Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: July, 2018
Jul 28, 2018

 

Google said they would not be reading your email.  Good News.  Listen in as I tell you what you probably don't want to know about Gmail's dirty little secret.

There is a new report out from SANS. Today, I will discuss what it said about Anti-Virus. 

Can you believe the Military is using home grade routers and then not even changing the default password?  We will discuss what led to some very important military documents showing up on the Dark Web and how it could have been prevented.

There is so much to talk about that I ran out of time so be sure to check out the related articles below.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/28/2018

Gmail's dirty little secret. Anti-Virus is now ineffective - SANS report. Stolen military drone document.

Craig Peterson: [00:00:00] Hi everybody. Craig Peterson here. Thanks for joining us today. I don't know if you can hear that little Roomba going in the background here, she's cleaning up the room. We have we have a few things to talk about. This one is going to be kind of interesting. How well do the global warming predictions stand up? Because we've heard that. Of course, our whole world is about to fall apart. We're going to drown if we live in Florida, and everything is over with. You probably remember some of this, we'll talk a little bit about that. This is very, very cool article from the Cato Institute. We're going to talk about app developers, here when it comes to Google. They have committed to not reading your e-mails, but the same is not true. Yes, the app developer, so what are they doing. Did you realize thi?. Yeah, Hey, we have lots going on there. 

[00:00:52] Yeah.

[00:00:53] Half of cyber attacks are, well, more than half, are undetected via antivirus software. Talk about that. A new report, a new study coming out of SANS, the SANS Institute. We've got military documents stolen. Some plans here, about the drone the number one, in fact, drone, in the U.S. military the MQ9 Reaper drone, and it's all because of something I warned you about here on this show a few months ago if the military had been listening in. I know they do. But, if these guys have been listening in the military, we wouldn't have lost those secret documents. Google. We're going to talk about how they now have had no phishing incidents. More than eighty-nine thousand employees. How did they do that? Well, we'll talk about that the top voting machine vendor has admitted something that I suspected for a very long time. Yeah, how can you trust vendors of software, and make sure they don't install backdoors. How can you do that? Yeah. Well, we'll talk about that a little bit. You know I'm thinking about it we're not going to get all of these today. You ought to check them out on my Web site Inside Facebook and Twitter. The artificial intelligence battle going on over our social lives, and Data, as a fingerprint, in fact, data is a fingerprint. We'll talk about what that means to you, as well. Because you're not a safe and private online as you might think you are. All right, let's see how far we can get today.

[00:02:36] All right. We're going to start here with tech's dirty little secret. Now, we know about Facebook. Do you see their stock this week? Wild ride. I think that Facebook stock was down 25 percent at one point. The way Facebook has been treating its users is just abysmal, frankly. You do remember a few years ago we talked about this, on the show here, but a few years ago when Facebook decided that if you liked somebody's page, so let's say I had a page, which I did, online and a lot of celebrities had a page on Facebook, as well. And they would post stuff for their audience, the people that liked them, Right. So, you could follow any kind of celebrity you wanted on Facebook. You could follow somebody that was a musician because you enjoyed their music and there's a couple of them out there that I really enjoy, some new guys. Anyhow, you could have the musician you could have someone like me or maybe another radio personality, whomever so you follow them, you like their page on Facebook, and when they posted something it would show up in your feed. So, you would see what they had to say, and that was the idea, Right. You followed them, you like them because you wanted to see what they had to say. It is that simple enough for you. And, what's happened now is Facebook says, ok well you have a million followers I'm going to show your post to maybe 500 if you want your post to be seen by more people. You have to pay. And, they do that to me all of the time which is why, I'm not a, you know big Facebook user. Well, one of the reasons, about a big Facebook user but I do post stuff up there and they say "hey pay five bucks, and we'll go ahead, and we will show your post to more people."

[00:04:27] Well, wait a minute these people said that they wanted to follow me. They wanted to hear from me. Why do you not show them my information? So, a lot of the big celebrities just said forget it. Some of the people that had more than a million likes on their Facebook fan pages said forget it, I'm gone. They deleted the whole account. They left. Now, this is a few years ago. Fast forward to today. We've got Facebook doing, even more, deciding because they're the Decider, more deciding about what it is you might want to see. What you don't want to see. Doesn't matter what you say, doesn't matter that you like the page, doesn't matter that they're a family member. If it says congratulations. OK great. They give high your ranking and you're more likely to see it. But, I want to know what my family members are saying. I want to know what the people I'm following are saying. Is that too difficult? Is that something that Facebook can't do for me? Right, I think that's a really, really, big deal, frankly, because that's why I was on Facebook in the first place. To find out what these people had to say. But no, Facebook is busy trying to gain you to get you to click on something to feed you stuff. And particularly those people who are libertarian like myself or maybe they're conservative. And Facebook has been using academics to come in and spend some serious time helping them develop their algorithms. And you know the academics know better than you do. So, they're going to give you what they think you should see which does not include anything that isn't on the Socialist Left, Right. 

[00:06:13] That's kind of the bottom line on this.

[00:06:16] Obviously they're not going to feed anything from the hard right. But the question is? Where's that line? And, so just a regular moderate conservative person who's out there, middle of the road, is considered to be too far to the right by many of the algorithms. So your information is put out there. So, there's a lot of reasons people aren't using Facebook, the way they used to. Their profit forecast was down. So, their stock went way, way, down. And, they've been penalized, Right. The free market at work. Well, Google is getting into, say it has gotten into, and it's continuing to get into some trouble as well.

[00:06:59] What's been going on on the Google front is kind of interesting, because Google was going through all of your mail. If you had Gmail Google went through it. They were looking for things and showing you ads based on what was in your e-mail. So, you know people kind of got upset because all of a sudden Google would be sending out a message about your bereavement. Because there was an e-mail about some uncle Dying or something and you would wonder about those ads. What are those ads all about what's Google doing here? And so Google, committed this was what, two or three years ago. 

[00:07:32] Committed to not going through e-mail and while the dirty secret is that they may not be going through it, but a wall street journal examination found that app developers, software developers, who are using Google's API's are going through your e-mails. One of the companies that they had a look at and this is from an article from Douglas Macmillan over at the Wall Street Journal. One of those companies does Return Path Inc. Now they collect data from marketers, they scan the inboxes of more than 2 million people who signed up for, one of the free apps and Return Paths partner network, using a Gmail, Microsoft or Yahoo email address, so, think about this. Think about the that what was that silly game, that people used to play over on Facebook where you are planting things you know you're a farmer. What is the name of that? If you know the name. Go ahead and text me 8 5 5 3 8 5 55 53 8 5 5 3 8 5 55 53. I can't think of it, anyway.

[00:08:41] Those games when you sign up for them the app developers now gain access to certain of your information, and they don't have to be a game. They can be a tool, and you might remember of course that's what Cambridge Analytica was doing, yeah take our survey and now they've gained access to all kinds of Facebook information about you and your friends and their profiles. Right, then that's why they got into so much trouble. That's why Facebook, also this week, got this huge fine from the European Union. The maximum fine possible under this new G.D.P.R which is the new data protection policy. So, they levied the maximum fine possible which really, Facebook's not going to notice, from a financial standpoint, because it's Facebook just makes so much money. 

[00:09:29] So, Google is giving that information away. You've got to be careful. Oh, yea Farmville. That's what it was. Thanks, guys. Farmville. There are a few of them I guess but that's when I was thinking I was Farmville. 

[00:09:43] So, Return Path is one of them.

[00:09:46] They're analyzing about 100 million emails a day, apparently, and at one point two years ago Return Path employees were reading about 8000 unredacted emails, employees. Okay, real people reading your emails per day eight thousand a day, while they're training their software. So, in another case, we've got Edison software which is another Gmail developer. They make this mobile app for reading and organizing your email. They personally reviewed the emails of hundreds of users to build a new feature and that's according to the company's CEO. So, letting users, employees read private potentially private right not necessarily all e-mails private but you know you consider e-mail private, don't you. That's a reasonable expectation, isn't it? You'd be upset if you found out people were reading your e-mails, Right. So, in this case, it's become common practice, for employees to read your e-mail. And frankly, it's a dirty little secret. Now neither Return Path or Edison asked users specifically if it could read their e-mails. They were just granted access to it. Really, really, bad news here. Now Facebook has allowed outside developers to gain access to the user's data, we know about that because of the Cambridge Analytica breach. Facebook says it stopped it in 2015. We're not going to go into all of that, but it's it's really kind of interesting to look at all of this, but remember, your data is not your data. Again, you are the product, right? We keep having to say that but a lot of people seem to forget about it. You are the product, you are not the customer? So, keep that in mind as you are going online and use your free e-mail and your free Facebook site to your free ecetera. Right. It isn't free. There is a cost

[00:11:55] All right, it is cyber attack time here, with Craig Petersen. You know, that's what I do for a living. I don't attack people I protect them from attacks. In fact most of the time I get involved with a company when they have already been attacked. I picked up three or four new clients, this week alone, that have been attacked. One, of them, basically lost all of their finances. This is a small family owned business and they made, really kind of a cool little device, and wow, things things are bad when your bank account information is used or when your payments are redirected from you when the hackers get into your computers now, gain access to your bank accounts and just wire the money out, it's gone in 90 seconds. it's just nuts what happens out there while SANs came out, the SANS Institute.

[00:12:53] Now, these are great guys and gals, obviously, but the great guys and they put together a number of training courses that you might want to check out, online at SANS dot org. Now one of the things they do is obviously they keep track of the exploits, and they just came out with their 2018 survey on Endpoint Protection and Response. So, they polled almost 300 I.T. information technology professionals. They asked about endpoint security concerns and practices. This year's survey. I want you guys to think about this for yourself. How do you measure up? Where do you fall in? In this survey, if you were asked OK. 42 percent of respondents reported and point exploits. So, that's pretty darn high. That's almost half as getting close to half of the respondents. These are information technology professionals, so, these are people who know the bottom line here of whether or not they're hacked, at least they're supposed to. And, almost half of them said that they did have exploits on endpoints. Now what the endpoint? Those are your computers. Basically, it's your Windows machines for the most part. Maybe your Mac? your Linux machine? Etcetera. Now, what's good about this is they're saying that's down from 53 percent last year, but the number of those who reported that they didn't know that they'd been breached, jumped from 10 percent to 20 percent.

[00:14:36] So, maybe we're getting a little less honest, in some regards, this year with the tools, now.

[00:14:43] You know I've talked about this before, in fact, if you attend one of my webinars I'll go through these stats but what is being reported right now, from our friends over at SANs is, that your traditional antivirus software, just doesn't work anymore. Antivirus systems, according to the survey. Now, these are professionals right. This isn't me. This isn't some marketer, right. Do you believe these guys? Do you believe these I.T. professionals? Well, they're saying that the antivirus systems, the traditional antivirus stuff, only detected endpoint compromise 47 percent of the time, 47 percent. Other attacks were caught through various types of automated alerts end point detection and response platforms, 32 to 26 percent. OK, so the most important attacks are intended to exploit the users. More than 50 percent of respondents reported drive-by incidents on the web. Now, all of this stuff is preventable and I think the industry, the security industry is doing everyone a huge disservice because they're all tooting their horns about how great they are and yet they are not great. None of the standard antivirus software companies you can think of, none of the standard firewall firms you can think of, None of these guys are actually anywhere near as good as they need to be or should be. And, I've I've said this before, right.

[00:16:27] And so how can you believe their marketing. You've got John McAfee out there the founder of McAfee anti-virus saying McAfee antivirus is the worst. You've got Symantec senior executive saying yeah, antivirus is dead, don't use Symantec because it's just not worth it. And, then by the way somehow leaving his position the next day, it's just amazing. So, it goes on and on but, credential theft was used in many of these compromises. So, keep an eye on that. Keep an eye on phishing make sure you know what's happening. You want to use a really, really, good stack. You're not going to find that frankly from anybody, right now except Cisco. And unfortunately, it's not just antivirus software, anymore. It's what we're doing now. And what you're going to see most of the really good security professionals doing is a layered approach. I mean layered, layers, upon layers, there's multiple layers, on the endpoint on the multiple layers, on your computer. There's multiple layers on the network, and there's multiple layers of the network edge, where you might find a firewall. Okay. So, keep an eye out for that. And while it's disappointing but somehow this SANs survey is not surprising. Things are getting worse in Anti-Virus Software it's effective in less than half of the cases.

[00:18:04] Speaking of antivirus and hacks, we talked on the show before, and it was all over the news about what the FBI had to say. Now, you know I worked with the FBI pretty closely I run their, national webinars for the entire InfraGard program which is the infrastructure Guardian stuff. Check it out online infragard dot org if you're involved with protecting your company's physical facilities or maybe your data facilities networks and stuff check it out, infragard dot Org. There are chapters, everywhere, there's like 80 chapters I think eighty plus nationwide and there is every state even here in New England. We have these chapters, so join your chapter. Keep up to date know what's going on, it's so important to have that information, in fact, you got to the webinar, I'm doing, again. We bring in experts, right. But in a few weeks and we're going to be talking with FRSecure, about this very issue here of how do you do security because you know you mentioned before the break in the last segment here how we have multiple layers on every part of the whole infrastructure. Well, he goes into some more detail where he's talking about the employees and the physical infrastructure. It's all well and good if you got the best of you know firewalled and anti-malware prevention and protection software and IDS and IPS, and all this stuff. But what if someone walks out the door with your server? And that's part of the HIPAA regulations. By the way, if you are involved with a medical practice, you've got to make sure all of your devices are physically locked down. All right, So, there's a lot to know, a lot to remember, a lot to learn.

[00:19:52] So we'll be we'll be having him on. I just recorded the Web an hour with him yesterday, in fact, we're having him on soon. So. FBI warned and I brought it up here on the radio show too before the FBI warning came out warned globally that there are hackers who have hacked many of our routers. If you're using a router that has not had a software update a firmware update in a while? Particularly if you're using a lower-end router like a small business router or a personal router for your home. That device has been used, to send all of your data to Russia where important information is harvested out of it, and then it is sent back to you. So, you don't even know it's happened. It's really bad. Some of the stuff is crazy complex that they're doing. So, if you have not updated your router yet, I've got an article about that up on my Web site that leads you through, gives you step by step depending on who the manufacturer is. Some of the older ones you will not be able to update or upgrade. If you have a true business class router, a higher end router, and firewall something you pay north of two-thousand to five-thousand dollars for. And, by the way, you should be paying around five grand for a decent firewall, nowadays. But if you have one of these you're probably OK, at least for now. This article and I mentioned this is the beginning of this show is mind-blowing, because it's our number 1 drone out there, the MQ 9 Reaper drone. This is the number one drone, the top in the world. This thing can send missiles and can just do all kind of stuff. 

