Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: June, 2018
Jun 30, 2018

 

Are Internet Passwords going away?  Listen is as I explain about a plan to kill Internet passwords.

Is Facebook still tracking you? Today, I will share with you 18 things, you may not know that Facebook is tracking.

Is Minority Report coming to your local Police force? I will explain about this new, creepy, artificial intelligence out there. This may be the future, and it is, unfortunately anticipatory.

How do you feel about Automated Grocery Stores?  What do you think is going to happen when you walk into a store and you never interact with anyone? I will explain what I think about this and some of the drawbacks of this technology.

Remember the extortion case involving bitcoin and Mitt Romney's tax returns?  I will discuss what happened this week to the criminal involved.

 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/30/2018

Microsoft Passwords - Facebook and Microsoft challenging Amazon Go - Killing Passwords - AI predicting the Future - 18 Surprising things Facebook is tracking about you

Craig Peterson: [00:00:03] Hi everybody, Happy Saturday. Well, this is when the show, of course, airs every Saturday on Clear Channel and I Heart Radio. And, I hope you enjoy it if you are watching this online. Of course, many of you might be watching at any time of day anywhere in the world, it's kind of cool. And, then also it's available via podcast so, hopefully, you've been paying attention to my podcasts and watching those as well. Today, we're going to cover a few different topics, so, I want you to kind of stick around. They're all important. We're going to talk about what you need to know, about the plan to kill Internet passwords, we mentioned this on the show before. I've got some more details. List of 18 things, you may not know that Facebook is tracking, about you. We've got a pretty new, creepy, artificial intelligence out there. This may be the future, and it, unfortunately, is anticipatory. So, we'll talk about what it's doing. We've talked before about checkout-less stores. Do you think they're going to affect you? What do you think is going to happen when you walk into a store and you never interact with anyone? Is that something that could change your life for the better or the worse? We're going to talk about that, and a story that is changing the world and it's just not been reported. I reported on it, because I got this information directly from the Secret Service some months ago, while the guy involved has gone to jail. But you know if one of your family members is kidnapped you would want to know these things. First of all, you've got to solve it quickly before that family member gets hurt or killed. You also know that the odds of getting your family member back aren't that great. Depends on where this is all happening, right. 

[00:01:50] So, kidnapping is really a bad thing. Well, what do you do when there's a kidnapping? We're going to talk about that, and we're going to talk about the new high tech kidnappings that are going on. And, this is not good not good at all. And particularly we're going to talk about a kidnapping involving U.S. presidential Republican candidate Mitt Romney. I mean, this is this is just absolutely phenomenal you probably haven't heard about it unless you heard it from me so, welcome. We're getting into the show right now. 

[00:02:26] So, first of all, let's talk about this. Check out this store, OK. This is really huge because think about if you go into the store. Think about you interacting with the cash register people, right. You put all your stuff out of your grocery cart you put it on the conveyor belt. They ring it up right. They scan it, back in the old days. They knew all the prices of everything, just because they type them, right there, Right. Nowadays, they try and scan it, if it is not can they just don't know what to do, Right. Call a manager while they're trying to change all of us because of course those employees can get kind of expensive and there's not a huge margin in the grocery market. You know, I have mixed feelings about this one. I have mixed feelings, in fact about a lot of automation projects that are going on. And the reason, I have mixed feelings about this one, is frankly, the checkout and the bagging. That's the first job, for many people, Right. That's where many of us got our start and an understanding of business. In fact, to look at the problems we have in the world today, with the younger generations, and not understanding the work ethic, and you know the real entrepreneurial drives education when you're young out there selling lemonade. I delivered newspapers, right. I have had jobs, forever. I worked for some pretty big corporations when I was young, and then went on for the rest of my life to be entrepreneurial.

[00:03:59] I haven't worked for someone else since I was 18. That is a big deal, Right. So, very entrepreneurial. And, you have these opportunities to have a starter job where you learn not to mouth off to the boss. You learn that you're not the smartest person in the room, even though you are 18, and you do everything right. All of these things, think back to when you were younger. Think back to the things you learned, so now apply that to your kids or your grandkids or even to yourself. And, then let's move on to this. Check out this war that started, Amazon's been busy at it. And, we know that already. It's called Amazon Go when they have, I think that's it. I know they have at least one test store and they may have more than that right now. And, the idea is you walk in the store when you walk in you take your smartphone, and you put it on the sensor and it knows who you are. And, you have an account and your credit cards linked into the account. And, now you go around the store and there are sensors and cameras that watch you take things off the shelf, and put them in your cart. Now, there is a grocery store in the Northeast that is now basically out of business. But it is one of the last things they had tried, in order to get their business up. 

[00:05:15] I think it was Stop and Shop, they had something very similar but you would take your smartphone to scan each item, you'd put it there in your cart and then at the very end you'd get the checkout button and you'd check out and you were all done that simple. Isn't that kind of cool. Well, they went, out of business. We used it a few times I just liked the convenience and not having to stand in lines waiting for the checkout. Not having to deal with them not being able to scan it, or whatever right. I absolutely loved it. But I'm not normal. I think we've established this. So, now think about going into the store never having to wait in line never having to do anything. Do you think that there will be more theft from the store? What do you think the downside of this is? No, I'd really like to know because I think there are some very real downsides to these problems. They've got this cashier free, automated grocery store that opened in early 2018. And, they have got more planned for Chicago and San Francisco. But Amazon is not the only one out there. Turns out that Microsoft has been busy trying to do much the same thing. They have a team now, it's only what 10 to 15 people, apparently according to this report. And, I've got it up on my Web site. This is from Fortune magazine. These 10 or 15 people are working on automated systems that will allow a store to just have you check out. One of the contracts I had years ago, was with NCR ,and I developed a system that allowed them to do way more than they'd be able to do before, when it came to checkouts. 

[00:06:59] And you know front office, back office, all sorts of things that you have to consider. But, one of these people is a computer vision expert, who used to work for Amazon Go, according to Reuters. So, that means you can expect Microsoft to get into this game. Cashier-less is coming. So, if you are working in checkout and I know my local store, my favorite store for groceries, frankly is Market Basket there are people who've been working there for 30 years, or even more. And you know good for them. But hey, if that's your only job, and automation is definitely coming to you, in coming your way, I I want to give you a little bit of warning, OK. So, keep an eye out. Very cool. How's that going to change your life? I know it will make mine a little quicker, a little easier, as I go forward, and I'm not going to be buying as much candy from that little, the little stand, they have right there at the edge, right to buy stuff, at the last minute or seconds. You know, it's probably going to hurt those supermarket tabloid magazines as well.

[00:08:10] All right, let's talk about this creepy, AI machine. This is a very cool article from The Daily Mail and it's talking about a machine that is going to work to help us, Right. Isn't that how all the science fiction shows start out. We're here to help, the right serving, human. I think that over the years so artificial intelligence is going to be helping us. And, if you are using Google's assistant, you already know they're using some machine learning to try and help you. All right, Now, the machine learning is all well and good, but in this case what's happening is right now today with assistant is looking at your calendar and send your reminder, hey listen you got that meeting coming up with your chiropractor, you need to get over there, and need to leave now or in five minutes it can remind you of things and even make suggestions your wife's birthday is coming up in two weeks. You might want to add something for her. 

 

[00:10:51] So, it is now accurately able to per detect what people are going to do next. So, it was built by a team of people over the University of Bonn in Germany. And what it did is it watched cooking videos. So, you know don't worry it's not Skynet yet, some pretty cool pictures I printed them up in black and white here, but you'll find them on my Web site. Craig Peterson dot com. This whole thing he believes, Dr. Gall that the intelligent software will eventually be able to prophesy your actions hours before they happen. So, if this team manages to fine tune this algorithm this program to be able to anticipate your actions that far in advance you can think of a lot of cool things from home gadget automation to kind of big brother's stuff. Now, do you have an Amazon Echo at home from Amazon? You just wake it up and look in a way. Now for all of you people who do have that Amazon device but think about the interfaces now, you can install different software modules onto your echo and have those software modules now control different things in your homes. So, think about controlling, for instance, the television it warms it up. Now, you need to warm up TVs anymore remember you had to turn them on wait for a few minutes for the tubes to warm up. 

[00:12:23] But you know it schedules your recordings on your DVR it is automatically going to get that cup of coffee ready for you in the morning because you're going to have a unit that has the grinder built right into it and so you just fill let up with your coffee beans and it's going to auto eject all of that coffee beans or maybe the pods into a trash can for you. And it's also going to remind you when you're shopping and you’re in the coffee aisle and are in front of the pods, Hey you need to pick up more pods because we're going to run out next Tuesday afternoon. It's going to be very, very, specific. 

[00:13:06] So, all the AI right now is really it was just watching you cooking these sorts of things are going to be used to help us understand you more. Now they used 40 different videos to teach this artificial intelligence. The recordings are about six minutes long and it was able to predict how people cook. So, they looked to recognize it. Now, remember they're not programming it to recognize something they are programming that to learn and to and to observe patterns. So, it isn't really understanding that they're cooking but it understated stood there's a second sequence of events that we needed to prepare the dish and a very far from trivial by the way and then tested how successful the learning process was. So they confronted the AI with videos and had never seen before and they were told the eye was given 20 30 percent of the clip and the AI had to kind of fill in the rest. And it did okay its accuracy right now is over 40 percent for short forecast periods and then dropped further, of course, the further it had to look into the future. It's not that smart yet, but this is coming. This is going to change our lives. And, I want to see if you have any of these concerns yourself right. 

[00:14:30] Why are people so worried about AI. Again, this is from the Daily Mail they came up with the list. I love this list so it's an issue troubling some of the greatest minds in the world. We know that we've talked about that before. Bill Gates, Elon Musk, we have many other top scientists who are worried about this and they're concerned that the AI may take over that part of the reason why Elon Musk wants to develop a colony on Mars. Elon Musk described AI as our biggest existential threat and like it's likened its development to summoning the demon. He believes super-intelligent machines could use humans as pets. Stephen Hawking said it's nearly certain that our major technological disasters will threaten humanity in the next 1000 to 10000 years. Well yeah, I think so too. Obviously, they're going to be taking jobs more than 60 percent of the people fear robots will lead to there being fewer jobs in the next 10 years. Do you think that's true? You know I do. There's a lot more. You'll see those again up on my Web site over at Craig Peterson dot com. So, make sure you check it out and get up to date on all the latest. So, Facebook, we know Facebook has been tracking us. Facebook has been promising Congress that they're really not tracking us a whole lot. 

[00:15:56] So, you know don't worry about it. Right. Not a big deal nothing to see here, but they are tracking us, and there is a list that you'll find out on Buzzfeed and up on my Web site as well, of 18 things you might not have realized that Facebook is tracking about you. Now a couple of these we talked about before, but I'm going to repeat them for those that maybe didn't catch it on a podcast, or one of my videos. So, this is in the aftermath of the Cambridge Analytica scandal which is going to have his team do some follow up. You remember he did send a follow-up report to Congress. It really didn't get a lot of press because he didn't say anything, right. So, anyhow it was a massive document and it had the written answer. So, here you go. Here's some of the information that was in their Facebook collects information from computers, phones, connected TVs, those smart TVs we've been warning about, and other web-connected devices as well as your Internet service provider or mobile operator because remember they all have access to which sites are you going to. What are you doing when you're there. It tracks the mouse movements on your computer the app and file names and file types that are on your devices. 

[00:17:18] And think about that one, right. Do you have any files on your computer you might not want Facebook to see? And maybe you don't want other sites to see because remember it's not just Facebook that can potentially see this stuff. It's other sites as well. OK. Whether the browser window with Facebook is in the foreground or background the time-frequency and duration of activities. So, they are watching you watching Facebook information about nearby what nearby Wi-Fi access points Beacon's cell towers signal strength and they use all of that to triangulate your location. OK so they also have connection formation like your IP address your Wi-Fi connection a specific location information like the GPS on your device it goes on and on here other devices nearby or on the network your available storage space the installed plugins on your browser. Whether that's your computer or your smart device to ensure using the purchases that you've made on off a Facebook website, so you don't even have to buy something on Facebook to have that happen. Your call information and a whole lot of other stuff. So, Facebook is sucking up a ton of your personal information you might not have been aware of it. 

[00:18:42] There is a lot more here in this list of 18 but it's scary. I want to also remind you about the recap chaabi noticed those and sometimes they change. These are the little boxes that show up to prove that you're not a robot. The story behind those is absolutely fascinating. So, it is tracking when you're in those boxes where your mouse is moving, and you do expect that because that's how it figures out if your robot or not because humans just don't move the mouse the same way a robot does. So, it's more than that. It is really tracking a lot of things. I've got to talk about this. This is extortion. We're going to talk more right now. And man, it's a really big deal and it's changing extortion in the Internet era is not what it used to be. 

[00:19:37] It used to be you would have something that people wanted you to give to them. Or maybe it was something that they didn't want you to disclose at all. And extortion has been around basically forever. Right. It's a very long-running crime very long running problem but it has changed in this Internet era. Now that this guy's been sentenced I can tell you a little bit about what the Secret Service had told me. You know I'd do the InfraGard webinars for the FBI. Very interesting. I get a lot of inside baseball information because of this and my membership in InfraGard, but I want to point out something here and that is that there is information I can share, and I can share it and when it's relevant to everybody I do share. So, we're going to share this one right now because it appeared in a trip wire as well as other places online. There was a guy who wanted to make some money and decided to do it illegally. So, what does he do? Well, he knows Bitcoin is a great way to never be tracked. Now for those who are listening and not watching I'm using air quotes right. So, he thought he could never be tracked. And of course, that's wrong. You can always be tracked and that can be a really big deal when you're tracking. 

[00:21:07] And with bitcoin there's certainly a degree of anonymity but based on how you use it you know and other factors you can be tracked because remember it's a general ledger system. Everyone has a ledger. They all know where the transactions are. So, in this case, he didn't know what his limits are how many times have we done that. Right. Would you have started a business if you knew how hard it would be if you knew all of the regulations and then on top of that you've got to do the marketing and the cash management you got to right take care of everything? Most of us if we knew in advance he wouldn't do it but many of us know enough not to try something we just can't do. When you're 60 years old, you don't want to learn how to skateboard right. I saw a great mean I should try and put this up on my Web site. My daughter sent it today. You know when you're a kid your injuries are, I fell off my bike, I fell out of a tree, right. When you're an adult, your injuries are more serious, I said, it's a very funny mean there's more than that to it. But, we're talking about this, he didn't know his limits. So, he decided he would try and extort money from Mitt Romney. 

[00:22:26] Well, in fact, it was more extort money from the Democrat and the Republican Party. He claimed to have access to Mitt Romney's tax returns. And, you remember the tax returns were kind of a big deal back then and during that election and of course these were a big deal in Trump's election because tax returns tend to be private. And, there are a million ways to interpret these, that are very difficult when you're talking about the complex returns. Even my return, half the time you know you look at it and you say OK, well I got to talk to the accountants about this and that and trying to understand what's going on. So, he claimed to have presidential candidate Mitt Romney's tax returns that he had stolen from the offices of Price Waterhouse Coopers. Now Price Waterhouse Coopers said no, no, no. They released a statement that it didn't happen but, this guy apparently in Nashville, Michael Mann, 37 years old of Franklin Tennessee, He said I got them. I stole them and I'm going to release them. And, then he set up two Bitcoin wallets, and the bottom line on all of this is, he's said whichever wallet reaches a million dollars first, is going to determine what I do.

[00:23:50] So, if you put money into this Republican wallet when it hits a million dollars, I will destroy my copy of Mitt Romney's tax returns. You know it was so mean, the Republicans didn't want that information disclosed. And for the Democrats, he said the opposite. Hey, if you get it up to a million dollars before the Republicans, I am going to guess what disclose the tax returns. We don't have time to finish this on the radio. If you're watching us on video, we're going to continue this. But for a while, this was a very big deal. Have a great week. Enjoy yourself. Visit me online Craig Peterson dot com. And we'll be back next week as well and make sure you subscribe to my podcasts. Craig Peterson dot com slash iTunes, subscribe right there, and I've been doing a short podcast almost every day. I release new information about what's going on. I appreciate everybody who has taken the time to subscribe. So, if you're watching on video stick around, everybody else look, for the video. You go have a great week. Bye-Bye. 

---

Related articles:

---
The Checkout-Less Store War Is On: Microsoft Is Reportedly Working on an Amazon Go Rival


Everything You Need to Know About the Plan to Kill Internet Passwords


The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance


Here Are 18 Things You Might Not Have Realized Facebook Tracks About You


Extortionist Faces 25 Years in Prison for Tax Fraud Scheme Involving Mitt Romney

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 29, 2018

Do you know if your Website is safe?  How would you know?  Well, that is what I am going to cover today.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/28/2018

Is Your Website Safe and Recent Experiences With Hackers

Craig Peterson:[00:00:01] Hi everybody, Craig Peterson, here. I want to talk about something that happened to me this week. Now, you know I host a whole lot of web servers and that means I get a lot of traffic in, and I have my own Web site right. It's a business Web site. I try and get information out by using it. This week something happened, and that is that my server was under attack. Right. So, I had a look at the logs trying to figure a few things out. Why am i being attacked? I think you might have a couple of ideas, why you think I might be under attack. But anyhow, bottom line is I started looking at everybody's logs. Did you know that your web server is probably constantly under attack, and that can cause a whole lot of bad things to happen. For instance, your web server might be compromised because of a zero-day attack, or maybe you haven't updated that web server in some time. In many cases, people never update their web servers. I just had a client that we brought on, that had done it, in probably about five years. That's a huge problem. And, I'll tell you why the bad guys want your web server, its so they can spread malware. They want to spread it to other websites, they want to send out some spam e-mails, phishing attacks and other things so, that they can take control and make some money by stealing your information, which is really a bad thing, right.

[00:01:36] Killing your Web site, means your information doesn't get any mailed anymore. They don't really care if it works, or if they break your side or not. They want to do drive by downloads, or they want to distribute malware. There was just a case this week of that happening, where their servers called Docker that lets you download complete machines that will do specific functions on, a lot of people for instance, use these Docker containers, in order to run Java software, or run a web server in this case. So, people were buying, or downloading some of these Web servers, and in this case it was a free one. So, they got it for free from our friends over at Docker. And, once they had it, then they had it installed. One person complained, and they complained that things were slow. There seemed to be a back door, obviously, this is somebody new a little bit about security, right. And, that back door turned out to be used, to have your Docker container, your Web site, mine bitcoin. And, apparently, they had made about 100000 dollars, which is real money, right. You know bottom line. So, pay attention.

[00:02:49] I can tell you on my server, the top five hits, were to the WordPress log in page, and some other control software that many Web sites choose, and I don't use, I just don't trust it. So, they were trying to hack in, just general. This was a drive by. This is a robot trying to hack in, and get at the information on my website to be able to log in take control, to put things up that I didn't want to have up. So, that's the bottom line, for today. Double check your web server logs, double check your security. Let's make sure the bad guys aren't trying to break in, or make sure they haven't already broken in. I found that, in fact, about a month ago, they had already broken in. We shut it down. This is a zero-day attack. We shut it down, immediately. We noticed it within a matter of minutes, because of the software we have in place. We were able to stop them. So, do you know, if the bad guys have gotten into your systems including your web server. Hard to tell, if you don't have the right stuff in place. Check me out online. Craig Peterson dot com and of course I'd be more than glad to answer any questions that you might have just me at

[00:04:05] Craig Peterson dot com or you can text me 8 5 5 3 8 5 55 53 that’s 8 5 5 3 8 5 55 53.

[00:04:16] Have a great day we'll be back tomorrow with another real quick daily hit. Bye-Bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 27, 2018

Do you own bitcoin or another cryptocurrency?  Listen in as I discuss blockchain technology and cryptocurrency issues with Ken and Matt.

Is Rosie the Robot your new GP? This morning, I talk briefly with Ken and Matt about AI, Artificial Intelligence in the Medical Community.

Find out more on CraigPeterson.com

---

Related Articles:


Cryptocurrency Theft: $1.1 Billion Stolen in Last 6 Months


Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular


Bitcoin’s Price Was Artificially Inflated, Fueling Skyrocketing Value, Researchers Say

The big picture: We’re getting closer to AI doctors


Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Information Disclosure

Critical Patches Issued for Microsoft Products – HIGH THREAT


Microsoft Confirms New Windows 10 Cumulative Update KB4284835 Issue


More Reports of Windows 10 Cumulative Update KB4284835 Failing to Install

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/27/2018

Blockchain technology, cryptocurrency attacks, and AI Doctors

Craig Peterson:

[00:00:00] Craig Peterson Here, Hi, Good morning. Boy, did we have a great webinar yesterday, by the way, I did one for the FBI, for their InfraGard program, that the FBI runs, and it was absolutely fantastic. We're talking about solar storms, and their effect on us, and how they could ultimately wipe out civilization. It's scary when you get right down to this stuff. The presenter was a professor at Baylor University, and for 22 years, he was with the Air Force, doing space weather, and he was talking about some of the things that really could affect us, and you know he doesn't like the hype of “hey, listen we're going to go back to the 18-hundreds, because we're going to lose all of our electronics,” but it was really interesting. Maybe we should talk about that someday. Anyhow today, with Ken and Matt, I spent a little bit of time going through two things. First of all, I went into my most in-depth description of how blockchain technology and cryptocurrencies like Bitcoin actually work, and why they are being compromised, why they're being stolen, and even how they're being stolen. So, if you have any money, or thought about putting any money into Bitcoin, you're going to want to listen in. Does that make sense to you? Right. What's the technology? How's it being stolen? And I've said for a long time that you should avoid buying these types of currencies. And I totally, totally, meant it, OK. It's a very, very, big deal. So, we talked about that, and then we spent a few minutes talking about the AI doctors and artificial intelligence. I went into that, in some detail yesterday, with Jim Polito, but we went briefly over it this morning over on WGAN and all of their affiliate stations in Maine. So, here we go with Kevin Mann. Thanks for joining us and stick around. 

[00:02:04] You're going to love this. At least I think you will. 

[00:02:08] Ok 739 on the WGAN Morning News on a Wednesday which means it's time to talk Craig Peterson, our tech guru, who joins us at this time every Wednesday. Craig, how are you? 

[00:02:19] Hey, that's me doing good. How are you guys?

[00:02:22] Well, I've had some, I've had some the cryptocurrency missing lately, you know. And why would it be missing? If any of it been stolen? 

[00:02:31] Do you think you just buy that stuff? 

[00:02:34] Come on. I went down to 7-11 and they had some on sale and I got couldn't resist.

[00:02:39] You know there's, at least there was, an ATM down in Portsmouth, is that where you bought them from?

[00:02:44] That's exactly yes, exactly. Yes.

[00:02:47] Oh, ok, Yeah, the whole cryptocurrency thing is starting to fall apart at least the way it is right now. We already know that we had major drops in the value of some of these things, like bitcoin, for instance. But, the big problem has to do with the basic premise of the technology behind so many of these cryptocurrencies and that is blockchain. Now you guys have heard about blockchain before, I'm sure.

[00:03:20] Yes, yes. 

[00:03:22] Now, the blockchain is really where you have everybody involved, has a ledger and the idea is that you and me, the three of us. We had some sort of a blockchain that we came up with. Right. And the way it works is the three of us will record every transaction that we make with each other, All right. So, for instance, if I give one of my Ken coins to Matt, I will write it down, okay, I gave a Ken coin to Matt and Matt has to write down he got a Ken Coin from Craig and then Ken has to write down. Yeah. Craig gave a Ken coin to Matt. So, follow me so far.

[00:04:07] Yes yes. 

[00:04:09] So the three of us have all written down in our two ledgers of this transaction occurred. Now let's say that they can for some reason Ken isn't available or maybe he'd missed recording the transaction. The way we know, who has how much, is based on the ledgers. Just like in a bank where you might have a ledger. And the problem comes up when one of us doesn't agree. Why? Because blockchains are based on this premise of 50 percent plus one. In other words, half of the people that are maintaining the ledgers for a particular blockchain currency plus one person have to agree that I gave a Ken coin to Matt. And, if you guys don't agree about whether or not that transaction actually occurred then it's as good as a transaction not occurring at all. So, we're talking about what's called the 51 percent attack, although technically for us that's 50 percent plus one. And here’s what's happening. What I just described is an over-simplification but it is essentially what happens with blockchain currencies. And that's why people love them because it isn't just one entity like the government saying that I owed Matt a Ken coin. So, we are as a group cooperating and sharing the information and validating the transactions. Well, Let's talk about a few here. MonoCoin, Bitcoin Gold, ThenCash, Virge, LikeCoinCash. These are few of the blockchain currencies out there that have been attacked by people, who are creating false ledgers. 

