Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2019
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: November, 2018
Nov 28, 2018

Time for some friendly banter as Craig is on with Ken and Matt discussing the Yubikey and how to keep safe while shopping online.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The New YUBIKEY Will Help Kill the Password

10 Cybersecurity Tips for Online Shopping

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/28/2018

Yubikey - No Password Logins - Staying Safe - Online Shopping

Craig Peterson: 0:00

Hey, good morning everybody. Craig Peterson, here this morning. We talked about Yubikey. Have you heard of this thing? This is going to be a game changer for so many people next year. It's a great security tool. And we also talked a little bit more about some of the things you can do to help keep yourself safe online different than yesterday with Mr. Polito. So here we go with Ken and Matt. 

Unknown 0:28
All right back again. 738 on the WGAN Morning News with Ken and Matt. Happy to have you with us here again. It's time to talk to Craig Peterson, our tech guru who joins us now.

Unknown 0:40
Hey, good morning, gentlemen. That little controversy there not just friendly banter.

Unknown 0:50
Craig. I was tempted to start talking first about the porn watching employee then affected the government networks because that's the most common and I was talking about the Yubikey. And I want to talk to you you about two factor authentication. However, since it is was Cyber Monday, and now it's cyber Wednesday, I think you should give us the chips for online shopping before more people get scammed. So let's start there.

Unknown 1:16
Yeah, it's a big deal can it always has been. And it's more of a deal this year than in past because, again, more people are shopping online. The deals started early. It wasn't just Black Friday, right? That I did shopping on Thanksgiving Day on Wednesday as well. If you guys have been on you notice the deals are kind of everywhere they are.

Unknown 1:38
Yeah, they are indeed.

Unknown 1:40
And there's a lot of money to be saved. You never get how much money I shaved today, honey. But here's the bottom line can when it comes to safety online. There's a few things you need to keep an eye out for. I've got 10 of them up on my website. But the first one that has to do with how pay online there are new ways to pay online. A lot of people aren't aware of Obviously, we've talked for years about skipping the debit card, because if the money stolen for your debit card, it comes right out of your bank account. But now you can pay online on websites, many of them using Apple Pay now. So can you've got an iPhone, you've had them for a long time that you use Apple Pay me at all just Yes. And how do you like it?

Unknown 2:32
Yes, you go wrong. We walk up. You push a button. And it works.

Unknown 2:37
Yeah. And now with your your new phone. It uses the face ID right? To correct her. Right. Yeah. So it's designed to be very safe. So if you go into a merchant, and you buy something, you just hold your phone right up to their card reader, basically. And it verifies who you are using biometrics or your pass code, and it's now gives that merchant transaction ID that they use to get paid from Apple. So the merchant never get your credit card information. They never get any of that information. So it can't be stolen if they don't have it. Well, that same technology now can be used online at various websites. So if you can do use Apple Pay, and then Matt, have you used Samsung Pay before? No, I've actually never used it.

Unknown 3:28
Yeah, it's not as good You're such a homework to go use it right now just to spite you.

Unknown 3:38
But it's something for people to consider, because you don't have to give your credit cards etc. Another thing to consider if you don't have one of these smartphones, is to go ahead and use PayPal, which has a very good record of not having the data stolen from a much better than the vendors and we should, you know, hundreds of vendors as recently inside one of our favorites websites, healthcare.gov just cut preached again, 75,000 people lost all of their information, social security numbers, everything sold by the government. So we know that there's problems with using our information online. That's just a real quick and easy tip for people use PayPal or use Apple Pay or use Samsung Pay when you're online use sites that are sites that you know a little bit about, you know that we've got Secure Site out there. That doesn't mean your data is secure. But you know, shop at the big guys make sure all of your software is up to date before you go online. There's something that I do and Edward Snowden does as well. And that is don't use your regular computer for doing online shopping. If you can, right now, this can get expensive, obviously. But the idea is, if your machines infected, you could lose your banking or other information. So if you can't afford a separate computer, make sure all of your software's patch shop up today. I just had a listener yesterday, reach out, I wrote a little thing for him about how to even make sure that your software is being properly updated, right. But be careful, don't click on links, emails, scan, have good passwords, all the stuff we always talked about, don't use public Wi-Fi, the shopping apps, you know, some of them are good, some of them are bad, basically use apps that the store itself has, if you're going to do a little bit of shopping, and you just all over this very careful don't give them more information than you need to. Because remember, it could be stolen. They don't need necessarily your date of birth or other things. And so only given the data that they need can just keep it simple. Speaking of

