Legers or 100000 Legers then we know that everything's legitimate right because it's all signed and it hasn't been messed with. And we can always validate based on looking at other ledgers that are out there. While, that whole concept behind block chain is being used now, by a few different companies, in order to do some kind of fancy things. First of all, some banks are already using it for literally their ledgers, right. There are bank ledgers and they are tracking the bank's ledgers and transactions between banks.

[00:17:30] So, it's already been used for interbank transfers interbank loans. You know the whole overnight rate and everything you've heard about before. Well, this is a big surprise to me. But Wal-Mart is about to jump into this block chain business and apparently by January 31, 2019, Wal-Mart has set a deadline for all of their direct suppliers to use blockchain technology to track food. Yes, indeed that head of lettuce that spinach that you buy over at Wal-Mart is going to be tracked with blockchain. And the idea behind all of this is that that they want to be able to trace the food, berries, mangoes, baby food, you know about the scare we had when it might have been a decade ago about spinach, and some of the nasty stuff in the spinach baby food. Remember, the scare with glass in some of the baby food bottles. Chicken with you when you're talking about salmonella or other types of diseases the same thing is true with beef. Wouldn't it be nice to be able to trace that food all the way back from the truck it was on, the box manufacturer that made the box that the chicken was shipped in with a plastic wrap that was inside that all the way back to the supplier or what day?

[00:18:56] Who handled it, everything. While IBM food trust has been working on blockchain technology to do just that, track all of the food. Very, very cool and it gives a much more complete view of the entire food system than what is currently available from anybody. And it is certainly stronger than the basic federal regulations are currently requiring. So, this is a really good pinpointing the source of the food contamination. It is almost certain, I can't see how it would not improve public safety. It's going to save lives because we can more quickly track down what other food might have been contaminated, where did it go, who might have sold it, where might it be sitting. The head of food safety over at Wal-Mart. Frankie Anice is saying that it's ultimately going to save money for retailers and farmers who have been swept into overly broad product recalls, in the past, and I've seen that before too. Because it's like OK, everything that came out of this plant is now recalled and you're talking, sometimes millions of eggs or millions of pounds of different types of foods. And it's a real problem. We had millions of bags and heads of romaine lettuce that was thrown out due to interruption of E. coli. Earlier this year 36 different states, so that one particular E. coli outbreak caused 210 people to get sick and five to die.

[00:20:30] And that's according to the CDC. So, very, very big deal this food trust blockchain is going to be a big deal, as well. And it's going to help promote food safety. I like it. I like that kind of transparency that that depth of view into our food supply. I think that's really important. OK, we've got some pricing trends coming up here. What's it worth? To steal your information and try and sell it on the dark web. Yeah, the pricing has changed. And I got to say the pricing has not changed for the better here. But for cybercriminals, the whole dark web is growing more profitable every day. And for those people that signed up for my Dark Web report, you know you've been getting them every month. And I got to say something about this too for the first time I think in about a year we did not have any of our listeners here who signed up for that free monthly dark web scan. None, of them, showed up in any of the reports this month. So, that's a very very big deal. First time ever we didn't have any new shows, obviously old stuff is out there but no new stuff so good for you. That means you guys are listening and paying attention. I really appreciate that. And I want to go by the way a quick shout out to a couple of new clients here, too.

[00:21:52] Tom and Jared as well. We ended up doing scans for them looking for information that if it was breached would be a bad thing. Right. Personally identifiable information, as well as stuff that would violate various state and federal requirements. So quick shout out to both of them and their companies. But in this case, the dark web is growing more profitable every day. And this is particularly true for stolen credit card data. Prices have gone up over the last three years as much as 83 percent. Isn't that amazing. For the US, Canadian, United Kingdom, an Australian credit cards, that is by the way. So Armors Threat Resistance Unit says, stolen credit card data is of great value to the cybercriminals because of the number of ways they can use it to commit fraud. So, they do everything from what you've heard before purchasing high-end merchandise for resale, for money laundering, and funding other illicit activities. Remember I told you about the lecture I attended in talking with the Secret Service officer about what they're finding and how can bad guys move money around because as a rule, they can't. All right what are you going to do? They don't trust each other etcetera, etcetera. The whole problem. The conundrum, the prisoner conundrum, but a different show for that one. So, anyhow the values going up, the prices going up that means we've got to start being very careful.