[00:06:09] So, this is a very dangerous cryptocurrency attack vector. This is something that, the NYU computer science researcher, Joseph Bono, released some research last year showing how much money you would cost to execute these attacks on the top blockchains by simply renting power, computing power rather than buying the equipment. And he said listen, these attacks are likely to increase, and we have already seen them I just named a few of them. So, you know it doesn't make a lot of sense for these guys to go after small beans. So, they're starting to go after the big ones and we're starting to see some serious attack here. We've had three successful attacks so far against ThenCash. And the guy was able to run away with well over a half-a-million-dollars-worth of the currency. We've had, already of over one point 1 billion dollars in cryptocurrency actually stolen in the last six months. And we have newspapers from the New York Times just about a week ago was reporting on this and I think we've talked about this some months ago. But the New York Times is reporting the Bitcoin price you remember, the almost 20,000 dollar value per bitcoin. Well, it turns out that it was artificially inflated. 

[00:07:36] NO, I'm shocked, shocked, shocked, shocked, shocked! 

[00:07:41] And from the very beginning always the run-up to the thousand-dollar value it looks like was completely fabricated out of thin air. So, we've got subpoenas now by American regulators, who are looking into a number of these different coin offerings. And you know I've said from day one gentleman voice these various bitcoins and and and the like using the blockchain technology is one of the reasons. And this is what we're talking about right now is that technology is not really there, yet, and you could easily lose all of the money that you, I don't want to say the word invest but that you use to buy these various types of coins.

[00:08:30] We were talking to Craig Peterson, our tech guru, who joins us Wednesdays at this very time to give us an update on the world of technology. Craig, I have a doctor’s appointment a little later this morning. Is it possible that in the future that will be with a robot?

[00:08:45] Isn't that an interesting idea? Right. We've always kind of known it was going to happen. 

[00:08:50]  Robot doctors, Yes 

[00:08:52] Yes, yes.  member of the Jetsons right. 

[00:08:55] And they were Joe Jetson and daughter Judy, Jane his wife. And, of course, Rosie. Right. And, the robot. 

[00:09:12] Yeah exactly. She was a she. But she did some diagnosis of George you know he's an idiot. I think it was one of the diagnosis. Anyhow. We had some real problems and I have some articles up on my Web site about that and I'll send them out to people who are I'll send them up to everybody who signed up for my text my SMS list because I think this is just amazing as we're spending a few minutes on because right now if you want to do research guys what do you do. 

[00:09:44] You want to research something anything you google it. Yeah, exactly you guys are both "Googleizers" right. Indeed. 

[00:09:55] So, you go online you Google. Now I want to a word of warning, Dr. Google doesn't have his medical degree, yet. OK. But we're seeing all kinds of interesting problems when it comes to our medical diagnosis. For instance, right now artificial intelligence has been shown to be better than radiologists at reading most x-rays. Now that's a very, very, big deal frankly when you look at it. And during the decade of 2010 to 2020, it's estimated, that doctors will have to have doubled their knowledge three times over the course of that 10 years. And we all know that we're not the best at remembering things, right. We're not the best at figuring things out. And it turns out that physicians are not either, because there are so many advances in technology, medical technology, going on and on and on. In fact, we already had an X Prize awarded for you remember bones in Star Trek with his. You have this sensor right. We already have the next prizes awarded for one of those things although it doesn't sound as good as bones as it was. But here's the bottom line. Give it another five to 10 years, and you will have an app on your smart device that will be able to do analysis, of your medical condition. 

[00:11:33] It's going to be absolutely amazing once the stuff and do you'll get a diagnosis. You might go into the human doctor, which of course computers aren't don't have any bedside manner right. I want to talk to somebody who I can talk to I can relate to, Right. So, those are still going to be physicians are still going to be things that computers aren't going to be able to figure out at least for the next couple or a few decades. There's no question about that one, but you can do various types of diagnosis right now just from a photo for obviously for skin cancer and for other things. So, Matt no today you're not going to be able to go see your computer doctor. Some of the human doctors can't remember every possible disease treatment or medical order article, AI can. And there's a lot of money going into having AI, artificial intelligence doctors, and by the way it's going to be free. 

[00:12:34] Ultimately, it's going to be, I don't need Obamacare. That's Craig Peterson who joins us every week on the comp at all of the information, Thank you so much. We'll talk to you next week. 

[00:12:55] Hey gentlemen thanks. Bye-Bye. All right time for a quick break. 

[00:13:01] Hey, I figured there's probably a few people wondering about InfraGard, real quick.

[00:13:06] Just go to InfraGard dot org online I N F R A G A R D dot org, online. Have a great day and we'll chat again tomorrow. Bye-Bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 26, 2018

Will your next Dr. be a robot?  Listen in as Jim and I talk about the future of medicine and why older doctors might not be as good as the new intern on his staff.

Find out more on CraigPeterson.com

---

Related Articles:

The big picture: We’re getting closer to AI doctors

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/26/2018

The Future of Medicine: Are Doctors as Good as a Machine

Craig Peterson:[00:00:00] Hi everybody, Craig Peterson Here. This morning I had an interesting conversation. Have you ever wondered about Dr. Google, right? How many of us have not gone online? Typed in our symptoms and tried to do a little bit of self-diagnosis. Well, this morning with Jim, I talked about that problem a little bit I'm glad, Jim kind of saved my butt on that one. But we talked about the stats the studies that have been done looking at medicine and medical practitioners. And we went into some details of what the future of medicine holds and frankly it's going to be in your hand.

[00:00:42] Here we go with Jim Polito, here. He's got a great story for us today and a lot of other great stories I'm talking about our tech talk guru, Craig Peterson. 

[00:00:53] Good morning sir. Good morning Jim. All right so you're telling me. That very soon, I could be going to the doctor and it could be the Robot from Lost in Space. Let me tell ya, he's got some mean pinchers. You know hands, I don't know if I want them you know, doing anything. 

[00:01:15] Are we talking about we're talking about the original one from the 60s. 

[00:01:19] The original one, like you know the one with the with the arms like the dryer vent. You know you like it. Yeah, yeah, that one. OK. So, but tell me now, AI artificial intelligence. 

[00:01:36] You're saying that it's going to be part of the future of healthcare.

[00:01:40] Oh, in a big way and there's a lot of reasons it should be the future. And, there is some really interesting stuff that I dug into, in fact in relation to this particular story. So, for instance, Jim you’re, you know, you're over 40. 

[00:01:58] So, just a little bit just a hair over 40 years old. 

[00:02:03] You know they recommend that you go in for colon cancer screening. 

[00:02:09] Seriously, I've been doing that since I was 40 because my grandmother died of colon cancer. So, yes. 

[00:02:15] How about that? Then women are going in for breast exams, you know it’s very common. And yet in both cases now, we've got a whole lot of dispute in the medical industry for instance, there was a study done on colon cancer experts, recently and it showed that of them agreed it had these, colon cancer experts some said screening has no value all the way through other colon cancer experts who said it absolutely has value. 

[00:02:52] We have things like for instance this is another medical fact, right. It's been around for a long time. If a little kid is sick you're going to see a doctor or you're sick you have a fever. Doctors have been prescribing aspirin for over 100 years.

[00:03:11] Yet recent studies are showing, that prescribing aspirin or other and antipyretic to reduce fevers can be significantly more risk than just allow you to run its course. You know what's a really big here. Right over here. You know we've all heard of old wives tale, right. You know how about Dr. tales. Now another doctor, John Landis he studied the phenomenon and he looked at medical academia and he found that he's come out of the medical academia environment, are more likely to have research claims that are false than research claims that are true. 

[00:04:01] This is not good. So, no this is all bad. 

[00:04:07] All right medicine very complex. It's very hard to find easy answers. And I'm going to tell you about one more real quick study here, and that is how what kind of doctor age do you prefer. 

[00:04:24] You know what. I don't really care. 

[00:04:26] I've never I had to see a specialist when I was a little kid, I had a man who was my pediatrician, then I had a woman. I'm one of those I'm one of those rare people who doesn't care, as long as I feel that you're a competent physician. I don't, It doesn't matter to me at all.

[00:04:44] Well, I'd prefer to see a doctor, you know my GP, my general practitioner, that I can relate to, right. That's kinda number one, right. If its’ a specialist. Yeah, I don't care if they don't have any bedside manner or they can even speak English. it meaningless it doesn't matter to me. Right. But when they're talking to the doctor and we're trying to evaluate if I should have that colon screening or what I should do. I want someone I can relate to that. 

[00:05:14] I mean, Francis Murray, my doc is still out and Springville like you said you heard. Yeah, I mean I can relate to them. I have a great rapport with them. 

[00:05:24] You've gotta have that. But, there's another study out that shows that doctors who are, our age. In other words, doctors who are older who are more than ten years out of medical school are more likely to make mistakes and cause harm to their patients. Than doctors who recently graduated from medical school, even in many cases than interns than some of the older doctors. What I'm kind of building up to here is all of these different studies I was looking at as part of this article are showing that in reality, medicine is, like with computers right, you know, what router should I get because they're all vulnerable right now, right. That the exact question everybody has, and how can you tell if someone is an expert. You're right it's hard. It's almost impossible because this field is changing so fast well the older tech field has a direct impact on medicine as well. So, the thinking here is just like you go to Google right now you might ask a question you know the number one radio show in western Springfield. Very simple. All right. Simple but it's going to get to the point where it will be free for you to get a real diagnosis from your smartphone, probably from Google or Microsoft, or one of these other companies but you won't be able to get a free diagnosis that better than you would get from an expert. Now, it's going to be hard to relate to that non-person. 

[00:07:17] See that's the thing. And where do I have to put that smartphone to get that diagnosis? 

[00:07:23] Yes. I don't know. I don't know if my protective case could handle that. 

[00:07:29] Well, we've already got that for your iPhone. We've already got something that just requires you to you plug it into the iPhone port on the bottom of your phone all you do is put four fingers on it and it will do a cardiac evaluation for you and will send the information directly to your daughters or your doctor. should do with them. Students who graduate in 2020 are going to experience or doubling of knowledge, what they learned in the first three years of medical school will be just 6 percent of what's known at the end of the next decade from 2010 to 2020. We've had four doublings of knowledge and we have had and they expect that to continue. So, how can anybody keep up with that? And that's where AI might be very interesting.

[00:08:21] Oh my god that is fascinating. Now look I I know that people are going to hear what you're saying. and say, oh that means I could just go right online right now and diagnose myself. And that's not what it means. We want to make sure everybody understands that. So, you need to get. One of the actual stories that will describe this to you and the easy way to do that is to text in my name. 

[00:08:46] Jay I am Jim to this number 8 5 5 3 8 5 55 53 that’s 8 5 5 3 8 5 55 53 and standard data and text rates apply. 

[00:09:04] But you'll get this information plus a whole lot of other information that will help you to make look, right, Craig the wise decisions for yourself. The more information you have the better you can make a decision and that's actually what is best in healthcare.

[00:09:23] You're absolutely right and be careful Dr. Google cannot diagnose and many doctors are going to be very upset when you run in with your printouts from your Google search, it’s not there yet another decade and we certainly will be.

[00:09:39] Wow that's incredible. Craig always a pleasure always an interesting segment and we look forward to talking with you next week sir. 

[00:09:47] Take care.

[00:09:48] Thanks Jim All righty. Thank you. That was great, man. I'm glad that we discussed that at the end. You have got to be careful do not go to the Internet and try to do the self-diagnosis, it's good to gather information on the internet but the relationship with the doctor that is the most important thing. OK, we have a final word when we return. 

[00:10:12] Ok. Got to point out something else. For those of you who I promised the free insider memberships to. Now, this is something we will end up charging for, but for now, there are a few people I offered it to. So, if you are part of this insiders group where we are sharing all kinds of special reports and things and you're giving feedback kind of helping out with a few things. If you're part of that, I want to let you know we have made some progress and we've got the software set up now so it's ready to send out your logins. We have a bunch of materials already in there. So, those will become available and everything takes longer and costs more. So, sorry it's not out there yet but this. This is exciting. This is a bit of a test for us, something new. We haven't done before you know we tried the Facebook group and we had hundreds of people sign up, but we just didn't have that type of interactivity that I really wanted to see so it wasn't helping a lot. But this insider thing, I think is going to be really good. So, keep an eye out in your e-mails and for those that I promised that I'd sign you up, and I you know I can probably still take a few more people, let me know if that's what you want to do. OK. Take care.

[00:11:30] And we'll be back tomorrow. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 26, 2018

Is your data safe when you are mobile? Craig discusses all about data transfer and virtual private networks in this daily podcast.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/25/2018

Is Your Data Safe At The Beach

Craig Peterson:[00:00:00] Hi everybody, Craig Peterson here. It is a beautiful day in the Northeast. I am just enjoying it. It got me to thinking about being outside of course, its summertime. We love to go to the beach, we love to travel around. So, we can talk a little bit today about some of the misconceptions people have about traveling and using Wi-Fi and security, because yeah, I do. A friend was over last night and while we got to talk about this. Yeah, I had a friend come over last night and he was here, talking about Wi-Fi and going online. He was very interested in the whole concept of being private and safe online. And this is a really big topic for us, as we're talking about, right now. In the summertime, we go to coffee shops, we go to restaurants, we go to the beach and we're often jumping onto Wi-Fi, public Wi-Fi. Many times, we're using our cell phones to get to places and you know the cell phones, of course, many of them have shared data plans. Mine does. And on top of that, I have the ability to use my cell phone as a wireless hotspot, as a personal hotspot, which is really, really, cool. So, what should you do? What should you avoid? This is kind of a really, big deal.

[00:01:28] Now, he was saying that he heard an ad and this ad was guaranteeing, it was promising him, that if all he did was use their VPN software that he would be safe, and no one would be able to monitor him. Of course, he is concerned about the bad guys, but they were saying, listen this is so safe, that even the FBI and the government can't monitor you. Not, that he's concerned about that, right, but you know you don't want your information stolen, no matter who it is. And, we know that the Russians are busy doing that right now, and are the Chinese, et cetera, et cetera. So, he thought that just having this VPN would make his life simpler, would make it easier, he wouldn't have to worry about having his bank account information stolen, for his business, right. Imagine one day finding out your payroll checks bounced, because someone had emptied your bank account, right. Can you imagine that? Has that happened to you before? It happened to me once. It was my bank account. Man, this would have been back in the 80’s, it my business bank account. All of a sudden, checks started bouncing. It's a terrible, terrible, feeling. And, he didn't want that. He has a lot of employees and I'm sure you can relate to that too. 

[00:02:45] Well, looking at all of this, and looking at the problem, looking at the guarantees, he was saying, hey, listen, is this going to work for me? Is my data going to be safe? If I use this VPN, that's being sold by this company. And, I had to tell him ultimately, No, because there are there's a few problems here. One is, that a VPN is only going to take the data from your computer. Let's say you're running a VPN, on your computer, So, it only can take the data from your computer to their VPN exit point, in an encrypted manner. So, they've got a server, let's say, they have a cloud server, right. Whatever, that means. And, their server is sitting, physically, let's say it's in Kansas City Missouri, just for the heck of it. So, here's what would happen. You're sitting on the beach, here in New Hampshire, or Florida, wherever you are. You're sitting on the beach and you're enjoying the day. You can just feel the rays of the sun coming down, and you're a little worried about getting that sunburn, right. You're watching the kids, you’re just enjoying the day and you've got to get on to your computer, because you just got a little note from somebody at work.

[00:04:05] So, you open up your laptop, and you connect to the VPN. In this case, he's talking about a third-party VPN. We'll talk about business ones, probably some other day, so he connects to this vendor X Y Z, the data from his computer goes to, in this case, were saying Kansas City, Missouri. That data is now safe. Well relatively, depends on the encryption they're using, etc.. But, let's say for all intents and purposes that data is safe. So, that data is hauled to Kansas City Missouri. But, it can it be encrypted forever. Facebook can’t understand what you're saying. Your mail server needs to know, what it is you're trying to do. The e-mail you're reading, what you're trying to send, right. All of these systems have to know. So, once it hits the server in Kansas City, Missouri, it is no longer encrypted. So, all you're doing with that type of a VPN, with one of these public access VPNs is that you pay a little bit and for some of them, they are free. All you're getting is data being safe from the beach, over to Kansas City, Missouri. Now, what some of these VPN companies, do and think about this one for a second, is they monitor your data and your Web sites to know where you're going. Some of them even go so far, as to insert their own advertisement portfolio into the web pages you're going to. So, he was asking me is my data safe right? Have you ever had that question? Have you thought about that?

[00:05:49] Is my data safe? When is it safe? Where's it safe? Well, in this case, we're talking about data is reasonably safe until it gets to that X Y Z VPN vendor in Kansas City, Missouri, because now there's this one exit point. So, think about that, if you're a black hat, when you're out there, and you're trying to break in. Do you want to go after just a regular little business? Or are you going to focus in on maybe one of these VPN providers, compromising their systems. And, now you’d have access to all of the data from 100 million people or 100 million sessions that people are creating and using through X Y Z VPN company. You see what's happening here now. And once the data is over on the other side and it's in the clear, their ISP could be monitoring it. They could have problems with the DNS, sending you to the wrong place, where it adds up to darn quickly. So, the question he asked me, my answer was, no right. What do you think the answer would be? Yeah, it's a little safer. What I said, Right. Craig you're always hedging your bets right. How many times have you said that? Obviously, data is a little safer because, from the time it left the computer on the beach, as you're sitting there, until the time it got to Kansas City. Missouri, it was safe, but you may well, have a very bad company that's doing nasty things with your data. 

[00:07:23] Once, it hits the other side of the VPN, and then on top of it their systems might be compromised, and now your data is not safe, that way either. So, remember all of this. Keep this in mind, here, when it comes to keeping your data safe, a VPN can be an adjunct, but be very careful about who you use. And some other day, if you're interested, let me know, and we'll do this, we can talk about your own private VPN. One doesn't make sense, and this is what I do for my business, and also for my clients businesses. So, have a great day, enjoy the weather. I am going to be sitting back enjoying it. It is that perfect. There's no humidity. It's in the 70’s, which is the way I like it. The sun is out, and you probably know I am little kind of a gentleman farmer here too. I’m going to enjoy some of our animals, while I'm here and as always have a Great Day. Make sure you visit me online at Craig Peterson dot com and we'll be back tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 23, 2018

Do you use or collect Bitcoin?  Today we discuss some of the many problems that go along with all these Cryptocurrencies and Blockchain technology, and why it is a good idea to steer clear of them.

Facebook is sharing your data and your friend's data.  What Apple is doing to prevent this.

Are you still using XP? There are companies who are.  They have embeded systems that run XP.  So what can they do.  Craig tells you how he handles it for his clients.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/23/2018

Cryptocurrency Downfall, Apple Closing a Loophole, Windows XP -What to do if you still need it

Craig Peterson:[00:00:00] Hello Everybody, Good Morning, Craig Peterson here. Today we've got two major topics, I'm sure are going to interest you. If you or anyone you know has been buying and are using things like bitcoin, we’ve got a lot of news that we'll be talking about today. Also, we are going to be talking about a couple of major security issues here. Why the military can't quit, Windows XP and should you. If the military's not doing it, well they have a plan. We'll talk about that and what Apple is doing to help make sure that the problem that just happened with Facebook and their developers doesn't happen on the Apple platform. I think they're going to do a very good job of that. So welcome, and here we go. 

[00:00:50] So, we're going to start by talking about blockchain technologies. Now, these are the technologies that are used to make things, like bitcoin, work. The whole idea behind block change technologies is that you have well, to kind of think of it like, a regular ledger that you might have an accounting. You've probably heard of double entry accounting, where things are balanced, right, they're balanced back and forth between, you know, the receivables and payables. But even more, it gets right down into; this money showed up in the bank account, that completely negates this invoice. Therefore, we know everything's balance right, and you know if you want to know more code talk to an accountant right. Well, those types of ledgers can be copied. They can be shared. We've seen them in movies before, where they're used by bad guys to try and cheat people out of money. Let's, put it that way. 

[00:01:45] And that's a problem. But, when we're talking about bitcoin and blockchain here's how it works. How do you know a transaction is valid? How do you know someone has some of this money that's out there? Well, they do it through a system of ledgers, and there are a lot of ledgers. In fact, when it comes to blockchain technology, the idea is that every one that uses a blockchain technology at all, anybody has a copy of all the ledgers. Now you don't know who the people are, necessarily, all you have is a wallet number. So, you know I'm sending money from here to there, and then all of that information is then distributed and shared with everybody else on the blockchain. So, it's cool technology; banks are starting to use it now, where they are doing with the overnight lending they're sending money back and forth. And they need a way to verify that transactions occurred and who got the money and the overnight rate was it at etc. So, that later on, they can go back and get down to it and figure out all of the details. Well, when you're talking about a ledger like this, where everybody's copy of the ledger needs to agree. That's impossible. Some people are going to have a machine that's offline, some people's hard disks are going to crash, and they are going to lose their ledger. So, you can never have 100 percent of these ledgers agree with each other. So, how does it work. 

[00:03:26] Well, the idea here is that 50 percent plus one of the ledgers have to agree. And, that's pretty good when you think about a bitcoin, for instance, you're talking about having thousands. Ten of hundreds, of thousands, of ledgers that are out there and they all have to agree. Now, there is a problem with this, in a few different ways. One is the amount of time it takes, but we're not going to get into that, for the ledgers to become insane. And, even to distribute the data, well, that 50-plus-one-person percent is a problem because theoretically, you could have an attack where someone can somehow modify half of the ledgers that are out there. Well, guess what, here it turns out that this very well-known attack vector has been used. Look at the mono coin, Bitcoin Gold, and Cass Virge, and light coin cash. All of those have had, what's kind of the crypto equivalent of, a bank heist. It's interesting because there's another article that I have in front of me and we put up on the website, that looks at this and see, that in the last six months, there has been one-point-one-billion dollars worth of cryptocurrency stolen, oh think, about that for a minute. What was thought to be the strength or one of the major strengths to these cryptocurrencies, which is that you have to have all these ledgers, and the ledgers have to be pretty much in agreement? And all of that information can be hacked. Now, how is it getting hacked? You know are we talking about people breaking into hundred-thousand-million-plus machines, to manipulate those ledgers, and move that currency, that cryptocurrency, into the black hats bank account. 

[00:05:32] No, actually we're not, and it's kind of smart the way these guys are doing it, here. There's an article I put out from NYU computer science researcher, Joseph Bonneau, and he released research last year where he went through and came up with estimates of how much money it would cost to execute these type of attacks on the top. Blockchain that is out there right now by simply renting power, rather than buying all the equipment and he concluded that these types of attacks were likely to increase. Of course, as we're talking about right now, it turns out he was right. Here is a quote directly from him when he was talking to Koine desk, he said “generally the community thought this was a distant threat. I thought it was much less distant and I've been trying to warn of the risk even. I didn't think it would start happening this soon.” So, there is there is a huge problem. You know, I have never been a proponent of these cryptocurrencies, for a lot of reasons, or one of them is the fact that they're not secure enough, and this has now been proven many times this year with at least a half a dozen different cryptocurrencies, OK. So, it's pretty bad. There's also another problem. 

[00:06:56] You can't prevent someone from spending the same piece of data five or even a thousand times, at once, without trusting the third party to do all the dirty work. So, you've got miners who are the people who are using the machines that are running the blockchain software looking for these highly complex mathematical numbers. So, they are consuming electricity, making sure no one's getting money's stolen, and this article is interesting if you are or have been thinking about getting into it at all, have a look. Have a look at the report that came out in this case. These guys in this one case, they were able to amass more than half of the network's power. We're talking about computing power here. The Bitcoin Gold attacker was able to double spend to very expensive transactions, sent to an exchange. So, it goes on, and Cass explains Amol, how even small coins are at risk. This is huge, it's really, really, huge and it's called a 51 percent attack, although it's 50 percent plus one, and we've got to be careful of it. I have another one that's up there, right now, on my website called Healthcare Info security. It is the place that I grabbed this from, and it's showing again, evidence is continuing to mount, the cryptocurrencies seeking criminals are no longer bent, solely on boosting bitcoin or demanding rent, demanding ransomware, but in actually stealing it, directly by being able to get in showing in here from carbon black. The top 10 currencies that are out there right now, of course, this is not surprising to anyone, but bitcoins number one, the 3M RIPL bitcoin cash-like coin, etc. goes on and on. Now Carbon Black says it's found at least one-point-one-billion in cryptocurrency related thefts since December 2017, and right now when we're talking here, June 2018. So, the crypto thieves are black hats are leveraging malware phishing attacks, fake advertising campaigns, and they're just repurposing old tricks. People are falling for all kinds of cheap attack tools, you can get them from anywhere, from a buck to a thousand dollars. It goes on, Krypto Jack and attacks are continuing.