Unknown 5:58
only giving things that people need, people are the worst enemy of themselves. I went on a prolonged Facebook re yesterday about that new, that new hack thing that everybody thinks is happening. And all they're doing is getting a message from somebody that says, hey, you've been asked for this message and tell all your friends. And then they're telling all their friends that they've been hacked, even though they haven't done so they spread this thing virally forever, because they are the worst people ever. So my point here is that people are sort of unknowingly spreading stuff and making mistakes and leaving themselves vulnerable and so on and so forth. Which I think dovetails nicely into a security hack I know that you want to talk about that millions of people are actually installing themselves they're they're doing they're doing the work for the hackers for that basically,

Unknown 6:41
ya know, we we are security our computer is better than we have before. Now that's not saying that our computers are properly secured right, but we are doing a better job now the FBI is estimating about 60% in NFC and some other stats say maybe as much as 80 percent of all of the hacks are exactly what you said that it's us being our own worst enemies is clicking on the links that you really shouldn't click on and in this case what we're talking about is these little browser extensions so you go to some website and while that this is really cool extension that you can use for shopping it'll tell you when there's something on that page that's cheaper there's a extensions that give you immediate direct access to Google all of these extensions you know think about it for a second everybody have you installed some of these browser add ons because these extensions are in a prime position for hackers to use against you people are installing them voluntarily they are being used by hackers and the same is true even for simple things like one of the biggest hacks schemes that have been going on for a long time again sorry Matt Android phones with their backgrounds you know wallpaper and wallpaper that was stealing people's contact list and the other information including even banking information so don't install these plugins these add ons these extensions don't download wallpaper if you don't need it don't put it on your phone your device because too many of us are hacking ourselves our computers store the bad guys and don't even realize what we're doing but I like I have a really beautiful wallpaper then I downloaded I got delete it now yeah yeah actually you should but if you're on an iPhone

Unknown 8:49
it's so attractive it's beautiful It's the whole universe and it's in through dm you touch it and it's great

Unknown 8:57
no you depress me I'm we've done a great place on her decks the guru correct Peterson comedy comedy want to get a direct information and I'm going to go on there because you have you have some of the cyber deals on I and I want this is an aside when I was in New Jersey I set up my sister in law's Alexa and i i love it. That was cool. But But and I don't, I gotta find out about all the plugins that she'll turn on your lights for you. But But I don't want talking about that. I want to talk about the Yuba key. Because you know, I'm I mean, I have lots of different passwords, probably not those great ones, and probably haven't changed them enough time. So is there's gonna be something so I don't need to do passwords anymore ever had.

Unknown 9:39
Have you heard of this before?

Unknown 9:40
No, no, no, no, I have not.

Unknown 9:42
Okay, well, they just came out with a new version. Here's what it is. It's a little USB fall. It's just kind of like that some type almost they make them so that they're very small as well. And yes, can it will help you depending on the website. I'm not everybody's supporting this technology right now. But this is part of the whole move towards two factor authentication. And I use USB keys, we everyone in my business uses them whenever we're doing something for one of our clients and what it does in our cases, it provides high levels of encryption, but where it really could help you out here can it and it's not a bad idea to use it because you of course have clients information being an attorney that you don't want to have stolen and I worked with a couple of Law Offices who apparently were hacked by other people maybe law offices that were opposing them in court trying to steal everything that they had about the case it was just amazing the stuff that's gone on but this is a physical token the best security you can have this something you know along with something that you have and that's what you use for it's a new standard that has come out now that these new up keys are supporting called fight out to Microsoft is adopting that Google's adopting

Unknown 11:12
protect people magazine your computer or is it when you go on a website and they asked for your password you it if somehow it's more it's better encryption is

Unknown 11:24
is it's both Okay, so so here's what it can do. You can use the UB key in order to decrypt files on your machine, decrypt your machine give you access to your machine. So if your machines stolen and they don't have you up key and your password, they have no way of getting the data that's on it. So that's one level that you can use you be key for the other one is a password free side where you still have a password on your computer but you only have one to remember. So the idea is it will be a better password and then on top of it. The USB key is used to authenticate you to these websites. So you're no longer have to log in to websites you be key will do it for you. These things started 45 bucks they go up to $60 and this is going to be big next year is going to be very big next year because it will be password less you won't have to have them anymore and all of the major sites are already starting to support it or do support it so it's why you be I why you be IU be key have a look at it.