[00:23:26] There's also an increased Dark Market for cloned ATM cards, passports, prescriptions, and even prescription labels, all of them have increased in performance or in they've all increased in importance over the last three years. OK, we are finally making it to five G we've talked a little bit about 5G in the past it is coming. It's going to have a massive impact on almost every facet of how we use the technology we're talking about faster speeds, lower latency, which means the turnaround time and also in cost, so there'll be huge new frontiers for us. You know right now some cars have Wi-Fi hotspots in them. It's going to become the norm because it's going to be so cheap, so fast, so available. There are already clothes, we talked about Levis with their jean jacket that had built into it sensors so that you could control it just by swiping your arm on the sleeve of the jacket. Well, think of all with 5g you could build right into that code all kinds of sensors that are monitoring everything right your heart rate your not just the rate but your cardiac monitor, video screens, you know you name it you go jogging in the morning and you're concerned about getting mugged because you're going through New York's main parks or wherever it might be you know your clothes could be streaming a video feed 24/7. 

[00:25:03] And the cost on that will be minimal, absolutely minimal. Or if you hit a panic button it'll automatically upload the last half hour of video and sound or whatever from a 360-degree radius around you. This is absolutely phenomenal, what's going to happen. It's going to open up everything and then think about the self-driving cars that are coming. Right now they have to have a lot of very expensive sensors on them but if they could all communicate all share that data push that data back you know you to the blockchain stuff earlier with Wal-Mart and what they're going to do to keep your food safe. Well, think about what could happen now of all of the cars all of the sensors and everything everywhere. We're sending all of this data to a central database where it is validated and put together. And now the cars have an up to the second. Up to the second. It's just I'm just shaking my head it's amazing here. But up to the second information about road conditions everywhere out there. So, this is really going to be huge. This is really the fifth generation of cellular network that's why it is called 5G. This is, you know we've got 4G LTE right now and I'm going to give you the real basics.

[00:26:23] I got a great article that I got from the verge that's up to my website at Craig Peterson dot com. But, five Gs is a set of standards, of course, it's been adopted internationally as well in the U.S. but they're able to move forward because in December last year 2017. They agreed on the basic standalone standards. They have other standards as well. It's a much more complex network. They have to have a lot more cell towers if you will, but they can be tiny. So, in an area that might have only had a couple of towers before eventually here, there could be dozens of towers, just everywhere. It's just going to be amazing. Everything's about to change. Remember, how fast LTE was when it came out. While that's what's going to happen again that's going to be fast, fast, fast. All of the major carriers are working on it. We've got What T-Mobile and Sprint are trying to get together so they can build one really big and strong 5G network. We'll see how that all goes. But, everything's about to change when 5G comes out. And you know we are about to change, give it a couple of years. All right again if you have any comments if there's anything you'd like me to cover in a master class make sure you e-mail me right now. Just me at Craig Peterson dot com.

[00:27:44] Craig Peterson dot com or text me with any comments, questions concerns, or topics for a masterclass to 8 5 5 3 8 5 55 53. I'm looking forward to helping you out. However, I can whatever questions you have. Take care and have a great week. Bye-bye.

 ---

Related articles:

Facebook Violates Apple’s Data-Gathering Rules, Pulls VPN From App Store

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Google Reportedly Bought Your Banking Data In Secret, And That's Not Even The Bad News

Idle Android Devices Send Data To Google Nearly 10 Times More Often Than Ios Devices Do To Apple, Research Finds

The Home of The Future Is A Security Challenge

Your Digital 'Purchases' Are Not Really Yours

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 28, 2018

 

Is it time to upgrade? Apple's new products - iWatch 4 and new iPhones.