[00:09:29] So, we've got a couple more here on the bitcoin stuff before we get into what Apple's doing to try and stop developers from sharing their data and also about Windows XP. Believe it or not, it is still in use today, and XP came out a very long time ago now. Bitcoins, price now, I mentioned this on the show about a year ago. I think we were talking about bitcoin and how there was a lot of fishy stuff going on when it was launched, and it looks like a couple of guys were involved, and they were able to get bitcoin up to 1000 dollars per coin very quickly, and it appears insider trading may have been happening. We talked about some of the rumors that were out there, and now we have a little bit more of a solid piece here. This is from the New York Times dated March 30. 

[00:10:27] And of course putting this all together today, because we are in a mode of talking about bitcoin, today we're going to kind of cover that thoroughly. So, this article was saying that a concentrated campaign of price manipulation may have accounted for at least half of the increase in the price of bitcoin, and other cryptocurrencies last year. Now, this is according to a paper released at the end of March. It's an academic; he has a history of spotting fraud in the financial markets his name is John Gryffen, finance professor over at the University of Texas. Isn't that interesting, here. So, the price the value was driven up artificially and remained artificial because once you get started, that way it just keeps going. Now, it was being manipulated, it looks like, by at least partially backed Livity at Phoenix, it's largest and one of the least regulated exchanges, in the industry register, in the Caribbean offices, in Asia, and it was subpoenaed by American regulators shortly after article started to appear. Talking about, but halted the digital flow of tokens, in and out of the exchange what was going on. Why were these tremendous price increases happening, last year, and, this paper indicates that manipulation played a large part, in those price increases? So, it's a very, very, big deal. 

[00:11:59] Yet, another reason to stay out of this, if you need another reason. 

[00:12:06] To tell your friends, your family, or yourself not to get involved with this. Bitcoin is selling off this year, and they're concerned that this decline. Could cause a lot of damage in the financial markets. So, Bitcoin is now, nearly a third, of its record high that was reached just six months ago. It's dropped by almost two thirds. Isn't that just crazy? So, they're worried that bitcoins, the bursting bubble could spill over into the equity market. Here's a quote from Matt Maylee. He's a strategist over at Miller Tabak, yeah. Miller Tabak, there are things to be concerned about regarding the stock market here with emerging markets and other issues, but I don't think bitcoin is going to be one of them. And he understands the fear or the steep rise and fall in bitcoin prices; it's very reminiscent of the 1990s dot-com bust, he said. But the difference now is everybody's investment wealth. It's a very, big deal. Everybody is talking about both of those things when they're in the bubbles. So, it's looking here, if you look at that article again, we have all of these up on the website, and this particular graph is from CNBC, but it's showing the correlation, between what happened with our tech bubble and what's happening with bitcoin. So, keep an eye out for that. This could be a very, very, bad thing. 

[00:13:43] Now, we all have heard about Cambridge Analytica and what they did with the Facebook data. They were getting information about friends of friends they were using it, they were manipulating it and, of course, before that eight years, well ten years ago now, the Obama campaign got the information on every Facebook user, worldwide, and of course, there are particularly interested in the United States. 

[00:14:08] So, we have a history now of abuse of your Facebook data, here, that stored in social media. So, Apple's been concerned. You know, they are probably one of the number one companies, out there, when it comes to trying to make sure you retain your privacy, right. So, Apple came out with new rules just last week for the developers. The idea is, to limit how developers use information about the iPhone owners friends and other contacts. So, there was a bit of a loophole, the lead app makers store shared data, without people's consent. That loophole is being closed. Now some of the apps that you might use, I use like a contact duplicate merger and things those should still work, but they have to keep the data on your iPhone. This whole practice of trying to get information about your contacts has been used for years. When you sign up for Facebook what does it ask for? Hey, is it OK if I help you find your friends on Facebook LinkedIn did the same thing, and now that Microsoft is running it, it is done even more.

[00:15:18] Right. Double time here. So, this isn't new, but Apple's new strategy is new. Apple has, of course, the world's, well one of them right, the world's most popular smartphone operating system, Android is more popular. But sharing data, as in a friend's data, without consent is what got Facebook into trouble. They announced all of this at their developer's conference, a little bit earlier this year. Contact List abuse is what it's been called, and it's a huge ecosystem and this will make a very, very, big deal. Interesting article. Want to get into more detail, if you are a developer if you have an Apple iOS app, and a lot of businesses do, make sure you double track this. As far as businesses going with developing their apps, I have got to mention something here, and this is a little self-serving. OK, I'll say that up front. But we are, my company is the only one that can sell this particular software, and right now, anyways, and that's why it's self-serving. Apple and Cisco got together to try and solve a major, major, problem. 

[00:16:35] The problem is if you’re a business, how do you keep your data safe when it leaves the office? 

[00:16:45] So, if you have sales people they need access to your data. Don't you think if you have somebody, who has some financial information, they need access to your data? Not all of them, but some of them do. So, how do you control that? Well the way most companies have dealt with it is, they buy some software, and that software runs on that iOS device or that Android device and all of the company data stays within that one. App. One app. So, if you want to use company email, you are using that app to send and receive email. You cannot use any other app; if you want to get into your customer management system, you have to use that app. If you want to get financial data, you have to use that app. If you want to get at your files, you have to use that app, right. So, you're stuck in this one app, and people have hated that for a very, very, long time for good reason. However, the main reason they had to do that was there was no way to have a check and balance on the apps and what they were doing on the phone. 

[00:17:56] Now, with iOS, you can remotely manage, and we do remotely manage iOS devices for businesses. You can, too. There's even free mobile device management MTM. There's free mobile device management software out there that you can use, depending on who you are and what hardware you have and what vendor relationships you have. So, look into that. But, all that lets you do is control what apps can be installed. It doesn't control the flow of data, between the apps, including the flow of data between your apps and what's happening with your business data. All right, So, I said this was self-serving because we've got a got a solution with Cisco and Apple that's been developed and works great that allows us to control all of the flow of data. Think about the military type system. Think about the Orange Book in the old days, right. How have you compartmentalized the data? And how you don't have your private home server for Clinton e-mail dot com, right on. Now, we found out Comey did it too when he was investigating the Clinton e-mail scandal, where he was using Google Mail. It doesn't and does it. 

[00:19:10] It's nutty. So, that became a problem and more of a problem. It just goes on and on. So, with this, you can control everything. And, I think you have to I think we've got to start controlling the apps which don't know what the developers are doing. But you might have a look for this out there. It is available for iOS. It is not generally available right now. We're the only ones in the world that can sell it. I guess that means, we're just kind of cool. But, I guess the other side of that is, isn't it kind of cool that you have a guy, here, that is tied in that tightly, with the security market. 

[00:19:50] In fact, I've got to go as soon I get off the air, here because I'm doing an interview, that we're going to be airing, because I'm running webinars for the FBI. Infragard program, which is the infrastructure guard, if you will, for the businesses that have a critical infrastructure. So, I'm doing that right after this. We're talking about the dark web. In fact, that's who it will be. I'll be doing that interview here shortly. You can join InfraGard if you are involved in critical infrastructure. You can find them online InfraGard dot Org. There are chapters in, I think, every state. 

[00:20:32] Well, you know Windows XP should not be used, right, don't even have to repeat that. But the military still is using it. It's using it in our ships even though the British navy just launched a nuclear submarine a brand-new build from scratch running Windows XP. Now, why do they do that? Well, the bottom line is Windows XP is a known, well-known commodity, very well, known. So, they know where the bugs are for the most part. Microsoft is still supporting it for them at an incredibly high cost, here. But what that means is that the military computers running XP are stuck with legacy hardware. They're stuck with legacy software that runs on it. So, we've got to be careful about this. The rest of the government operations are moving to Windows 10. I think we've got all of our clients on to Windows 10 now that are using Windows, and we're keeping them up to date, obviously, with the patches and we do that all automatically. And we have people that hop on when there are problems, which there are, this week. I'm not getting to it on the radio, but check out my Web site Craig Peterson dot com because there are a bunch of Windows 10 updates and they are not all working. So, I've gotten instructions on how to install them which machines are having problems. 

[00:21:59] What that means for you and what you should do. So, check that out on my Web site, again, Windows 10 update problems this week. So, they are working on trying to get rid of it; they've got Windows XP 2003 other legacy Microsoft products that are out there and the problems just continue to pile up. Now one of the things we have done for companies that are running XP, and you might look at this as well, is we take that Windows XP machine we put it into a virtualized environment, and then we put special firewalls around it with full intrusion detection and prevention. So, you can do that as well, if you're a business and you're stuck with Windows XP. We're doing that for manufacturers, as well, where their hardware, their manufacturing hardware, is running Windows XP. So, we put it in a box, if you will, with all kinds of protection around that. So, keep an eye out, and that's what's happening. Make sure you join my mailing list, so you get my weekly e-mails. They come out on Saturday morning, and we have some special reports. Those people who signed up for my insider club here, there is a membership site. 

[00:23:13] It is closed but we've got some more special reports, we'll be sending them to you along with information on retrieving them. And that's something that we've offered for free. We shut down that Facebook group by the way because we just won't get in the activity. I think people are just used to me telling me what's going on and what should happen right as opposed to the interactive back and forth. 

[00:23:36] Although we had some interactivity, and we still have it, multiple times a week, usually it's via text. If you want to text me, if you want to sign up, if you have any questions, just text me directly 8 5 5 3 8 5 55 53, 8 5 5 3 8 5 55 53 and I'll let you about  any major alerts or other problems that come up, until then, have a great week and we'll see you online. You've been listening to Craig Peterson. 

---

Related articles:

Critical Patches Issued for Microsoft Products – HIGH THREAT


Microsoft Confirms New Windows 10 Cumulative Update KB4284835 Issue


More Reports of Windows 10 Cumulative Update KB4284835 Failing to Install

Unbreakable smart lock devastated to discover screwdrivers exist

 

Cryptocurrency Theft: $1.1 Billion Stolen in Last 6 Months
Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular

Bitcoin’s Price Was Artificially Inflated, Fueling Skyrocketing Value, Researchers Say

Apple Tries to Stop Developers From Sharing Data on Users’ Friends

Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Information Disclosure

The big picture: We’re getting closer to AI doctors

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 23, 2018

Today a short discussion on what is wrong with the internet.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/21/2018

What's Wrong With the Internet

Craig Peterson:[00:00:00] Hi, everybody, Craig Peterson, here. And today I want to talk about really what's wrong with the Internet. I think this is kind of crucial. It's critical really. When you get to it, you're going to agree with me. OK, so let's stick around because here we go. Do you know what the basic foundation of what's wrong on the Internet is, smart people and stupid people, get equal airtime? Think about that for a minute now. Well, you remember we had a policy that was in place under the Federal Communications Commission that required equal airtime for opposing views. So, let's say that you have an opinion about something, let's say you have an opinion that no one should live in the middle of an active volcano. OK, so well done, sir was something that I think is pretty darn obvious. Don't live in an active volcano. So, if I were to say that, on the air, and this so-called Fairness Doctrine was in place, what would happen? Well, they'd say, well you have to have an opposing view. So, they would find some idiot that believed living in an active volcano was just fine, right. Those people are out there; they're always out there, you'll see them out there. And, that's the biggest problem with the Fairness Doctrine. But, we're not talking about radio right now, we're not talking about trying to get Rush Limbaugh off the air, what we're trying about right now is what we're trying to understand, the Internet. Now, there's smart people and stupid people and just because you have degrees doesn't mean you're a smart person, right.

[00:01:47] Can we can we agree on that? There's lots of different types of IQ, if you will, Right. So, you've got the intellectual quota, you've got the ability to be able to analyze data in and pull it all together. Spatial, social right, there's all kinds of different types of smartness of these quotients that we can come up with. So, stupid people are the people who will argue against something that's just true. And, I don't know why? Many times, I think they're just arguing for the sake of argument. They don't want to be with anybody. They're like me, they're a bit of a rebel, right. Or maybe there are a lot of rebels, and here's the problem. On the Internet, stupid people tend to shout louder and shout longer than people who have wisdom and judgment. Ignorance generally prevails, and we see that all of the time. Look at what's happening. we've got antiphon out there. These people that are saying, hey listen, we're anti-fascist, and yet the tactics they're using are fascist, right. Am I wrong there, right. I'm sure to hear from somebody, right. Somebody is some stupid person. NSA, oh no they're not, you know beating someone because they are trying to exercise a free first amendment, free speech rights. That's not fascist. Well, what is a fascist thing? Well, get right down to it, it might be a little bit too cynical for you.

[00:03:23] OK, how about this one. Do you remember this e-mail? When you forward this e-mail to friends, Microsoft can and will track it, if you are a windows user, for a two- week time-period for every person that you forward this e-mail to, Microsoft will pay you 245 dollars. For every person that you send it to, that forwards that ad on, Microsoft will pay you 243 dollars, and for every third person that receives it, you'll be paid 241 dollars within two weeks. Microsoft will contact you, for your address, and then send you a check. I thought this was a scam myself. But, two weeks after receiving this e-mail, do you guys remember that one? Do you remember, that e-mail? OK, did any of your friends fall for it? I know, I got it because, why? Because some friend of mine forwarded it to me. How about the one that's more recent? From Facebook and Zuckerberg. Hey, if you like this, you know what? Zuckerberg is going to track it. Facebook is going to track it, and you are going to get paid money. All right, it goes way back cobbled chain letters, you remember those things, Right. So, let's not, for everybody, the stupid will always be with us. OK, Stupid stupidity is not a function of capability. Frankly, I think it's a choice, OK. So, what's the point here? Well, the point is stupidity is cheap and plentiful with stupidity. Your opinions appear to be endlessly open, right. It's crazy. Wisdom is scarce and expensive and usually involved, with upfront commitments, upfront studying, and upfront research. 

[00:05:09] And, when I look at my business, I look at the security business that I'm in, I see stupidity, everywhere absolutely everywhere. I want to tell you a quick story here about a guy that I worked with in Chicago; his name was Miroslav. It was at least 20 years ago 30 years ago. Maybe, he and his family had emigrated from the full former Soviet Union. He knew what it was like. In fact, I had been up in Canada, and I bought a copy of Pravda. You remember that? That's the Russian, the Soviet, the communist, kind of like, Time magazine. And I brought it back, because I thought it was hilarious, because of the way they were portraying the United States, and how everyone in the U.S. was drunk, and they were on street corners, and everybody was homeless, and what a terrible thing capitalism was. So, I showed it to him, and he says I got to take this home, I'll bring it back tomorrow. So, he took it home, and his wife saw it and tore it to shreds. So, remember he promised to bring it back tomorrow. And about a week later, I sent him a slob where's my copy of Pravda, and he says my wife destroyed it and he said I'll get you another one. He never did. By the way, I never got my Pravda back, but he described how he used to have to stand in lines for bread in the Soviet Union.

[00:06:40] Yes that's what you had to do. The shelves were barren.

[00:06:44] I don't know if you've seen the Americans, on TV, but they do a reasonable job of showing what it was like. You can get as many boots as you want. They had so many boots, one style, and only a couple of sizes right. That was the only thing the government, the Soviet government was good at making, back in the day. But he'd stand in the bread line, and he'd have, like no choices. He had his family had to get the bread that was on the shelf, that was it. Right nowadays, you get to decide, do we want to go to Panera, and we can get this bread or that bread. Or, do you want to go to a pan and get some bread from them at the supermarket? And, you know. I’m at my local supermarket; the bread aisle is huge. There are at least a thousand different loaves of bread and different types of bread. So, in the Soviet Union, they had virtually no choice. So, these people would come over to America, and they'd go to a supermarket, and they wouldn't believe what they saw, because there were so many choices. It was everywhere, and that's the joy of true capitalism. It was everywhere. Now OK, I'll argue. Right. We don't have true capitalism in the U.S. anymore which is true. But Kim married to the Soviet Union. It was just incredible. You and I would think, oh wow, that's just a miracle isn't that the coolest thing ever. I love that. But the effect on some of these people that came from the Soviet Union cleared, including Miroslav, you could see it in him. It was overpowering.

[00:08:24] He was amazed, at how much better things were over here.

[00:08:30] Now that conversation happened more than oh 20-30 years ago now, but I still remember what he looked like, and you know what surprised me the most, that he said was that some people came over from the former Soviet Union. Their choices were so dramatic; they couldn't take it, they could not take it, they could not make the decisions. So, the one way that they would return, he told me about people, that returned to the Soviet Union. Well, of course, at that point it had pretty much collapsed because this was right after the collapse, of the Soviet Union, it wasn't very many years after, during the Reagan administration. But you know, we're talking about a thousand times more many more choices, and they were just overwhelmed, they couldn't deal with that. So, they went back. Well, today we have a similar problem. If you go on Google and you look for security, you're going to see you know, anti-virus, anti-malware. How do I get my training and security, that's required by law? How do I get it for my employees? You are going to be overwhelmed. There's not a thousand choices you will get million-page hits, when you do your search online.

[00:09:47] And, you know what, a lot of those people frankly, and then this is scary if you ask me, but a lot of those people, are stupid people

[00:09:57] Their saying, oh this software is the best, I've used it for years.

[00:10:01] There's no problems with the software, and they are completely ignorant of the subject matter.

[00:10:09] You know, in this day and age, we have a continual problem with what are called zero-day attacks. We've never seen them before. We have the president of Symantec, who pretty much got fired because he said that their antivirus software was useless. And yet how many people can you find out there that are peddling Symantec software, right. It's huge; you're saying, hey it's a mess just a mess. These are the stupid people, OK. Kalisz people's not going to help them get a faster internet connection; it is not going to help, a 60-inch widescreen monitor isn't going to help. Being motivated is not going to help. The number one skill you need is discernment, and that's the skill nobody talks about. How do you know, who knows what they're talking about? You have to discern, and that's the problem with the Internet today 

[00:11:08] How can you judge me, from somebody else that has a thousand posts that are all wrong 

[00:11:15] Right, where I've been on the internet since 1983 and doing security for major corporations down through small guys, right. How can you tell the difference? How can you discern? And, I want you to think about it too, from your business standpoint, if you are a business owner, how do you distinguish your business from the other guys that are online? The other guys that are shouting louder and longer than you are shouting, a little bit of food for thought. I appreciate you subscribing. Please make sure you take a second and give this podcast a rating on iTunes. Craig Peterson dot com slash iTunes. Let me know, what you think. Hopefully, I’ve earned five stars from you. You have a great day, and we'll be back with more tomorrow. We'll see. what tomorrow brings us, there's always something. Thanks again, Craig Petersen. Out.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 20, 2018

 

Have you gotten an ad from an attorney while visiting your local chiropractor?  Listen in as Ken, Matt and I discuss what I am calling twenty-first-century ambulance chasing and what it means to you.

Did you hear about the new military branch, the Space Force? Matt, Ken and I discuss that and the Space Mining of Asteroids and what it means for our economy.

Have you ever used one of those DNA collection companies, the ones that tell you where you came from?  If so, you'll be interested to hear Ken, Matt and I discuss the hack that happened to My Heritage and what hacks like this means to the future

Find out more on CraigPeterson.com

---

Related Articles:

Digital Ambulance Chasers? Law Firms Send Ads To Patients’ Phones Inside ERs

New asteroid gold rush ‘could earn everyone on Earth £75 billion’

US: Crypto Could Pose a Problem for Candidates Seeking Security Clearances

Why a DNA data breach is much worse than a credit card leak
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/20/2018

Ambulance Chasing Attorneys Using Geo-Fencing, Space Mining and DNA Data Breaches

Craig Peterson:[00:00:00] Hey everybody, Good Morning. Craig Peterson here. Of course, you might not be listening to this in the morning. I get it, but Good Morning. Such a nice expression, isn't it. I'm glad you're joining me today. And, of course, we're going to be getting into Ken and Matt. Now we went into a little more depth than usual with them because they had some good questions. But we talked about geo-fencing and how lawyers are starting to use that, to direct ads to you. Yes, indeed the ambulance chaser goes 21st century. We'll talk about the Space Force and space mining and how in 2022 NASA's going to start a trend that frankly could destroy the entire world economy. And, a breach of one of these DNA services. This one was bad enough. But what could happen here in the future. All of that and more of course with Ken and Matt and Craig Peterson. Stick around. Here it goes. I really enjoyed it this morning. Hope you do too. Let me know Craig Peterson dot com slash iTunes. Make sure you leave rating. Hopefully I've earned a five-star rating from you and also a comment, Craig Peterson dot com slash iTunes. Here we go.

[00:01:19] Ken and Matt and we have with us, as usual, Craig Peterson, our tech guru, who joins us at 738 every week. Craig, Good morning. 

[00:01:27] Hey good morning. Doing well. How are the eggs.

[00:01:30] I know how the politics going? Actually, got to tell you the eggs are pretty good. That's not bad. Yeah. The issues are a little suspect, but the eggs are good, so you know and what you don't have. 

[00:01:41] Yeah you know, Craig, my day job, I'm an attorney and so I was wondering if there's any way I can get more business other than chasing the ambulances behind them. So, where I how can get in the ambulance itself.

[00:01:56] I love it. What a segue here. How did you know that? Yeah, this is really kind of an interesting article here, and problem. If you have a smartphone you have a device that can be tracked right. We all know that if you have a dumb phone that device can be tracked as can a cell phone of any sort. But the tracking technology that's in cell phones is just astounding because they've got this GPS and the GPS allows you to find out where you are within a meter or two. Kind of depends but that's a lot of resolution. Now our devices have a facility, whether it's in Android, or it's a new iPhone or an IOS device have a facility that's called geo-fencing and Geo-fencing is where you set up an area a geography as you will and you define a kind of a virtual fence around that area. So, one of the uses for that's really nice. And parents love that is that you can set up a GPS fence for your kid’s school. You can have a geo-fence for your kid’s after-school activity, and you can have a different one for the House, and maybe yet another geo-fence for their best friend's house, and then when they are moving between all of these different places when they're going places. The smartphone that they have, is sending information, by the way, doesn't have to be a smartphone you can get little watch-type devices 

[00:03:32] That is what we did for a granddaughter. Those also have a geo-fencing capability and she can make emergency calls to family members, which is really kind of cool. But, what can happen with the geofencer's, is when the kid arrives at school you're notified, when they arrive at home, or the friend's house, wherever you set up the geo-fences. Well, attorneys Ken I think might be smarter than we've given them credit for, as they should, The patients in Philadelphia now are going to start to notice something a little different. Some of the advertisers in this particular case, attorneys have set up geo-fences around clinics. We're talking about emergency rooms, chiropractor's offices, and even pain clinics. So, all of these places have been defined with geo-fences and what's going to start happening, in Philadelphia, is if you show up at one of these places you are going to start seeing ads from attorneys. So, you kind of mentioned the ambulance chaser, Ken, and that's exactly what we're talking about here right now we've got personal injury law firms are going to be using these medical clinics to target people. And then by the way it's not just like its popping up on your phone.

[00:04:55] Hey, have you been injured? It's going to come up as your normal ads stream. So, if you're on there on Facebook, or you're cruising the Web, you're going to start seeing these things, and they don't stop just because you've left the area. They, in fact, will continue for as many, as much, as a few weeks. Now, this is interesting because there was a case about this, down in Mass, and Maura Healey is kind of upset about it. In a direct quote from her saying “that private medical information should not be exploited in this way.” So, she's concerned and prosecutors down in Mass reached a deal last year with an advertising firm that was sending ads from a Christian pregnancy counseling and adoption agency to people who entered a Planned Parenthood clinics. So, the people would cross this digital fence and they'd start getting advertisements that said things like, “You have choices” and “Click here for pregnancy help.” So, she came up with this deal. They agreed to it, the state called it. The Commonwealth called it a little bit unfair and deceptive and it resulted in the banishment of digital advertising. Digital advertising firm from Massachusetts. So, this is a problem. It's going to continue to get worse as more the technology advances. Yes, Ken, you don't actually have to run after the ambulance’s anymore. 

[00:06:28] Oh that's good news. All right. So, I would love that way too. You have the benefit. 