[00:21:46] Well we found online in the dark web and by the way, I hope you're doing Dark Web scans for yourself and your family. But we found or having them done, we found out there, the plans not for the reaper itself, but the entire maintenance manual, manual on the MQ 9 a reaper, wow, ok. This is the maintenance. This is Delta training is included in this where it's showing how to use the reaper to attack and to blow up IED's that might be on the road. How to hit a convoy, OK. All of this information and it is being sold for, drum roll please 150 and 200 dollars, for the lot. 

[00:22:39] Isn't that something. How did they get the information? 

[00:22:44] Well, turns out, that apparently, and this is according to bleeping computer, here, Kaitlynn but apparently the military bases I.T. team had not changed their routers default F.T.P. credentials. In other words, the default credentials now they're using a Netgear

[00:23:08] router. WHAT???? That is a personal home router, it is not military grade, it's not business grade. What the heck are they doing, using the Netgear Router or are they NUTS? And for two years give or take we've known that these Netgear routers have a default set of FTP credentials. 

[00:23:34] So, the hacker also bragged about accessing footage of the MQ 1 Predator. My gosh what's going on?

[00:23:44] So, if you're a business don't use these things! If you're the military, what the heck are you doing using these things? And if you're just a listener wondering what's going on, Appreciate you joining us today. Craig Peterson, of course, you can visit me online, all of today's articles including the ones we didn't get to like, 30 years on how well did global warming prediction stand up. Quick answer. They didn't.

[00:24:08] And Google's 90000 employees how did they stop phishing. I'm going to have to do a special on that one. Top voting machine vendor admits it Restall installed remote access software on voting machines, that were sold to states. Your data is a fingerprint. And Facebook, Google, Twitter, they're all using AI to battle over your content. It's kind of interesting lots of stuff. Of course, you don't have time to get to it today. But, I appreciate you guys joining me. Visit me online Craig Peterson dot com. Make sure you get my alerts. The only way to do that is to text me.

[00:24:47] You can ask any question, you can sign up for alerts, whatever you want. 8 5 5 3 8 5 55 53 8 5 5 3 8 5 5 5 5 3. Have a great week. Thanks for joining us. Bye-bye.

 ---

Related articles:

---
Gmail app developers have been reading your emails

Inside Facebook, Twitter and Google’s AI battle over your social lives

A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States

Google’s 89,000+ employees have had zero phishing incidents since switching to hardware security keys in 2017

Thirty Years On, How Well Do Global Warming Predictions Stand Up?

‘Data is a fingerprint’: why you aren’t as anonymous as you think online

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 25, 2018

It's Apple's App Store's 10th anniversary, find out why you should delete your old apps.

 

Craig is on with Ken and Matt as they discuss the tips and tricks for apps as well as some tips from a white hat hacker on what you should do to stay safe online.

 

Find out more on CraigPeterson.com

---

Related Articles:

On the 10th anniversary of the App store, it’s time to delete most of your apps

A Real-Life Hacker Reveals What You Should Stop Doing Online

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/25/2018

Why You Should Delete Old Apps - Secret Tips To Staying Safe Online

 

Craig Peterson: [00:00:00] Hi everybody this morning I talked about some of the tips and tricks for apps. It's the tenth anniversary of the app store. So going a little bit of detail. We really need to think this through. I also talked about some of the tips from a white hat hacker what should you be doing online. What do you need to look for online. What should you not be doing online. So all of that and more this morning with Ken and Matt. Here we go.

 

[00:00:27] Craig Peterson joins us every Wednesday at 7:38 and guess what. It's seven thirty eight. So it's time to Craig Peterson. Wow.

 

[00:00:35] I'm doing good. Hey that's really quite the coincidence isn't it.

 

[00:00:38] It's weird the way my favorite is. Got to get Can't Get No Satisfaction by the rolling SCENE I The Greatest Rock Roll song.

 

[00:00:45] If you're on a desert island you had to do something on repeat every day for the rest of your life.

 

[00:00:49] I'll be the one that would be the one that you know the Stones were just the all to it. I'm a kind of a blues guy and of course rock n roll history is kind of in the blues.

 

[00:01:00] And it's very bluesy and rock'n'roll and I just love that is the greatest rock'n'roll song of all time even though it's not my favorite. I think it's a great little song of all time. Yeah yeah exactly. It doesn't make me cry either by the way this is supposed to make you cry. No no I was saying the song Suddenly Seymour from Little Shop of Horrors. Every time I hear the song I said oh that was a good movie too.

 

[00:01:25] Not the original but the one with Rick Moran.

 

[00:01:27] He was fabulous that you haven't written Maraniss. It's kind of been like at my age for like 20 years right. Did the did the Ghostbusters movies and the Dead I shrunk the kid in 1984 like 1989 movies I remember He's Canadian so he kind of faded into obscurity in the U.S..

 

[00:01:45] What are you saying about Canadian.

 

[00:01:46] He used to do a standup stuff up in Canada and you know second city and all that sort of thing in Toronto. And then of course he got those movie roles down here. But it was it was Bob. Dave. Dave Dave and Doug.

 

[00:02:01] But I'm trying to remember the Hoser thing you know they had a whole staff he and might go in 2009 he did Bob and Doug but then in 2000 didn't go to those on TV. GOLDBERG Yeah.

 

[00:02:17] So yeah nothing really big but he's done a bunch of stuff up in Canada where the government forces people to play Canadian content because so much with Voltaire. I mean it's great stuff but so he's had a lot of stuff up in Canada but really not so much down here.

 

[00:02:34] So over the years Sanatan anyhow bigger than Rana's. I have like 300 apps on my phone. Today is an important day in app world particularly when iPhone users. Wouldn't you agree.

 

[00:02:50] It absolutely is. And I don't know Danny had I guess he didn't have the drum.

 

[00:02:58] What's it called you know drum roll drum roll.

 

[00:03:00] No the snare drum you do it right on the edge.

 

[00:03:04] Any rimshot rimshot Sheargold.

 

[00:03:07] There we go for the perfect segue because yeah it's kind of fun because it is the 10th anniversary the App Store. And if you pull out your phone right now can how many apps are on there that you just have not. Well I have about 300 apps and I'd say about 200 97 I don't use exactly what you're about normal. And then over on the math side this is where the real danger comes in is for Android users how many do you have.

 

[00:03:36] Matt Yeah. How many apps do I have. Yeah I would say probably about 80 or 90. It's not that bad maybe.

 

[00:03:47] Yeah you're probably a little bit more normal here when the Apple App Store opened it had 500 total apps on it. Now it's got more than two million and it has been 10 years now. Over those 10 years Apple has continued to vet apps and deleted apps. It has gotten rid of some of the apps and the whole idea behind look at your apps doing inventory is because of security. Now whether it's an Apple app or an Android app your app is going to many times go out to the cloud. It might be using some sort of a cloud service or searches or other things out on the cloud. So even if the app itself is perfectly safe what's behind it in the cloud might not be safe according to today's standards because we've got all kinds of new ways to hack into things. Now on the Android side the apps just don't get the vetting that they get over on the Apple side. And we know about some of the wall papers for instance on Android that were actually stealing all your contact information. Even banking information and sending it up to the bad guys.

 

[00:05:01] So the story here the motto of the story anyways is if you have app it's probably a great time to go ahead and look at them. Get rid of the older apps because they're not vetted like they should have been but you can't get and you can't get everything on the back end up in the cloud. And if you have old Android apps you might really be in very big trouble. So go through get rid of the older apps make sure you keep those apps up to date with the latest versions of them. But some very very big security problem. And by the way you know Ken you mentioned that you probably only use three of those apps. That's actually not abnormal most people do not use most of the apps that are on their phones. In fact the average person's only launch in about nine apps per day and that includes by the way your phone and messages and you only are using about 30 apps over the course of a month. So if you have more than about 30 or maybe even 50 apps on your phone it's time to Collina them.

 

[00:06:10] I will say that some I use some of the travel apps like de guru and next flight. I use Fregoli when I you know I will use all the time but when I'm when I travel the very alpha1 you know you all obviously I use quite a bit on around as I use quite a bit. So there are some I used pretty frequently Ghafar apps.

 

[00:06:31] Yeah well I'm the same way. I have a lot of apps on my phone that I use regularly. Like you mentioned flying or on vacation or whatever those apps of course are important to keep on the phone now there's a new trick I don't know if you knew it on your iPhone but now you can tell if you go into your settings general iPhone storage it gives you an option called offload unused apps.

 

[00:06:56] So what that'll do is automatically delete apps that you don't use that you do not use regularly but it saves all the documents saves the day to go with them and you're going to have to read download those apps if later on you decide to use them again. But it's something that could save you some space on your phone. And Apple is not removing them if you don't need to remove them. So in other words if you turn this on and they offload unused apps you turn it on if your phone gets tight on space it'll just start shooting these old apps ones that you're not using in the head. It will remove them from the phone it'll keep your data but it'll start saving space way.

 

[00:07:38] Do you know what period of time you like is it if you don't use it for a year or I mean do that.

 

[00:07:43] Well it depends on how much space you need on your phone. So it's going to start deleting the oldest ones the least used let me put it that way not the longest I've been on the phone. But I was going to start deleting them kind of one at a time as you need space. So if you're for instance you're downloading movies from Netflix or something onto your phone. Is certain to run tight on space. It'll start moving at least to use used apps or at least recently used apps from your phone. So that's what it does it isn't like anything old in the three months it's going to whack it as you need space. It'll start deleting the older one.

 

[00:08:18] Well now that I'm answering a look at my phone and the apps I've been sitting here playing Snake versus block for the last five minutes. So the last question I have for you before we let you go for the day is related to what you should and shouldn't be doing online and I guess the reason I'm asking that is because there is an actual hacker who has like a real life hacker who's who is revealing to the general public like kind of the dumb things that they do that maybe they shouldn't be doing online.

 

[00:08:45] What are these warning things that he's telling us not to do father's black hat and white hat black hat or the bad guys in white hat are the good guys in this case. It's actually a lady named Stephanie and she is a hacker of sorts. Hackers didn't used to have the bad connotation it has today. But hackers nowadays I mean someone who is trying to break in and she has been doing this for quite a while. But what she's advising her to do is just kind of some very basic things here. OK. Don't post stupid stuff online. That's kind of her big number one. You know when you're younger you just need you don't have any sense at all. Sometimes those things will come up with you particularly when it's time to go to college or get a job OK. So that's a very big deal out there.

 

[00:09:38] And some of the things that you've seen it's just amazing. New home owners taking pictures of their new house. And those pictures getting uploaded member those can be geotagged and that obviously now gives a physical location for your new home. Easy to find online. That's another one of her things. Now there are apps you can run on your phone Android or iPhone that will remove the geotagging before you post your photo. And that's something I always advise people do. You know you're taking pictures of a kid at a soccer game for instance and you're uploading them those now are available for their friends to use. And you know about bullying. And I was certainly bullied as a kid. Now today's bullying follows you all the way into the house because there line these bullies from other kids from schools until they can find out where you go after school where you're playing soccer where your home is. Don't upload geotagged employees and then there are pictures and then the employees here too. Same problem. Taking selfies with complete disregard for what's in the background of the picture. So they could be password sensitive information on white boards computer monitors voicemail passwords other passwords taped to their computers and desks and walls. So some people even post pictures of their paychecks. This is not Stephanie had some great advice on what to do what not to do. And I've got all of that up on my Web site right now.

 

[00:11:12] Links to her article to Craig Peterson our tech guru you can go to dot com. Get all of his information all the time. Join us every Wednesday at 7:38 thanks. We'll talk to you next week.

 

[00:11:25] Take care gentlemen thanks.

 

[00:11:26] Thank you Craig. We're going to take a quick break.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 24, 2018

Have you ever wondered about the technology behind the signs you pass by as you drive down the road?

 

Listen as Craig and Jim go into some detail about the billboards and road signs watching you and why you should be extra cautious now with your smart device because it is getting monitored.

 

Find out more on CraigPeterson.com

---

Related Articles:

New road signs can detect mobile phones are being used in vehicles

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/24/2018

Road Signs Watching You - Billboards Tracking You - Police Using You To Track Yourself

Craig Peterson: [00:00:00] Hey everybody Craig Peterson here. Have you ever wondered about those signs as you drive down the road while there is some technology we're going to talk about today with Jim Polito that goes into some detail about why you should be extra cautious now with your smart device because it is getting monitored. But also we talk about these new electronic licenses the ones for your cars as well as the ones for your smartphones. What are they going to be used for good or evil. You know are you going to get caught because you maybe went a little too fast last week. Wow all of that. More with Jim. So here we go stick around talking about Craig Peterson

 

[00:00:49] High tech talk to. This is a great one. Going to talk to us about the 10th anniversary of the app store but you should celebrate it by deleting most of your apps. But here's the one that caught my attention. New road signs can detect mobile phones are being used in vehicles. Joining us now our favorite Canadian and tech talker Craig Peterson. Good morning sir.

 

[00:01:20] Good morning Jim.

 

[00:01:21] Craig wait a minute. Now we've heard about red light cameras so they catch you running a red light.

 

[00:01:28] These are these devices can tell if fine texting when I shouldn't be texting.

 

[00:01:37] Good morning. Yeah I don't know. This is kind of concerning isn't it. You know we've got already billboards up that can detect a car an individual car. It reads the license plates and it knows hey you pass by this sign every day about this time. Now it also there's also tech out there that recognizes this type of car you're driving. So all the way down to the brand and model of the car. So for instance if there's a lot of high expense so high end expensive cars driving by the billboard will change because now they have a new audience that they can market something to. Wow. Which is. Yeah isn't that something. In the case of a car coming by the same time every day if it's like the only car on the road they can actually narrow it right down. You know I see this car coming so I'm going to show this ad that he comes by every day and they try and influence your behavior. Now think about tying a bunch of those billboards together. So they came and know where you go where you drive because the courts have ruled again and again there is nothing illegal with these readers. Right your driver's license right.

 

[00:03:00] Right so that's step one. It's the employees you know the next step is they are detecting your mobile phone. Now this is really kind of interesting because your phone is typically always giving out some information about itself and about you obviously being aware of who owns me. Yeah. Well the basics are with the phones all have an identifier that's built into them and that identifier is used by your Bluetooth device or your Wi-Fi device that unique identifier so you can connect to a Wi-Fi network. Now Apple made some real cool technology changes here a little while back then really led the field on this one so that if you if you walk into you walk into a store and you have never connected to their Wi-Fi network it uses a random number to identify itself. So every time you go into that store the store thinks hey this is a brand new phone. I've never seen before but if you do connect to the store's Wi-Fi your phone says oh I've seen this Wi-Fi before so it uses the same identifier used last time. Therefore a company like Wal-Mart if you use their Wi-Fi and I'm not real I'm not really picking on Wal-Mart.