Do you share your streaming passwords?  Listen in and you will hear about who is sharing theirs, and what might happen because of it.

Who owns the content on your digital device?  Turns out -- not you.  Listen in and I will explain why.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Facebook Violates Apple’s Data-Gathering Rules, Pulls VPN From App Store

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Your Digital 'Purchases' Are Not Really Yours

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/27/2018

New Apple Products and Mis-Use of Digital Streaming Products 

Craig Peterson: [00:00:00] Hi everybody. Craig Peterson, here. I was on the radio on Maine this morning. And you wouldn't believe this commercial, I should have recorded it, but it was a commercial for you to reserve your tickets for Maine's Polar Express. A Train service that runs through the frozen night White North. So, if you're from the south, or someplace warm in the world, it's time to kind of freak out because Maine's going to get socked over the winter. Maybe that's why they have Saco in Maine. Right. They got socked, anyhow. And for those from Maine, Hey welcome. Glad to have you aboard this morning with Ken and Matt. We talked about a few different things. In fact, we had a little banter back and forth about some of the Apple gadgets that just came out, and Ken, of course, he loves Apple. So, we talked with him about what he's doing there. We also talked about a couple articles in the news this week which of course millennials streaming sharing their digital purchases, and whether or not they really are yours. And we covered that a little bit more depth yesterday. So, if you're interested in that listen to yesterday's podcast, but you know millennials sharing streaming is a real problem and the younger kids the millennials are even worse. And Facebook's VPN bottom line, just don't use it, OK. I wish there is a great alternative to Facebook, I just haven't found it yet. So, here we go and thanks for listening. Thanks to those people who did go ahead and respond.

[00:01:33] We had quite a few more responses to that little survey that I put up. So, here we go with Ken and Matt. 

[00:01:40] He's back again. Ladies and Gentlemen Craig Peterson, our tech guru. He joins us at this time every Wednesday, to give us an eye on the world of technology. Craig, how are you, sir? 

[00:01:50] Hey, Good morning, gentlemen. 

[00:01:52] Doing pretty well one of my daughters and her husband flew in from Europe. She's living in Oslo, now. And, we had Thanksgiving, on Sunday. So, that was really kind of fun for the first time we smoked a turkey in the smoker. So, it was a great weekend. It was nice to see, almost everybody was here. Another daughter in Kentucky and granddaughter, but they didn't make it. 

[00:02:16] We're not sure if you're aware of this Craig, but Thanksgiving is in November.

[00:02:19] Smoking Turkey is not legal, I don't think. Safer than doing it in a deep fryer.

[00:02:27] For years these accidents. Yeah, she can't make it back until after the first of the year. So, we're going we're having we had it on Sunday and the next month we're going to celebrate Canadian Thanksgiving which is in October and then we're going to celebrate you. Do you have to apologize at the dinner table?

[00:02:42] Can't have too much turkey!

[00:02:45] Exactly.

[00:02:46] I love that Matt too. Yeah, well I'm sorry but we have to say sorry but did you eat potatoes, Soe-rry. You've got to say it right. 

[00:02:54] I have to tell you the big news, because I know we've been waiting for this. I have ordered my iPhone 10 s Max. Yeah. Just buy that other iPhone. I try. I'm on the monthly thing that you upgrade once a year. So, yes so I did order it. It's going to be next week.

[00:03:16] It's going to be bigger than my face, but it's you know a lot of people were looking forward to.

[00:03:24] There were lines. But you know frankly, Matt for normal mortals or normal humans. The iPhone 8 versus most of the iPhone 10s. Now, of course, they killed the 10, straight 10, but the 8 is just playing good enough. I don't know how well Apple's going to do with this. You know I think they were smart to have that program that Ken signed up for. Where,

[00:03:48] I would not have bought it, otherwise. Yeah. You understand that every time something new comes out you, have to buy it do you not understand that.