[00:06:36] We're talking to Craig Peterson, our tech guru, who joins us at this time every Wednesday for a look on technology. 

[00:06:42] So Craig, when I join the new United States Space force, yeah, this is because I'm signing up as soon as I'm able to, probably spending a lot of time in space and if I were to, I don't know, encounter an asteroid, would I suddenly become a billionaire.

[00:06:59] Wow, that's a great one. Well, first of all I think you're too tall Matt. I think there are limits on that. So, you might not be able to do it, but yeah, the next big gold rush is, in fact, in space and we've already got a number of companies.

[00:07:20] There's a couple of dozen that I know of that are busy trying to get into space. So, why do you want to get up there, I think maybe Matt your, or your, question really revolves around. Does President Trump have an ulterior motive to this new space force? Right. Am I reading this right? 

[00:07:39] Well I mean, is he looking to make his next few billion.

[00:07:43] Yeah exactly. Maybe that's what's happening, I had not even thought of that. So, here's what's happening right now. We have these asteroids in space and you know that we've sent some satellites while some rockets by right with Rover type devices on them they've landed on asteroids have done a little bit of mining to try and figure out what they are. Well, there are all kinds of precious metals that are fairly easy to mine on asteroids. Boy, there has been a lot of science fiction written about this stuff over the years, but one of the major things that they're looking to mine from space rocks is gold. So, the world's first trillionaire. This is an interesting article came out of the U.K. and you'll see this up on my website. But the world's first trillionaire is not going to come from cryptocurrency or some other clever new APP. It looks like they might become rich from asteroid mining and that's what's really kind of interesting. Goldman Sachs is looking at this. They're saying that's what's really going to happen. And NASA's estimating the total value of asteroids, that are easily reachable from Earth, could be up to 700 quintillion dollars. So, that would mean about a hundred billion dollars for every person on earth. OK. Obviously, that's not going to happen, right. Because if you have an influx of gold, gold is going to become less valuable. The same thing is true for all of these, you know, the valuable commodities that might be out there and those asteroids. So, what we have to look at here as the winner is going to be the first one to get up there, to be able to economically grab those asteroids bring back those minerals, and start selling them. Because once it becomes cheap, the price is going to go down.

[00:09:46] Look at oil, the price of oil, of course, has been a cartel for a long time over in the Middle East where they kind of control the price of oil. But, once we started fracking and it was less expensive for us to get the oil, and the extra oil the extra gas the price per barrel plummeted, it went way down, because now there was more oil. So, when there's more gold or there's other planetary resources that are just floating around out there. So, the whole value's going to drop. So, if you've been investing in gold and they start mining it, it's not going to be worth what it used to be worth. But this predicted mineral wealth is just so vast, it could destroy our world’s economy. So, that's a very, very, big deal. We've got NASA back, in 2022, is going to be launching a new mission. They’re going to a metal-rich asteroid that's estimated to be worth, this one asteroid, about twelve thousand quadrillion dollars. That one asteroid. So, boy oh boy. Talking about an economic collapse that just you could make some big bucks up there in space. But ultimately, this could really change everything here on Earth and might even drive up the value of these crypto-currencies. 

[00:11:14] I'd like to see Matt go to space. Sometimes, I'm sure you would it might improve our chemistry, yeah exactly that. 

[00:11:19] We are with Craig Peterson, our tech guru, who joins us on Wednesdays at 730. So, we've heard a lot about hacking and credit card hacking. DNA is kind of a definition My Heritage had some hackers breached their accounts and didn't give me DNA. But is that us. I mean, is that a serious breach something that we should be worried about.

[00:11:43] Yeah, well in this case right now with My Heritage it was passwords usernames and they were basically encrypted. So, not a whole lot of trouble there but it brings up the concern about our DNA being stolen getting our DNA data back for ransom, in fact, that's already happened once, which is just absolutely amazing. 

[00:12:08] We had one Indiana hospital that paid 55 Grand to hackers so that they would not release that, so, it was being held ransom. So, we've got to be very careful here. 

[00:12:18] The data could be sold, on the down low, and could be monetized to  insurance companies could end up out on the web and you could in the future apply for a job that you're denied, not realizing that the company denied you because the deep dark data somewhere in the corporate system knew about your DNA and knew about your proclivity for heavy drinking or maybe some disease. And so, they didn't hire you. This is scary. This is a longer term, we don't have it happening yet, but we're freely giving our DNA, everywhere. Guess what. Those passwords that My Heritage lost, you can change your passwords. You cannot change your DNA. And in the future, this could be a very big deal.

[00:13:06] All right, Craig Peterson, our tech guru, who joins us every Wednesday at this time to give us an eye on the world of technology. Thanks so much for joining us Craig, we really appreciate it. We'll talk again next week.

[00:13:15] Hey gentlemen take care. Bye-Bye.Thanks.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 19, 2018

Apple iPhone are now going to be harder to break into.  Craig and Jim discuss a new change to Apple security that will disable the feature that companys like Cellebrite and Greyshift were exploiting making it harder for anyone to break-in to your iPhone.

Find out more on CraigPeterson.com

Related Articles:

---

Apple Is Testing a Feature That Could Kill Police iPhone Unlockers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/019/2018

Police iPhone unlockers are going to be blocked

Craig Peterson:[00:00:00] Hey, Good Morning everybody. Craig Peterson here. I had a rather long discussion this morning, actually, I guess more of a lecture, I need to stop doing that a lot. Jim Polito and on these other morning show drive hosts kind of say their own thing. But I had a discussion this morning with the Jim about Apple. I don't know if you know it or not, but I found something in the latest beta release of Apple's iOS. And in fact, in the prior one that's going to have a huge impact on law enforcement frankly and on businesses. In fact, there's a bit of a surprise here for most people. So, stick around here we go. We've got about oh say eight minutes with Jim starting right now. Here he is. 

[00:00:52] Our good friend Craig Peterson the tech talk guru and at the end of this segment we're going to tell you how you can get more from Craig without getting annoyed. But joining us now, Apple is testing a new feature 

[00:01:06] that could kill police iPhone unlocker's. What's an iPhone unlocker or what did the police use for that. Well Craig Peterson. We'll explain. Good morning sir. What is an iPhone. Police iPhone unlocker. 

[00:01:24] Well bottom line that is the form of smartphones we have some security built into them. And we like that we want that because what that means is we have some privacy as far back as the Clinton administration the federal government was trying to put some technology, some backdoors into the encrypted phones that were available to them and they were trying to do that, so they could listen in on any conversation that they could get their hands on. Today, it's not just the conversation. You know we tax people. Look at look at what's happening right now with the FBI with Strzok and Page and those types of messages can be recovered because they are kept by the phone companies. Right. So, the FBI and the local police department they'd love to get their hands on your communications device, because you're probably using something other than texting. So, for instance I use iMessage on an iPhone and that's not encrypted end to end Jim. And what that means is no one can intercept it. Well they could potentially intercept. But it's almost impossible to decrypt. So, it just makes it so expensive and difficult to decrypt that message that that they don't bother. 

[00:02:51] Now when you're talking about criminal cases like what happened in San Bernardino with the murders in the office. Right. They wanted to get their hands not only on the iPhone, but on the data in the iPhone. They wanted to see is anybody else out there colluding with these people. And what that might mean is there might be some other people that should be investigated, maybe arrested and maybe they can stop another crime. So, when you lock your iPhone, when your iPhone requires you to give it a thumbprint or passcode or look at your face. Now you are given access to that iPhone and the police have limited ability to get into your iPhone to see what might be on there. Right. There is there is a company that has some tech, Jim in them and that's called an iPhone on Walker. The companies like Cellabrite are Greyshift. They make devices that they can hook an iPhone up to and unlock it as though you had either given your fingerprint or your passcode or your face to unlock it so they can unlock it right. That's about 

[00:04:11] Son OF A GUN. 

[00:04:12] Yeah it cost about fifteen hundred bucks is what these places charge to unlock an iPhone. You have to, frequently, a police department will ship the iPhone over to Israel where this company is located. And then the company will go ahead and pull everything off of the iPhone and encrypt it and send it back to the police department. But what what's happening right now is interesting Jim because the way they unlock the iPhone is they fog in the software. It's like a loophole right think of a loophole with the law and there's a lot of discussion about that. Now in the news with the loophole of the of the illegal immigrants coming up here to the U.S. bring in a young child and getting you know preferential treatment because of that. So, think of it as sort of a loophole that there are bugs in the iPhone that allow them to get in but there's also some features. So, for instance your iPhone, let's say your iPhone isn't working quite right, You get to the appointment for the genius bar, you're go in. 

[00:05:21] Yeah. I hate that name.

[00:05:25] And you talk to the geniuses behind the Genius Bar and they'll plug your iPhone in. And there are special facilities on that iPhone connector that allow them to get into your iPhone to reset it to do some fishing around to see what's going on with your iPhone. And so, what's happening is these companies like, Cellebrite and Greyshift, they've been using that diagnostic port on your iPhone to break into apps and yeah that's where the problem's been coming from. And so what Apple has started doing here and has been in the beta releases is they are basically going to close that door and they're going to make it so that if the iPhone has not been unlocked within the last hour that port will not come on it'll be unusable.

[00:06:23] That's good. That's pretty good. 

[00:06:26] Yeah. So, the question is you know bottom line do you want to head right. How far should the police be able to go with a warrant. But there's one other angle to this that most people haven't talked about. That's a little surprising and that is how about you are an employer and you are providing an iPhones or iPads to your employees and you know you're talking about a thousand dollar device, plus the company information that might be on that device because businesses also use the iPhone unlockers and unlocker companies so, that they can now front employee leaves and just you know scramble their passcode and takes off and refuses to give it to them. So, they can then take, that phone they can ship it to one of these companies and get it on lock get all of that data off that and get the iPhone back, so they can reuse it. So, this fix that Apple is going to be making to the iPhone or at least they're planning on releasing this soon. That fix will break the law enforcement access to the data on the iPhone. It'll break employer access to data on the iPhone and iPad. 

[00:07:41] And the IOS device. Yeah. And I I don't know do you go back to just good old regular policing. How would you capture Strzok and Page those two FBI employees? How would you catch them, if they had been using something like Signal, which is designed to communicate securely there's no records kept of it and the messages just disappear. And if you can't get into their devices how do you make that work. So, this is going to be a big problem for law enforcement coming forward. And I've talked to FBI special agents a little bit about this and they're concerned as well. And it's not just that it makes their job easier it makes their job possible because Apple is doing such a good job with his security on the phones. And we're just talking about iPhone's, because of the Android devices most of them can be broken into easily, frankly mainly because people just aren't updating their Android devices it's just too difficult to do so huge, huge, discussions all this when this software comes out in a few weeks. 

[00:08:55] All right so we know this. There's more information on this, and this is just an example of the stuff that you get from Craig Peterson for free. There's no obligation he doesn't try to sell you anything. He doesn't hack you and he provides this information. He sends me a weekly breakdown of all the big tech stories. So, if you want to get one you can get it. There's no gimmick here is just free. 

[00:09:24] You text my name Jim to this number 8 5 5 3 8 5 55 63 that's 8 5 5 3 8 5 55 53 with any question that you might have or just Jim I'll keep you up to date and you'll get this information, standard data and tax rates apply, of course. 

[00:09:46] But it's a great service to have and if there's ever a big international hack or some information that you need right away he sends it to you and he sends it to you without all the hype. Craig, thank you so much, buddy we'll talk to you next week. 

[00:10:01] Hey thanks Jim. Take care. 

[00:10:03] Already Bye Bye, everybody.

[00:10:05] Well that's it for today. Hopefully you're going to have a great day and a lot to remember there. Don't forget to sign up if you haven't already to get my weekly show notes. I got some really cool stuff coming so keep an ear out for that too. Take care. Thanks again. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 18, 2018

This morning Craig and Jack had a very short discussion about the Tesla Car that caught fire and the safety of litium batteries.

----

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/19/2018

Tesla Car Fire and Lithium Ion Battery Safety

Transcript:

[00:00:00] Hi guys. Craig Peterson here, this morning I talked a little bit about the Tesla, the guest who was on the radio before me didn't quite get it right. I guess what else is new, right. Not understanding some of the technology, and there's one thing I forgot to mention that I will add to the end of this recording. So here we go with Jack Heath.

[00:00:26] Great Transition To Craig Peterson our tech talk guy his show airs on the weekends Tech Talk with Craig Peterson. You know I thought of you, because you and I have talked a little about a good light Ford f 150 and all the people that talk about gas and oil and all that stuff is the problem. These batteries tell you and how they're discarded probably are bigger, bigger, threat to the environment than gas and oil. 

[00:00:49] Good morning. You're absolutely right about that when we're talking about the Tesla, we're talking about a car that relies entirely on batteries. It is using batteries that, frankly, are not only dangerous when they catch on fire, but if you're in a car accident. Do you remember the issues that we've seen in phones, as well as these cars, is that those particular batteries, they tend to have a lot of power stored in them, so they can deliver the power very quickly, and that means they're going to heat up a lot, which is a real problem, frankly. When you mention like the F 150 Ford, compared to something like a Prius even the Prius is only good for about a hundred thousand miles before they recommend you replace the batteries that are in there. 

[00:01:39] The Tesla has the same sort of a problem and creating these batteries is very, very, dangerous. 

[00:01:46] There are all kinds of chemical processes, so you're right. When you're talking about what is greener, today anyways, the greenest cars out there, are the cars or trucks that will last 200- 300 thousand miles and that burns gas and they tend to also be the safest still. Remember, I spent 10 years in an emergency medical services responding to the scene of one of these vehicles, can be very dangerous for the occupants and the rescuers, especially if you have to cut into the car.

[00:02:23] Interesting. Great stuff. Craig Peterson, check him out. Craig Peterson with an O.N. on Peterson dot com. Thanks Craig. 

[00:02:30] Ok, so here's the part I did not mention, and that's what happens when they try and cram me in to a very short segment this morning. That's one of the shortest I've been on, it was only about a two-minute hit on the radio. Just because there's a bunch of stations, Jack doesn't mean I shouldn't get more time, anyways. Here's what I didn't mention, and we were talking about Tesla. We're talking about the safety of the vehicles and in reality, the crash tests have shown the Tesla to be one of the safest cars out there. In fact, it even broke some of the testing equipment they had to change the nature of the test so that they could really kind of score Tesla at all, frankly. So, it's not that Tesla's aren't safe because they are, frankly, they tend to be very safe. We were talking specifically about the batteries, and the safety of the batteries. Now, you might remember if you listen to my radio show on the weekends or maybe on the podcast, you might remember that the guy that invented the lithium ion batteries out of the University of Texas. He's, what is he now in his late in the 70’s, I think, he might even be in his 80’s. He's come up with a new type of battery, a lithium glass battery that can be charged, like that. You know a matter of a couple of minutes, and that does not have these discharge problems that the lithium ion batteries have, and that frankly is where all of these problems are stemming from, is the rapid discharge. Then things heat up they catch on fire and then you've got a lithium fire which could be just totally, totally, nasty. 

[00:04:08] So, hopefully that technology progression progresses along, and of course I'll keep everybody up to date on that as well. And we've got a few other things brewing that we're going to be announcing, fairly soon, so keep an eye out some more insider stuff. We're almost done with that site. We have some people we've given away free insider memberships to. And that gives them access to some of the special reports and some of the other things that we are doing here on the radio show. And then we're putting together some, basically a kind of a threat matrix, right. Some threat and analysis when it comes to security, for people who are in business. People in business who are responsible for the security, and even a little bit of training, which is now required by law and regulation. Depending on the industry you're in, you may have a huge requirement. If you’re in a normal business, you realize you actually do have a requirement for security training for your people. So, we're going to be doing some of that as well. So, keep an eye out for that, and have a great day we'll be back with you tomorrow. Bye-Bye.

 

---

Related Articles:

Tesla goes up in Flames in California

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at: 

www.twitter.com/craigpeterson 

For questions, call or text:

855-385-5553

 

Jun 16, 2018

 Problems with Mac OS if you're a Mac user. Craig explains an eleven-year-long vulnerability and why it has not been fixed.

DNA data breaches.  Craig discusses why it is such a big deal and why we have to be worried about it.

Cryptocurrency is in the news again.  Craig tells you why this blows his mind.

Police can unlock iPhones. (Well they brute force attack it -- so if you have a 15 number password it will take them over 200 years)

Hey, you heard the police can unlock iPhone's right. Well looks like there's a new feature that might stop them.

Also, ambulance chasers they've been around a long time. Well, we're going to talk about a new type a digital ambulance chasers.

Do you drive a BMW car? They've been found to have more than a dozen security flaws.

Craig is putting up a new membership site (Yes, it is free you just have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/16/2018

Apple Macintosh 11-year-old security hole and Apple could kill police iPhone unlockers.

Craig Peterson:[00:00:00] Hi everybody.

[00:00:01] Craig Peterson here. Of course we're going to be talking about technology its impact on us what we'll be talking about security. We've got some great information here including some problems with Mac OS if you're a Mac user. This is an 11 year long vulnerability that just hasn't been fixed yet. We're going to talk about DNA data breaches I don't know if you've heard of these before but it's becoming a big thing and it's something we need to think about. We've got a cryptocurrency story this week that just blows my mind. Hey you heard the police can unlock iPhone's right. Well looks like there's a new feature that might stop that an ambulance chasers they've been around a long time. Well we're going to talk about a new type a digital ambulance chasers and BMW cars. They've been found to have more than a dozen security flaws. 

[00:00:54] You know there's probably a lot more. Don't worry. Here we go. You're listening to Craig Peterson on the air now for going on 20 years. We've got tens of millions of podcasts downloads and hopefully we'll be able to give you a couple of things today that not only educate you, but I think you'll find surprising. So here we go. 

[00:01:17] Well first off, we're going to talk about this hack. This is a problem that is only in Mac OS. Now we talk a lot about problems that only exist in the Windows world of course. The Android world which has been a real cesspool when it comes to security breaches and the main reason for that as we've discussed before is that people are not updating their Android devices and many times that's because you just can't update the android device, right. You buy them because they're cheap. And even if there expensive there are thousands of variations of Android because of the device drivers they're all using different components and sometimes the exact same model phone from the exact same manufacturer will have different versions of hardware in them or even completely different hardware. So, it's really difficult for these companies that are manufacturing the phones and the carriers that are further modifying the phones to keep everything up to date. Think about that, if you're Google, and you are making an operating system and you’re selling it and you’re getting blamed for all of these Android problems and in reality, the problem is there are a bunch of people putting their fingers into your code messing around with it in order to make it compatible for their customers right. So, think about that for a sec you’ve got the android device so you are shipping it now to some door operating systems are you shipping now to some device maker that’s going to take your operating system and put it on their device well the devices all vary in the CPU in the speed that think about the displays they’re all different. 

[00:03:01] The way you touch them to interact is actually different. Those are all different device drivers. You also have, of course, the cellular data modem that might be in there to get data you’ve got the Wi-Fi chipsets. There’s a whole ton of pieces and they’re all buying them from more or less the same manufacturers depending on what it is but they’re having to modify it. So now your Google operating system your Android is being modified by the device manufacturer who now is going to ship it off to your carrier. So you have a contract with who with Verizon with T-Mobile, Sprint whoever it might be. So, they’re going to want to get their fingers into it too. They’ll do a few little things they might be using specific band frequencies, for instance, for your internet. And in fact, that’s true for Wi-Fi as well because depending on where you are in the world there are different frequencies sets different bands for the Wi-Fi.

[00:03:57] So now you’ve got the manufacturer, who has modified it, you've now got the ISP or the phone provider the carrier who's modifying that device and shipping it out. Many times, You'll also find that the people who make the component hardware for the device will also be modifying that device before they ship it out. So, the list kind of goes on and on. The people who have the fingers in it. So, now your Google, you found a security problem. Now what are you going to do about that security problem. How are you going to get your code out there, while you're going to make effects or patch and you're going to send it to the device manufacturer. Now the device manufacturer says you know we haven't sold that phone and years. OK. So, we've got other things we have to do. We have our people now working on the next release of the next greatest phone. So, they're not going to make an update for your phone. And the same thing with the component manufacturers they're not going to have an update for some old chip that they manufactured years ago. And even if it's a fairly recent chip and they do provide an update, it's got to go back to the manufacturer who now has to integrate it and then distribute the changes, right. And then it has to go back to the carrier who sold you the device who no longer has a relationship with you potentially right you might switch carriers. How are they going to get their changes in how they're going to get out to you? So, it's very, very, difficult in some cases. Google can send out patches directly to you. You can get them. You know you've got to Google Play store and you can get various types of updates and stuff from there directly from Google. But it's a real, big problem and that's one of the biggest problems we have right now in security. Certainly, the biggest problem in mobile security now. Apple has been known to be rather safe and secure because it was designed that way from the start. 

[00:05:55] Remember the whole Internet thing started in government and in academia and the big guy out there in academia who had a lot of operating system technology was AT&T and they had something called Unix and Unix was designed to be able to run on all of the different hardware AT&T had and that's a lot different hardware. Think about the big old phone companies. They had old machines new machines they had machines that were huge main data processors they had other machines that were teeny tiny sitting right by a Pole pack then couldn't really put one of them on a pole very easily, but you know you could it happened.

[00:06:35] And so they had this operating system called Unix that worked really well. While UC Berkeley University of California Berkeley took some of those concepts, licensed some of that software the version 7 Unix, back in the day, and they ran with it and they started adding in more ability to have networking. Now think about this for a minute, in your school system our university system. You also have the same types of problems AT&T has had plus a few more because you also have a lot of pieces of equipment that you have to make and modify maintain

[00:07:13] Run different software on and at the same time. Now you have a new problem which is you have all these students that want to hack in and change their grades, right and do all of the stuff you might not want them to do. 

[00:07:26] So, it becomes a little bit of a problem. So, guess what. AT&T and UC Berkeley particularly Berkeley they built in a lot of security. They designed the Internet, basically. And because of that Internet implementation let's put it that way they didn't really design it, but they certainly implemented it but because of that implementation and its security you now had an operating system called Unix back in the day that was very secure it was ready to go. And then you had a Torval, come along and he went there and made his own Unix lookalike and called it Linux and it doesn't have all of the same safety features. But it has much of the same thinking that was there in the original Unix’s of the world. So, fast forward to Apple, Apple had its operating system that was frankly kind of a toy it ran on some of the Mac’s number of those little boxy ones way back when. But it wasn't a great operating system and it wasn't something that could really build on to a lot of good things with it had its advantages. I can already hear you. Here come the text messages right. You know already here you're talking about it but in reality, they needed something a lot better.

[00:08:42] And so that's what they did. They took Unix.

[00:08:45] In fact it looks like what they did is it took free BSD looking down on the kernel and they were able to put their windowing interface on top of it. And you know there's times actually to a couple of other companies. Steve Jobs had some involvement with but. We're trying to make this simple right. This is not a history of Apple computers. What I'm trying to explain why they are more secure than Windows and so they took all of this wonderful code that was designed to be secure. They put a window in interface on it and out they go. They had a very good very productive operating system. Well one of the things that they did to make it more secure and they added on was that the applications became signed applications. So, a developer would sign an application and you knew now that the developer had basically approved it said it was good and Apple would sign them so that you knew. Yes, indeed this was reviewed by Apple and it was something you should pay attention to. You don't have to worry about any more of the machine automatically just accept the software, and if there are problems of course the machine will pop up a little warning saying well the software is not signed I don't recognize it and unless you change some settings it will not lead to install that software. While there is a bit of a problem here because Apple, remember they changed their processors. Now they're using Intel processors. They may actually be switching processors again within the next year or two, but they changed to Intel processors from the power PC stuff and I love PowerPC stuff. 