 

[00:04:23] I understand. Yep.

 

[00:04:25] So you walk into the Wal-Mart store and now the Wal-Mart store says oh I've seen that phone before. And there is technology that is in some stores out there that will track your movements through the store based on your cell phone. So you connect to the Wi-Fi it knows where you are knows you posit a certain point in an aisle and then the analytics are already there where it looks at it all and says Oh what kind of a shopper is as a person. And then when Jim goes out to the cash register here to check out it knows oh ok. So now we can associate what you bought with where you were what you looked at. You know all of this sort of stuff and we we've talked a little bit before about Wal-Mart and how Wal-Mart has now got a patent because of a couple of weeks ago on listening devices. So it kind of could tie this all together. So what we're talking about. So now we move on to our roadsigns here and that type of technology moving over to the roadsigns. Now this is really kind of interesting. And they're looking at this in the U.K. right now because in the U.K. just like here it's illegal to use your cell phone when you're driving. So what these mobile phone doctors are doing that they're putting into some of these signs in the road and not just the big billboards but can be any sign is they're looking again at the signals from your cell phone. And if you're actively using your cellphone to send text messages or receive go online. You know we know the data packages and stuff in there. If you're actively using your phone that's easily detectable even though they're not necessarily monitoring what you're saying because your phones are encrypted to embrace encrypted so that right.

 

[00:06:20] Right. So they can tell if I'm doing that and then they're going to send me a warning kind of like the speeding sign that they have you know it says speed limit. And it sat up and says your speed. 75 miles an hour you know the speed limit is 45.

 

[00:06:39] It tells you that it's going to do the same thing.

 

[00:06:43] Yeah this is Norfolk County over there the UK and they are planning on doing this as of the road safety team. So run a bit more Stephanie on this which is where Californians are now. Yeah California is already experimenting with digital licenses on the cars themselves. So your car will report is a little act of device that there are in your life and your car will report your speed. Massachusetts has already got some work underway on your cell phone. Driver's license there's one state down south that already has that. So think about this for a minute. When you're talking about a driver's license on your smartphone. So you don't have to carry your wallet or credit card against people carrying those like they used to because everything is of no use Apple Pay to use.

 

[00:07:41] Right. Right.

 

[00:07:42] Yeah. So mean you've got an app issued by the state that the cop can come up and read and he's got all of your information. That app has access to your TPSAC your speed your travel history everything. So that app could also be reporting on your driving habits what you're doing on and on.

 

[00:08:06] Is speeding you know just the basics are you are you are you are you last week were you speeding last week.

 

[00:08:17] Know so we've got some interesting privacy concerns coming up right down the road at us and some of this tech is already there and it's already being experimented with excellent metaphor coming down the road at us folks.

 

[00:08:29] If you text my name to the number the Craig Peter sends about to give you you'll get this story and many others including the story about the 10 year anniversary of APS and why it's time of the App Store. It's time to clean out your apps. Craig Peterson will send all that information to you no charge and he will not annoy you. So text Jim 2

 

[00:08:57] 855-385-5553. That's 855-385-5553 and standard data and tax rates apply.

 

[00:09:09] You'll get this information. If there's a major hack he will notify you he will not sell your name you will not try to sell you something he will just provide you with information like he does here every Tuesday every Tuesday. Craig Acción segment. Appreciate it. And we'll talk with you soon.

 

[00:09:28] Thank you sir. Take care. Bye bye.

 

[00:09:30] Thank you Craig Peterson everybody. Great guy. We will podcast that in case.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 21, 2018

Did you know that it has been 10 years since Apple introduced its app store?  Today I will discuss app hoarding and how you can do a little "spring" cleaning on your iPhone.

Have you been hacked?  If not you are lucky! Today, I will talk about how 2018 has turned out to be a banner year for cyber breaches.

Did you know that small business is under attack?  I will tell you about why and some of the things I have uncovered.

A reminder.  If you have not already replaced your Router - You need to do so.  The malware is still out there and it is still causing issues with the lower end routers.

There was so much to cover this week -- I barely got started and time was up -- please read the related articles in this post to see what I thought was important this week.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/21/2018

Small business security and breaches. Why delete old apps and how. Worst cyber breaches of 2018

Craig Peterson: [00:00:00] Hey, everybody, Welcome to Tech Talk with Craig Peterson today. You know it's the 10th anniversary of the app store. Well not today, but just towards the 10th anniversary of the app store. So we're going to talk a little bit about apps today. Maybe it's time to do a little bit of, Well, it isn't Spring, either. but it may be some cleanup on your phone. We'll talk about why you should do that. We've got the worst cyber security breaches so far of 2018. This professor, we're going to talk a little bit about doxing, a New York University professor who is encouraging people to basically attack ICE agents. It's crazy, isn't it? Real Life Hacker reveals what you should stop doing an online DNA test. Did you buy one of these as Amazon Prime had them on special this week? We're going to talk about it shattering your identity. There have been some interesting stories about this new tech new road signs that can detect mobile phones being used in vehicles. 

[00:01:03] Now the director of National Intelligence. Dan Coats has a couple of words for us and I've got an article up on my site. If you have a Wi-Fi router you know we've talked about this many times, but have you done what you should do. I know a lot of people haven't because they haven't been calling me asking them to help fix it. 

[00:01:24] But, anyways how to make your Wi-Fi router as secure as possible. So here we go stick around. We've only got a half an hour

[00:01:38] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives. 

[00:01:48] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes I appreciate what you do with Forbes magazine for all these years it's one of my first go to places or talk right now with the guys and gals behind Siri. We're joined right now by the director of Kindle technology. We're joined right now by the CEO of Ebates Kevin Johnson on air for more than 15 years.

[00:02:13] Over 20 million podcast downloads. This is Tech Talk with Craig Peterson.

[00:02:20] You know I keep talking about trying to change that intro. And I still haven't done it right. There's just too many things on the plate. It's kind of like the cobbler's kids. Well' I picked up to new clients this week, two new security clients. These are both companies, and because of some serious security problems, they have had. And, I've been working more closely with the FBI as you know because of a couple of things, one this whole InfraGard thing and a few are involved with critical infrastructure if you are responsible for security for business physical as well as some of the security for your computers and other things you might want to look at infragard, I-NFR-A-GARD dot Org. This is an FBI to the private sector organization and they do a little you know kind of a background check on you and then they will sign you up and you can attend some of the local meetings held all over New England, there are some 80 chapters nationwide and you can be kept up to date and that's kind of nice because you get briefings from the Secret Service from the FBI Ecetera. And you also get to attend the webinars that I put on for the infragard members for the FBI. So, check that out as well. But I've been working with them on a couple of different cases it's really kind of interesting the cases but the latest one is just this week. Wow. We had talked with this company last week and the last excuse me last year and the company a small company. 

[00:03:57] Right. That's obviously what happens at all small companies, being really big targets. They were targeted and there was what's called a whale attack against them, and they only found out because of some weird e-mails. Now, this has got to be a record here because I think the most recent clients we've picked up have all noticed a problem with their e-mail. Something weird is going on. So, we delved into this and it turns out that this company had been hacked, maybe. But in this case what had been happening is that they had the customer list which makes you think they've been hacked right. So, somebody has their customer list. They have their invoice format which also makes you think they've been hacked and they have their logo which of course you can get from their Web site, and they've been sending invoices to this company's customers. Now, this is a really big deal because in those invoices they said OK ACH the funds to this account. Now for those who don't know ACH is a way of sending money directly to a bank account or pulling money directly out of a bank account. We use it we use it to pay a couple of our providers and we use it for some of our customers to pay us. It's really handy but, it's also really actually rather dangerous because those guys have your bank account number. So, the bad guys were sending out invoices to the customers of this small business saying pay up and here's where I want you to wire the money. 

[00:05:41] Wow. And they did not hear about this from many of their customers. It's absolutely crazy. It's insane. So, we went in there. We reviewed everything that was happening and came up with a solution for them. We came up with a battle plan including tightening up all of their security, because they were running their own in the House e-mail server, which a lot of people do, and they did it because they wanted to be secure. They didn't want someone hacking a third party service or you know, there's so many ways that it could go wrong when you don't have your hands on it right. Well, it looks like it had been compromised. So, we're cleaning that up we're giving them a much better system that is much more secure. We're putting special clients on all of their machines, not just this normal anti-virus crap that doesn't work. Boy, if he didn't attend my last Webinar there's some serious news out there about like McAfee, saying McAfee is the worst product in the world. Norton saying, Yeah you know none of these products work, people. I keep getting called into business. They didn't work. I got another one. I've got to go to next week who has a major security problem, as well. So, it's been a very interesting, interesting week this week as I'm seeing more and more small businesses getting hacked and having money taken out. So, I'm talking to the FBI agent out of the Boston field office and talking with him about what we've found and what's going on and giving them account numbers and stuff and.

[00:07:21] He's talking. He's telling me about an indictment. I guess it just went out and about a company, very similar thing, and that bad guys got a half a million dollars from this small business. Five hundred thousand dollars. And, even though the FBI has indicted these people you can try and freeze bank accounts et cetera. But, the money's already gone, and I think well I know I've told you guys this is quite a while ago but a story about how doxing works, and how this lady over in the former Soviet Union had to use some of this data that she doxxed. It's an interesting story I should tell it again sometime. But, she was able to get almost 50 million dollars it was more than 45 million from this small-medium sized business, and it only takes 90 seconds for that money, once they have their hands on it. Once they have access to that account it only takes 90 seconds for it to be out of reach of U.S. law enforcement. That's how bad it is. So, you know welcome aboard to our newest customers this week as we try and straighten out the mess. I just wish people would do the right thing to start with. And, sometimes they do.

[00:08:41] And, you know Ron and Monica if you guys are listening, and you come to mind, you know growing the business you wanted to be safe. You're nervous because you didn't understand enough about it. Right. A small business. Somebody is responsible for the IT but there's not necessarily someone that knows enough about it. So, Ron and Monica came to us and they've been a happy client of ours here for a few months now. But, that's the exception right. Usually, people come to us when their whole world has fallen apart. That's a really, really, big problem. All right. So, we're going to get right now into the tenth anniversary and what you should be looking for. Now, it's my 10th anniversary its the 10th anniversary of the app store. I've been on the air now for over 20 years and I think that's about right. We're coming up on our nine hundredth show weekly show so 900 divided by 52. That's that's a lot of years and I appreciate everybody who listens to us and of course all of the sponsors of the radio show and you know without you listeners we would not be here so I appreciate that. Including the listeners of our podcast and people who are watching some of the stuff over on Facebook. Well, it is the 10th and well not today isn't the tenth anniversary as I mentioned earlier but of the App Store. And, I wanted you to look at your phone right now, your smartphone. 

[00:10:12] Open it up. I'm going to pull mine up here too and have a look and see on this app store, not the app store, but on your phone. How many apps do you have this screen? I bet you. Just guessing here I probably have a 1 2 3 4 5 6 times 4 is 24 per page and I have 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 pages of apps. 

[00:10:55] How many you have? That is all lot. So let me see 24 times 15 that would be 300. I have 360 apps on my iPhone. Wow. How many apps do you have? Well, when the app store debuted 10 years ago there were 500 apps total out on that app store. This is the Apple App Store obviously. Now, it's grown to over 2 million apps and people like me, I probably have more. I will I know I have more than 360 because I like a lot of them I've deleted and frankly most of us could probably delete a lot. Here are the statistics and I want you to think about your phone your devices here. But, this is according to a study that was done by Nielsen. You know those guys and they found that the average person launches roughly 9 apps per day, 9 per day and interacts with roughly 30 apps over the course of a month. So, for me, that means I have 330 apps that I just plain don't use. Now I know most of these apps use from time to time and that's while they're still on my phone. Yeah, I'm making an excuse, But I do use a lot of them. OK.

[00:12:14] Here's why you might not want to engage in the kind of digital hoarding that I've tried not to do as I said I've deleted some of the apps. The bottom line is, that there are some serious security flaws with some of the older apps particularly if we're talking about Android apps here. The iPhone apps, iOS not so much. But you cannot get updates for a lot of these apps. There are servers that are behind the apps may be where the security flaws are. So, for instance, you're using an app lets just use Dropbox as an example we use Dropbox with a lot of our client Dropbox app. Isn't just a standalone app just like so many of them behind Dropbox app you have Dropbox servers, you have Dropbox data storage right. The same thing with email apps almost any app is going to use some sort of cloud device to do storage in order to pull it all together, Right. It's not storing everything on your phone although some apps certainly do. Well, the security flaws could be behind the app and could be sitting there in the cloud and they're never reviewed by Apple. 

[00:13:29] All Apple is doing is looking at most is looking at some of the code and looking for some major mistakes or them doing stuff that would really, you know, drop your security level and you could lose data. So, that's frankly that's the biggest reason to get rid of these older apps. Yeah, they can slow down your computer or your iPhone really or your Android device that's out there. But, it is a security issue. Now, of course, you also have the issue of using space up but when we're talking about space nowadays it's just so cheap to get cloud space from Google. Or from Google or from Apple. You know we're talking about 99 cents a month for a pretty serious upgrade in cloud storage. But the iPhone now has an automated way to kill apps that you're not using anymore. And what it does is if it's getting low on space and it needs to free some up it can go in an automatic magically delete apps that you're not using, regularly. 

[00:14:40] It saves the documents and data that go with them but it gets rid of the app. See here I'm going to pull up on my iOS device, you're going to go unlock your phone. So, you're in this is true of any iOS devices to have your iPad as well and go to settings. And, this, by the way, is only in the more recent versions of iOS. So, go to Settings General and then under general go to iPhone storage and it's going to give you an option called offload unused apps. Now that's going to automatically delete the apps you don't use, regularly. But, as I said it's going to say the documents are going to save the data. And frankly, it's going to save you gigabytes of storage on your device. Now you can also look at the apps that are hogging your storage because some of them take up a lot of space so if you've done that already so we went to settings General iPhone storage and made sure to offload unused apps is turned on. So, now I want you to go to settings general iPhone storage again and you'll notice there is a running tally of how much space each app is taking up.

[00:15:55] Now if you have a lot of apps it might take a minute or so for it to go through. Find out how much each one's using and sort it in numerical order by clicking into a specific app. You know how much storage is dedicated to the app itself and if it's the app is automatically removed that storage you are going to come right back to you. But it's also going to tell you about the data it's accumulated in some apps are accumulate a lot. Like I use iPod type apps right. Streaming apps listen to podcasts. Those are going to use a lot. I use video apps from Amazon from Netflix from Plax etc. and any movies that I've downloaded are gonna be sitting in there too so that's really going to get you on the right track, again. It's under settings. Both of these settings general iPhone storage. That'll help to clean things up now for Android users.