[00:03:56] Well yeah. And whoever has the newest toys wins.

[00:04:01] That's right. Exactly. And I actually am I'm not. I don't use my iPhone with one hand.. I mean I know one of the complaints about the 10 Max is that you can't use it with one hand. I always hold it in one hand and use my finger to do things with it, so to me who is blind and deaf and old and cranky. I have to have a bigger screen, exactly right. I can't see anything. 

[00:04:26] So, I have people calling it like the 10 SMax, no smack. 

[00:04:34] Oh that's funny. I've heard that. Oh yeah. OK.

[00:04:38] I'm not running out to buy one, because they're the only big winner on that phone, frankly, is that it's got amazing graphics if you're doing 3-D or virtual reality. Which clearly he is doing that all the time. I got it because it's bigger, by the way, also is the new iPhone.

[00:04:56] Watch, because I didn't get the iPhone watch, because my eyesight is so bad. So, that's on watch. What do you think about the new watches, it is better? 

[00:05:04] Yeah yeah yeah. It's the iPhone, of course, it's the iwatch 4. And, this is the kind of a big announcement, frankly, from Apple. Its better and bigger than all the other stuff and it's become very, very popular. But, what's interesting about the new watch is that it has now a single wire electrocardiogram built into it. In other words, it can watch your heart rate your rhythms even then read the rhythms. It actually approved by the FDA. So, it really kind of a big deal. People are concerned about the watch and the fact that it can read your heart rate and rhythms and watch for maybe potential damage to your heart. Because now are we going to have more and more people going to their doctor. You know the problem we've already seen in medicine is Dr. Google you know Dr. Google, right?

[00:06:03] Yeah, I know talking about can be his problem. 

[00:06:07] Well, that's where you go online and you search through your symptoms and you find that you're about to die. 

[00:06:12] Yes. Right. Happens daily to my wife. Yes. 

[00:06:15] Yeah. So, thats Dr. Google and so many people using it. So, now people were kind of worried, well with this new watch, which by the way is phenomenal, because it has a built in cell modem and has basically everything available on it. It's just amazing and they changed the bezel to make it a little bit bigger, Ken so maybe you can finally see it. You know scroll one letter at a time on it. But, this new watch is now trying to cause some more problems for doctors, because all of a sudden someone's going to say oh no, oh no, I missed a heartbeat earlier today which happens a lot. Particularly, if you're under stress and for some people and they're laying down on their left side or their back. So the Vegas nerve gets stimulated, that slows the heart down causes, you know, a Bradicardiac rhythm, a slow rhythm etc. Can you tell I was a paramedic for 10 years? But yeah, So that's a big problem, potentially. We'll see how it goes. But yeah the watch 4, is by far the best watch, before this one came out, by the way, the Apple Watch one was still for sale, and it was probably Apple's biggest seller. In fact, it was Apple's biggest seller, because the two and the three just didn't do much for people. But the four, Ken thats real deal. That's all you got to get now. 

[00:07:35] Yeah, I mean Christmas is, right around the corner.

[00:07:38] I'll be good for them. I'm going to send it out to my kids. Do lawyers celebrate Christmas? Oh, the kids.

[00:07:46] I celebrate anything and everything that gets me presents.

[00:07:54] All right Craig Peterson, our tech guru is joining us now, as he always does on Wednesday at this time. Craig, I had an employee tell me a little story, whereby he managed to convince a friend of his in college to give him his NHL hockey streaming password. So that he could watch hockey games and he, kind of just like, never stopped using it and he's he's like 6 years later still able to watch the games because the kid who he got it from still has that password and still logs in and can still use it to watch the games. This is, of course, done by people with HBO Go, Amazon prime, Netflix and so on and so forth, right. Where you're taking passwords and essentially sharing them between people. It tends to typically be something that young people do particularly. Is this a thing? 