[00:10:26] It was really, really, good but they changed their processors, so they had to have these universal wineries so developers and Apple themselves or write software that would run on the Old Power PC architecture or it would run on the new Intel architecture. How could it do that? Well, that actually kept both binary as both programs in one program. So, the operating system would start to run the program it would launch a program it would look at it and say Oh, okay I'm a PowerPC I am going around the PowerPC code or Intel so I'm going around the Intel code and that makes sense to you. It was actually a great little idea and it worked really well. The problem that has surfaced now is that for the last 11 years since they put this whole thing in place we've had a we've had a real problem and that problem is that Apple apparently was only checking the very first binary for a signature. Isn't that a problem. It sounds like a problem to you. So, all a hacker had to do was put in a binary into you know into this little package and that binary just had to contain the one signed piece of code. That's all it needed was one signed piece of code and off it went to and the rest of the code could actually be nasty, nasty, nasty, so keep an eye out. Don't install software that is that you don't you don't know where exactly where it came from because it could end up biting you and in a very big way the signature check bypasses. These are these are very big deal so watch out for that 

[00:12:16] This next one is very controversial frankly. What should you be able to do, if you were the police or the FBI, should you be able to monitor someone's private communications. Well we know the Constitution lets us be safe right to keep our private papers and other things. And I think that all makes a whole lot of sense. But when we're talking about the digital world should the government have a back door. Now this debate has raged on for a very, very, long time. I mean crazy, long time. Certainly, my entire career in computers and technology with encryption. So, the police right now have a way to unlock iPhones and not all of the police departments have this. But there's some technology that they can license, and they can buy a little box, they can ship an iPhone overseas and for as little as 15 hundred bucks they can get the contents of the iPhone. And I can see absolutely see how on in some cases on occasion they could catch criminals that way they could stop something really nasty like a terrorist attack right. And you can probably see the same sorts of things. Well, this is an interesting problem because you have civil libertarians on one side saying no they should not have access to them. 

[00:13:46] But, they kind of do, and the way they have access to your iPhone right now is because of a bug, if you will, Right. A loophole, maybe is a better word, and it’s in the iPhone hardware and software that all iPhone’s have. Basically, it’s a USB connector on them, and that connector, when connected up, can be used to start a diagnostic session with the phone. That’s what they use at the Genius Bar, in order to work on your phone to fix it, Right. They use that little port whether it's the old 30-pin or whether it's the brand-new connectors or the new ones apparently next year are going to be USB-C based. So, they use that in order to get into your phone and check it out and fix things. Well there is a problem here. There is a company called Grayshift, and you know they've been out there. They have a product called Greykey and there is an Israeli firm called Cellebrite. They've been using that port on your iPhone in order to break into the iPhone. Now back in the day it was pretty easy to break into nowadays it's really nowhere near as easy. So, what are they going to do.

[00:15:04] Well, Apple in its iOS beta releases since 11.3 has had a little feature that's built into it and that feature is that when you connected to a USB accessory the phone has to have been unlocked within the last 60 minutes. So, if you go into the Apple store for instance and they want to run some diagnostics they can't just take over your phone anymore. You now have to log into your phone and once you're on your phone then they can plug into that port right now, it doesn't have to be unlocked at the time you give it to, them but it will have to have been unlocked within the last hour. Now that means that this is probably going to break GrayShift's products that are being used by police departments, worldwide, in order to hack into your iPhone. You know is that a bad thing or is that a good thing. You know I work on security and I've worked with the FBI on hacking and I run the FBI’s webinars to keep the Infragard people up to date. Right. The Infragard webinars. So, how does this impact them while I think it might impact them in a very, very, big way. This might kill those products, entirely, unless the company comes out with products that are literally there in the police car or are there in the FBI vehicle that allows them to grab the phone from the bad guy and hope for the suspect let's say, and hope that that phone has been unlocked within the last hour and then they're off and running. 

[00:16:51] So, this one-hour timeline a major change from earlier tests where the time limit was a one-week period. 

[00:16:59] But it is significant because Grayshift, had been advising its customers to simply make sure they unlock the iPhone soon after obtaining it. And that's according to some documents that motherboard was reporting on earlier this year. So, it's easy to do within a one- week time limit harder to do with just an hour. This also means to you, that if your phone gets messed up you're not going to have as many options when it comes to having the Apple guys or your tech people go ahead and help fix your phone, Right. So, don't lose that passcode, right. Important safety to remember. As I've been talking I've had some text messages come in. People are wondering here IOS not IOS users but Mac users OK. They're wondering about that 11-year history. 

[00:17:52] So just to make it clear for those who might have missed a little bit of it and I'm going to delve into it just slightly more. Right now.

[00:18:00] There are the vulnerability is primarily at third party software here that we're talking about. There are at least eight security tools that are known to have this vulnerability and it does not affect IOS. This is only your macs and one of the tools that does affect is one that I use, every day is called Little Snitch firewall and it's a great piece of software, but it also gets fooled. So, this universal file is also known as a FAT problem does exist, but it really only exists on the Apple Macintosh computers. And I'm sure it'll be fixed pretty soon. All of these developers now are aware of the problem and they're going to be fixing it, frankly. This next one here. This is kind of, I'm kind of this is this isn't a weird category I guess as a way to put this. We've had ambulance chasers probably since the days of lawyers, right. Since the very first lawyer anyone ever had these guys and gals that are out there looking for people who have been injured and then trying to help protect their rights and help them claim some money against whoever might have wronged them. All right, that makes sense I can see that. Well this is a little different because now you have a smartphone with you when you go online. That smartphone is showing new advertisements right. And your smartphone also has built into it a GPS. So, your smartphone knows where it is. How many of you can figure out where I'm going with all of this. 

[00:19:47] OK, well many people who are in emergency rooms or chiropractor's offices or pain clinics in the Philadelphia area or their area excuse me maybe start noticing their phones. The kind of messages that are directed at you because you're an emergency room or to pain clinic, OK. You're only getting fed the ad because somebody knows that you are in an emergency room. So, it's kind of like an attorney putting a digital kiosk inside of an emergency room when you get on the phone you're going to start seeing ads from Attorneys. So, this is kind of interesting. It's grabbing what's known as a phone I.D. from Wi-Fi cell data or an app using GPS. Yes, and the ads can show up for more than a month and on multiple of your devices, as well. Now the Massachusetts Attorney General, Maura Healey, said here's a quote from her “private medical information should not be exploited in this way especially when it's gathered secretly without a consumer's knowledge without consent as well”. OK so, Healey's office the first one in the country to go after geo-fencing technology that's being used to catch people while they are seeking care. So, this is going to be really kind of interesting, Mass also reached a deal last year with a Massachusetts based digital advertising firm that was sending advertisements from a Christian pregnancy counseling and adoption agency to people who entered Planned Parenthood clinics. So, when patients go to the clinics they cross a digital fence as these GPS fences you've heard of them, I use them all the time myself personally to remind me to pick up stuff when I’m at store and they'll soon get an advertisement such as you have choices click here for pregnancy help. 

[00:21:57] So, interesting now in Mass they're saying that those ads violate their consumer protection laws. Other states probably don't have the same thing. OK, we can go for a real quick roundup here now. Couple of things I want to get to before the show ends. We've all heard about AI or artificial intelligence and what it's going to be doing. Well MIT fed data from Reddit which is an online bulletin board into an artificial intelligence and that this is just kind of nuts. You know if you have ever seen EXMachina, It is a great movie but our robot even very, very, interesting they ended up calling this AI Norman. As Norman Bates. Because all he could think of was murder, OK. It's crazy they fed it those inkblots right. The Raw Shark Texts and it was just, murder, murder, murder. Kind of crazy cryptocurrency trading app, Taylor, says all other funds have been stolen in a cyber attack. If you didn't need yet another reason not to get involved with these cryptocurrencies. And speaking of that Cayman Island startup has just raised four billion dollars without any product. And what were they raising it with. You guessed it this is they have a blockchain platforms called block 1. 

[00:23:32] It doesn't have a product, Live yet. You should see a picture of this guy. I'll have to make sure it's on my website. But, he looks like he's 10 years old that was running this thing. It's not a great time to be investing. In fact, most of the blockchain currencies are really losing a lot of their value. BMW car computer systems have been found to contain at least 14 separate flaws. This is according to a cybersecurity lab out of China. They allowed hackers take at least partial control of the affected vehicles, and BMW is saying, that that does not allow them to control any of the driving systems in the car. So, that's probably good news. And we had a DNA data breach. This is crazy. The DNA testing service, My Heritage revealed that hackers had breached 92 million, of its accounts. Hard to say exactly what they got, But this is bad news because that data is there forever, and it is not like a password that you can change your DNA is your DNA. Have a lot more podcasting make sure you check that out online. You can find it all at Craig Peterson dot com SUBSCRIBE LEAVE A COMMENT Craig Peterson dot com slash iTunes. I've been doing pretty much daily podcasts. Well until next week we'll see you in the online space I'll make sure I send out any alerts if there are known major problems during the week. Take care and I’ll Talk to you, later, Bye, Bye.

---

Related articles:

For almost 11 years, hackers could easily bypass 3rd-party macOS signature checks

No one is updating their Android devices, new data shows

Apple Is Testing a Feature That Could Kill Police iPhone Unlockers

Digital Ambulance Chasers? Law Firms Send Ads To Patients’ Phones Inside ERs

Cryptocurrency trading app Taylor says all funds have been stolen in a cyber attack.

MIT fed an AI data from Reddit, and now it only thinks about murder

A blockchain start-up just raised $4 billion without a live product

BMW cars found to contain more than a dozen flaws

Why a DNA data breach is much worse than a credit card leak

New asteroid gold rush ‘could earn everyone on Earth £75 billion’

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 13, 2018

A larger problem that first thought -- Yes its the Routers.  Craig goes through with Ken and Matt how big this router problem really is, why people are not taking it seriously and why they should, and what to do. 

Maine Elections were held yesterday.  Craig, Ken and Matt discuss technology and voting and hacking. 

USBs are not necessarily safe.  Craig talks with Ken and Matt about the different tactics that are being used to infect your computer. 

Find out more on CraigPeterson.com

Related Articles:

That Russian malware that infected over 500,000 devices is even worse than we thought

IBM bans the use of removable storage by employees

The FBI Router Warning - What To Do

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/13/2018

Routers, Hacking, Electronic Voting, & USB Drives

 

[00:00:00] All things technology, tech guru, Craig Peterson is on right now on the WGAN Morning News With Ken and Matt.

[00:00:17] All right we're back again at 738 on the WGAN Morning News With Ken and Matt, Craig Peterson is with us as usual at 738 on Wednesday and Craig, How are you this morning Hey, Doing good man How are you guys doing great and welcome back from North Korea. 

[00:00:31] Craig was very successful you had. I want to congratulate you on that. And by the way thanks by the way. And while you were there did you have any discussions with Vladimir Putin about malware or what's going on with Malware now.

[00:00:45] This is this is absolutely crazy. First of all, you know President Trump and I had a great time, we had a little bit of a beer summit afterward but they didn't televise that. So, you guys might not be aware of it. But here's the issue we're having right now with the latest information all this is coming from the FBI working with Cisco Talos and the issue is that this whole malware thing on routers is worse than we thought it was initially. In fact, it's a whole lot worse. They're able to not only just basically take over your routers and look for information but they've developed a very powerful platform that they've been using to capture all kinds of banking information personal information. OK so we knew about that. But they can go to the next step. Now if you visit your site and they remove money from your account as you go through a pink site the next time it's capable of actually modifying the bank site's pages to show your correct balance before they stole all the money from you. So, this is going on and on. It's getting worse and worse and we're finding out more as time goes on. Now the thing to do. You know the FBI came out with a statement about rebooting your routers and now, it's gone a little further. 

[00:02:07] And what we really need to make sure happens, if you have some of these lower-end routers that are used in homes and are used in small businesses you need to do factory resets on these things and you need to upgrade the firmware that's in them because the bottom line you could be infected in a power cycle is not necessarily going to clean things up for you. Now if you have a router from for instance your cable company or one of these other providers Internet providers you're probably OK. We're talking about the types of routers that you might get if you go to a local Staples store or Wal-Mart etc. You might have ordered online. And so, people are kind of scrambling trying to figure it out. I'm surprised many people haven't done anything about this because it's a very real threat. We're talking about more than half a million devices that are being compromised. And, it's your personal information that your financial information. I think we have to be very careful of that. And you know that ties in. Also, we were talking about Russians and the hacking and the accusations about Russian collusion ties into yesterday. Of course yesterday we had a primary here in the state and there we were voting and we're using electronic voting machines and I know Matt you and Ken were talking about having a box sitting there that you could shove your ballot, right. 

[00:03:31] You know, yeah I'll take that 1920’s technology. No question, but having our paper ballot is ultimately very important because not just the Russians but many other entities I'd say are trying to get into some of our voting systems. We had an examination of what happened during the last presidential cycle here in 2016. And they found that Connecticut was the only state here in New England that actually had attacks against it that we know about. So being able to fill out a piece of a paper ticket into the machine have that machine count the vote is a very reasonable thing to do because that Matt can be audited you can spot audit and make sure that the counts pretty much match up right. I don't think anything is perfect don't think any person's perfect. But in this day and age where we've got Russia we've got China coming after us. I pick up a new client that had Chinese backdoors in their systems, this is a small military subcontractor. In this day and age, we've got to be cautious so I'm not so sure having that box there is the worst thing that could happen.

[00:04:45] Craig Peterson our tech guru joins us on Wednesdays at this time, just talking about the world of technology.

[00:04:51] Craig, this isn't the stuff you sent us every week, but I had to ask you about this Korean summit happens and of course journalists go to cover it because it is a historic occasion and the press kit for the for the people who went to this thing included a you know it's hot. It's hot in Singapore so they included a little USB fan and this USB fan you know you could plug into your computer and then it would use the electricity inside of it and activate the fan and it keeps it cool. I was sitting there typing away on your you know your journalistic laptop there.

[00:05:23] How stupid, how stupid, are reporters to plug that into their computer 

[00:05:26] I mean seriously, up here at a North Korean summit is a USB thing you can plug into your computer. Go ahead. It's fine. Don't worry about it. 

[00:05:36] Exactly. It is in this day and age it's absolutely crazy. And here's why you are Matt. You know this obviously but when you're plugging something into that USB Port you may just be using the power because you can. You can design things just actually only pull power leads to data leads in the USB connector are used. But if you plug something into your computer there's a very real possibility that something bad could happen. Now it can be anything from there. Our USB drives that are designed to destroy your computer physically, like to getting smoke to come out. OK. Be careful too when you're at an airport for instance or you at a coffee shop and you want to plug in your phone to that USB charger that's sitting there. Because again many of those have been hacked. So, you can plug it in thinking you get a great charge and in fact it is hacking your computer it's downloading malware there are all kinds of things that can be done. So yes, when in Singapore China or certainly North Korea they'll plug anything be into your devices. IBM just announced about two weeks ago that they are banning all removable devices from any of the computers that any of their employees have or use. So that's everything. So, think about that when you are thinking about the dangers of using a USP drive you don't know about. And we just had yet another case, Matt, where you must be drives who were shipped from the manufacturer in China and contained a virus right on them.

[00:07:19] We are don't know Craig Peterson, our tech guru by the way you can get a quick response to a company you want and get all of his great information. You know I always use Firefox and I changed Chrome because I think my daughter told me to and I hate it. I'm not sure I remember exactly why I hated it, but I got rid of it and went back to Firefox. Was there a preference for one over the other one?

[00:07:44] Yeah. Here's the problem that we're facing. It's a bit of a dilemma. First of all, if you're using a Microsoft product Windows product you definitely don't use an explorer anymore. There are a number of browsers that are certainly better, but the features that are present in websites, for instance, are available typically in chrome. Chrome has all these wonderful plugins you can put on it to do different things, in fact, it can be kind of an operating system in another cell. So, a lot of us have moved towards Chrome as fast. It was efficient, but the problem was chrome, of course, is the Google really is tracking pretty much everything. So, there is a little bit of a compromise and we're talking about Chrome there's a browser called Epic's BP. I see an epic version of Chrome that was taken by some guys over in India and had all of the tracking code removed from it. For the normal person, however, Firefox is presenting now a really good option for you so using Firefox first of all they've completely redesigned it. It is designed with security in mind security first design in fact and it is now fasters and chrome is which takes away that excuse and there are again many plugins available for it. So, I've taken to using more and more. I have Firefox in fact even on my iPhone and I have it on my iPad as well. It's a really great option for people. 

[00:09:21] All right Craig Peterson, our tech guru joins us every Wednesday this time to give us an eye on technology. CRAIG, We've, got a lot of election stuffed breakdowns we're going to go now. We will talk again next week sir.

[00:09:31] All right take care guys. By the way, I have a list of the bad routers that are going to be very hackable up on my Web site as well. Craig Peterson dot com and you can go in there you can look at the list. I've got instructions for how to reset and restore to factory restores on the routers etc.. All of that right there on my Web site.

[00:09:52] Awesome Thanks, Craig.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

 

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

 

For questions, call or text:

855-385-5553

Jun 12, 2018

5G is it Dangerous?  Craig and Jim discuss 5G and what it means and the differences in Radiation types.

More Bad News on Routers.  Craig tells Jim that this router problem may be even bigger than originally thought.

Find out more on CraigPeterson.com

Related Articles:

5G Wireless Service Is Coming, And So Are Health Concerns Over The Towers That Support It

That Russian malware that infected over 500,000 devices is even worse than we thought

The FBI Router Warning - What To Do

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/012/2018

5G Dangers? and New Warnings about Routers

Craig Peterson:[00:00:10] He's just out of the G7 summit. Oh my God. Our connection with him dropped. So we'll try to get Craig Peterson back.

[00:00:20] He's up in Ontario right now our good friend our tech guru who we kept waiting so long. Good Morning Craig Peterson. Hey listen. How was the G-7 summit did you? Did you enjoy it? 

[00:00:36] It was pretty good. You know it was it was nice to see Trump relax with Justin. We had a little beer summit afterward.

[00:00:45] Oh that's good. That's good. Listen, I know my good friend Craig Peterson some folks were asking about you this weekend, I was in an appearance and they said why does Craig say Peterson? And I said because that's how he pronounces his last name. I said because he's from Canada, you know, you get it. 

[00:01:05] But India. 

[00:01:07] Hey, you sent me some stuff this week. It's incredible, But I'm not going to be able to get to all of it. And at the end of this segment folks we're going to give you an 800 number and if you text my name Jim to that 800 number you'll get all the information. Plus, you'll be on Craig Peterson's list which is a good thing he won't sell you anything, he won't hack you, but he'll provide you with important information. 

[00:01:33] I know we're getting the 5G right. Ok, we need to get to that in order to have self-driving cars. We need that Wi-Fi technology. You put out some information that this may be hazardous to my health. How is 5G going to hurt people? Because right now we're all running around on 4G. 

[00:01:54] Yeah, there's a lot of people that are concerned about the radiation that comes from the cell phone and we've known that for a long time there are a couple areas in the country where there's no electromagnetic radiation allowed at all and that's because it is typically used for government testing. But the rest of us were exposed to it from everything from power lines through our cell phones. Now the 5G thing is interesting, because now in order 5G work. They have to put up about as many brandnew towers for the cell phones as they put up over the last 20-30 years. 

[00:02:36] Wow. 

[00:02:37] We're going to more than double the number of cell towers because these signals are going to be carrying much more data. They're going to be at a higher frequency typically. And what that means now is there is going to be even more of this radiation that's going to be coming from these towers. I don't want people to get all worried. Right. There's multiple types of radiation. You obviously you have sunlight that the type of radiation, you have the x-rays which is a different type, and than you have what you get from your cell phone. It's called non-ionizing radiation. This is not the stuff that's known to be harmful. It's thought by most people to not be a real big problem. Well, we're talking about the new 5G technology that's coming our way. There will be a lot more of it than we've ever seen before and we could end up with three to four times as many cell towers as we have right now. And it's going to give us basically broadband type Internet on all of our mobile devices like you were saying for cars et cetera. Yes, you could be driving down the road and not only listening to your iheartradio app but your car could be getting a whole new bunch of software. Download everything right there. Live streaming of all of your videos with the kids in the back. From a business standpoint that means that we'll have even more connected devices. We already have clothes that you can wear that have cell technology built into them Levi's introduced to jacket. All that in fact had Bluetooth and other types of technology in it. So, it's opened up a whole new world of possibilities. A lot of people are worried about the radiation that's going to come with that, although it's not to be harmful. 

[00:04:30] We're talking with our good friend Craig Peterson, and in just a minute we're going to give you a number you can you can text my name to, standard data and tax rates apply and get this information. So, I have seen. I know that. yes there are different types of radiation and as you explained it non-ionizing radiation is what basically what cell phones use, some of the European countries say they have evidence that it causes illness and can increase the risk of cancer. And yet there's just as many studies, Craig that show it doesn't that it has no impact. 

[00:05:10] Yeah, I was a keynote speaker last year at an annual board of directors meeting and I was approached by a lady afterwards who came up and asked, “What do you think about cancers, caused by cell phones? Yeah, And I said, “Well you know I have an advanced class amateur radio license, and so I've been around all kinds of radio waves for a lot of years, high powered ones as well”. And I said, “you know I've watched this fairly closely, but I don't think there's any convincing evidence for this yet and then she said “well, I have brain cancer and it's been attributed to me using cell phones almost all day long and my job.” Yeah, you know my jaw kind of dropped, and my heart went out to her. But yeah, there has been information come out from both sides. I tend to stick with the it's probably not causing any harm to pretty much anyone. There are people that think that the power lines caused all kinds of different types of problems, even the power lines in our houses. 

[00:06:18] Well, I mean people talk about having a digital alarm clock right next to your head on the nightstand and how can have the impact, although I kind of think that's been disproven and there has been a lot of research done about the power lines and everything else in a lot of that has been disproven.

[00:06:39] But the I guess we just haven't had cell phone technology n this type of radio frequency and it being so prevalent. I mean we've always had the radio frequency that's going out right now in AM and FM right now with our voices going through. But this other type and this 5G that you're talking about it's gonna be more prevalent it's going to be stronger. And what difference will it make, and I think I think it's an interesting read. I read it with an open mind. I think it's an interesting read. 

[00:07:16] Yeah it is it's something we need to keep an eye on it out definitely be an eye on that. And I've got one more thing.

[00:07:23] Sure I'll keep an eye on this Cisco Talos has come out with a whole investigation into this Russian the hack our routers in our homes and in our businesses. And you know people we've got to pay attention to this. This is future than we thought.

[00:07:42] It's huge is the word but I know that you said huge-er. It's always good when a really smart person says something like that. Huge.

[00:07:50] Yeah well it said it's the whole Trump era you know. And you know.

[00:07:57] So the but this is really, really, really, big and very, very, bad. So, make sure you reset your modem cell just power like. But put them back to factory default upgrade the software that's on them so that you're getting rid of this because this is way worse than we thought. They're collecting way more information being way more manipulative. Take the money from your bank account and then when you go to your bank site they actually modify the web pages as are in transit to make it look like your balance has not changed.

[00:08:32] Ok. This is true. All that's happening right now. Right.

[00:08:37] Our good friend tech talk guru Craig Peterson.

[00:08:42] If people text my name to this number 8 5 5 3 8 5 55 53 that's 8 5 5 3 8 5 5 5 5 3 you'll receive this information plus everything else you need.

[00:08:58] You'll be on the list. Craig Peterson sends out alerts when big things happen. He won't hack you, he won't send you annoying things, and he's here with us. Every Tuesday at this time Craig enjoy your business trip and always a pleasure to talk with you sir.

[00:09:17] Hey, thanks Jim. Take care. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 11, 2018

The Internet Trends Report.  Craig discusses some of the interesting things that you will discover in reading through this report.  

What's up with Android users doing updates and patches.  Craig tells you about a study that showed 90% of Android users do not update or patch their devices -- 90%  WOW!!

What Browser are you using?  Craig explains why Chrome is probably not your best choice if you are worried about privacy and security he tells you his choice for browsers.

Whats the matter with checking your phone everytime it beeps?  Listen in as Craig talks about a study that indicates that interruptions from our smartphone are affecting our brain chemistry.

Owning cryptocurrency Can affect your employment. Craig explains why the Federal Government is taking a long look at those who own Cryptocurrencies and have a security clearance for their jobs.

Autophagy and intermittent fasting.  Craig discusses a study by Nobel Prize winner Jason Phung and his research and how intermittent fasting has changed Craigs life.

Craig is putting up a new membership site (Yes, it is free you just have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/09/2018

Don't Use Android, Switch Browsers, and Smartphone Intrruptions

Craig Peterson: [00:00:00] Hi everybody, Craig Peterson here, With a fan going on me as it is a little hot today. So, I apologize for some of the background noise and I'm a little clogged up also, just allergic to something. Just this time of year. We're going to be talking today about a couple of things to do with cryptocurrency. We're going to get into addiction and I wanted to get to last week as well as Autophagy thing. This guy Dr. Jason Phung won a Nobel Prize a couple of years ago and I've got to tell you what he found has already changed my life, so I'll tell you about that as far as my health goes. And it was really quite surprising to me. Goodbye Chrome. When you talk about why, we've got at least one guy who is leaving chrome and where he's moving to. Smartphones, they are impacting our brain chemistry. Cannon, Oh my gosh. Remember the Cannon EOS, Well, they stopped making them in 2010 and they just ran out of inventory. So, that's it that's the end of an 80-year history of film cameras for Canon. Wow. And, I want to get to Mary Meeker. She's just amazing. She's got her new internet trends report out. I just printed it up. I printed four pages per sheet. This thing is huge it's hundreds of pages long. Almost 300 or I think little over 300 pages. So, we'll talk about what she's seeing for trends in the Internet and of course a whole lot more stick around. Here we go.