[00:16:51] The process is, of course, a little different if you are running Android Oreo. 

[00:16:57] You can not get a running tally of your apps and sizes instead you have to click through the categories and find the apps by their usage. There's another apps category for those that don't fit the top level category so, it's not as simple. As over on the app Apple's side. Now again, ten years ago 2008 much different time for app users. 

[00:17:20] Most people didn't consider that a simple flashlight app or social network or maybe an app that just gives you a nice background on your phone might do everything in its power to try and track you and gather up information. But all of those types of apps, historically. All of those types of apps could have done it. Not that they all did, but many people downloaded a free flashlight app or downloaded a free wallpaper and what those apps actually ended up doing was grabbing all their contacts taking that contact information and sending it on out. So you might want to delete those as well. Good time. The 10th anniversary of the App Store to go through and do a little bit of cleanup on your iPhone iPad or Android devices as well.

[00:18:17] Our let's move on to the worst cybersecurity breaches of 2018 so far. Now, I have seen in 2018, one of the worst breaches of small businesses I have ever seen. In fact, it wasn't one of the worst. It was the worst and other security professionals I've worked with have agreed it was the worst one, they had ever seen. Just a small business, talking about eight computers. It is nuts what's going on out there right now. But here we go. The year is only half over and let's see which one of these you can remember the Russian grid hacking.

[00:18:59] We know the Russians were infiltrating and probing our power companies, here in the United States. Remember, they are not run by the government they are private businesses. There is evidence that the Russians, apparently had direct access to all of the control systems in one major U.S. utility. I'm not going to name names here. The not Petya malware has been going out there. Grid hacking guide is just crazy. US universities in March this year the Department of Justice indicted nine Iranian hackers over an alleged breach of attacks on more than 300 universities in the U.S. The suspects are charged with infiltrating the 144 U.S. universities in and 176 and 20 other countries 47 private companies and targets like the United Nations, US Federal Energy Regulatory Commission, and the states of Hawaii and Indiana. Apparently, they stole 31 terabytes worth of data. Who wouldn't notice that data going out of their systems exfiltration something you have to watch for, estimated to be worth three billion dollars. Man, we got rampant data exposures. Data breaches of course, continued just crazy in 2018. But their quiet cousin, I liked the way wired worded, this data exposure has also been prominent this year. I've got a link to this Wired article up on my Web site. Craig Peterson dot com if you want to read the whole thing I'm just kind of commenting as I go through it here. But, the data exposures when data is stored and is not defended properly. So, is not encrypted at rest Etcetera Etcetera So data aggregation firm exact Exactis, talked a little bit about the 340 million records exposed publicly accessible it's two terabytes of very personal information about hundreds of millions of US adults. Under Armour breach, This is their my fitness pal app and a lot of people that were using it using names email addresses passwords from 150 million users. VPN filter. This one's still going on warned about it. At the end of May beginning of June but it has impacted more than a half a million routers worldwide.

[00:21:26] This was spying and it was just like a siphon, right too. You've seen these massive siphons that they use to suck up water for firefighting.

[00:21:39] And are there like two feet in diameter. These huge things and they can suck up thousands of gallons a minute. Well, that's the sort of thing VPN filter can do and it sends it all to Russia. And once it's in Russia they have your information, everything you've been doing online. It's just crazy. Which, is why and we're not going to get to any of these other articles, unfortunately, we have run out of time but that's why I have put up on my Web site you'll find Craig Peterson dot com in today's show note make sure you check your e-mail. My show notes for today but talking about how to make your Wi-Fi Router as secure as possible. You've got to do it. This is very dangerous stuff. The FBI had been warning people worldwide and unfortunately, very few people have put the patch in place. The FBI has slowed it down by blocking the command and control. But, this is a very very big deal. So make sure you pay attention to that and we're starting up a few other things. We've got some other recordings we're going to be posting. We're putting stuff up on YouTube and Facebook, soon. So, I will let you know. But make sure you are subscribed to my regular weekly show notes, so I'm going to check in make sure that's up.

[00:23:00] But, if you go to Craig Peterson dot com slash subscribe. It should pull up a little subscription page for. And once you're there. Go ahead and subscribe to my weekly newsletter and you'll get these articles, all of the details. You'll also be able to get, this is a very good thing. Any warnings about immediate breaches that are underway. I have master classes that I'm giving for free on a bunch of topics so its based on what you're telling me you want to hear about. And I do these things absolutely free is not a pinch and the only way you can find out about that is making sure that you get my weekly e-mails, again. Craig Peterson dot com slash subscribe. I'll be back on the air next week same time. And you can also find me online, go to Craig Peterson dot com slash iTunes, please subscribe. It really helps to get those subscriber numbers up. Those are the ones that count. I want to make sure people listen in and they understand these the most important topics of the week and of the day have a great weekend. We will talk again next week. Take care. Bye-bye. 

[00:24:21] Only one out of every five people. If you still can't get enough, go to the Web site, Tech Talk with Craig Peterson dot com.

 ---

Related articles:

---

On the 10th anniversary of the App store, it’s time to delete most of your apps

The Worst Cybersecurity Breaches of 2018 So Far

The SIM Hijackers

A Real-Life Hacker Reveals What You Should Stop Doing Online

How to Make Your Wifi Router as Secure as Possible

New road signs can detect mobile phones are being used in vehicles

Intelligence chief invokes 9/11 in warning of potentially crippling cyber attacks

NYU Remains Silent on Professor Who Doxxed Ice Employees

When a DNA Test Shatters Your Identity

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 18, 2018

Has Facebook ever suggested that you tag a person in a picture you posted? Craig joins Ken and Matt to discuss what Facebook is doing with Facial Recognition and why you should be concerned. 

Patents are issued every day. Craig tells Ken and Matt about a Patent that Walmart just got and why everyone who shops there should be aware of it.  

Are you concerned with someone hacking your iPhone?  Craig explains a new feature available on the iPhone that will protect your iPhone.

Find out more on CraigPeterson.com

---

Related Articles:

 

Facebook Is Still Abusing Your Privacy

 

Walmart’s Newly Patented Technology For Eavesdropping On Workers Presents Privacy Concerns

Apple’s USB Restricted Mode: how to use your iPhone’s latest security feature

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/18/2018

Facebook Facial Recognition, Walmart Privacy Concerns, Apple USB Restricted Mode

Craig Peterson: [00:00:00] Hey, Craig Peterson, here this morning we talked about a couple of things now. One of the subjects I kind of talked with Jim Polito about yesterday is your Facebook privacy but we always take a little bit of a different angle especially with Ken and Matt and we went into some more detail on the privacy that you can get in a Wal-Mart store. What's new patent about? And of course iPhone's right. With the new software update from Apple how much privacy are you going to get from that and who are they trying to protect your information from, anyway. 

[00:00:35] So, here we go with Ken and Matt. We are back again 738 and the WGAN Morning News on Wednesday which means it's time to Craig Peterson our tech guru joins us at this time every Wednesday. Craig, how are you this morning? 

[00:00:49] Hey, I can't believe you guys were talking about Dr. Pimple Popper. Did You ever watch that show, man? 

[00:00:57] No, he did not have to look it up.  Did you see the view count on some of those videos? There's definitely some sick people out there as well.

[00:01:05] It's absolutely amazing and it's showing that something to talk about the fact is sex but Instagram is where she started in 2014 it said in the YouTube in 2015 and they are talking about 4 million people. 

[00:01:20] So she gets picked a crazy.

[00:01:24] Now, she is a reality TV show. Can I point out that I know nothing about this woman nor do I want to. I'm showing this man I'm going to I'm going.

[00:01:32] I don't what I'm going to trick you into watching this. Why am the way I hate it? I was just hearing about it. I mean, realistically all you got to see is about two seconds worth of that video. I can make you see I can fool you and you can think Look get cute puppies or something you can click on and you're like oh my god, no. 

[00:01:48] So of course is calm as we go. When he got all his valuable information. 

[00:01:54] Let's talk about Facebook are they still abusing me, abusing my privacy.

[00:01:59] Was that a big faces type thing you know a nice segue pimpled. 

[00:02:06] Yeah.

[00:02:08] Very clever, very clever, Yeah. Here is the problem. I remember when the Zuck went and sat before Congress three months ago and Congress kind of drilled him and said, hey privacy what's going on. And, he continually said well I'm going to have to get back to you on that. Do You remember that? Well, he finally got back to Congress and told them kind of what they wanted to hear. Well, that's kind of the bottom line here because he did answer their questions and basically he goes he goes on and on and on for dozens. I think it's more than 100 pages long answering the questions about privacy. But, now we've got another problem with privacy and it's something that we've mentioned a little bit on the show that I know Matt's been concerned about and that is our faces no Ken has a phone and an iPhone 10. And in order to unlock his phone, he has to have his face in front of the phone right.

[00:03:06] Yes that's correct. I mean this in fairness since I have been critical of the Apple, Apple cult. You know my face also unlocks my Galaxy Note. So,

[00:03:15] There you go. Same sort of thing. But, it's concerning right because I know, Matt, you've expressed concerns. Do you really want Samsung or Google or Apple to have your face on file?

[00:03:28] No, no I really don't. Yeah, Yeah exactly.

[00:03:31] Now with Apple the face does not leave the phone, none your fingerprint does not leave the phone it's kept in this enclave that sharing passwords. 

[00:03:43] But, the bottom line is you really don't know. Well, if you're on Facebook and I know Ken doesn't use Facebook he uses what was my face space, exactly. But over on Facebook if you post a picture you can take someone in that picture, and the way that works is now you say yeah right here's a picture of Matt and I. And, so you post that picture up there on Facebook and you tag Matt. And, now it tells Matt, Hey listen Ken tagged you in a picture and it's kind of cool because wow, ok I remember there that being there you share your picture with your friends Etcetera, Etcetera. It's really kind of a cool feature. Well, have you guys noticed that Facebook is now suggesting people to tag in the US with their facial recognition software. Yes, exactly that's exactly what's going on. And, Facebook has now got this massive database of faces that it's been using and it built it over the years, as kind of an interesting technology, Using basically a kind of, logical deduction, as to who it is in the picture. But, now people are getting concerned because we already know that Facebook, isn't, well you know all big on privacy. That's not their business. And, we know that they are doing this and some people are alleging that, in fact, what actually happened here is that Facebook is not telling people what it is doing.

[00:05:19] In fact, there's a number of people that are talking about lawsuits. Congress has gotten involved now because Facebook's core business model of course built around advertising. And I have to mention Tom Cruise here, Minority Report. Remember him without somebody else's eyes walking past a billboard and the billboard yeah changed and offered him a deal. Right. It's just incredible what can happen to expect that in the future. Expect that it's going to recognize you. There are already billboards. That will change based on your car or the predominance of a certain model car on the road and you're going to see that more and more of. The technology is just incredible. But, combine having pictures of people's faces making it easy to find those pictures online. So, let's say Facebook ends up with a face search function and 3D printing where you can now 3D print a mold of maps face. The legal ramifications for this is starting to get really kind of crazy. And, even though we know Apple has done a lot to make sure that you cannot unlock it with a just a picture. Someone Samsung's worked on that too you know the future here it's getting kind of terrifying. Frankly speaking of terrifying surveillance oriented future, is Wal-Mart listening in on their employee's conversations, yes they have filed a patent to do just that.

[00:06:54] Are they monitoring their people and why are they doing it.

[00:06:57] Why they're doing it? Well. Wal-Mart, of course, in a battle for its life against a company that cannot keep its Web site up. What are Prime specials? Of course, we're talking about Amazon and Amazon, of course, had their big prime day yesterday with all these prime deals. I took advantage of a couple myself. There were a couple of good ones but Wal-Mart is trying to figure out how can we make their stores more efficient. Because Amazon doesn't have cash registers. It doesn't have to keep the air conditioning on, in the whole place. It doesn't have to stock the shelves like Wal-Mart does. You know they can have millions of Skew's Amazon can. So, don't have to be selective about what they carry. So, how can Wal-Mart compete? Wal-Mart was just awarded a patent for technology that listened in to the employees and the people's shopping in the stores. So, it's called listening to the front end, this technology. We don't know if Wal-Mart ever going to build it, but they did get this patent and it will provide them with some performance metrics for employees. It will tell them how many people are up there that front end of the checkout registers it leaves and it's even able to tell how many bags an employee uses to package your goods that you just bought. So, you know all the efficiencies are what they're aiming for. And some employees are kind of concerned as, Matt, just indicated that maybe this is going a little bit too far. And, of course, there's a number of people that agree with that including the professor over Cornell's industrial labor and relations school.

[00:08:47] We are happy when Craig Peterson our tech guru joins us. Everyone's here Craig Peterson speak to my apple 10 so is my apple Ten now more secure from prying eyes like police officers or NSA or the government.

[00:09:04] Yeah. There's concern about those guys and there's also concern about bad guys. So, for instance, you can go and you can buy a machine for about 30 thousand dollars from a company and all you have to do is plug an iPhone into it. And supposedly it will crack any iPhone. Now, it might take a few months. It seems to depend on how many digits you have in your passcode or whether you use in your face or your thumbprint. But, they can break into them, apparently. They are certainly getting paid for it. And, the government is getting the information. But, how about somebody that just grabs your iPhone off a table at the local coffee shop? How about if you go to China for a business trip? Or you go to Russia? China is known for getting their hands on your devices even while you're sleeping in a hotel room and copying the devices. So, Apple has come up with a new feature. If you just upgraded your iPhone you've got it so if your phone has not been unlocked for one hour they cannot plug one of these devices in order to copy your iPhone. So, I think it's a good idea. This is not just an anti-law enforcement thing. This is a privacy thing. Bad guys in this country, as well as, around the world are using it to unlock the iPhone and now there are some ways around this and we will discuss those right now. But bottom line, if your phone has been locked for an hour your phone, is pretty safe. But if you're in a coffee shop you probably just used it and that bad guys get to have access anyway.

[00:10:41] Craig Peterson our tech guru joins us every Wednesday at this time to give us an eye on technology around the world. Craig thank you very much. We will talk to you again. Thank you, gentlemen. All right so we're going to take a quick break here and we'll come back on the other side maybe call.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 18, 2018

Do you tag people in pictures on Facebook?  Listen in as Craig talks with Jim Polito about Privacy, Facebook and Facial Recognition.