Unknown 12:35
Craig Peterson our tech guru joins us at this time everyone's day and he made today. no exception to that. So appreciated. Craig, thanks so much for the updates. And we will talk to you again next week.

Unknown 12:45
Hey, gentlemen. Take care. Bye bye.

Unknown 12:47
All right. Craig Peterson.

 ---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 27, 2018

Craig is on with Jim on the Jim Polito show as they talked about how to shop online safely securely especially during the holidays as well as a recent breach on the Healthcare.gov website by a porn-watching employee.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

10 Cybersecurity Tips for Online Shopping

Porn-watching Employee Infected Government Networks with Russian Malware, IG says

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/27/2018

How To Use Cash Online - Secure Shopping Tips - Govt Employee Watching Porn Infected Network Russian Malware

Craig Peterson: 0:00

Hey everybody. Craig Peterson here this morning I talked about how to use cash online. Did you know you can do that for this shopping season. Little bit of a safety tip there and go into some detail about it all. I think you will enjoy my conversation with Mr. Jim Polito, hope you had a great Thanksgiving. And this shopping season is going wild. And of course, the holidays, get together with some family. Get together. Some friends. Just just have a great time. That's what I really enjoy about this time of year. And frankly, most of the year I guess that's one of the advantage to having a kids there's always a birthday going on. All right here we go with Jim.

Unknown 0:42
He is always here on Tuesdays. But we appreciate he was here last Friday, Black Friday with a lot of great advice about getting the best deals will now he's here today to tell us a couple of things. One, we'll start with that how to protect yourself while shopping online. Yes, Cyber Monday isn't over yet. Joining us now. Our Tech Talk guru and good friend Craig Peterson. Good morning, sir.

Unknown 1:10
Good morning, Jim. No, you're right. It is not just Black Friday or Cyber Monday anymore. Now. It's a whole season. It actually started within a week ago. All of last week. You saw to keep seeing them until the end of the year. This year.

Unknown 1:26
Yeah. And I would imagine, you know, like everything else when people are out in the streets in the old days, and they were going Christmas shopping and most of them Ed cash. You know, the pickpockets were out in force. Well, now we're all out there online with our credit or debit cards buying and I imagine the modern day pickpockets are all out there

Unknown 1:52
where they are in the world, frankly, in the online space. If really you want to send passionate use credit cards. And other thing I was that way for a long time. Jim I went to almost 20 years without a credit card. And for about five years of those I have a debit card. And then I finally came late. There are some ways that you can spend cash online nowadays that have come into a bit more popularity rightfully Jim. Wow. One of them. Yeah. Did you know that?

Unknown 2:26
I hadn't. Craig No idea. We better give this. This just in in the Jim Polito show newsroom. You can shop online with cash. Here's special correspondent Craig Peterson. Craig.

Unknown 2:42
Hey, good morning, Jim. We've got news coming out of Washington talking about how the government's putting their fingers in your pockets in many more ways than they ever have before.

Unknown 2:52
So how do you use I never heard this how to use cash online.