[00:01:49] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:59] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes appreciate what you can do with Forbes magazine for all these years. It's one of my first go to places you can't talk right now with the guys and gals. Siri right now by the director of technology we're joined right now by the CEO of E-bates Kevin Johnson on air for more than 15 years. Over 20 million downloads

[00:02:27] This is tech talk with Craig Peterson. 

[00:02:32] All right let's get going. Not a whole lot of time. It's hard trying to squeeze this into half an hour, it has been crazy. OK, so everybody should now have their Log-ins for my membership site everyone who asked who is having problems with this whole router update. This whole FBI thing. If you haven't received it let me know. But we were busy this week making sure we gave free account to the listeners who were having troubles who wanted to know more about the routers what models are affected maybe what they should do. We're going to be putting more of that together over the next week. Expect us to come out with something about. OK so now you can reboot is a router for two weeks now. So, what should you replace it with. And by the way you should have rebooted it twice if you do it once per week which is a minimum recommended by the FBI. So, we're putting together something I'm going to try and do a little probably not a Facebook Live, just so many of you guys just aren't listening aren't on Facebook because of frankly good reasons. So, we're probably going to do webinars or we'll do it similar to the last web before we had and kind of go through what your options are what you should do if your business how you can move away from these cheap home routers you don't want to use them now.

[00:04:03] It's just amazing to me that people are still doing it. So, if you still have questions about this or anything frankly you can always text me 8 5 5 3 8 5 fifty five fifty three to get a hold of me. Well, let's get into Mary Meeker's report. She comes out with this Internet trend report every year and the market pays major attention to her. Kleiner Perkins is the company that she works for. And they've got a lot of very cool data in this it just came out the end of May in fact May 30th. So, she is looking at the trends overall of course growth is continuing but is continuing to slow. Now I'm looking at the stats here comparing smartphone unit shipments Android, iOS, and other and year to year growth. And basically, we have leveled out here with about one and a half billion smartphones a year. Now think about that if you're a business person or even if you're running the local soccer teams Web site you've got to seriously consider what people are watching what they're looking at. And another statistic that's in here is that now more than 50 percent of the Internet users are using these smartphone devices. 

[00:05:23] It's just incredible. So, this year we had 7 percent growth versus 12 percent growth last year and our global Internet users we are now more than 50 per cent saturated. In other words, 50 more than 50 percent of every person worldwide has access to the Internet. Now that's a pretty big number. What that means is from a growth standpoint maintaining growth is going to be difficult, but growth still does remain solid. We've got more innovation more competition frankly, you can find all of this report I got it posted a link to it anyways up on my Web site at CraigPeterson.com, WI-FI adoption online payment. This thing goes on and on. She's done a great job here looking to better experience for consumers and video music. The news feeds it is just amazing. So something you should look at if you are an Internet marketer if you are doing anything Internet frankly so have a look at that. Mary Meeker. OK so let's talk about some of these devices. Let's talk about the Android smart devices because here's some statistics that I thought were probably happening and now it's getting confirmed. Yes indeed. Android devices turned out and this is a great article on cyber scoop by Patrick O'Neill.

[00:06:59] Turns out, no one is updating their Android devices, and what have I said about Android for a long time. One is they are more susceptible to hacking than iOS is for quite a number of reasons. The hardware in Android is not as good as the hardware you're going to find in an iPhone. But in addition to that, the biggest problem people have with Android devices is keeping them up to date, most of the manufacturers and remember we're not just talking about the guys that make the phone. We're talking about the companies that are using the phone and are distributing them that are selling them to end users because each one of these carriers is going to have some changes at least to the software in those devices. So, what it's time for a new update when Google comes out with a new version of Android. It might not ever, ever, be available for your Android device. So, when you go back to the standard recommendation of patch early and patch often. You can do it even if you want to. OK. Duel security just came out with the stats here. They released a study about a week ago that found that 90 per cent, nine zero percent of over 10 million Android devices across the U.S. and Western Europe are running outdated versions of Android, 90 percent. And remember New versions of Android aren't just giving you some new features. They aren't just making things cooler, looking nicer. Right. With all those wonderful new little icons and logos and things. No, they are closing security holes, 90 percent of devices not patched up to date is a significant gap. So, you take my advice if you can afford an iPhone you're wrong because if you can afford an android device you can afford an iPhone.

[00:09:11] Now you don't have to buy the latest, greatest iPhone right. This iPhone 10 that cost a thousand or more dollars depending on what you get on it. You don't have to get that device. All you have to do is get maybe an iPhone 6S. For instance, there are still for sale 6 s plus maybe. Still for sale and now they're cheap. They're about the same price as an Android phone. Many of the carriers if you up your contract with them they will just go ahead and flat out give you one of these older phones and the iPhone's are easy, peasy, to keep up to date. Apple puts out security patches for the iPhone for years. And years. Unlike many of the Android devices and so, the updates you get an android often they're kind of haphazard, if you even get them at all and attackers are taking advantage of this. We've got new malware brand new malware popping up that preys on old Android software and hardware. OK. So, Apple is dolling out patches to the App Store. There just isn't the same thing for Google Play and that's because there isn't just one Android phone. There are more than 1000 models. Compare that to Apple that only has to deal with a few dozen. And you can begin to understand why Apple can keep their software patched up and Google cannot, remember this isn't really Google's problem. This is really a problem of the carriers and the phone manufacturers not taking the Google updates and being able to get them out to you. 

[00:11:00] OK, now Duo also found that computers are often left behind and Wes's operating systems 74 percent of Macs and 85 percent of Chrome OS machines are not running the latest software. And that's a travesty. Now it's not so bad necessarily with Apple because even if you're not running the latest operating system they provide security patches for the last couple of operating systems, OK, so it's not too, too, bad. But when we’re talking about Google's chromos it's a bit of a problem. It's really weird too when you look at the ChromeOS from Google which is on these inexpensive typically inexpensive laptops. These machines auto update on every restart. So, it's really weird but chromos is widely hair hailed frankly as one of the most secure really computing environments out there today. So, some of these stats may not tell the whole story but again if you can make sure you ditch your Android device and ditch it quick and get yourself an iPhone or an iPad. Don't worry about the latest model. You don't need it to stay up to date. You need something recent. If you can afford an iPhone 7 or 8 or 10 go for it. But if all you can afford is that six that are still supported I would I would not get anything older than a 6S which is kind of Apple does this half and half right. They do a six and then come out sometime later with a success then they'll do just the seven then the seven-S OK, so try and get the second half of the six that's S series whether it be the big one or the small one. 

[00:12:54] All right so let's talk about Chrome Google Chrome. You know I've been on Google earlier for Android now and again remember it's not so much Google it's the people that are using the Android software that are making the phones that are selling you the phones etcetera. Right. So, we're not going to just completely blame Google for this one. 

[00:13:16] So or not I'm not trying to be nasty about it but here is the bottom line. We know Google has been really big over the years on monitoring everything that we have to say right. You know that it's pretty straightforward. I think pretty much everybody knows that. Right. I'm not crazy here. Google's business is keeping an eye on you and your business right. OK so we're on the same page here. If you are using google chrome and heck I use Google Chrome right. A lot of people do because there are great plugins for it works well. It's relatively fast. Well you know I don't. Are you sick of hearing about data privacy, now. But listen here, in the U.S. there's very little you can do about these big businesses keeping tabs on you. The big business is watching where you're going online what you're buying what you're interested in right. So, they can bring up this ad or that ad. This is a real problem. So how much information do you want to give Google. I was just looking today, at my information that Google holds. You can go in you can customize it you can say I don't want to track where I'm going. Where all my searches are, but there's a lot of options and I advise you to do that you should go in. You should customize your security settings. But the bottom line is they are going to record stuff whether you want them to or not. Now if you live in California you have some options, if you live in Europe you have some options, because of the laws that are there. 

[00:15:08] The rest of us have to look at this seriously and try and figure out what the right way to go is. We've got Cambridge Analytica the personal data of more than 50 million Americans are in their hand. The Obama campaign the personal information of over 1 billion people in their hands. We've watched companies shut down their European branches because of Europe's data privacy regulations. We've seen companies block Europeans from even gaining access to their Web sites. And when you look at the number of breaches that have happened over the last few years it's just going to make your head spin. So, what can you do. Well we've talked about a couple of things before. Duck Duck Go. That's my default search engine. And you just go to my Web site. CraigPeterson.com you can look it up right there. There's a search function right on there. But Duck Duck Go, doesn't keep any information on you. We have the founder of Epic. On our show here. Couple of years back and that's a browser epic browser dot com and it doesn't keep any information on you. But it is based on the Google Code. But they've gone in and they've removed some of those functions. Google has been there to track you. So, what should be the default browser for you. And it's a question only you can answer. You know I use Chrome for some things I use safari on my Mac for other things use Firefox frequently on my devices as well including on my smartphone. 

[00:16:56] I use Firefox, but Chrome has 60 percent of the browser market and Firefox has about 10. Now Firefox has a whole new version of their browser out there now. It is designed to be fast and it's designed to be secure from a. I'm not going to let people steal your information standpoint right. So basically. You want to ditch the browser that supporting a company that uses the data it's gathered about you to sell advertisements right as well as allowing companies to track your movements online. Because just how much privacy do you really think Google is going to give you. Now Firefox's parent company that's Mozilla. It's a nonprofit. They, in fact, I would say they're a little how what's the right word there. They're kind of crazy about some of the security and whether or not they should use this version of open source software open source software or not use it. Right. But they're saying over at Mozilla that the Firefox browser the new one is designed with privacy and convenience. In fact, they say right on the site that Firefox proves that privacy and convenience don't have to be mutually exclusive. And you know I agree, about that with them frankly. So, I agree that you shouldn't be sharing all of this data. I agree you shouldn't be using Chrome, in many cases right. I love having a fast browser and out of the box. Firefox has privacy turned on with Google Chrome you have to go in you have to know what you're doing and you have to configure it. 

[00:18:53] So, let's just leave it at that. OK. They've got this do not track tag that's available in Firefox now. Not every site is going to honor that. But they really are trying to get privacy and get it out to you. The end user. OK so let's move on to the next. We don't have much time here. We only have about five minutes left. I want to remind you that if you're still questioning your router and what you should be doing, I am going to be doing a webinar for you. So, you have to keep an eye out if you want to know about that. If you have any questions about your router it particularly if your business and you wonder if there is an alternative that isn't going to break the bank reach out to me I'm putting this stuff together it takes a little while. Hopefully within the next week I'll have that out and available and we'll be able to chat in the online space in a live webinar. Answer your questions. But until then you can just text me 8 5 5 3 8 5 fifty-five fifty-three we'll get you the information we've been for people that qualify that are trying to figure out what to do but haven't been able to will even send you. We'll create and send you your own log-in to my membership site for free so that you can get all of that information. So, we'll do that for you. 

[00:20:26] But you got to reach out 8 5 5 3 8 5 55 53. 

[00:20:31] Interesting study that came out and it was talking about constant interruptions from alerts and messages on your smartphone. And what's been interesting about this is they've been going further than just how long does it take you to get back into that train of thought. Have you noticed that when you get interrupted by anyone or anything it can take quite a while to get back to the original train of thought. I know with me when on trying to figure out something and I am sitting there working in particular. I'm trying to program or I'm trying to write something I have the stream of consciousness and someone interrupts me. I've lost a minimum of ten minutes sometimes more than half an hour to try and get back into that flow again interrupting me. To me is extremely painful. I just really hate it. So, when I saw this study I thought wow now this is interesting. Very, very, interesting. This is from CBS local affiliates an affiliate down in Philadelphia but they're talking about this whole thing Dr. Scott B. He's a psychologist over at Cleveland Clinic. He says there's this phenomenon they call switch cost that when there's an interruption we switch away from the task that we were at and then we have to come on back. We think it interrupts our efficiency with our brains by 40 percent. He says our nose is always getting off the grindstone. Then we have to reorient. Ourselves. And they're saying that when you do get that interrupt people get little surges of stress hormone, cortisol, which we've heard of before it causes the heart rate to jump. 

[00:22:14] Some people get sweaty hands and muscles can get tight. So, bottom line they're advising. Put that phone away. Right. If you're getting the interruptions I have mine on silent-mode most of the time I don't even know it's going off right. I check, I poll every once in a while when I need a little bit of a break. I check and see are there any messages any phone calls I have to return. So, he goes on to say initially when you start trying to stay away from technology or confine it you'll be a little uncomfortable. You'll have that fear of missing out or a little anxiety that something is getting past you. But with practice he says your brain can get used to it. So, break the habit. You don't have to carry that phone around with you all of the time. You don't have to be constantly checking. There are some symptoms to this. If you wake up in the morning the first thing you do is get on your phone. You've got a problem. If the last thing you do at night before you go to sleep is check your phone. You've got a problem. It really interesting article you find up on my Web site. And there have been many other articles that are similar to that. 

[00:23:25] You have to disconnect. Read a book even watch a little bit of TV. I promise I talk about Krypto we've only got about a minute left. We had two different things one if you have a security clearance, you might want to listen to this, because at this point they're saying that owning a cryptocurrency could cause you a problem if you're trying to get a security clearance and I can see why. Absolutely see why. And man, I wish we had time to do this. Maybe we should do kind of a whole show on this, but this guy won the Nobel Prize back and I think it was 2016. Dr. Jason Phung and he was talking about Autophagy where cells repair themselves in your body. Know what stops them from repairing themselves. Eating. So, what's interesting is if you know me you know I've been doing intermittent fasting. So, what Basically what he found and won a Nobel Prize for is if you do intermittent fasting you will be healthier. Really interesting article you'll find it at Craig Peterson dot com. There's a ton of information I've read five books on this so far just fascinating and personally I can say it works. Have any questions. Text me 8 5 5 3 8 5 55 53. Make sure we answer you and visit me online as well. Craig Peterson dot com have a great weekend. We'll be talking again soon. Bye-Bye.

---

Related articles:

That Russian malware that infected over 500,000 devices is even worse than we thought

US: Crypto Could Pose a Problem for Candidates Seeking Security Clearances

The FBI calls Chinese spies in the US a ‘whole of society threat’ — here’s how to protect yourself

HIPAA Security Rule Requires Physical Security of Equipment

IBM bans the use of removable storage by employees

5G Wireless Service Is Coming, And So Are Health Concerns Over The Towers That Support It

No one is updating their Android devices, new data shows

Bye, Chrome: Why I’m switching to Firefox and you should too

Constant Interruptions From Smartphone Can Impact Brain Chemistry, Scientists Say

Canon shutters 80-year history of film cameras

How to renew your body: Fasting and autophagy

 

Here’s Mary Meeker’s essential 2018 Internet Trends report

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 11, 2018

Your Identity is getting Stolen.  Jack and I discuss the rise of ID Theft,  and what Governor Chris Sununu did in regard Credit Freezes for NH Citizens.

When you get down to it, the problem is with the use of our Social Security Numbers.

Technology is working on a solution using Blockchain Technology but it is not there yet.

----

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/11/2018

Identity Theft, NH Law and Social Security Numbers

Transcript:

Craig Peterson:[00:00:00] Craig Peterson here, New Hampshire just passed a law, in fact, the governor signed it on Friday that provides you with the ability to get a free credit freeze if you are the subject of a data breach. Now this is interesting in fact the way it's set up it's actually the first in the nation and no one else has a law quite like this not going to have to dig into this little more New Hampshire kind of snuck that passed me without me knowing but that's what we talked about this morning with Jack Heath. The bottom line is your identity is getting stolen, and there's not a lot you can do about it. We get into social security numbers and what's the new technology that might stop all of this mess. You know there are things you can do to stop malware. But how about if the data is stolen and you have no control over it. It wasn't malware on your computer but it was some other company some big company or the government, in many cases. MAN OH MAN Here we go Jack.

[00:01:09] Joining us on the Autofair listener line for a tech talk update is Craig Peterson. His show airs on Saturdays on I Heart news talk stations. Craig Good morning. 

[00:01:18] Hey Good morning Jack. This whole thing about this bill that was passed and signed into law by John Sununu is really interesting. You know some of the specifics behind identity theft, but it's a really big deal. 

[00:01:32] Yep, you just you just gave his father credit for signing the bill. The governor is Chris Sununu 

[00:01:36] Yeah, yeah, Chris and his father would take the credit. 

[00:01:41] Sorry wrong Governor Sununu. 

[00:01:44] Tell us what you think about it. Tell us what your opinion of it is.

[00:01:48] Well, I haven't seen the bill and I'm sorry I've fallen down on that I wouldn't have looked that up and read the actual wording of the bill but when we're looking at identity theft, it is a huge deal. And it happened to me just a couple of weeks ago.

[00:02:04] You know we have this big Equifax breach last year which is a very big deal right. And I was part of that breach that happened Equifax. So, I started monitoring my credit report and monitoring the dark web and certainly out on the dark web. My information was there, yeah thanks Equifax and whomever else. But what happened, was, I got an alert on my credit saying my credit score has changed. So, I went online and I started to poke around a little bit and looked at my credit score and my credit report. Because I had signed up for a service where you pay a small amount monthly and it tells you when your credit report changes and lets you have a quick look at it. And, it doesn't bring your credit score down for doing it. Lo and behold there is a credit card that I do not have and that it had something like a 400 dollar balance on it.

[00:03:04] It was 60 days past to so I immediately knew. Wait a minute.

[00:03:11] I didn't open this credit card. That's not my balance right. And it was hurting my credit. And that's how I found out about it. 

[00:03:20] It’s a very simple easy way to tell all of that, but you often won’t get notified.

[00:03:26] No, well I wasn't notified, other than I have a credit report being in place, right.  Having a credit monitoring service is something everybody should do, anyway. But, yeah nobody told me. Hey, listen did you open this X Y Z credit card. Right. That just didn't happen. And when you get right down to the bottom of all of this, Jack, the big problem is our social security numbers right. They were guaranteed that they will never be used for anything other than Social Security. But now our Social Security number is used for everything from our taxes all the way through getting health insurance right. It's just this universal number.

[00:04:09] We don't have a good solution for what could replace this whole security number for with.

[00:04:16] There was an Eastern European country that tried something new. They tried to use some blockchain technology. There was another attempt where they had a card that was one of these smartcards kind like your credit card. If you look on it now it's got that little chip in it. And that little chip has an encrypted handshake it can do with the bank. And that helps to tell them it's really you. So, they came up with the special chip they put it on a card that uses a universal identity. And this is just last year. It wasn't two months before that whole system was hacked. So, you know bottom line here it's one thing to be able to know and hopefully recover your credit. In my case that was pretty simple because it was just a credit card. Someone wasn't pretending they were me. In the worst case, what happens is people use other people's identities when they have been arrested for a crime. And then, you're driving down the road, Jack, and you get pulled over and it's a felony stop and the police have you laying out in the middle of the road. They've got their guns drawn because you supposedly committed a crime right and you didn't. And, now you have to prove it wasn't you. Usually, you can do that without a lot of trouble. But, you're still the subject of a felony arrest. This whole thing is really, really, crazy and I think this move towards in NH to help to you know will help seniors and younger people both of those groups are the ones most likely to suffer the most.

[00:05:57] But, to make it so that you can start that road to recovery afterward, is a good thing. I think it will be years before we finally have a solution. Getting rid of a social security number moving toward something that's more secure by using some of these technologies are looking good but it is not there yet. 

[00:06:18] All right Craig, the other thing if you want to make a lot of boatload of money and I don't know the answer, real quickly. But the other thing is most people cannot remember, they might remember the last four numbers their social but, they can’t remember all these other names and passwords. Trust me they cannot. And someone's going to figure out something to do with that. Anyway, thank you, Craig.

[00:06:34] Hey you're welcome. There is a free report on Passwords and Password security available on my Web site. 

[00:06:38] Cool. I'll check it out.

---

Related Articles:

NH Governors Press Release on Senate Bill 303

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at: 

www.twitter.com/craigpeterson 

For questions, call or text:

855-385-5553

 

Jun 8, 2018

Today a short discussion on training brought to mind by a visit to Lake Placid Olympic downhill ski jumping training center.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/08/2018

The Importance of Training

Craig Peterson[00:00:01] Hi, Craig Peterson here. I don't know if you've seen my Facebook feed you might want to check it out. I'm up at the Olympic Training Center in Lake Placid and it's really kind of cool. This is where they do the training for the Winter Olympic ski jump competitions. And, of course, when I'm recording, it's summertime well, early summer. And you might wonder how they do it. I got some really cool video that I posted up on Facebook of them doing some training of the younger kids who are Olympic hopefuls. Of course, the team isn't assembled yet. They're not doing the training here, but these kids are certainly hopeful in their own teams and they're moving their way up there's a progression. It's really cool, to see and how they do it in the summer time which is they're using basically the same hills and some of the small hills covered with some kind of plastic type of surface on the top and then they ski jump into a pool. They’ve got some special devices in place to help make sure that they don't hit the water really hard to kind of break the surface tension. It's fun to see and it's fun to watch. So, you might want to check it out. Over on my Facebook page. The thing that comes to mind is something that again the FBI has been talking about and I've been talking about for years on my radio show when it comes to training the number one thing that most people and businesses just aren't paying attention to, when it comes to right down to security. 

: [00:01:30] These kids in the summertime doing winter ski jumps. They've got everything right. They've got their winter ski boots on. They've got the winter skis going down these hills that are typically used in the winter and they're recreating the conditions just like it would be if they were here in the wintertime except of course for the problems of being no snow right. So, they're doing the best they can. How much time are we taking, with our employees, when it comes to conducting training on the security front, keeping the black hats out and making sure that our employees are really getting white hat training. So that they know what the bad guys are going to do. So, they know how to derail it when the bad guys are trying to attack, because we're talking about a multibillion dollar industry where they're coming after us and sometimes they're just pretending they're good guys right there pretending they're wearing white hats and they get us to do things maybe we shouldn't do and our employees to do things that they shouldn't do either and we end up losing a whole lot of money because of it. And I don't know if you noticed in the news, I'll have to talk a little bit more about this, but you know that router hack that we talked about the one the Russians have been involved in. It turns out according to Cisco talos that Cisco is determined here that it was a lot worse than we originally thought. 

: [00:02:55] I mean a lot worse, they were breaking SSL encryption and using man in the middle attack techniques. As part of that, they were also faking Bank sites. So, you'd go to your bank they get your account information your log in, eccetera. They would take money out of that account and then guess what. When you went to the bank legitimately to try and see how your balance was right they would change the bank's page so that when you checked your balance everything looks normal. Right. And because it's all going through Russia just going through your local VPN. Believe it or not, one that you did not install but they installed for you. And now when you are looking at the bank balances, actually adjusting it in real time as you go on the site, you have no idea that they've actually stolen that money from you and transferred it out of your account. So, even looking at the bank balance online doesn't guarantee that they didn't get it from you. So, check it out. Go online you'll see a whole lot more information about it. The training's really important and I think you'll have a lot of fun if you have a look at those videos I posted of the kids doing their training at the Olympic facilities in Lake Placid New York. Take care and We'll talk again, tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 8, 2018

Today a short review of a study by NTT and what they found about businesses and security -- it's really, disheartening.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/07/2018

The Importance of Security

Craig Peterson: [00:00:00] Hi guys, I'm out by Lake George, still here in upstate New York, enjoying the week. I saw some statistics just came up from NTT and that's going to be the subject of my little lantern today because it's very concerning to me. NTT you probably know these guys they are the Japanese AT&T. And, I think the whole name is Nippon Telegraph and Telegram, in English, anyway. 

: [00:00:28] But they did a survey of businesses and they found that the majority of businesses that were surveyed, and of course they take that, and they push it out to all businesses, but the majority of businesses surveyed said that they would rather pay ransomware than try and prevent the ransomware from getting on their systems in the first place. They'd rather not bother with the security they might need to keep the criminals out and just pay the criminals afterward. There are so many things wrong with that thinking. But let's start with the simplest, which is that if you’re talking about having your systems hacked, remember, you’re going to be out of business. You're hoping that just paying that ransom, which may be as little as five thousand dollars, is enough to get all of your data back. 