[00:08:41] Yeah. Well, you nailed it. It's a huge thing, right. And there is a great article talking about it that just came out. It was on CNBC. 35 percent of millennials, according to this little study that was done, are sharing their passwords to streaming services. That's a lot. And, when you look at it us old guys and gals, here, the baby boomers 13 percent of us shared. So basically millennials are showing them three times as much and they're kind of worried because, of course, now they're losing on potential revenue. Now you could argue that maybe these people would not be watching Netflix, they would not pay for a Netflix account if they didn't have one for free. But, there's just one really cool little note in here, and I don't know maybe this should be part of divorce proceedings or something, I don't know. In this particular case, a young lady, a guy came over to her apartment one night. They had dated, this was kind of the first date and they wanted to watch this movie that just came out on Netflix and she didn't have Netflix so they came over and she had a smart TV. Either you guys have these smart TVs?

[00:09:53] I do, actually, yes I have a 65 inch Samsung Smart TV, that I bought about a couple years ago. Maybe, but I don't know I'm not smart enough to figure it out. 

[00:10:01] Smart TV, Dumb user. The TV is smarter than the user. Yes. 

[00:10:06] Yeah, I have an Apple TV and I really like it.  I think it's great. But at any rate, he went ahead and he put his username and password into her smart TV because it had built into it Netflix and Hulu and all these others. And now years later, and it's still encoded in her TV and she's still using it. And that's kind of the norm. I know one of my kids has done that with our account. And, so every once in a while, we change the user's password. Use your password on it. But it's it's really huge. People 21 and younger are sharing passwords at a rate of almost 50 percent. So, keep an eye on that. Obviously, they're going to have to do something about it. Maybe cause, you know charging more or something but it is a really, really big problem. Bottom line. Then the other digital problem, I don't know if you guys heard about this when I  have a Kindle, I've had an Amazon Kindle for years. Do you remember when the book 1984 from George Orwell was pulled off of people's Kindles to remember that you bought it and I bought the book and then all of a sudden, one day you go into your Kindle, and the book has been deleted automatically by Amazon?

[00:11:33] You don't remember that story? And I actually miss that one. Craig, Yeah.

[00:11:36] Ok. That was a few years back in 1984. Could you get more poetic. At any rate. The problem we're seeing right now is that people are starting to find out that when you QUOTE buy a movie or buy that book END QUOTE. Whether it's on Amazon or Apple or Google, wherever it might be you're buying it, your not actually owning that silly thing in your digital purchases in this day and age it just plain are not yours, and they are the owners of the intellectual property, here. Those owners are now deciding, after you've paid for it. They want to change the terms. And if you read the fine print, when you sign up with any of these services you'll find out that you actually don't really own it. And they have the right to change the terms at any time for any reason without notice. So, more recently some of the terms of change, here for Apple and Apple didn't do this. It was the owners of the movies that did it and people's movies all of a sudden, disappeared. So, if you want to be able to resell it later, make sure you buy the DVD you can resell that. You can resell a book, but you cannot resell your Kindle e-book and you cannot resell your download, you're not title but your video streaming services copy and you can't resell it because you don't own it, and you might not even be able to have access to it in the future. 

[00:13:12] We are talking to Craig Peterson, our tech guru. He joins us. He's at 730 on Wednesday. Facebook and Apple are they having a certain conflict, Craig.

[00:13:20] Craig, Yeah. Apple just pulled Facebook's VPN software off of their store. You can no longer get it. Facebook purchases a VPN company some years ago, and Apple's really good about trying to protect their users privacy. So, what was happening is Facebook had this VPN, people use VPN, you know in order to stay safe. It turns out that Facebook's VPN that was available for free was gathering every little bit of information it could on you it was spying on everything you were doing on the VPN. Apple's new App guidelines absolutely prohibit the collection of any customer data. So, because of Apple's increase here in security and privacy, they pulled Facebook's VPN from the site. And in fact, Apple went so far as to remove apps and share location data with third parties, et cetera, et cetera. I don't know what Facebook's going to do. And as always remember of course when it comes to Facebook and many of these companies it's not free. You are not the customer, You are the product. And this is just proof again, that Facebook's doing everything it can to find out anything about you don't use their VPN. That's been my mantra for the last five-plus years.