Unknown 2:56
Yeah, this is very interesting. A lot of people know about a hotel. And many people have PayPal account. Yeah, but did you know with PayPal, the first of all, their security has been extraordinary. Their record of keeping your data safe is incredible. But PayPal allows you to deposit money into a case how account kind of like a bank, all all of your money there is protected as well, which is really kind of nice. At least you know, to what degree PayPal has a better record for safety than most banks who was well, so that's one way you can do what you can also link your PayPal account into a bank account. And if you're going to do that, in order to really just kind of use cash, you don't want the credit card, make sure you open a separate bank account for you transfer some funds into your PayPal bank account. And then you can use PayPal online. And then Apple has a new way for you to send and receive and even family cash on line with Apple Pay. Now, if you have a more recent Apple phone, you'll find that that phone has the ability now to use up near field communications to use Apple Pay. And you can send people money. For instance, your kiddos you're 25 show or your kids calling you from his phone, because he's trying to buy gas somewhere. And he does Yeah, because, you know, you can stand with using your Apple phone. And there are some Android apps for this as well. But I really liked the way Apple does this, you can send him money right in a text message, it goes immediately to him. And now he can use that at the gas station using Apple Pay. So there are ways to not have a credit card now to tie them into bank accounts. Or even with Apple Pay. And Samsung Pay has some of these features as well to maintain cash balances with Apple that you can use to pay and you can use these apps websites. Now more and more as a website you go to, if they have an Apple Pay option is the safest way to spend money online. And all you have to do now is you go to the website, you have to be on your Apple browser. Yeah, you're on safari playing on your Apple Computer, and you go to check out and you select Apple Pay. Now what will happen is it will come up on your phone, it'll use either your phone's pass code, or your face ID, or your thumbprint. Some biometric verify, you do want to pay and you can pay using pairs that you put into your app. Or you can pay using a bank account, or you can pay using a credit card and the vendor that you're buying from never gets your banking information. So your banking information is completely protected. And all you're doing is no different than going up to a cat year and giving cash. It's the virtual basically equivalent of that. Yeah,

Unknown 6:06
yeah, it really yeah. And you don't need a credit card. For any of this, you, you don't need to use a debit card, which you should not be using online, you should not use debit card. But again, you can use Apple Pay to protect your debit card, which is really nice. All the merchant get when you buy something from them is a verified transaction, IP. And that's it. And that they don't have information about you unless you give it to them.

Unknown 6:34
Right. So I don't have to worry, the bottom line is I don't have to worry about this organization being hacked that that be, you know, and then and then finding out a year later, like they always do, oh, by the way, we got hacked. And all of this information came out, like the credit like them, the credit monitoring services, you know, whoa, oh, we got hacked when about a year ago. You know, that's, that's great. That's, that's very, very interesting. And that is the way we're talking with Greg Peterson, our tech talk guru, great guy, and at the end of this segment will give you a number the text My name to it, Craig will get you on his list. And you'll get all of this information plus more and standard data and text rates apply. So you really want to skip the debit card, you want to shop secure sites only. How do I know if a site is secure?

Unknown 7:32
So big trick, right? You saw this, this this one here. But if you don't healthcare.gov got breached?

Unknown 7:40
Really. Really?

Unknown 7:41
Yeah.

Unknown 7:43
Well, listen, wasn't that the plan? Wasn't that the plan where I could keep my doctor keep my insurance and save 20, $500 a year? So I'm not surprised that it kept preached?

Unknown 7:55
Yeah, well, you know, it was so cheap, they just didn't have the money that have shared all that. That's what happened

Unknown 8:04
that gov is considered to be a secure site now at that, frankly, is a misnomer. Jeff. Yeah. Because all Secure Site means is that there is encrypted data between you and the site. So if the web URL as they asked, that means that you are probably talking to the website you think you're talking to, and that your data is secure. But that doesn't mean that once it gets there, that whatever the site is, is actually going to be able to keep your data safe. So bit of a misnomer, but it's kind of the low with far. But look for that little lock up on your web browser when you visit.

Unknown 8:47
And I guess you would say that it's time to beef up the passwords. That's an important thing, right?

Unknown 8:54
Yeah, absolutely is you should be using a different password for every way. I use different email addresses for almost every website out there as well. Use a good password generator. my number one recommendation is one password. And this might be a great little New Year's resolution for everyone. But certainly a great shopping resolution, one password and last pass in the other one says the digit one password, it's a little bit more sensitive, it is great for businesses, it's great for teams. And the last pass all one word last pass works well for individuals works well for team and you can get pre versions. Both of those are going to help you select good passwords and remember them as you go from ISIS like problem stuff that people write them down. I

Unknown 9:51
quickly before we go. I mean, I know I've seen reports in the past on the number of federal employees viewing adult material at work, and for how long they were viewing them the hours. But the problem is, we had one particular I'll say guy watching adult material, which basically invited the Russians into our computer systems, correct?