: [00:01:21] If you get back in business. Yeah, I got to tell you here what the FBI has said. Hold on a sec, let’s let the truck pass, the joys of doing this live, right. 

: [00:01:35] But according to the FBI statistics, and remember I'm tied tightly with the FBI and they're Infragard programs. So, I get their stats, and they're saying that the majority of businesses never get their data back, ever, even if they pay the ransoms.

: [00:01:53] Then to top it off, you're out of business at least during the time while you're waiting for your data to be recovered. Now, your data may not ever be recovered, as is often the case the majority of the time. Your data is not recovered or maybe just parts of it are returned. These guys are out to get you. And they're out to get you a lot of different ways and it will cost more than that five thousand dollars you spend on security. And in reality, you should be spending somewhere around three to five percent of your budget on security, because it is that important. Certain events will force you out of business. You know you've got to spend that money. You're not going to get your data back. This is this is not something that's worth risking. 

: [00:02:42] And I was just talking about cancer in fact with someone, a little bit about really this is almost like cancer treatments, right. It's like how many people do self-exams for cancer. And some people do. 

: [00:02:58] And those people that do those self-exams are the ones that end up surviving. Why? Because they caught it early and that's the whole idea here, you got to catch the bad guys early, you got to stop them from doing more harm, and stop them from destroying your companies, anyhow. Disappointing news from today from NTT and that survey make sure that you are staying up to date with the technology doing all of your updates. Having a good intrusion protection system, defense system, as well as prevention and keep that business of yours safe, heck, you've put enough money into it and into your career, right. Either way, you don't want to lose it all. Craig Peterson here, and we'll chat again tomorrow. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 6, 2018

Today a warning about USB Drives and their use and how the Bad Guys including State Actors are using them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/06/2018

The Dangers of using USB Drives

Craig Peterson: [00:00:00] Hi guys, Craig Peterson here again. I've got a couple of warnings about USB drives, that little small stick drives thumb that we all have. And we use, and it was interesting - I was thinking back right of all of the different ways we used to move data around. Of course way back when it was punched tape and computer tape, I used that a lot. I used it before that punch cards. When I was programming and putting stuff together for computers. I basically used it all the eight in hard sector floppy disks all the way down to the little ones. DVD drive CD-ROM drives. And of course today we are sharing stuff over the network. We've got to us be drives that we're using to carry things around on and sometimes we just copy it to our phone and send it back and forth, that it's really changed over the years. But there is a problem and the problem is that USB drives are now being misused, they're being infected. I've got a report here a warning out from our friends over at the FBI and they're talking about the vulnerability, it's a "cakbot" is what it's called marionette. Now, this is a piece of malware that has been coming on thumb drives come in straight out of China and apparently it might be targeted at one of them is a financial services corporation that they got this some drive infected with this malware variant that's designed to steal bank information banking information. We also have had warnings before as I was thinking about this about us be charging station these public charging stations you see them everywhere now right they are on airplanes you can plug in USP devices you can plug them in at the local coffee shops on and on.

: [00:02:02] And what's been happening is people have been taking those little charging stations plugs a kind of pop off the front and put a little piece of hardware in there. So, it's not just a dumb charging station actually fairly smart. And then the public USB charging stations are then used to install viruses and hack the devices that you plug into the charging stations. Now if you've ever tried to route a phone a smartphone like for instance an iPhone you know that the only way you really been able to route them in the past has been to plug them in to a USB port and then run some software and it uses some of the diagnostic features of the device in order to be able to get into it. And you can root your phone while reading your phone, of course, is getting around the operating systems controls right. So, if you have access to the U.S. port on a smart device whether it's a computer or a smartphone you can potentially, not necessarily but potentially you can get into that device and take control of it. So, this is just kind of a general warning for everybody don't play around with us. Be poured. And if you do get a thumb drive if you buy these things and I do these all the time we use them for installing computers for our customers. Use them for configuring firewalls and moving stuff around. And the thing you have to remember, make sure you format it.

: [00:03:38] Now how do you format a thumb drive. Most people do it on their computer. But once you've put it into the computer, isn't that computer now infected. All right to think about that one for a minute. So, there are devices that you can get. All they do is the format. And these pieces of malware that might be on them don't affect it at all. So, if you're responsible for the security or at least for those of you that are responsible for security in a large organization, make sure you get one of these USB thumb drive bulk erasers. The rest of us use a machine, that's probably not susceptible. Maybe take an old laptop to install Linux on it and use Linux to reformat those thumb drives. The next best thing would be a Mac, and then the worst thing would be a Windows computer because those are the number one targets and frequently they're the ones with the most vulnerabilities. And then you can get all the way as far as what IBM just did in the last month. And they have now banned removable devices in their entirety for their employees to use. So, if you work for IBM you cannot only not use a thumb drive. You can't use one of those detachable USB drives either that so many people use for backing up their systems and moving data around till a couple of warnings about your US drives you might not have thought about it but just because it's so-called freshly formatted and came from the manufacturer in China, doesn't mean it's safe.

: [00:05:08] Always reformat those drives and if you're concerned about security another thing you might want to do, is not only disable those thumb drive port those USB ports on the devices for your computers in the company but you might want to get some epoxy and put the epoxy right there in the ports. So, no one can plug anything in because it's a great place for people to steal data from you. And it's also a great place to introduce malware. Think about what happened with Iran with their nuclear program. We brought their nuclear program to its knees, while we admitted it. Afterward, we worked with of course Israel on this. But, we got onto their computers infected them destroyed their centrifuges because someone found a USB drive that probably Israel had placed at a coffee shop near the nuclear site and they found they saw USB drive. They brought it back and they plugged it into a computer that was not internet connected sitting there controlling the centrifuges and we were able to completely destroy the centrifuges. So, it's a dangerous thing. Be careful with thumb drives. Have a great day and we'll be back of course with another thought here, as I am kind of doing a little bit of vacationing and working here working holiday all at once so as things come up. I've been trying to put out a real quick little podcast. Thanks for listening. Make sure you share it and make sure you go to iTunes and give me a rating. Craig Peterson dot com slash iTunes and leave a comment. I appreciate it. Thanks. Take care. Bye-bye.

 

---

 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 6, 2018

There is an issue with Routers - FBI worldwide alert.  Craig discusses the problems with these routers and what you have to do.

Are you addicted to Cryptocurrencies? Craig talks with Ken and Matt about what some Dr.'s are saying and also gives a warning about Cryptocurrencies and your security clearances.  

Don't use Cruise Control if you drive a Chrysler or Fiat.  Craig speaks with Ken and Matt about two issues related to cars.  Both can be deadly.

Pink Color Jobs?  Craig explains to Matt and Ken what these jobs are and why they have this name.

Do you love knowing what technology is coming in the next year?  Craig tells Ken and Matt about Mary Meekers Internet Trend Report and how and where you can access the information.  She is the standard bearer of "what is coming in tech." 

Find out more on CraigPeterson.com

Related Articles:

The FBI Router Warning - What To Do

Hospital launches rehab clinic to treat cryptocurrency addiction

Fiat Chrysler warns 4.8M Jeep, Dodge, Chrysler and Ram owners to not use cruise control

How Social Media Became a Pink Collar Job

 

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/06/2018

Chrysler Recall, FBI Router warning, Cryptocurrency issues, Pink Collar Jobs

Craig Peterson: [00:00:00] Hey, good morning, everybody. Craig Peterson here this morning with Ken and Matt. I spent a little time and we talked about of course the FBI warning about our routers and when a little detail. But you guys know about that right. Then we also talked about the Fiat Chrysler warning about 5 million of their vehicles being very, very, dangerous. And social media and how it's now a pink-collar job. Isn't that new. And we talked about Mary Meeker and her latest report the 300 slide internet trends report and what that's all about. And if you are investing in bitcoin or any of these other cryptocurrencies and you have to maintain a security clearance, we've got a big warning for you. So here we go. Have a great day. I'm enjoying myself. I am out in the Adirondacks here doing a little bit of vacationing and meetings of course with friends. That's the way it always goes. 

: [00:00:59] So Here we go with Ken and Matt.  Welcome back again its 738 on the WGAN Morning News and it is Wednesday which means it's time for Craig Peterson, our tech guru. He joins us at this time every Wednesday.

: [00:01:11] Sir, are you this morning doing, I am well, I'm out in Lake George, at Americade, doing some motorcycle riding yesterday it was a little rainy, but it should be nice the rest of the week. 

: [00:01:24] Excellent. Yeah. My wife last asked me if we had a router and I didn't know the answer. 

: [00:01:32] So, there's an issue with routers Yeah this is the same one that we've been talking about the last couple of weeks. The FBI has come out now and given a worldwide alert and we've got to be really careful with this because the problem is that the routers that we're using for our homes, and unfortunately many small businesses are using these home routers as well. Those routers are compromised, many of them with a whole bunch of Russian software, that is taking your data and is sending it all the way out or actually to Russia. Today in Russia they are looking at it for bank account information, credit card information, personal information. So, you've got to replace these things. I've had a lot of our listeners have reached out to me on my text number. I gave out a couple of weeks ago. I mentioned the ORBI, you might remember you can get that right now. Best Buy has the best price on it. That's ORBI. You can get it on Amazon. And one of our listeners was concerned because looking at the reviews on Amazon there were a lot of complaints about the ORBI that come up right at the top of the reviews. However, the ORBI device is a great little router and if you look at it the reviews chronologically it's fantastic.

: [00:02:54] They had a problem about a year and a half ago with some other firmware that's been pretty much fixed now so the ORBI is what I'm recommending people to replace their home routers. Now, if you have a router from your Internet service provider they are taking care of this problem. If you bought an aftermarket router that's when the problems start coming up and that's when you really should look at replacing it was something new. That’s because there's probably not new firmware to fix this problem. It's absolutely huge. It's devastating. We still haven't really begun to see the fallout from this. But make sure you reboot your router at least weekly for now, and go ahead and replace it. And I'm going to be sending more information to people and explaining things, but have a good look at that ORBI router and it will make a difference for you. Big difference. It's a scary world.

: [00:03:52] Speaking of scary worlds, is it possible to be addicted to getting cryptocurrencies. Should I be afraid of, you know, buying them going forward?

: [00:04:04] Yes, it is. It's interesting because I've got a couple articles on that this week in my newsletter. But the problem that we're finding is that people are getting kind of a gambler's addiction to buying cryptocurrencies and it's becoming such a problem that we're starting to see not only doctors talking about it but it could end up being something that gets into the AMA standards as well. Cryptocurrency addiction. The other thing that is happening right now with cryptocurrencies is that we've got a problem with background checks and security. You know, if you have a clearance from the federal government, you have an FBI background check, that is required for working, for instance, down at the shipyard and you bought cryptocurrencies. They're saying now that that could be a big mark against you when it's time to get a background check to renew your security clearance. And the reason why is they're saying that with cryptocurrencies they are so frequently used by the black hats, by the bad guys, the criminals, that they may take that cryptocurrency that you have and count it against you thinking that you may be doing illicit things online. That’s because you can use a cryptocurrency to buy drugs, not just marijuana but all the hard stuff, like fentanyl and other things. you can use that cryptocurrency for all kinds of illicit transactions. So are cryptocurrencies back in the news this week and one of the big warnings is the federal government has not made a standard yet but a lot of people within the review board are saying cryptocurrencies are a big mark against you if you have to have a security clearance. 

: [00:05:58] Craig Peterson is our tech guru he joins us every Wednesday at 738. Craig, I use cruise control all the time, now I don't have I don't have a fiat. I have a Honda Ridgeline, so, I am kind of safe but, I mean can things go bad with cruise control? Let‘s talk about your Honda for a second. 

: [00:06:27] These newer cars including the Honda, In fact, I had to send a thing to my mom about the Honda and how these keys that you don't have to put into the ignition. Right. You just keep them with you. Right. A lot of people tend to leave them in the car or when they lock the car in the garage. And what the problem that we're seeing now is that people are dying because of that. And here's why. Can get them a little key flaw that you have for your Honda. And this isn't just a Honda problem. But if you take it with you even into the house it can be close enough to the car that the car sinks. OK can't hear or see is nearby. And if you forgot to shut off the engine which is you know you look at our generation we've been turning off the key for how many decades right. And now you have to hit that button to shut it off. So, they forget the shut off the engine and that engine keeps running. And what's been happening is people getting been getting brain damage and even dying from the carbon monoxide to creep in from the garage into the house because the car's still running, and we don't know about it. So, a real word of warning here to all of our listeners. This is picking on Honda, I am just picking on Ken. So, because of that problem we'd be very, very, careful especially it's been hitting the older population. Now back to the original thing you're mad about the cruise controls guys. Matt and Kim here's what's going on. 

: [00:08:03] The Chrysler Corporation you remember last fall I think it was October or so we were talking about a problem with Chrysler's and how the software in that car could be manipulated so that someone could remotely drive the car and drive it into the ditch. Do you remember that? It was in the news. Yeah, Well now the latest is that there is a bug and Chrysler Fiat. They are warning people that have their cars double checked your model number and I have a list of them up on my Web site that are known to be effective. I should say but be careful because some other cars can in certain situations and it has already happened people. If you have the cruise control on it will not disengage. You can get a break. You can hit the cruise control off button and the cruise control will stay on. So if you're going down the pike at 70 miles an hour that engines going to keep trying to go down the pike at 70 miles an hour. Now if it happens to you, thing to do is STAND on had brakes, because the brakes are designed to overpower the engine and that engine still going to be going, going, like crazy. Get over to the side of the road. After to coming to a full stop and then put the car in park. OK. So Important safety tip for Chrysler Fiat owners out there, cruise control on some of the vehicles can in certain conditions decide it is not going to shut off.

: [00:09:40] So contact your dealer they'll have a fix available for you they can let you know if your car is affected or you can do some searches online. The joys of technology you guys. We are talking about Cruise control. Not even autonomous vehicles. I'm just so concerned about the future frankly.

: [00:10:01] We're talking to Craig Peters on our tech guru who joins us at this time every Wednesday. CRAIG My final question for you what exactly is a pink-collar job and why is social media one of them. 

: [00:10:13] Yeah that's an interesting thing right because we know all the jobs that women tend to move towards and men tend to move towards other jobs. It's turned out that social media for businesses is a job that has been attracting almost exclusively women. And it's a decent job you can do look from home depending on the job position of course. But it's been called the pink-collar job because when it comes to social media it's really been a woman's world. And I've got to mention one more thing if you want to know where the Internet is only Mary Meeker every year puts out her slides. She is brilliant. If you are an investor you've got to check her she's got her 2018 Internet trend report out. And, of course she does mention a little bit about pink-collar in there. But she talks about everything it's almost 300 pages of slides. It's incredible amount of data very dense. But it's everything from people buying online what kinds of devices they're using. We reach saturation e-commerce versus brick and mortar. Hey, it's your business. Check it out. I've got it up on my Web site as well. This is her 2018 internet trends report and it is really the standard bearer when it comes to trying to figure out what's coming our way online.  

: [00:11:42] All right, Craig Peterson our tech guru joins us at this time every Wednesday. Appreciate you joining us sir. We will talk to you again next week. 

: [00:11:49] A gentleman. Take care. 

: [00:11:50] Thank you very much sir. All right.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

 

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

 

For questions, call or text:

855-385-5553

Jun 4, 2018

Can you know it all? No. I share some insights on how you should focus on the who vs the how.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

: [00:00:00] Hi guys, Craig Peterson here and I am sitting over-looking Lake George, boy what a beautiful place and a great time of year. I was listening as I was riding out here on our motorcycle to Dan Sullivan. Now if you don't know who he is he's a great coach and he has a lot of great things to say. 

: [00:00:18] And one of the things he was talking about today is something that's really kind of bothered me for years and years. You know I'm the kind of guy that has to understand something. In fact, I'm kind of a guy that has to understand everything and obviously understanding everything and be a little bit of an issue sometimes right. You just can't. Basically, you can't understand everything. Now I started a company I was doing well, I had a lot of sales, I had a lot of clients, and so I hired some sales guys and they just weren't performing the way I thought they should. So, what do I do, right. I go out and I hire a coach and I start taking courses. I take all of the big sales training courses, in fact, if you've heard about it I've probably taken it. I've probably mentored with a few different people that you've heard of before, in fact I'm sure of it. And I learned a lot about sales. I thought learning about sales would help me, because then I'd be able to discern whether or not someone was a good salesman and if they're good salesmen I should keep them, right. If they're bad salesmen well, you can let go of them and let go of them quickly right. That's the idea. Fail early fail often and but you know I tend to hang on to people, customers as well as employees. And I hung on to some sales guys way longer than I should of and got really disappointed when they walked away or ran away. In one case, with my clients and started calling them up and trying to sell them competitive products and services and stuff and it just it just really bothered me. But the point that Dan was trying to make that really hit home with me. It was something about, Knowing how. And he said the basic thing that you should be looking at here, isn't knowing how to do something. 

: [00:02:22] But Dan's really big on knowing who to do something. So, I kind of did a take back on that and thought well you know I've been trying to do this for a long time. I think I know what to do. I think I know how to do it. How can I hire someone if I don't know enough how can I tell if someone is a good enough sales person or technician if they are someone that knows more or should know more than I do. Right. So, I've spent decades learning how to do a lot of things and that's kind of cool because I'm a renaissance man. Right after all of these years I know how to do a lot of different things. I've studied seriously studied things like marketing and sales to try and figure it out because I want to help people and yet there's a lot of people out there that there's so much noise they can't discern but this point about how versus who really struck home with me. And I thought of something I should share with everybody and that is. Who is someone who's in the know? Who knows how to do what needs to be done? So, for instance if I want to do webinars better, you know I've been doing webinars for a long time. I do webinars for the FBI infraguard program. All right. I know how to do webinars but I'm not the best in the world at webinars and it might take me another five 10 years to become the best at doing webinars.

: [00:03:53] If that's the case is that time well spent at my stage of life I look at it and say absolutely not because I have so many decades behind me there's going to be fewer decades in front of me. Right.

: [00:04:07] As we're looking at all of this, and trying to figure out who, I think is way easier than trying to figure out how. Because you can ask not just for recommendations. You know who can I call? Who can give you a good reference? You can look at the work they've done and if you find someone who knows how to do what you need to have done what the advice here is. Russell Brunson was talking about this as well. 

: [00:04:35] But the advice is while you look at that and say hey guy let's work together on this and 60 days or even 30 days and let's see how it's going after 30 days and see if we really want to get into this. But I am impressed with you and what you can do and maybe I should give you a percentage of the company. Now obviously that's something that you might do for a revenue generator. All right a percentage of the company or a senior manager that is going to be with you for a long time and has skill sets that you really need. But I was thinking about this too from the standpoint of my customers would be really nice if I could say, “hey listen I'll keep a percentage of the money that I save you by not having you hacked. How are you going to figure that one out, Right. That just doesn't work very well because how can you prove that something might have happened, or something didn't happen. Obviously, you can't prove that sort of thing can't prove a negative. So I don't know how well that would work in certain aspects of I.T., But for instance if you need a security company you can go out and hire the best, you could hire my team, if you need a marketing company you can go out and hire the best but try to as long tail as you can. 

: [00:05:54] You can't hire anymore NIST firm that knows everything. There's just too much to know and that goes back to the initial statement here about the how versus the WHO there's too much for you to know as an entrepreneur. There's too much going on in the business and in life in general nowadays you can't hire a company that knows everything. So really you need to have a security company, you need to have an infrastructure company you know somebody keeps your PCs working and then you've got to reach out further you have to have a company that understands how to do some of the marketing stuff online. How did it use some of the cloud tools that you might be needing to use? You need to have somebody who can compose Emails for you? Help you put together the webinars? Do the videotaping? Do the video editing? Help you with the podcasts? All the ways that you use to reach out to your customers and it gets to be a kind of a complex issue when you get right down to it. But, going right back to this point that Dan Sullivan made. The how versus the who

: [00:07:01] You can't be the best at everything. Focus in on what you're good at your core business and then go find the who find the who knows how to do what needs to be done. Just amazing thought to me I'm going to try and work on this some more. Even in some of my hires especially. Now with the gig economy, you know you have sites like Fiverr or even Vworker where you can hire someone to do a task or a small set of tasks. And that's the cheapest best way to get anything done. If you can define the tasks adequately which is sometimes a problem, Right. So, look at that as well is the who you're looking for someone to do something on a short term basis for you where it's like right. Write a little letter or a sales letter or write some copy for a web page or is it someone you need a long-term relationship with. Like it is for my clients you know I have clients some clients have been with me for 25 years where I've been doing the security and network infrastructure work for them for 25 years is that the kind of relationship you need. So backup figure this out. The WHO is probably the answer as opposed to the how. Because you just can't figure out how to do everything especially in this day and age. Visit me online of course Craig Peterson dot com and I'll be back with more insights as I get them. Take care and thanks for listening. I really appreciate it and I appreciate your comments. If I can help, or if you want to ask a question or comment  you can text me at eight five five three eight five fifty-five fifty-three or just go to iTunes you can find me or go to Craig Peterson dot com slash iTunes and make. Make sure you subscribe to my podcast. Take care. Have a great day and a great week ahead. Let’s Derail the bad guys.

---

 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 3, 2018

 

Your Security.  Are you taking the easy way because it is what you know even if it does not protect you?

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

: [00:00:00] Hey everybody, Craig Peterson here.

: [00:00:02] I'm sitting at the foot of the ski mountain up in Killington Vermont. I don't know if you've ever done that before. It's early June. Of course, spring time. All the leaves are on the trees here in Vermont, New Hampshire, Maine, and all of New England and I'm looking up at the hill and I see that there is still a lot of snow going down the ski trail and it really gets me to thinking because you know it wasn't that long ago that people were skiing down the mountain. Of course, they've got the snowmaking machines on the side that are blowing all of that mist on to the trails that turns into snow and when it hits that cold air. And then of course, people are packing it down. And that's why it's called a trail right. There's a lot of people who've been over it who've been there before who are just getting really getting rid of all of the growth that would normally occur.

: [00:01:00] And it got me to thinking even more about what I've been doing for businesses and my life and to helping other people, you know so much of what we do in our lives is kind of like the boat being driven by the wake. We have all of this stuff behind us that we've done over the years. 

: [00:01:23] And yet the water in front of us is boundless there's just so much of it out there and yet we're being driven by our wake and the same thing is true with this ski mountain here in Killington Vermont the skiing season's over.

: [00:01:38] And yet there are still a lot of things left over from the ski season there's still snow pack down on that mountain. 

: [00:01:46] So when I think about helping you guys out, what can I do to help you with your home or your businesses and you know more particularly about security and really kind of aiming at things that are historical, things that I've done over the years we all do that right. You know you bought your computer and when we bought those machines what did they come with all they had Norton or they had Symantec right. The McAfee stuff or whatever it was. And we continue to use it. We paid that license fee after 30 days or 60 or 90 or whatever the expiration of that little free term was. But we went ahead and just did what we've always done right. That path was beaten down that hill. We aren't going to go off we're not going to try to have black diamond that double black diamond maybe not even the blue slopes we're going to stick with the bunny trails with those green trails that are out there the easy ones and the easy way to do it is to stick with what your machine already had. Right. What the manufacturer of your computer seemingly recommended. Of course seemingly because in fact whoever paid the most to have their software pre-installed on your computers is who got it right. It's not necessarily a recommendation. So, think about that as well. That's what we do. Right. We stick to those paths and the more difficult paths are kind of going off to the side and they can be a lot of fun. And in our case what we're trying to do is avoid getting steamrolled getting run over by that train right. We've got a lot of bad guys in there on those tracks and they're steaming straight towards us. They don't bother pulling the whistle right because they're trying to break into our computers. They're trying to take all of the work that we've put into our businesses and our business life. 

: [00:03:48] Our job, our whole career, and for what is to us not a whole lot of money. OK. Could be a lot of money. Five thousand dollars let's say they steal from our bank account that's not a whole lot of money when you look at an entire career. But to us that means checks are going to bounce. If you're business there's been businesses that have had millions of dollars tens of millions of dollars stolen. And the most recent story I've been sharing with people and we'll have to do that one of these days here. But it is of 45 million-dollar theft from a business straight from their bank account. So why did I bring of this up why am I talking about this. Because I understand what happened at Sony. I understand what happened at Equifax both of them were hacked both of them are huge hacks both of them were multimillion-dollar Hacks. They are you know, destructive. They destroyed other people's lives. Right. Sony still in business. I just saw an ad on TV for Equifax offering dark web services. Are you kidding me. These are the guys that lost our data and all you know put all of our stuff, so Security numbers names addresses up phone numbers you name it up on the dark web site. Am I going crazy here or something and now they, Equifax, are the place you should go to get your Dark Web report.