Did you hear about Imran Awan and the DNC Hack?  Craig discusses with Jim some of the ties that these IT workers had with the Russian Hack.

 

Find out more on CraigPeterson.com

---

Related Articles:

Facebook Is Still Abusing Your Privacy

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/17/2018

Facebook Abusing Your Privacy Again, Facial Recognition, Russian Hacking

Craig Peterson: [00:00:00] Hi everybody. Today, we talked about Apple just a little bit but mostly about Facebook. We talked about Imran Awan, you remember the I.T. staffer there was working for the Democrats and with a tie in to the Russians. Wow, it gets kind of crazy but it's all about privacy today with Jim Polito, so here we go.

[00:00:26] If he was running Amazon they wouldn't have crashed yesterday. 

[00:00:30] I'm talking about our tech guru and good friend Craig Peterson, Good morning, sir.

[00:00:36] Hey good morning. I noticed that too. I was on, and yeah I was getting all kinds of errors trying to do the one day deal that they had. I don't know if I can extend it or not. But, yeah they had problems. 

[00:00:49] Well they didn't have Craig Peterson on their side. No they don't. 

[00:00:54] I built some of the biggest Web sites in the world with the biggest databases. Long before Jeff Bezos got involved with the whole Amazon thing, and yeah there's something I've done for decades, now. It's scary to think back. I said the other day to someone yeah you know I've been doing professionally computer networking since 1975 and all of a sudden I did the math and felt old. That would be worse. 

[00:01:25] Is that a young person said and not that you're not young. In relative terms said they had computers in 75 

[00:01:35] Weird, eh? 

[00:01:38] Tell me about Facebook still abusing my privacy. Are you telling me that Mark Zuckerberg wasn't completely honest with me.

[00:01:50] Did you notice the Zuck said in an answer to a lot of the questions said Hey, I'll get back to you on that, and fact he did. Oh he did. He did. He sent them a document that was hundreds of pages long as I recall, and it got no press because of course by then the news cycle was over and people move on.

[00:02:16] Yeah they move on then and they he said Yeah well we kind of do keep everything and everyone possibly that we possibly can, and that reminds me of Debbie Wasserman Schultz who is I.T. guy to you has just made it into the news have you guys talked about this one. 

[00:02:35] I've talked about him but in family and everyone else but he seems like the mainstream media doesn't want to talk about him.

[00:02:46] He just came out I guess this week that you know they were supposed to turn over a server for the FBI to finally examine as near as I can tell. They're saying the Russians hacked right the Russians hacked the DNC. If you look at the charges that are just brought against the Russians there's no mention of the fact that the Russians were trying to hijack the Republicans as well. Did you know that. Yes. It was completely left out of the indictment. Well it turns out now apparently this server that they were supposed to turn over, they were starting to look at it and then they checked the serial number. The server that was turned over for investigation was not the server because they gave them something else. 

[00:03:32] Isn't that interesting. And didn't we learn that somebody. Took a whole bunch of information, off of that DNC server in question. And that the forensic folks figured out that the speed with which all of the data was downloaded indicated that it would have been impossible to do it remotely that somebody who had access to the DNC server put in a Zip drive and downloaded stuff. Now that says to me you well wait a minute. I don't think that was a Russian. 

[00:04:19] Oh he goes it goes on and on. Anyway, that story is going to continue to give us all kinds of entertainment because this whole thing is just completely nuts. What happened what they let happen to do is back to Zuck. Yeah. So he did three months ago sit in front of Congress. He came up and said yeah we're going to have we're going to make it so everything's transparent. And you know maybe when you were thinking about transparent maybe he was thinking of it like looking through a window or maybe a camera lens. Because as it turned out the Zuck is using specialized facial recognition technology. 

[00:05:01] That people just aren't aware of when you are on Facebook. Now. You know if you post a picture you can Tag someone in a way that you tagged me before I've tag you in pictures, of course. 

[00:05:14] So, it was that's kind of cool and it brings pictures and things to peoples attention and you can find the people were when you were tagging people in those pictures did you realize that Facebook was using that to say oh let me see complete within this picture.

[00:05:32] And simply those in that picture simply those in the other picture. Let's see which one do we think is Jim Polito via a process of elimination Facebook has apparently been very busy building facial recognition software to the point right now where if you post something and you go to tag someone some people have noticed that over on the site. Now Facebook or just people to say oh yeah well it tells you who it is.

[00:06:06] It says even when they don't know I put up a picture and it says Do you want a tag Cathy Polito in this picture and I haven't tagged my wife in the picture. 

[00:06:18] Well he is same as last time. Well. The poor thing for probably the best reason.

[00:06:24] But it says Do you want to put up other people. And it says Do you want to tag them. And I'm thinking I didn't tell you who that is. Well Facebook Knows. 

[00:06:36] Well the New York Times reported last week that more than a dozen different privacy and consumer groups and some government officials are arguing that the company's use of the facial recognition is once again now violating people's privacy because they did not remain appropriate user consent. So, it's scanning photos anything uploaded to their social network. Now what would think about this for a minute. It's kind of cool that you want to take Cathy this picture it makes life a little easier. But you take this to the next level. And now Facebook has the ability to identify you. 

[00:07:16] Now, I don't know why this is but man, Minority Report we keep calling a great movie and enemy of the state.

[00:07:24] Despite Tom Cruise it was a great movie. It really was. 

[00:07:28] And you remember when he had somebody else's eyeballs and he walked by like by a sign and the sign now changed and offered him a special deal on what he had bought at the store before, right. Right. Guess what Facebook could do with this data 

[00:07:45] Yeah they just walk into the place and it says that's Jim Polito. You know what Jim Polito likes such and such bourbon why don't we tell him it's on special. 

[00:07:58] Yeah, Well and he likes that friends of burbon. So let's go ahead and let's get the competitor bourbon to advertise and pay us to promote to Jim Polito.

[00:08:08] Yeah exactly. Exactly. You can live with some of that. Right. 

[00:08:16] But, it might be good right because it knows you're trying to buy a car when you want to see the car. 

[00:08:22] You can put some of that but there's a part of me that always makes the extra little leap and I always say to myself hey I'm never doing anything wrong. I'm never sure I shouldn't be I'm never doing things I shouldn't be doing I really I lead a nearly monastic life. So, I'm not worried about it. But, I always think to myself. But, do I really want people to know that much about where I am now worried about I'm worried about when a hacker gets that information or somebody else. Exactly right, because I think what can happen here. 

[00:08:59] If Facebook sells this data or the nation's stolen or even as simple as doing Facebook's search for Jim Polito pictures and now we've got Apple next year all of their phones are going to have the facial recognition software right now. You can get it you can go to a local U.P.S. store and use their 3-D printer. So now I can make a 3D version of Jim's head. I know to unlock any door. OK.

[00:09:27] You're going to need the extra large printer to do that one the one with the double double triple chin option that one Yeah exactly. Its scary the state is being collected in a lot of people don't know about it. 

[00:09:43] Pay attention. Craig. This is great stuff and I could go on and on. Craig Peterson is a great guy who will provide this information to you. Plus other great information about the iPhone about Wal-Mart eavesdropping on workers. All of that you can get that information for free. He will not pester you. He will not try to sell you things. Here is what you do. You text my name to. 8 5 5 3 8 5 55 53 that's 8 5 5 3 8 5 5 5 5 3 standard data and tax rates apply and you'll get other information say there's some big hack some national or international hack. Craig Petersen will send you the information that you need. He will not sell your name he won't do anything like that and he won't pester you. And he's always here every Tuesday after the 8 30 news. Craig thanks so much, buddy. That was very informative always a pleasure. Thanks Jim. Take care. You too. Craig Peterson, everybody. Yeah I don't mind being recognized here and there. I just don't want it.

[00:10:58] You know what I really don't care if Facebook has it at a certain point I just don't want a hacker to get it and then do something else with it. We have a final.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 16, 2018

Have you wondered what will happen with our Jobs once Automation really takes hold? Listen in as Jack and Craig discuss Automation and the future jobs.

How about the changes in how we receive our news? I spoke with jack this morning about the changes in media and differences between TV vs Radio vs Newspapers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/15/2018

The Future of jobs with Automation and TV vs Radio vs Newspapers

Craig Peterson[00:00:00] Hi everybody, Craig Peterson, here. I spoke this morning with Jack Heath and we talked about a couple of things. You know Jack's been in the news business for a lot of years, television news. So we talked about that specifically what is happening with the news and is there any legitimate source, anymore. Frankly, where's it all going, and jobs what's happening with jobs? You read an article in the paper this morning. So, I went into a little bit of detail about the future of jobs with technology. They're going to get better they're going to get worse. All of that, and more, so, here we go. 

[00:00:36] Joining us now on the Autofair listener line a regular contributor, the host of Tech Talk heard here on the weekends and Saturday on News Talk stations, Craig Peterson. Craig, good morning.

[00:00:48] Hello hello. Hi. How are you? Good. Doing good. 

[00:00:52] You know I saw a story this morning, thinking of you coming on and I saw it on one of the national news outlets. You think about technology and all the change with entertainment and information, and how we get stuff, and how fast or where we get it. There is one Blockbuster Video store left open in the country one and you wonder about some other retail changes because of technology that could be coming.

[00:01:19] Yeah, it's going to be a very very different world in another 10 years from now. Absolutely guaranteed. This week we've got Wal-Mart, who just obtained a patent that kind of concerning people. It's all designed to listen in to where you are and it's using the sounds to figure out how many people are in the store at the checkout. The whole retail space is going to change. And you know Walmart's got to compete. Think about Amazon, and how many small businesses Amazon has hurt? How many small businesses Wal-Mart just completely put out of business? Those guys are now at work against each other, and Wal-Mart is trying to find ways to cut their costs down because they've got stores, all of the overhead of workers, and the air conditioning and everything you have to do. It's going to be just a totally different world out there. Jack, you're absolutely right. 

[00:02:18] All right what else is going on in your tech talk world.

[00:02:21] Well, we've got concerns too right along the same lines as what you thinking of. What's going to happen with workers as these jobs disappear and basically any job that can be automated will be automated here in the near future. Especially with a shortage of workers. But, as these jobs disappear where are people going to end up at. And of course we've had this problem throughout history, when we have the Teamsters, say you know what's going to happen to us now that we no longer have horses and carriages, and of course, there have been other jobs that are followed on. But the big concern right now is, that these new jobs that are going to come about these new jobs that people are going to take as they are replaced by automated systems. These new jobs are going to be lower skilled even than they are now and lower pain. So, we could be in for some real trouble. But other economists are saying you know bottom line we ended up historically, with better jobs than we ever had before. So, maybe that's what's going to happen to, Jack. We're going to have to keep our eyes open our ears to the ground and continue to train ourselves. Everyone needs to remember, you're responsible for your career. You can't rely on your employer, you can't rely on the government, you need to improve yourself, continually. 

[00:03:46] Good stuff good stuff. And, you know I also think of you mentioned the changing work. And I just seems to me that the last few years technology more from a consumer behavioral point of view has really impacted how people get information. You know you look at the look at the media for a moment and you could argue that news talk radio has really married up well with the Web in terms of handheld phone and I Heart Radio the app and how many people can easily access that but you look at television news a traditional evening television newscast. It's already feeling and I had many years of my life that was the profession you know news throughout the day that is becoming as different ages of Americans consume differently. I don't know how many younger people watching television news. Certainly, I still like to hold a newspaper and look at it, but that's archaic to many people and they don't have the budget either, Jack you know you're in TV for so long.

[00:04:48] Look at what happened with WBIN TV and they did investigative journalism. They had people who were assigned to that to find the stories. Nowadays, we don't have I haven't any more places don't have the local news department. The all-day news that you were talking about back when you were in TV. There's not the budget forward anymore because the eyes have moved everywhere out and you're right about radio I think radio absolutely works. Obviously, the ears are down a little bit because again people are paying attention to way more things, but it's still there. Talk radio, you can have people on the radio, Experts that think about this stuff and that you don't have the budget problems that the newspapers have for instance because newspapers have to hire people to write these stories to do the background to do the investigations. On the radio, it's interactive. People love that it's more like what's been happening in social media frankly where the interaction is what's getting people's attention. So I love Radio, always have. But we're not getting the news like we used to. 

[00:06:02] You can sit down and watch the evening news with your favorite anchor and actually count on it being true even. You know and you'll get the morning newscast what used to be you know morning news, nationally. It's become a combination of an entertainment reality TV show just to kind of hold on to ratings and very little news, anyway. All right. It's not locally I do think of them WMUR to be as great.

[00:06:27] Does a great job and they're doing it. But budgets aren't like they used to be.

[00:06:32] Well let you go. Thank you, Craig Peterson, on New Hampshire today on this Monday morning. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 14, 2018

How do you protect your data from leaving with Employees? Listen in as Craig discusses what happened at Apple this week and how the lost some significant data.

Can anyone break into your iPhone?  Well maybe, but today Craig explains how Apple is trying to make it harder with their newest iOS release.  

Do you shop at Walmart?  Did you hear about the patent they were awarded this week.  Craig will fill you in on what they are trying to do and why you need to be concerned about it.  

Are you worried about Ransomware?  Craig talks about revealing news from Sonicwall and what they found.

You know the NSA has been collecting data.  But you might find what Craig has to tell you today about what the NSA is now doing and what it means for your privacy.

How valuable is your Face?  Craig will explain how large databases of Facial recognition data is going to be used. 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/14/2018

Apple Self Driving Tech Stolen. Facebook Still Abusing Privacy. NSA Deleting Phone Records. Malware Attacks Skyrocket. Walmart Eavesdropping

Craig Peterson: [00:00:00] Hi, Everybody Welcome to Tech Talk with Craig Peterson. We've got a lot of stuff to cover today. We're going to be talking about an Apple employee who's been charged with stealing their self-driving cars secrets. Apple has a new mode. You got the iPhone's latest security update. It's called USB restricted mode. We'll talk about that Wal-Mart boy. Do you work for Wal-Mart? You know someone who does well they have a new patent that is really starting to concern some of Walmart's employees. We've got a new stat here from the guys over at Sonicwall about malware attacks and guess what? Surprise, surprise, they are skyrocketing. NSA is deleting millions of phone call and text records over privacy violations. Facebook is still abusing your privacy. So here we go.

[00:00:51] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:01] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes I appreciate what you do with Forbes magazine for all these years it's one of my first go to places or talk right now with the guys and gals behind Siri. We're joined right now by the director of Kirkendall technology. We're joined right now by the CEO of Ebates Kevin Johnson on the air for more than 15 years.