[00:14:47] All right Craig Peterson, our tech guru joins us for some tech updates every Wednesday at this time. Appreciate it, Craig. Thanks so much. We'll talk to you again next week. Hey gentlemen, take care. You. All right let's take a quick break we'll come back.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Sep 25, 2018

Have you ever bought a book for your Amazon Kindle and have it disappear after some time? Well, it turns out we don't really own our digital purchases. 

Craig joins Jim Polito today as they discuss more about this deception as well as how millennials are causing millions of dollars of losses by sharing their streaming password, on the Jim Polito Show.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Your Digital 'Purchases' Are Not Really Yours

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/25/2018

You Don't Own Digital Products And They're Taking Them Away - Millenials Stealing Streaming Services

Craig Peterson: [00:00:00] Hey good morning. Craig Peterson here this morning I talked to Jim Polito about a couple of topics I think you'll be interested in. One is the iTunes Store and article that came out of CNBC and I think this is really kind of interesting. Sara Salinas, S-A-L-I-N-A-S, came up with this article. But millennials sharing streaming passwords. This is a real big problem. It's going to change things for everybody really kind of kind of in a major way, I'm sure because of millions of dollars at risk here and being lost and your digital quote purchases. Are they really what they appear to be? Guess what? They aren't purchases, right. So we talked a little bit about that and my experience of George Orwell's 1984 where you guys are out. Did you ever buy that book on Amazon Kindle and then have it deleted from your Kindle device while it's happening more and more and it's not just Amazon that it's at risk. I also want to say a quick thanks and shout out to all of the people who responded to my survey if you haven't already just take a minute this is going to be so beneficial for you because I have a new masterclass I'm going to be doing. And we're starting in about two weeks I think and I want your opinion what should I be teaching what's going to be real value to you? This is a free class. Okay, so we've got I don't know somewhere 100 plus call or calls responses I think so far 150 people I think click through to the survey so if you haven't done it yet, please do it. Just take it this won't take you two minutes literally not two minutes. Double check if you are a subscriber to my email. Look at my email from Saturday it just comes from me at Craig peterson.com if you are an SMS subscriber check your text messages I sent out on Saturday. And Oh, and by the way, I'd be interested to know when you receive the message as well. Some people are complaining they don't get my texts until like mid-afternoon on Saturday. And I send them out right at the start of the show to remind people about the show. So I don't know it's all crazy. Anyhow, let me know. Go there. Check out your email, check out your SMS. If you are not subscribed already. Make sure you subscribe. Craig Peterson comm slash subscribe. That's how I get all of my articles out to people. All of this stuff that I'm finding online. And I go through hundreds of articles narrowed down to about a half a dozen important tech and security articles for the week. So if you're not on the list, make sure you get on the list. And now here's Jim

Unknown 2:53
He is the man with all the answers. He's our good friend. And he is the Tech Talk guru I'm talking about Craig Peterson. Good morning, sir.

Unknown 3:03
Are you good morning, Craig,

Unknown 3:06
what is this waning moments? So I go to the iTunes and

Unknown 3:10
download a song and own it, let's say Free Bird by Leonard Skinner. And I go to the checkout. And what's the

Unknown 3:23
what's the deal? You mean? I'm paying for something, I don't own it. What are we? What is it? What is this, I'm renting it.