: [00:05:27] It doesn't make sense to me. Sony you know that we had top executives that were bad mouthing the stars of their movies should we be worried about them. No. No. Those executives for the most part in all of these companies still have their jobs. The companies still exist. Right. 

: [00:05:47] So he's still out there even Weinstein Company is still out there.

: [00:05:53] After all the stuff of Harvey pulled. Obviously, Equifax is still out there the buying ads are still doing credit reports on you and me. I just don't get it. Why do people put up with this, anyways that happens to the big guys and it's an entry in the balance sheet right in their ledger they put a thing in saying you know we had to spend 50 million 100 million a billion dollars to recover. But if it happens to you or me if they go into our business emails and they're able to steal stuff if they get into our computers steal our client listserv. How about not even the bad guys over in Russia or China or Iran. How about it's the salesman who's taking our customer lists with them as they walk out the door. What do we do about that sort of thing. And that's a really big question and one I think we all have to think about. So, for the big companies there's one equation and I know how to deal with the big companies right. I've been dealing with them for decades on security. I use them provide some of the best software in the world you know that already right. I'm a big Cisco guy. They are the biggest they are the best by far. That's why they're the biggest by the way. But you need to understand you. Because I've got this huge weight pushing me ahead.

: [00:07:24] I've got 10 20 feet 30 feet of snow on that ski mountain of history for me what I haven't been able to do is help a lot of small businesses. I'm talking about businesses that have less than a couple of hundred employees really all the way on down through a one-man operation.

: [00:07:48] Because you guys. And that includes me by the way you guys are the ones who are going to get really badly hurt by these big security breaches. It's not the big multinational corporations who can spend who sometimes do spend money on security.

: [00:08:10] It's you, right.

: [00:08:12] How much money can you afford to lose? You’ve got to weigh that out too. How much money can you afford to spend? And how about you as a home user. We have a lot of home users listen to my podcasts as well. Over the decades now it's almost two decades. Well probably just two decades. But what can you do. How can you do it? So, I've been really busy, and I bet this is probably one of the stupidest things I've ever done. Right. But I've been really busy trying to put together a very low-cost alternative. Now it's not going to be as cheap as buying Norton or some of these other pieces of software that just don't work OK. They really don't address nowadays and are estimated to be only about 50 percent effective. They don't work. So, I'm not going to be that be able to be that cheap but I am going to be relatively inexpensive but it's taking a lot of time a lot of effort engineering time everything to try and put this all together. So, what I'm asking you guys to do is just take a minute and e-mail me just me at Craig Peterson dot com, me at Craig Peterson dot com and tell me what your concerns are. 

: [00:09:31] All right if you don't care and if you're happy as a clam with Norton. Great that's fine. I get it. I understand. And I'll just continue to help the big companies and I won't bother with the home users I won't bother with the small businesses but that that's the market that is not served at all. It isn't just not under-served right. It's not just underserved. It's not served because you can't afford to do it you can't afford to buy a thousand seats of licenses or even in some cases even 100 teachers still can't afford it and then you can't afford to run it and then it's confusing.

: [00:10:06] What do you do when there is a breach. Right. So, what are your concerns. Why do you have the concerns you have. I really like to know I'd like to know what I can do to help. I'm I'm trying to derail this steam locomotive that's headed our way. The steam locomotive that is Russia, China, Iran, the bad guys, the organized crime people and the mafia. I'm trying to help you derail it, but I need to know what you're looking for because I've tried a couple of things before. We've had very limited success. Maybe it's just some simple training. How do I use my free tools? Maybe it's what tools are out there that are inexpensive that I can use. You know I may be only paying a hundred bucks a year per computer because that's kind of the bottom line. That's the minimum I think that that certainly that I've ever found that you should be paying for half decent stuff and that'll get you to 90 percent which is way better than 50 percent. What do you need? Well how can I help you. What are you concerned about. I'm concerned that I'm just continuing to go down this road here. I have I have a problem and it's too much knowledge too much experience in this field. Remember, I've been doing work on the internet since 1983 and I've been doing Internet security since 1991 and I've been doing it for the big boys.

: [00:11:42] I need to help the small businesses. That's where my love is. That's where my give back is. That's who I'm trying to help as the small businesses. They're the ones that make the new jobs. They're the ones that take all the risks, right you entrepreneurs out there.

: [00:11:57] And yet you’re the ones that are being underserved. So, as I said here in Killington looking at that ski mountain realizing that there is a lot of stuff in the way kind of blocking my vision of what you might want because I’ve been in it so long. Let me know, email me here just me at Craig Peterson dot com. Send it to me at Craig Peterson dot com. What are your concerns? If you have just texting available right now you can text me as well 8 5 5 3 8 5 fifty-five fifty-three. What are your concerns? How do you see them? And I'm talking about concerns about moving away from the Norton the Symantec the stuff you're already using that doesn't work. Now, what are your concerns about that? What are your costs concerns? Do you have any concern at all that really your business data is going to be lost or stolen your computers are going to be hacked are going to be held for ransom by the way? If they're held for ransom the odds are less than 50 percent that you'll ever get your data back even if you pay.

: [00:13:02] Ok. People who pay, 50 percent might get most of the data back. It's rare that you get 100 percent back. So, what are your concerns. What can I do for you. I guess that's kind of the bottom line because I really want to help you know that this has been an effort of love. I need to make a couple of bucks as well. But I want to derail the bad guys. So, let me know me at Craig Peterson dot com. Have a great day. I am off obviously vacation here doing my little motorcycle trip and enjoying it. Going to be in upstate New York. The rest of the week. Take care. I'll be trying to answer your texts and everything during the week and I'm going to try and do more or less daily podcast here to just keep everybody up to date on what's going on and my thoughts and ideas hopefully they're helping out. But do let me know. Take care. Now have a great day - Everybody.

---

 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 3, 2018

 

Routers and Router Problems and Amazon Reviews.  Craig discusses some of the issues that have arisen from people trying to find the router that he recommended.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

: [00:00:01] Hey guys. Craig Peterson here. I'm actually in Vermont today at a kind of really cool little festival that they have got going on locally. I had to mention to those of you who listened to my radio show today and those that texted me recently about the problem with the routers that the FBI has been talking about.  With these types of router problems, I've been recommending routers to people and I've actually had friends of mine have them installed for a couple of years now. Some of you are seeing that there are some issues that some people have had when they're looking at Amazon reviews. Now that's always a problem looking at Amazon and looking at the reviews. You don't know if this is a competitor who's writing it, you don't know the person who's running it really had no idea what they were doing and because they didn't know what they were doing ultimately it wasn't going to work for them correctly. But then nothing was going to work for them. So, you know I get it, I understand, it can get frustrating for you. So, what we're going to do is put together some more in-depth information. You'll find some on my Web site already if you texted me, we're now sending out free accounts for our membership site. We’re going to be using that to distribute information to our insiders the insiders like Craig Peterson dot com and I'm going to do some more research. And I want to put a little form up there so that we can talk.

 

: [00:01:21] I know a lot of us who listen to the show and myself included aren't Facebook fans, in fact, many people don't even have a Facebook account because of some of the crap they've been pulling. So rather than trying to conform to a Facebook group or something else, we're going to end up just putting it together in our own Web site. So, I have a little insider's thing and I'm not charging for it. We will see if how that all goes. So anyhow, I'm going to be putting together some stuff this week on the different types of routers. Until then make sure you reboot your router at least weekly. And I'm trying to see if we can get some form of a commercial router available for listeners at a decent price. Decent prices where the problem comes in, because I know a lot of people have trouble coming up with the 80 to 100 plus dollars that you need in order to buy one of these even very low-end routers that you might get over a Wal-Mart or something. Anyhow, I'll keep you up to date. I'm going to be working on this while I'm out of town a little bit so, give me a bit of time and I definitely will let you know when I can let this one drop. Take care.

---

 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 2, 2018

 

The rumors you have heard about the big vulnerability in home/small business routers are not RUMORS they are true.  Craig delves into the problem and tells you how to fix it.

 

Cars have their own networks and if they get their wires crossed things can go bad.  Craig tells you today about a problem with the Firmware in Fiat/Chrysler cars. 

Tech Jobs have not been hugely attractive to women except now there are a few.  Listen as Craig explains what the Pink Collar and Gig Economy are and why Women are attracted to them.

Today Craig talks about some of the Pros and Cons to Faster Wireless and dispells rumors too.

Craig has a new membership site (Yes, it is free you just have to sign up)  IT will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

: [00:00:00] Hey welcome to tech talk with Craig Peters son. We are going to be talking about this FBI home routers small business router vulnerability. We had some more information that went out this week hopefully you got it. We'll be glad to send it to you if you tell me what the router is you have if you have any questions about it let me know.

: [00:00:24] Eight, Five, Five, Three, Eight, Five, Fifty-five, fifty-three.

: [00:00:34] We'll be talking a little bit more about that today. A massive Chrysler recall. Do not use your cruise control. We'll be talking about social media. It's a pink collar job  now, really kind of interesting. And I got to talk about something that I've been doing for a little while here now and it has just dramatically improved my health. And you know what. It hasn't cost me one thim dime. One thin dime. Cryptocurrency addiction, apparently now it is a disease. We'll be talking about that and 5G wireless service. You know I just switched my carriers for my business cell phones and we moved all of them over. I was looking at the different offerings for the different carriers so we'll be talking about 5G what is it. When will it be here. And why are there health concerns all of that and more stick around. Here we go. 

: [00:01:35] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives. 

: [00:01:45] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes I appreciate what you do with Forbes magazine for all these years it's one of my first go to places or talk right now with the guys and gals behind Siri. We're joined right now by the director of Kindle technology. We're joined right now by the CEO of E-bates Kevin Johnson on air for more than 15 years.

: [00:02:10] Over 20 million podcasts downloads. This is tech talk with Craig Peterson

: [00:02:20] Right here we go it has been a very very busy week for us as you can imagine here at my company putting all of the stuff together we have been responding to everyone who sent us a text about their home and small business wireless routers. We have had a lot of questions we've answered them. We have sent out some special invitations to people who asked to put them into our new membership site. We’ve got an insider thing.  I tried to do in fact I did on Facebook and we've had few hundred people sign up but this thing with Facebook did not work for this audience. You probably know I have a lot of clients and we have our training site and it's a membership site and we've put together something that that has all of my special reports. And as we go forward we'll be putting more of them in. So for those of you that ask that texted me we checked with you. We sent you and hopefully by now you have your Log-ins to my insider site and that insider site log in you're going to get all of the information here about the small home small business routers. The problems that the FBI is warning about right now. We have a few special reports and therefore you going into details about how to do passwords and a few others about hackers and what they're doing and what the state of the art day has if you will in the whole hacking world.

: [00:03:55] So things to look out for. So you should have gotten your Log-ins to that site. It's a special password and it's your password it's your account. And we'll be keeping you up to date. We're definitely going to keep doing this. We had issues with Facebook and part of the reason we had the Facebook issues was a lot of us myself included just don't trust Facebook. Right. So, what are you going to do? In our case, we said well forget about it. We shut down that Facebook group. And now we've got our insider site where we're using that to distribute all of our special reports and other things that you need to know. So again, if you have questions you got to reach out to me and you frankly you should have some questions because there is a major hack I guess is the best way to put it going on right now and it appears to be Russia that's doing this. They have some software called VPNFilter. Now this is a really interesting type of attack because what they're doing is they are going after these low-end routers so the types of devices that you would get at the local store you know whether it's staples or Wal-Mart or even a lot of them that you might buy online at Amazon but made by companies like Micro-tik, Linksys, Netgear, and T.P-link.

: [00:05:25] Right. Who hasn't bought equipment from them over the years, as well as some of these network attached storage devices. And they are crazy vulnerable. So, what these guys from Russia have been doing is they've been using some hacks to get into your router. They change the software on your router and then they use another stage of the attack to take all of your traffic and send it all off to Russia. So, think about that all of your traffic their filter.

: [00:05:59] They're looking for bank account information, they're looking for information that's going to help them steal your money credit card information, just kind of everything and anything. This is huge because according to the FBI we've got more than half a million networks that have been exposed to this right now that are hacked. OK. So again, if you contacted me you've got all the information. So just go through it. I list the model numbers that are known to be bad. But the bottom line is for now anyways just reset that route or you're going to have to power recycle it at least once a week. And there's other things you should do too. I'm not going to bore you with those here on the air. But there's other things you should do. All of that is there on the membership site. We go into some good detail on it and you can always ask questions. You know we're all we're here to help right. That's what I do. That's what my team helps to do. And you might want to do a factory reset on some of these devices and everything. 

: [00:07:07] But if you still have a question you can reach out to me Eight, Five, Five, Three, Eight, Five, Fifty-five, fifty-three. 

: [00:07:16] That's my text number. I, my wife and a couple of people my team do monitor as well so we can get back to you with any questions. Now if you are a small business really upgrade OK get rid of this junk. It's time to move on. We've got such a major, major, problem and it's continual right it seems like every week there's a new hack and I'm really happy to say that my clients haven't been hacked in years and years and years and decades, in fact, that's because I'm using the right stuff at the right time the right way OK. So, there are ways to keep the bad guys out. You know they're like a railroad train they're just plowing through everything we've got to derail them. And for that too there is there's more information in the membership site that I gave some free accounts out to this week. But if you need help you can apply and you know we're letting people in that really need help that that target really can't do this themselves.

: [00:08:28] So anyhow Eight, Five, Five, Three, Eight, Five, Fifty-five, fifty-three. 

: [00:08:33] Can you believe tech talk is number one in the market with this guy as host. Number one rating based on direct mail polls. There was another September 1995. Not all of those cards have been returned.

: [00:08:46] I got to think Dan again for that, it is so cool he did that for me a decade ago. I guess I should probably update some stuff but you know I spend too much time on other things anyhow. Let's move on to the next article and this has to do with software. In fact, it's specifically some software known as firmware and it's specific to Fiat Chrysler. 

: [00:09:13] They sent out a warning about a week ago telling people that if you have one of these about five million Jeeps, Dodges, Chryslers, or Rams Do not use your cruise control. And remember that's how we started out today is a terrible way to start the show. Fiat Chrysler is saying that this condition where the cruise control will not release in other words you're driving down the road.

: [00:09:44] You got it set for 65 miles an hour because that's a speed limit and you need to stop. It will not release the cruise control you can tap the brake which would normally release it. That won't stop your cruise control. You can go ahead and hit the button to cancel cruise control. Well that will not stop your cruise control. And they're saying that this condition can occur if the cruise control accelerates at the same time there's a short in the system. Now the good news is if you forget to not use your cruise control on your Kreisler if you forget that the brakes are designed to be strong enough to stop the vehicle even if the engine is engaged in the cruise control is on. So the trick here is to step on the brakes as hard as you can. And then once you get the car down to basically stopped put it in park and putting it in park will disengage the cruise control. Now you don't want to put your car in park when you're traveling down the highway that will be bad. But it is a reasonable thing here to do this push on those brakes. Give it your all get that car stop. Put it in park and then you'll be OK. Of course, you can also kill the engine once you're in parked but that cruise control button will not stop the cruise control tapping the brakes will not stop the cruise control either. Now they found this problem when they were testing

: [00:11:20] The vehicles computer networks. Now this is really interesting, and this is where it becomes a technology problem. The Cars today have their own networks so using something called a can box and basically everything in the car is all tied together and that has created a number of scenarios that frankly I would consider to be a nightmare.

: [00:11:46] Now there was a complaint filed with the National Highway Traffic Safety Administration a guy in Kansas said that a 2017 Dodge Journey SUV rental vehicle was going down the road about 70 miles an hour with cruise control on when the windshield wipers came on by themselves and the throttle lock up. Now the owner was not identified in the complaint database, but they said that the cruise control button would not disengage by tapping the brakes or turning off the button and the driver was able to slam on the brakes and get the SUV to the side of the road. It was still running at an engine speed to support the 70 miles an hour and fighting the brakes.

: [00:12:30] Engine stop button. By the way would not work as a member nowadays with the new ones. You're not turning the key and pulling it out of the ignition. In fact, I had to send a note off to my mom because of some problems that have been reported with Honda's that if you don't turn off the engine and if that key fob that you have is close enough to the car that you're just going to keep running and in some cases it doesn't even have to be close to the car depending on the manufacturer and model. And so people are dying and they're dying because of carbon monoxide in the home and the engines running the cars so quiet they don't hear the car they don't realize that an elderly person who's used to turning off the ignition. Right. It's not going to work. So this complaint said that the driver tried to kill the engine and that button did not work. Engine shift or excuse me stop on. Isn't that crazy. So, he put it into a park and the brakes smoked significantly according to the report. So, there's 15 Jeep Dodge Chrysler and ram models from six model years with gasoline engines automatic transmission and models in Canada Mexico and other countries are also affected. But there are you know Chrysler trying to figure out which ones of which models the toll roads the National Highway Traffic Safety Administration urged drivers not to use cruise control on your feet at Chrysler until repairs are made or they know exactly which model are affected and they've got a pretty good idea right now. And you'll find this article up on my Web site. If you want to find out a little bit more about that case now we're going to move into pink collar jobs. I found this article really interesting.

: [00:14:30] Now here's what's happening. You know there's a lot of jobs that are mostly men right is dominated by men and those jobs tend to be more dangerous jobs more physical jobs. And you know I get that right does not make sense to you. It certainly makes sense to me.

: [00:14:47] So what should you do if you are looking for a job and you're out there or you want to hire someone. It's interesting because this article came from a hot little potato is talking about this and saying that companies hiring for technical positions often slip language into the job postings that appeal to men. They'll say things like looking for ninjas for people who are trying or are willing to obliterate the competition that are capable of dominating. Right. So those words are all kind of male words. Right. And they are going to attract more men than women. But it's interesting to note that there is one job in the digital economy that is falling squarely and predominantly to women. And this is a position that's often overlooked but it draws on marketing and editorial skills right. The ability to write. And guess what that means. That means the social media. Right. That kind of all fits together. And women tend to be better communicators than men and they seem to be gravitating toward this type of a job.

: [00:15:58] So it's kind of interesting because looking at the job postings you'll discover the same bias in the language in reverse this these job descriptions here for this job have a bias towards women. So, here's an example.

: [00:16:20] Social Media Managers are quote “The behind the scenes screens labor involved in Media and Technology is central to propelling our digital economy forward.” Isn't that interesting. Between 70-80 percent. This is according to Brooke Duffy's she the assistant professor of communications at Cornell. Between 70 and 80 percent of social media, workers self-identify as women on the salary compilation site pay scale and the careers been referred to as the pink ghetto. I don't get the ghetto part because it certainly does pay well and usually you don't get ghettos as paying well. But anyway. Any rate. An interesting article published by Duffy and University of Oxford and in new media and society it kind of goes on and on. They analyzed all these job postings etc. payscale the average paper social media specialist is 41 grand for staff jobs and there, of course, are a lot of contract jobs out there doing this sort of work. It's really quite cool frankly when you get right down to it. I like it.

: [00:17:29] Bottom line is kind of nice to see the jobs out there for women that they're enjoying they're appreciating and they're making some decent money at. And it's something that you can do at home. Whether you're a man or woman I don't know if you've checked out some of the sites I hire people from a few different places online but the worker is one of course. Fiverr is a very popular site one I've used before where you can be hired to write one press release for instance and take as much work as you want to so have a look at that as well. That's called the gig economy and women have been doing very well in that gig economy out there. OK let's talk a little bit about. This is the need because wireless is going to get a whole lot faster. In fact, many people may just end up getting rid of their Wi-Fi networks. I would not recommend that for businesses in general but for homes. My goodness. The new 5G wireless that is starting to roll out already can be up to 100 times faster than your current data speeds on your LTE device which is typically called 4G your 4G devices that are out there now. What's concerning about this too many many people is that the wireless community you know all of these wireless vendors horizon and Sprint and T-Mobile etc. have been in a bit of a race to roll out this 5G service and we're not sure about you know the pros and cons of it. I remember I was the keynote speaker at an annual meeting for a bank here recently and in talking with them.

: [00:19:19] Afterwards a lady came up and said So, what do you think about some of the problems that are being caused by the wireless networks in our homes and I said you know I'm I have an advanced class amateur radio license I just had to renew that by the way. It's good for 10 years. But anyways haven't the vans cost him license and I know of a lot of studies that have been done about this type of radiation. Now people get concerned right. Hold on. Yes it is radiation. You are getting radiation from your cell phone but it is not ionizing radiation is not the type of radiation you get from a nuclear fuel source that can kill you. Right. This does not destroy your cells. Now some people are concerned because of the resonant frequency of water two point four gigahertz. Right. All of that sort of stuff I get it I get it. But I was talking to her and I said hey you know bottom line in the ham community we've been studying this for what 100 years now and there is a slight increase in cancer amongst Ham’s but it's also very hard. To normalize for the Ham’s that actually make things they make their own transmitters. They are smoldering. They are at boards right. So, they're exposed to all kinds of harsh chemicals. Now how do you normalize for that. I don't know. But basically, they're saying yeah there is no direct correlation between our cell phones and various types of cancers. And then she went on to tell me how she had some form of brain cancer and they were attributed to her using her cell phone a lot.

: [00:21:06] You know it may be that case might be true. Typically, that's not a problem but when we're talking about the 5G wireless one of the major differences between 5G and the 4G LTE we're using today is that 5G technology needs more transmitter sites. So they've got all of these transmitter sites now in the cities. You've got to think about what they're going to have to do. Basically, they're going to have to install new antennas roughly equal to the total number of cell towers built over the past 30 years. So, in order to support 5G which requires you to be very, very, close very close to the antenna. How do you get close to the antenna while you typically just move the antenna close to you. Right. And tada, you're close to the antenna so moving the antenna closer to you means need a lot more. And think about the last 30 years. All of the cell towers that have gone up. It's almost 2020. So that means since about 1990 or the late 80s basically every cell tower that's ever gone up. They're going to have to do that again. 300000 new antennas and there's a lot of outrage or some alarm in some neighborhoods as antennas are going up around homes now. So interesting problem. We'll see what happens if 5G isn't in your neighborhood yet. It will be soon. So, keep an eye out for those increased data speeds. I got to mention this again for those who are just joining us on the radio. 

: [00:22:58] The FBI router warning. Yes. This is real. No this is not a hoax. Yes, there are some things you can do about it. If you texted me this week I send to a lot of detail and to do I sent you a lot of detail on all of the individual devices that we know are vulnerable that are been hacked to right that are being hacked by apparently the Russians they are using this hack to take all of your data and send it back to Russia so that they can gather things like your bank account information. Right. That's what they really want and more information and also use your device to launch attacks against other people. Now that frankly that's a really, really, big deal in my book. How would you feel if you knew that your small business router or a home router was used to attack somebody and you know it was used for ransomware, or it was used for something even worse. We know that al Qaeda and ISIS have used compromised systems to spread their information to show videos of Americans being beheaded. Imagine that being on your or your home machine and having the FBI show up at your home asking about what happened and were there to check it out. If you don't have the information I can send it to you. I have some stuff up at my Web site. There is a lot more for those people who are in my insider membership site. It's all free. I opened it up to listeners who need access to this information.

: [00:24:41] But you have to text me text me directly Eight, Five, Five, Three, Eight, Five, Fifty-five, fifty-three.

: [00:24:48] I'm not going to bombard you with texts. OK. We're making this simple Eight, Five, Five, Three, Eight, Five, Fifty-five, fifty-three. I'll be glad to send you the information not just about the FBI warning but answer questions about your router and how you know during the week. Visit me online Craig Peterson dot com. You can follow me on Facebook or Twitter and all of today's articles you should see in the e-mail newsletter that you got this morning. If you're not on my newsletter list, make sure you sign up. Craig Peterson dot com. Have a great week. Talk to you later. Bye bye.

---

Related articles:

Major Home/Small Business Router Vulnerability

The FBI Router Warning - What To Do

Fiat Chrysler warns 4.8M Jeep, Dodge, Chrysler and Ram owners to not use cruise control

How Social Media Became a Pink Collar Job

How to renew your body: Fasting and autophagy

Hospital launches rehab clinic to treat cryptocurrency addiction

Here’s Mary Meeker’s essential 2018 Internet Trends report

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1