[00:01:25] Over 20 million podcast downloads. This is Tech Talk with Craig Peterson

[00:01:34] Well you know the bottom line here we have an autonomous cars coming and they're coming at us really really fast. We're going to talk right now about what's happened at Apple and what might happen with your business. Frankly, if you're not really careful. An Apple engineer was just charged with criminal offenses he apparently had been working in Apple's secret autonomous car business and while he apparently might have done something wrong. Now you know President Trump has been talking about the Chinese and how they're trying to steal our technology in fact how they have stolen our technology. We already know that's the case. We already know that some of these laws about privacy about some of the things we take for granted here, patents and things just are not enforced over in communist China.

[00:02:25] Well, apparently what he did was he decided he was going to resign. So, how does he resign? Well, he is told to turn in all of his Apple gear. He's walked out the door. Now Apple has a really great policy that you should probably implement as well in your business and that policy is they walk them out the door. They take the equipment and then they do forensic analysis on that, equipment. When was the last time you did a forensic analysis of equipment for people that were leaving your business? Well, they found that he had done a few things wrong. First of all the activity of copying stuff on the network to and from devices had increased dramatically in the days before he resigned. They also found that he used Airdrop to drop some of these files from his computer to a non-Apple owned computer, apparently that of his wife he was going to take a job over in China. And apparently, he was going to take the secrets with him. So, remember whether you're talking about an employee who might have access to your accounting records or maybe it's an employee who has access to your client records. There's a lot of information you don't want walking out of the door. Can you look back in time to see what an employee has been doing? Can you erase a laptop that just doesn't get returned from an employee? Erase it remotely. Do you want your salespeople or others who have access to this information to walk away with it? And then on an everyday day to day basis. The big question is do you really want all of your employees to have access to everything. I hope you don't. I suspect you don't want that either. So, lock it down keep tabs on it and let's really try and keep this world and our businesses a bit of a safer place. I'll let you know what ends up happening with the charges here. Maybe he's convicted maybe he won't be but we'll see. This is industrial espionage of the highest degree top secret information

[00:04:44] Of course, you've heard about what's been going on with the FBI trying to get into iPhone's, local police department also trying to get into iPhone's.

[00:04:53] These things are locked down pretty well but there are a couple of companies that allow you to get into the iPhone. Employers have been using them, let's say someone leaves their employ, say they move on to a new job. What do you do with the data that's on that iPhone? Because sometimes the employees will just go ahead and lock it up and forget. I'm not going to open it up for you. All the information in there is not only lost to a business but on top of that what's happened is that iPhone has become unusable. If it's not locked to your Apple account. Now there are some ways to deal with that with employee devices reach out if you'd like to know a little bit more. But what we're going to talk about right now is Apple and law enforcement a little bit of the battle going on here. And I I don't know kind of which side they absolutely come down on with this because I don't want the bad guys to have access to complete privacy, right because then they can conduct their bad deeds their evil deeds and deeds in private. But I also don't want to have this problem of having my information available to some bad guy that just grabs my phone and walks away because I'm sitting in a coffee shop. And then they can hook it up and they can hack it.

[00:06:11] Right, do you want that. I know I don't. So Apple introduced in their latest release here in OS it's eleven point four point one. They introduced a new feature which is called USB restricted mode. Now what that does is it locks down your iPhone. You a little port at the bottom of it so that you cannot you or a bad guy, in this case, cannot access the information or the data that's on it. So they can't just plug it in and download everything from it. So, what Apple has done, is they've put a delay in if you haven't unlocked that phone for at least one hour that port is turned off. Now in my case we're talking about this coffee shop obviously, the guy if he has his little apple iPhone copier device there with him he's going to be able to take that information and he's going to be able to hook up your phone right away because you probably opened it up in the coffee shop, right. You probably had it right there so that you could use it. That's why you had it open in the coffee shop. So, it's opening in the coffee shop. He has access to it. He just takes it over to his table and puts it in a bag right. With a little battery powered device that offloads everything from your iPhone and tada he has all of your data.

[00:07:33] Now the same thing is true when we're talking about law enforcement. Obviously, if you are at a border crossing you probably already know or within 50 miles of a border. We're talking about international borders here. They can open up your devices have a look inside them make copies of them just do all kinds of things with them. And that one-hour timer obviously is not going to be, in fact, in effect. But if you lose your phone it's found on the side of the road. This will stop most people from being able to get into it. Law enforcement they're going to be able to gain access to quickly. There are some workarounds in fact that you can use to keep that port alive. We're not going to get into that right now but keep an eye out if you have an iPhone. Obviously, take the latest software update they tend to be very stable, in this case. I have it already. It is stable and I like the idea of trying to block that USB port and the ability for the bad guys to be able to get your data here, Bottom line. But if you don't have a good passcode on it. You're not paying attention to security at all. Well, you probably don't care. Check it out online. Craig Peterson dotcom

[00:08:57] If you worked for Wal-Mart you might want to listen up here right now because they've got a new patent in place. If you compare the two big retailers who are you talking about while you're obviously talking about Wal-Mart because they've got physical retail store out there. But you're also going to be talking about our friends over at Amazon and when we're talking about Amazon and Wal-Mart you're talking about two behemoths who are fighting for your business and my business. Wal-Mart. Great place to go shop you can save a lot of money. Amazon same type of thing. So, how are they going to compete? Amazon has this great advantage when it comes to costs. They don't have to maintain a retail store. They don't have to stock all of those shelves. They don't have to move the merchandise on time for you to be able to buy it. They don't have to have the people at the checkout registers or the checkout registers, right. They don't have to have all of the doors in and out they don't have to have the air conditioning. Think of all of the overhead of retail. And that's the reason why frankly Amazon has killed so many small retailers out there. So, when we're talking about the big battles ahead, Wal-Mart has to find some way to become more cost effective. So, how can they do that? Well, we already know from local Wal-Mart that they have some pretty big self-checkout areas. My local Wal-Mart has eight checkout areas. I've seen them with much bigger check out errors for you to do it yourself. So you scan it. It weighs it when you put it down so that it gets an idea. Making sure you're not trying to steal something.

[00:10:36] So you are not trying to put in something way too heavy or way too light in there and depending on where you live sometimes those scales are really picky sometimes they're not so picky but Walmart's done that helped save some costs who hasn't been to a store whether its Wal-Mart or Target or you name it where you haven't had to wait for a long time in line and that can be a very big deal. Well in this case what we're talking about is Wal-Mart being able to track you and their checkout people in the store and the patent applies to sound technology. We're talking about Wal-Mart now using sound, to figure out what youre doing in the checkout line. It's listening for things potentially like the the crinkle of the bag as a bag is used or the movement of the cart. So they know hey there's a lot of people in line I need to do something about it and even record conversations. Now that's a little bit scary, for both the consumers and for the Wal-Mart employees as well. Whether or not Wal-Mart is actually going to take advantage of this patent or if it's something that they might just license. We'll see. Time will tell. So far it's just a patent that was just awarded this week and it has to do with using sound, to track you in the store while you're buying things and that in conjunction with these RFID tags these radio frequency identifiers that Wal-Mart is already putting into most of the products, that's really going to give them a bit of a leg up, in fact, a huge leg up over other retailers. But, I don't know if it's enough to beat our friend over at Amazon

[00:12:28] We have all kinds of reports that come out about cyber security. Verizon's a real big one. They released reports quite frequently but so do many others WEBROOT. We've talked about on my radio show before there is a new study out right now that is I think there's a little bit of a surprise here. It's from our friends over at Sonicwall and it's talking about what they have been seeing. Sonicwall is a provider of VPN services, you know where you have the hardware there in your business that you want to use. They also have some firewall techniques and some specialized security software that they run. And what they're showing is that in the first half of 2018 ransomware attacks are on the rise again. Now, ransomware attacks are very scary. They're kind of nasty frankly and they're on the rise because they work. If you get hit by ransomware you have to follow a few rules here some bottom line rules. First of all the FBI strongly recommends that you never pay a ransom. However the business realities might dictate that you have to pay the ransom. But if you do pay that ransom for ransomware, remember that you may never actually get your data back up 50 percent of the time according to the FBI your data is never recovered. So remember that the other big problem when it comes to ransomware payments is if you pay and the bad guys receive it. Right. So assuming this transaction happened they now know that you pay ransoms. So, many cases ransomware perpetrators have attacked again and again at the exact same business. So be very careful.

[00:14:22] The best ways to help prevent ransomware and the best ways to help prevent real high cost when it comes to being hit by ransomware are the following. First of all, make sure you have a very good backup. Make sure that backup is tested. Test your backups. Test them frequently to make sure they're working. The next thing is you need to have not just anti virus anti virus does not cut it anymore. I can't emphasize that enough. It is just not enough. You need frankly you need kind of like an onion you need something where there are multiple layers you're you're guarding your DNS. You've got an endpoint piece of software looking at every file on the machine as it's open. You have something that the edge in your firewall. These next generation firewalls and some are better than others obviously. Now my personal preference is Cisco. That's what I sell. But I have something at the edge that says wait a minute here. This is an infected file and hopefully can go ahead and grab it and scrape it back. You know the average time it takes a small business or any business in the United States to be able to find out that it has been hacked is a good six months sometimes even longer. So, you got to be careful you've got to watch that. You have to be prudent when it comes to ransomware because as our friends at Sonicwall just told us ransomware is on the rise and ransomware can kill a business. Most businesses that get hit with ransomware or a good hack are out of business.

[00:16:00] They're out of business within six months. Not good by the way.

[00:16:04] Mystics 6 billion malware attacks during the first six months of this year compared with 3 billion attacks over the last half of 2017. We're talking about a 100 percent rise in ransomware attacks. By now everybody worldwide knows who the NSA is it's no longer. No such agency. It's the National Security Agency and the guys and gals over there have been sweeping up data. We've certainly talked about it before on my show. But did you know what they're doing now. This is a big surprise to pretty much everybody out there. The NSA has been collecting not just metadata but all kinds of data. And we've heard about FISA warrants in the news recently as it appears President Trump's campaign was monitored due to one of these FISA warrants which are designed really to help to catch spies and other foreigners who might be trying to do harm here in the U.S. Well, apparently a number of these FISA warns were flawed. And the new management that was put in place by President Trump over at the NSA has been looking at what's going on not obviously just maybe what went on with the Trump case but they are looking at all of the data what's been captured what did the Obama administration orchestrate when it started capturing all of the data on all Americans dealing with all of their communications.

[00:17:49] Well, its turned out now that under the Trump administration the NSA has started purging i.e. deleting billions of records yes those records that they were recording that are now under questionable jurisdiction are being deleted. What they're saying is they think that they may have intercepted communications between people that frankly they were not really authorized to do so instead of trying to play games with it or just try and keep it secret. They have come out and have officially announced that they did capture data. They probably shouldn't have. And rather than go through it all and try and figure out what's what what's where they're just deleting it. They're calling it technical irregularities and we're talking about a purge right now of over 685 million phone and text records records. Now that's really really huge. You know is the NSA to blame. They certainly have collected billions over the years but seeing that they are getting a little bit of oversight now makes me feel good in knowing that the NSA has identified some of these records as records they should not have and they're deleting them. So kudos. Good on you guys over there. The NSA

[00:19:18] Well, if you're a Facebook user and you've been paying attention you know that Mark Zuckerberg about three months ago agreed to stop tracking much of the information online. To be more transparent about it and to of course allow you to control some of your data. But we have some questions for Mark Zuckerberg right now due to some more information that's come out. First of all how are you making things more open and more transparent when the European Union introduces new laws about privacy. California has almost the exact same laws going into effect in 2020. So when those laws went into effect about you keeping data private about you at Facebook not only keeping the data private but letting people control their own information how is it that you try and move and that you did over a billion records from the European Union to the United States hopefully out of reach of the European regulators at least that's what it looks like to me. That's what it looks like to a lot of people who have had closer looks at it than I have. Well, now FaceBook they're facing yet another problem, because what they're also doing is they are using specialized facial recognition software. Now this software is designed for them to be able to figure out who's who in which pictures.

[00:20:50] Bottom line. What Facebook is saying is they're using it to protect your identity online. I'm not sure how much protection there is by having Facebook capturing my face and measuring all of the coordinates on my face and taking all of that data now and and putting it on to a bigger database which now becomes a database they can sell so that if I'm recognized down the street who knows what's going to happen. You remember Tom Cruise, walking by a billboard and the billboard greeting him with a new sale at the store has on just for him. You know that could be great. All right. As a marketer my marketing hat here I have that hat on and I'm thinking wow this is great. I don't have to bother people or not to interrupt people who might not be interested in my product. So, if I know who they are and I know what they've been looking for I can target them better and they're going to have a better experience overall.

[00:21:53] But the reality is some of this data is already being used elsewhere. We know in China they have a new whole new way of classifying people. They are doing kind of a social media trick over there where you have a social cred. This is what they're calling it your social cred. So if you jay walk across the street it recognizes your face because they have it on a database. It then uses that data now to lower your social cred. Doesn't that sound like something from a sci fi twilight zone type episode. So, it lowers your social cred. And then there are things you won't be able to do if you have a low social cred. So having a low social cred could stop you from getting on an airplane from opening a bank account. Obviously getting a loan. That type of data has already been used here in the U.S. for well more than a decade we've been protecting things like the Super Bowl using facial recognition technology where we have our federal databases of the bad guys of the known criminals. When you walk into that venue it looks at your face and it says Okay you're clear it's hundreds of others today anyways a gate that comes down so no you can't enter. But the police will respond if you are spotted in a stadium and you are thought to be a terrorist. So, today there is some false positives as time goes on there probably be fewer of them but maybe not, right. It depends on on how strong the state gets and whether or not it continues to move towards a socialist or communist type fascist state right. We've certainly seen that progression in the last 50 years. So, how could this possibly go wrong.

[00:23:44] Mark Zuckerberg having our information about our faces that's a biometric piece that could be used in a lot of different ways. Now, remember an iPhone 10. Right, what does that have on the front of it. It has a sensor that reads your face. And we have Android devices that will be coming out with it and more and more. So, if you can read someone's face what do you think's going to happen with the facial recognition software. What kind of value do you think there will be in a database of people's faces, Yeah. We've already seen where some of these facial recognition programs can be faked and fairly easily frankly so as time goes on as those those databases are hacked and stolen or sold, will the bad guys be able to get into my iPhone 10 or other device. Right. Will they be able to get into this thing and be able to use the this to excuse me in my face to get into this. We've got 3-D printers. If you've got a really good face print if you will because you've captured my face from the front from the side aren't all of the photos I've uploaded to Facebook all of the family photos on me and that it's it is automatically tagged me and I've noticed that by the way the auto tag thing where it's using facial recognition technology and saying hey listen we think we found this person in your picture. You want to tag them. How do you think that's working? So, will they be able to use this technology that you may not even know you're giving Facebook the permission to use, Right. Your face. Will they be able to use that technology to hack our devices.