Unknown 3:30
This is a bit of a surprise for people. But we've known about this for a while. For instance, I've had an Amazon Kindle for many, many years. And, and that's the electronic device from Amazon that allows you to read books electronically carry hundreds of them with you. And I love it. I every night before I go to sleep. I have my little Kindle. I don't know if you remember this one or not. But a few years back there's this book written by this Orwell character. And I bought it called 1984. And it was a great book. And I read it and many other people bought it as well from the Amazon store for their Kindle. And then one morning, they got up and the book was gone. It has been deleted from their Amazon Kindle or years

Unknown 4:23
in 1984 to Come on, guys. Really? That's the guys to lead to. Right. Yeah. So a lot of people asked about trying to figure out what's going on. Now we've got a new problem that people are noticing. Actually guys, it's the same problem with the iTunes Store. It's happened with other online stores. And that is that you can't buy anything anymore. You know, if you went and you bought a physical copy 1984 from a store, the courts have ruled that you can take that book and you can burn it. You can do anything you want with it. Almost right. You can sell it to someone else, right? Yeah, the same things true. If you bought a VHS tape or a DVD, there's aftermarket stores still for records if you're still like playing the old records. Yeah. Well, as it turns out, these electronic devices I have a little bit of a change in them know, you remember the change from records to CDs? Yes, I knew all live through that. Yep. Yeah, it was bold enough for that. And, and I remember at the time I was really upset because it costs to the guys that made manufactured and sold the albums you know, those big old black records it cost of about a buck apiece to make those and, and get them out to the store. Okay. And then along came CDs. And a constant of about three cents. Yeah. And, and remember, they were more expensive. A CD was more

Unknown 6:04
expensive. Yeah,

Unknown 6:05
it was like, what was that five to 10 bucks for a record and media like 15 to 30? Yeah, it was crazy. So I was really, really upset. Well, they, they had problems, right, because people wanted to buy the CDs because they sounded better ended up replacing your whole catalog by, you know, you're like, Oh, I want it on CD now. Yeah, it was just convenient. It didn't scratch. It didn't pop, you didn't get clicks, right? All of those wonderful things. So that's what people did. We all upgraded. Well, the music industry in the book industry kind of looked at all of us and said, ointment, and now people are starting to make copies of CDs. And so they got very upset because they were making copies of CDs, you know, these CDs that cost them we, you know, at least 10 times less than it costs them for the old stuff to make. So they were making a lot more money. Well, fast forward to about 1015 years ago, when Steve Jobs came out with the Apple Music Store. He was forcing them just forcing them Jim to sell their songs for 99 cents,

Unknown 7:16
which is a great price point, right? You don't think twice Yeah,

Unknown 7:20
well, 99 cents for a song. It's great.

Unknown 7:23
Yeah, so the guys and gals decided they would play some games with licensing know to hit that 99 cent mark and they did something similar with Amazon and that is you do not own any of this stuff. all you are doing is you're buying a license to use it so even though it costs for instance my main topic 1984 from Georgia Well, I bought on my Amazon Kindle cost less than a penny to distribute. And yet Have you noticed you Kindle books cost almost as much as a hard copy book. Yeah. which caused them again, more than $1 to print and ship right away. So it cost them a lot less but you now not only are our pain dramatically more incrementally, but you don't even own it anymore. I can't believe that

Unknown 8:22
that so so it's basically like what Microsoft does now with software like you used to buy Microsoft software and then you get re updates then they come out with a later version now you pay a yearly fee to use that Microsoft software on your computer. Well have you seen Microsoft now for Windows seven now this is their older operating system windows man eight and seven are the three primary ones right now they're Microsoft has changed it to a monthly rental you if you want updates, you have to pay them every month. So if you buy a movie via airplay movie at this isn't just an iTunes thing but if you buy a movie online you cannot resell it you cannot resell your Kindle book if you bought it because you didn't buy it to pay your bought a license to use it.

Unknown 9:16
And and they have every right and this is what happened recently with some of the Apple made all the products out on what do you call these things, right movies and things right. If you have so called bothered to own it, and the license or decides they don't want to they don't like it anymore. They don't like the fact that Apple sold it to for 99 cents, they really thought they should have gotten a buck 30. So they're going to change the terms of the license, which they can do after the fact according to the fine print because they reserve the right to change, suspend, remove, disable, or impose access restrictions or limits on any external services. And anytime without notice. or liability to you.