[00:25:34] Almost certainly at least that's my bottom line.

[00:25:37] Visit me online. Hope you have a great week ahead.

[00:25:41] Craig Peterson dot com. Take care guys. Thanks for joining us today.

 ---

Related articles:

---
Former Apple Employee Charged With Stealing Self-Driving Car Secrets


Facebook Is Still Abusing Your Privacy

NSA deleting millions of phone call and text records over privacy violations

Malware attacks skyrocket in the first half of 2018: SonicWall
 - this site shows a little excerpt, needs to sign-in/paid membership?

Walmart’s Newly Patented Technology For Eavesdropping On Workers Presents Privacy Concerns


Apple’s USB Restricted Mode: how to use your iPhone’s latest security feature

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 11, 2018

Craig joins Ken and Matt talking about what a 30-second change to your computer can do, and why is it important to have the right DNS settings.

Do you know what Incognito Mode actually does?  Craig explains to Ken and Matt the way it actually works and what it does and does not protect you from.

Find out more on CraigPeterson.com

---

Related Articles:

This 30-second change to your computer settings is the easiest way to stop hackers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/11/2018

30 Second Free Security For Your Computer and Incognito Mode 

Craig Peterson: [00:00:00] Hi everybody. Good morning Craig Peterson here this morning I was talking with Ken and Matt about a couple of different things but primarily this morning we went over a 30-second change you can make to your computer. Why is it important to have the right DNS settings. The bad guys they've got a lot of nasty software out there. They're being very successful getting that nasty software onto your computers my computers. Well, not so much, actually knock on wood. But, here, here, we talked about what you can do a very quick and easy change. I have some software that costs me money that I charge for my clients. But this-this is free and it gets you about 90 percent towards safety. So, here we go.

[00:00:52] I've had an iPhone phone since the first phone, when you had the iPhone one, and I had the first I thought I skipped every other. I mean I wouldn't get the thee and the five and the seven sure. Yeah and I think great Craig Peterson would have to agree with me that the iPhone is the greatest invention ever in the history of humankind. Would you not agree with me, Craig

[00:01:15] Well I may put fire, maybe the first maybe wheel and then maybe the iPhone. Yeah, so you know it's a funny joke the other day on Facebook somebody said you know my teacher told me in high school that you know you guys have to do this in your head. You know the math in your head because you're not going to have calculators everywhere you walk.

[00:01:34] Yeah, sure sure sure showed them. Because Craig because Matt's wife asked me what photo I have with I like an iPhone, 10 of course because why would anybody not have the iPhone 10. But, I still think the iPhone is still I think the best you can take a mortgage out for that phone. No, I'm out there. Do you pay fifty dollars a month forever for the rest with the rest life contract? But, you could upgrade. Know it doesn't. It doesn't matter what you pay because the person who dies with the most toys wins.

[00:02:07] So, it doesn't make that's true. I did not get the iPhone 10, Ken. I'm stuck with the 8 which by the way looks like are killing off next year the gonna to change the iPhone line. They released this is like the first time I think they've ever done this. Apple decided they would give mock copies of next year's models to the press. So, it looks like the 8 will be dead as of next year. And the reason I didn't do it is I don't know. I love tech. And obviously comes this way Matt I think you might be but I'm cautious with that right. Yes. Like when we're talking about the iPhone 10 you've got that whole new sensor.

[00:02:50] And, I don't know with facial recognition of the facial recognition it recognizes me no matter what you do but I'm sure the NSA also loves that because they've got it stored in a database to find me no matter what. Are you kidding me?

[00:03:05] That's a lot of people are confused about that Matt. When you're talking about whats stored where Apple is way different thing Google is with Android. None of that information like your thumbprint if you use the thumbprint scanner on your iPhone or the facial information none of that ever leaves the phone, right.

[00:03:25] See it's encrypted.

[00:03:27] Yeah. It's sort of encrypted on the phone and what's called the secure enclave. And, in fact, I don't know if you've heard about who's who you have had there.

[00:03:37] There are two paths replaced on their iPhone because they cracked it and then there are some leaders stopped working and they had to take it into Apple and that's because bottom line Apple doesn't want anybody messing with that secure enclaves stuff. And if you change the screen and you got that from the reader there is a potential that you might damage it, slightly because it's packed in elephants snot which is kind of a technical term so, that if anybody did come up with a less gross a technical term, perhaps I just believe that.

[00:04:15] I mean what's that movie with Will Smith. And you're thinking of Enemy of the State, that they could fight back with everything they need to find out about you.

[00:04:24] That movie really good movie. So, why Chapman why hide anything.

[00:04:30] Just a total mind you bought the building because you made a phone call. Right, exactly.

[00:04:36] He was the guy who going to watch the watchers. Who's going Yeah?

[00:04:40] So, many great guys who watch the watchers of the watches and the watchers and watchers. So, that's the most serious things hacking. Now you've got 30-second change your computer setting. The easiest way to stop hackers.

[00:04:56] Well, this is really, really, kind of cool it's up on my website but if you're going to have to find out more because there are instructions, right. But, here's the bottom line. Cybercrime has become huge, right now and it's expected to cost us worldwide here, more than two trillion dollars next year very, very, big deal.

[00:05:21] Ok. And it's hurting little businesses, its hurting big businesses it's hurting you and me just regular consumers as well.

[00:05:29] So, I have a product that I use and it's from Cisco it's called umbrella. And I've been using that with my clients for a long time. And what umbrella does is, if your computer tries to go someplace on the Internet. The first thing that has to do is change the name, into an address, right. You guys know that you put into a web browser something like tune-in for instance Somby go to tune-in radio to listen to the show while you're on the road for that. That doesn't mean anything to the Internet, that name. So, there's something called domain name service but it takes that name it converts it to an Internet address and then it goes to the address, it's just like if, I dropped a piece of mail in the post office and I said deliver this to Matt Gagnon, they wouldn't know where you live right.

[00:06:22] Well, probably not. We may not but you never know.

[00:06:28] He is. Well the NSA was supposed to try. So.

[00:06:33] So, the question is and if that's the case, how does this really interfere with hackers, Right?

[00:06:41] Because if you could stop the hackers from sending their post office stuff home right if you could stop them from mailing all of the stuff they stole home. That's half the battle and that's what this is all about. That's what umbrella is all about. It's not an expensive service, but I found a really great article on Marketwatch. So anybody who wants to can read this can go through the steps and what it does is, it showing you some free services that are kind of like Umbrella.

[00:07:16] They're not as good, but they're quite good. It's 90 percent effective at stopping some of these pieces of ransomware is 90 percent effective at stopping all of the malware. Because, one of the things that these pieces of malware do when they get onto your computer, one of the first things is they call home and say hey I got somebody, what do you want to do now.

[00:07:41] And, so they call home. They now can get the command and control information. OK. We're getting encrypted and it actually has to have a key so that they can now extort money out of you, if that doesn't happen they can't do any of this. So what this does and this is it really is a 30 second changes as Ken mentioned. What it does is it stops any software on your computer, legitimate or otherwise from going directly onto the Internet, and all it does is say, Hey listen before you go anywhere we are trying to figure out what the address is of the place you're trying to go to. Ask me, don't ask somebody else. So it asks that software and my customers cases it just you know umbrella and then umbrella's Whoa. Wait a minute. That is. Known Chinese or Russian or wherever it may be hacking group. We don't want you to go there. So it will now change and it will pop up a little screen that says this is dangerous, you can't go there if you're going on our web browser. But, if it's software that's trying to track your machine, 90 percent plus of the time is trying to phone home and it will be stopped. So, Ken I think this is one of the most important things people can do. It's very, very, simple. There are some free services out there that do a very good job at it and it's going to help to stop you from becoming a victim.

[00:09:12] We're talking to Craig Peterson on our tech guru joins us for some tech updates every Wednesday at this time. Craig final question for me before we let you go here today the Incognito browser. What does it exactly do if people have never used that particular feature on their web browser what is it you you're actually accomplishing.

[00:09:29] Well that's a great question. But, here's the bottom line on Incognito mode. All major browsers have a method they might call it private mode that might call it incognito which is what it is called over on Google's Chrome. But, the idea is it gives you some, Anonimity, a lot of people have been thinking the wrong way about all of this. There was a survey that was just done a little bit of a study. Most people got it wrong. So I'm glad you brought it up here's the bottom line. When you go into incognito mode on your browser it really doesn't hide much. It'll clear your cookies, when you're done. But, let me tell you when you'd want to use Incognito mode and when you wouldn't if you are trying to do something that you really, really, really, don't want anyone to know it's a new business deal or maybe you're trying to collude with Russia. Do not use Incognito mode, because it doesn't protect against anything where it comes in very handy. Let's say you share a computer you right there in the studio you Matt and Ken you share a computer.

[00:10:40] Danny uses that computer from time to time. If you go online and you start searching for a great present for a well for Ken lets say and now can use his computer what he thinks going to happen advertisements and so can begin to see that you were searching for a new table saw for him at his house and these you say, oh I know what I'm getting from my birthday. Right. That's when it comes in handy because those cookies don't get set, the advertisers don't know what you've been searching for. And you can safely browse online for your spouse or friend or whomever and not worry about getting all of those ads popping up on your computer, incognito mode does not protect you in reality 100 percent from advertisers it certainly does not protect you from bad guys. It's just a handy little feature to have. Firefox is the best at incognito mode, among all of the major browsers and the epic browser E-P-I-C is absolutely the best if you want to maintain some online privacy.

[00:11:49] I'm kind of sad that you told him what he is buying me for my birthday. It's kind of sad sad that on our tech guru joins us every Wednesday 738 go to his website Craig Peterson dot com. Thanks Craig we'll talk to you next week.

[00:12:04] Hey gentlemen take care. Have a great day.

[00:12:05] Thanks a lot Craig, I'm going to take a quick break here.

[00:12:07] You think you're getting me a chainsaw instead of a tablesaw. Just curious. You know you seem like the kind of guy I like to work with Sand's builds on this stuff. You see these hands these hands.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 10, 2018

Do you fall into the category of people based on this survey who think that the browser incognito mode helps protect their identity? Listen as Craig discusses incognito mode with Jim Polito.

 

Find out more on CraigPeterson.com

---

Related Articles:

What Your Web Browser’s Incognito Mode Really Does

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/10/2018

How Safe Is Browser Incognito Mode

 

Craig Peterson:[00:00:00] Hey, Craig Peterson here, this morning we discussed incognito mode. You get to listen in on Jim and I talking about it. But do you fall into the category of people based on this survey who think that the browser incognito mode helps protect their identity? Well, it doesn't. In fact, most people really don't understand it at all. 

[00:00:25] So, here we go with Mr.Jim, I forgot to wish him Happy Canada Day. 

[00:00:32] But, he's not holding it against me. And he's back again with more great information. 

[00:00:37] I'm talking about our Tech Talk, Craig Peterson. Good morning, sir.

[00:00:43] Hey, Good Morning. What a great morning! This isn't so bad. I'm getting used to the air conditioning and staying inside.

[00:00:55] Yeah, you know yeah avoiding the sun, that's Canadians, avoiding the sand any more than six hours of daylight is too much for a Canadian. to much. My daughter, my daughters, my eldest daughter, in fact, she just got a job over in Norway.

[00:01:10] She's only the lead on THE LEAD project managers with a company Kongsberg. They're making the world's first completely autonomous ship. 

[00:01:21] So, she's telling me about how, it's like light, the whole day over there and night and then during the winter time, of course, it's just dark all the time. Yeah. I could take that, I think it's like two weeks or something where she is in Norway and the sun basically doesn't rise.

[00:01:43] I couldn't take that. I mean I would love to be over there now. I couldn't take it. As a kid.

[00:01:51] You know we used to go we used to run around we'd leave in the morning and Mom and Dad would have no clue where we were. And I remember one-night playing kick the can and it was like 10-10 30 at night. And

[00:02:04] This is we've all grown up there in northern Canada and it never really got darker than Twilight. And, so I have no clue what time it was, such a different world out there, AHH, definitely a different world.

[00:02:21] Well look, we've got it speaking of hiding in the dark. So, when you go on your web browser and you want to go into Incognito mode, I always kind of feel like is this for real. Are they really not tracking, where I'm going? Or, is it just a scam? First of all, explain incognito mode and exactly what it really does.

[00:02:53] Sure. Well, all web browsers have something kind of similar to this incognito mode. They might call it a private window, for instance, if you're using Safari, Google Chrome calls incognito mode. And, the basic idea behind this is that you can remain anonymous. At least that's what most people think, Jim. That if you use Incognito mode online, you are somehow completely anonymous and I think you can guess where I'm going with this. 

[00:03:25] Yeah, you're not. OK. So, there you go. Folks, Craig Peterson solved it for you right there.

[00:03:36] Exactly. Incognito mode is kind of nice. What it does do is, it does clear cookies when you leave your session. So, for instance, you might go online now, incognito mode is great. Like, if you are shopping for a present for your spouse or kids or whatever. So, you go into Incognito mode, and then once you're in that mode you do a little bit of shopping and poking around and then you exit incognito mode. Now, why this is nice for buying the present is, if that computer is now used by your husband or wife, for you know the other person, they won't see ads, for what you just were searching for online. So, if I know my wife, for instance, wants a brand new table saw for her birthday. 

[00:04:32] Know I don't think Mrs., I don't think Mrs. Peterson wants a table saw. I think Mr. Peterson does. But I get it. So, the ads don't pop up, because you know what I find especially if I buy a big ticket item or research a big ticket item online or Amazon, I buy one, and then Amazon sends me an ad for another one. Like Hey Amazon, I just bought one. Why would I need two? 

[00:05:01] What you can return them on Amazon. Maybe that's what it is and make the money and the turn, right.