Unknown 10:00
That books that movie that song that whatever can be deleted from your device perfectly legally. And they are already doing it. Amazon's already done it. Google's already done it. This is a massive change most people just aren't aware of. We're talking with our good friend Craig Peterson tech guru who we learned an awful lot from and you can learn more from him. At the end of this segment. I'll give you a number you can text my name to and get this information at a whole bunch more standard data in text rates apply.

Unknown 10:32
I want to ask you about this one. Now

Unknown 10:36
the millennials are sharing streaming passwords. And that is costing companies millions in revenue. So I've got Netflix and I give a bunch of people that password the login and the password. Netflix is just getting one monthly fee for me. But say five different people who don't live with me are watching off of that. That's what's happening. Right.

Unknown 11:02
Yeah, it's an interesting change because you again, most people, you and I, the older generation, the non millennials were used to having to pay for stuff right if you went to a movie about a VHS tape or a Betamax. You know, you paid for those things. But these younger kids grew up. We're pretty much everything was available for free on the internet. And, you know, there is a lot of free stuff on the internet. But most of it just isn't worth anybody's time of day. And it isn't right. You know, is it just me so

Unknown 11:40
there is and more and more moving to streaming services. You know, you might have Netflix or Hulu, there's many others out there. I have Apple Music For instance, I have amazon music so I can listen to music anytime. It's really kind of cool. I frankly, who buys anymore. In fact, the apples talking about putting off their iTunes Music Store because for $15 a month 15 one five, your whole family can listen to streaming music, no matter where they are any songs anywhere. It's just a phenomenal deal. So Apple says, Hey, listen, we're not making the money we used to off of our music store. We might well shut it down. But these millennials that are out there, and it's primarily millennials, but not all 100%. They've been sharing their access for a very long time. And when you've got more and more competition, like I mentioned, Netflix has video mimic their own movies on TV shows Hulu, Amazon doing the same thing the rolling out new studios, they're having a little bit of a problem. So study was just done. It said about the 35% of millennials are sharing passwords for streaming services. So 35% of millennials, 19% of Gen actors table

Unknown 13:02
just raised his hand

Unknown 13:08
and 13% of baby boomers three times as many Millennials are doing it we're talking about hundreds of millions of dollars of potential revenue that they aren't booking they're trying to figure out how to deal with this and this problem is just getting worse Jim it's a fundamental problem frankly with a mentality that people have there is there's one person in this story that came on CNBC even reported on this that was saying hey, you know, I'm using the Netflix account of a guy I went on a date with one came by my house and he put his Netflix into my CV

Unknown 13:53
and he kept it for now apparently has been going on for years she has kept at her TV on TV. It's now her right she's listen, if she gets married legally, she asked to delete that. That's cheating. That's that's TT like having to return the ring afterwards. I think it is the same thing. Craig Peterson is our tech guru and he's got more of this great stuff for you. And it's free and there's no obligation he's not going to try to sell you anything he doesn't sell your name all you have to do is text My name to this number 

Unknown 14:33
855-385-5553. That's 855-385-5553.

Unknown 14:36

standard data and text rates apply. The great thing about being on that list is that when there's a major hack or there's something going on he'll send you a message but he won't send you spam Craig great segment Always a pleasure to talk with you see you next week. Hey thanks Jim. Bye bye bye bye all right when we return

Unknown 14:58
as always everybody thank thanks for listening and do take a couple of minutes and answer that little survey again it was in your email it was in my text messages on Saturday just look them up it won't take you two minutes and it's going to be absolutely beneficial because it's going to help me understand what you guys want to learn because this is a free masterclass I'm offering to you now my courses I charge for but my classes my master classes are absolutely free. And the only way you can get into one of these classes for free is by answering the question, okay, and there's only three or four I can't remember questions on there. So it's simple, it's easy. It gets you free admission to the master class. So make sure you do it anyways. Blah Blah. Thanks. Have a great day and we'll be back tomorrow.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1 2 3 4 5 6 7 Next » 22