[00:05:08] So, that is what it is good for, is good for, getting rid of cookies. But, even then, you're not anonymous as far as the websites go because the Web sites can track you based on how you have configured your web browser. Yeah exactly. Never ends does it are plugins you have the extensions set. OK. So if you really want to have the best somewhat anonymous while you're online browsing experience, the easiest thing to do is use Firefox. Firefox has added some new features so that when you're in incognito mode on Firefox, it does more than Google Chrome does to kind of keep your information private. Again you know because you don't want to be tracked you don't want cookies you don't want more ads for that new sports car or table saw, right. So, it's a good way to do it and the other one to consider seriously consider and this is the one I use quite frequently is the epic browser now. I've had the guy who founded this on my radio show before and we've talked about it but it is E-P-I-C. I see browser and what it does is it goes far beyond any other browsers in trying to keep your information safe. It does not let them set COOK tracking cookies most cookies are completely ignored. It has all of the features of Google Chrome, and yet no tracking which frankly is I think kind of nice. It's a little bit of a relief to know that and then there's another quick trick. That you can do if you want to do a google search and you're tired of Google coming up with all this information about you and everything else. You can go in you can force all of your cookies and doing that is not only going to get rid of the ads that are targeted at you but flush cookies you're going to lose access to certain Web sites that you might have signed into. You're going to have to re-sign in and stuff 

[00:07:19] Yeah. Yeah, I do. I do mine. I don't mind that too much though

[00:07:25] Right. And you know as we've found out in this last week. Well you know, Jim, you and I talked about this months and months ago. I had a secret service briefing about an extortion attempt against Mitt Romney and the Yeah, Yeah I remember that. And you know so they're using technology they thought would make them anonymous. The guy was caught. He was just convicted this last week and he's facing 20 years in prison. So, you know that bottom line even if you think that you are going to be anonymous, there's nothing anonymous online. Bottom line if you're shopping for a present go ahead and use Incognito mode makes a lot of sense or use the epic browser or Firefox.

[00:08:10] It's great stuff. Now listen, folks. That's just a sampling of the stuff you can get from Craig Peterson. He does it for free, for my listeners. All you have to do is text my name, Jim. to this number

[00:08:26] 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5 55 53. 

[00:08:36] Now, standard data and tax rates apply. You'll get the information on Incognito. Plus this one a 30-second change to your computer settings. The easiest way to stop hackers. This is all great stuff Craig won't bother, won't annoy you. He's a nice guy and when there's big stuff going on like a hack he'll send you an alert. So, you want to do this to the man from the Great White North, Craig Peterson. Craig thanks so much and best for your daughter in Norway. Tell her to enjoy it while she can. 

[00:09:14] Yeah, I absolutely will have a Beauty-day, eh? 

[00:09:19] Thanks, Craig. We'll see. Bye. 

[00:09:22] And for those who ask why we call him Craig Peterson because that's how they pronounce it in Canada. It's not Peterson. Hey, we got a final word. Don't go anywhere. 

[00:09:33] You're listening to the Jim Polito show, your safe space.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 3, 2018

How do you feel about the coming Artificial Intelligence?  I spoke with Jim Polito today about two recent studies involving artificial intelligence and what they found. I know you will find them interesting.

Find out more on CraigPeterson.com

---

Related Articles:

The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/03/2018

Machine Learning vs Artificial Intelligence and Psychotic Machines

Craig Peterson:[00:00:00] Hey, everybody. Jim Polito has got to get those phone lines fixed I called him again this morning. And what happens is, that it really sounds hollow and tinny on my side and just as bad on the side. Well, I assume they'll eventually get that fixed. I guess we'll see. But this morning, hey this is a big deal. Artificial intelligence, this morning I explained to Jim here, and to all of his listeners, he's got a huge show number one in central and western Massachusetts, It's crazy. But, anyway so millions of people out there, I explained to him and the listeners and of course now to you, right. The difference between artificial intelligence and machine learning, and I gave examples of two different pieces of artificial intelligence that have been in the news over the last month, and it's dramatic. It's scary but you need to understand this, and also which devices are safe to use. Who's tracking you and why? All of that right here, so, here we go. 

[00:01:08] Our good friend Craig Peterson still having trouble getting connected with him. But we will. And, meanwhile what he's going to talk about.

[00:01:18] When you can get at the end of the segment here, we're going to give you a number, and you text my name to that number. And Craig Peterson will send you a whole bunch of information. He won't annoy you he won't pester you, and he'll just send you important things like when there are big hacks and things. Standard data and text rates apply. But here he is, Craig. I was just telling everyone how I forgot to wish you a very Happy Canada Day. 

[00:01:46] Yes, that's right. 

[00:01:49] I missed Canada Day Sunday, July 1st. 

[00:01:52] I should have had a Molson or Labatt or a Musette, I like Moosehead here. So, yeah, it's like a cool time of year. You know we've got all kinds of celebrations. I've got a mom who's got like 10 birthdays, Wow. This is for our family here.

[00:02:16] You're a busy guy, Craig Peterson, busy. OK, Craig, it's time for you to give us the creepy story and scare us to death about a guy that can predict the future. That's I mean, I wanted to predict certain things like the power ball. I don't want him predicting other things. 

[00:02:34] Yeah, Well this is this is scary. No question about it. You know we've, we don't have, a yes, real artificial intelligence that that kind of thinks for itself not yet, it's not even born yet, really, frankly. Hey now, what, No, in reality, it is just Machine Learning. This is something that we've been working on for a very long time. And machine learning is where a machine can observe a theme and then make some assumptions based on off of those observations, right. That's the machine learning, that's kind of where we're at today. Artificial intelligence is coming around the corner, but it's not quite here yet. And, it's what scaring the living daylights out of everybody. What you're talking about right now is very, very, impressive because I sent this article to you talking about this one, study that has been done, and what they did is say they'll see this artificial intelligence, and they watched some video, and this is really kind of interesting too, and we're talking about the video, and what they were doing. But bottom line this is at the University of Bonn, over in Germany, and they said they watched about 40 different cooking videos. So, these were videos where people were cooking the different thing from salads to dinner. OK. Nothing, we would be terribly worried about. 

[00:04:14] And the computer then learned, OK and so it's watching these videos about cooking and it learned. OK, we like that. We wanted to do that stuff 

[00:04:28] Actually, right, That's right. Now, this particular took over a place a little different than what we had just about a month ago where they said the machine learning this. They said it read a channel or somebody would read it at all.

[00:04:46] Read it. Oh, I know. Read it. Yeah, yeah. 

[00:04:49] And, that people were talking, it's like a big old-fashioned board. This REDDIT. It ended up being psychotic, and everything they asked. 

[00:05:01] Wait, wait, wait, wait, hold on a second. You are now assigning reading. So, Reddit which is a program which is you know an app and everything else. OK. And it's got a guy in it, to do some stuff. You're saying that the AI in Reddit that would be like saying the AI in Facebook became psychotic. You're basically assigning a human psychiatric disorder. To 

[00:05:28] Map a program, a Web site.

[00:05:32] Yeah that's exactly what happened, this is an MIT. OK, not too far away. No. And then they made this little machine learning that way. They said it looked at the darkest corners of Reddit, to be honest about it. But they said, it just got sent to the bulletin board these people chatting back and forth about how they ended up having to name it. 

[00:05:55] Norman, what they named it. Well, first of all, you name someone Norman, in all due respect, to normal is out there you're going to automatically become psychotic, it's like you name someone, Jeeves. 

[00:06:07] Have to grow up to be a butler to those people, Right. So, this MIT named this the world's first psychopath. 

[00:06:19] Who were we, were we feeding that all too, say that now, you've seen these Rorschach ink.

[00:06:26] Yes, yes, like they show you the ink blot test. And most people look at them. It's a psychological test and say every time they look at the blot, they say, I see a naked woman. And now people see the blot and tell the therapist what they saw in it, and it's supposed to show some things in their subconscious. What they have written ordinarily offer up, or wouldn't be able to know that, or even there and offer up his, or her trying to do is get to expose what your normal thinking is.

[00:07:02] Yeah, Oh yeah. You see that naked woman, are you? You don't see this, or you like that, they bad this artificial intelligence. Well, in one of those and artificial intelligence came back, and said things like a man is shot dead, a man jumps from the window. Man is electrocuted and is hacked to death. It was just a man get pulled into a snow machine. All of them. OK, so it's totally massively Norman bait. Wow. So, that was just was last month, this month out of Germany we have we have our latest greatest clue. And, this one observing the Food Network. OK. Yeah. And, so they let us learn from watching cooking and then what they did is they said it just some very short videos and after that asked what's going to happen next. And as long as the prediction was only maybe 20-30 seconds into the future, it was actually very, very, accurate. And remember they only added 40 videos. It's not as though one of these machines could possibly go online and find videos to ingest anywhere. There's no YouTube. It just won't. When actually, I guess, YouTube does have some video. So, what's going to happen when we start feeding this type of information into the computers now. Now let's talk about our system. People out there have assistant systems for a home to go home. You've got your own theory which is the most popular one of them, both Google and Amazon right. 

[00:08:52] You've got your Amazon echoes all those things floated by the way everybody thinks Google is going to win. Why are they going to win the war when it comes to the virtual assistant, why, they have your e-mail. They have your calendars. They know where you go. They know where you are, what you know, the restaurants you're in. They basically know everything, now in the last four months. Google has tripled the number of hardware devices, that are using them. So, this year so far there are 16 hundred devices that have this type of intelligence built since and now we're up to five thousand now. Amazon still dominates that field. They've got 12000 different devices, that they have there. And this is going to be a race of races as Apple, Google, Amazon are racing to have these machine learning, the system because already Google system will look at your calendar and will tell you, hey listen I just checked your calendar and you have a meeting down here in Boston and in the traffic right now there's an accident on the pike, there is this other alternate route and that's going to take an extra 20 minutes and I know it takes you 20 minutes just to get into the car so you better go right now.

[00:10:22] They're watching me. 

[00:10:25] And, then we had more phone problems. But, yes they are watching you. The thing to remember here is that the only one of these major companies that are absolutely dedicated to your privacy are our friends over at Apple, so keep that in mind. They do gather some information but, anything that leaves your phone is anonymized. They have no way to figure out who it was that said something, did something, went somewhere. It does store information but only on your phone. But remember that phones encrypted, it's protected, and it is not used for marketing or maybe even used for evil. Hey, did you notice the Google took to do no evil out of their corporate motto? The Web site, anyways. You don't. Don't be evil, that's what it was. It's gone now over Google, anyways. Have a great day. Have a great Independence Day, or Canada Day whatever it is coming up your way. It's a busy month here for us, in my family and it's a great month. I'm actually for the first time, in a long time, I'm actually enjoying summer this year. Even though the temperatures have been horrific, 103 degrees here in New Hampshire which is where I live, Live Free or Die, or Live Fry or Die Today. Anyways we definitely have a big heat wave enters this summer, right if you like summer, you put up with the heat. And I am actually enjoying summer this year, the heat is just not bothering me as much as it used to. Take care, Have a great day. Bye-Bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 2, 2018

How much learning are machines capable of?  As it turns out quite a lot.  Today, I spoke with Jack Heath about predictive AI research from the University of Bonn in Germany and what they learned as well as what Apple is learning from our iPhones.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/02/2018

Artificial Intelligence in Our Phones.

Craig Peterson:[00:00:00] Hey, Good Morning. I Hope you're having a great week, of course, I am when I'm recording this. We are looking forward to Independence Day, the Fourth of July, and all of our fellow Canadians out there will be having a great Canada Day, no longer Dominion Day. I’m just enjoying this time of year. Boy, we've got some serious heat here in the Northeast. I've been talking to some of my friends who are these snowbirds, who go down to Florida and I've asked them to stop bringing the 100 plus degree temperatures here to the northeast, it’s pretty bad. Hey, have you wondered about artificial intelligence. There is a scary new AI, out of the University of Bonn, over in Germany, and that's really, what I talked about this morning with Jack Heath. How's it going to affect you? Who's going to win this war series? Probably, the most well-known of these assistants that are out there. But, who's going to win? That's not always the first to market.

[00:00:58] That's for sure, on this Monday morning, because the tech never stops with Craig Peterson. His show airs on the weekends on our current stations. And, Craig joins us now, Good morning, Mr. Craig. 

[00:01:09] A good morning. You know you have a habit, a pattern of doing things. Jack, you are bound to be maybe a little bit surprised, maybe not. Have you heard about this new artificial intelligence, that is predicting the future?

[00:01:26] David Losh, not kidding. No, I haven't. I mean I've heard about AI. AI, and all this stuff and they say it's the next big the next big groundbreaking tech, but I haven't heard about predicting the future. 

[00:01:35] Yeah, this is really kind of interesting and frankly kind of creepy as well. There's a new artificial intelligence machine that has been put together, here. Over at the University of Bonn in Germany, by the way. And, what they did is they set it up to learn how these machines learn. When you talk about artificial intelligence, I mean they are really able to learn things, from their environment, right. They're not programmed to understand, that you put the right foot in front of the left foot in order to be able to walk there. They're able to understand how to move the muscles, and that's really kind of it, and then they learn how to walk. In fact, that particular computer was able to predict people’s actions. Now they were really looking at a small sample. They had videos of people cooking, and they fed the videos into the artificial intelligence, 40 of them in total and the artificial intelligence was able to look at them, and kind of analyze them about how people cook, Then, what they did is they gave them identity versus knowledge in some different videos, but not the whole video. Just a small amount of it, and then had the artificial intelligence to predict what people will do next. And it was really quite accurate. And frankly, the University of Bonn from now and you kind of scared me by saying they think that these guys will be able to predict our actions, many hours into the future. And that's a really, really, big deal. And, when we look at our new, for instance, our new iPhone, they have machine learning chip built into them and that's the next step toward artificial intelligence. 

[00:03:23] Google has a system that has really started taking hold and get traction. Google, in the last four months, tripled the number of hardware devices that are using the system and the whole goal behind it. And if you're already using Google, just that you know that. But the goal behind it is to be very predictive. So, it will remind you, “Hey you're going to go on the fourth you're going to this place or that place. It'll just remind you, that it kind of thing, without you doing anything. It's already analyzed your calendar and analyzed the traffic conditions your driving patterns how long it takes you to get to the car and told you when to leave. So, I think Jack, we have this to look forward to pretty quickly. And, in fact, Google's system has become so popular over in India, it was just launched, by the way, last month over in India. It's so popular that a half a million Indians have proposed marriage to Google. In other words, they said Google, Will you marry me, please. 

[00:04:27] Amazing. All right, Craig, good stuff. Craig Peterson with than O.N. dot com Craig man, make it a good Monday, and a great Fourth to you too.

[00:04:34] Happy Independence Day. Thank you. And tomorrow morning

[00:04:38] And my best to all of you out there, as well, all of our great listeners, I so appreciate you and appreciate you sharing it. I had a really cool thing happened last week somebody had tagged me in a post, saying. “Hey, this is the guy I was telling you about”. And, they tagged a few different people, so, that was really kind of cool. And a couple of shout outs this week as well we were able to help out a couple of other small businesses and went back and visited because you know once you get the technology in place that's kind of just the start of things right. You have to make sure it's working. It's integrated, the employees understand it. Everything else. So, you know we don't mind it, we like making those follow up visits to make sure all of the technology is in place, anyhow. Have a great week! A great Independence Day. I'll be back tomorrow, and I going to talk to Jim, take care, bye-bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1