Unknown 10:22
Yeah, absolutely. This is a good lesson for everyone. If you're at work, only use work related web because in this case, it was on government employee at the US Geological Survey, he had apparently visited some 9000 adult websites, videos, site 9000, that one guy alone, he was downloading essentially malware, right? He was going to the site is grabbing porn. He was putting on a thumb drive on his Android cell phone plan. It's amazing, isn't it. And the auditors found that that his fitness source of some Russian malware that had Greg throughout the US Geological surveys network and computers, it was a forensic investigation that lasted a while. But we've got to remember as business people, you have to have standards in place that they the employees don't use any of these other sites as the standard because people don't always pay attention to what's new employee handbook when you have to be told not to look at porn at work. I mean, I think there's a greater issue there.

Unknown 11:40
It's almost like the you know, when you see the commercial and it says, stunt man, do not attempt this at home. Of course, I'm not going to jump off a bridge. But you know, when you have to say, hey, by the way, don't look at porn at work, and is a bigger issue there. Anyway, Craig, the number, please, that folks can text my name to J.I.M, Jim and get this information.

Unknown 12:07
855-385-5553. That's 855-385-5553.

Unknown 12:16
That's great. And standard data and text rates apply. Craig will not bother. You will not pester you will not hack you and Craig Thank you so much. This is a this was a great segment.

Unknown 12:28
Hey, thanks again. Take care. Take care.

Unknown 12:31
Craig Peterson everybody. Don't go anywhere. Final word when we return.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 26, 2018

Craig joins Jack Heath on NH Today talking about how to shop safely online during the holidays.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

10 Cybersecurity Tips for Online Shopping
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/26/2018

Online Shopping Safely Tips

Craig Peterson 0:00

Hi guys, Craig Peterson here. I had a good chance this morning to speak with Jack Heath. And Jack's now covering all of the State of New Hampshire, parts of Maine. Vermont, Massachusetts. It's really kind of cool. He's grown that quite well. He's got a great morning show. And we talked this morning about, of course, Cyber Monday online shopping. Some tips and tricks to keep you safe online. Justin's wife has had some problems online, some financial issues with stolen stuff. I hate it when that happens. And jack as well. How can you tell the scammers from the real guys What should we be doing online, all of that and more, of course, with Mr. Jack Heath. Here we go.

Unknown 0:45
Monday morning with Cyber Monday, we're going to bring in Craig Peterson and a moment our tech talk guy. But Justin, you and I were talking before we went on the air this morning earlier about the scams and the one of our regular contributors without saying her name, got a phone call or a recording same as a so you know, her social security number had been breached, and to call this number. And you and I know that's not how it works. And I was telling you about the other day, if you get a call and your Verizon user, and you might get an automated call on your phone, like an 800 number. typically don't even answer those typically. But it's like your account is going to be terminated if you don't press one now and verify your account information, right. And you're sometimes people get a statement or something looks like they're from their bank and asking if you did this transaction. And people just fall for this stuff all the time. And they'll say, you know, did you did you buy you spend $879 this weekend in New York? Yeah, no,

Unknown 1:41
but they they want you to go and verify your account that's how they capture information from you. Right It's it's tough

Unknown 1:49
because my wife my wife Renee, she she got a her her debit card was actually compromised. So she got a call from our credit union saying hey, this happened and she was skeptical because we get so many calls that are scams that are trying to get you on so you know what, once real right. So she got a social security card call said that one was a scam. The bank one was real. It's tough to tell.

Unknown 2:10
And and I think you're going to get even more even more right around with all the volume right now. And today is Cyber Monday. Going to set a record I think about 18, 20% over last year. It's going to be the biggest single transaction day online in history. Craig Peterson joins us in the Auto Fair listener lines. It is Cyber Monday. Craig and that's a kind of a mixed thing, isn't it?

Unknown 2:31
Yeah. Hey, good morning. We are setting a number of new records this year we are already broke black Fridays record of having the most shopping done from our mobile phones as opposed to our desktops and also the best deals ever on Thanksgiving Day. So yeah, we're we're shifting we're using our mobile devices more there are better ways to pay online than there have been in the past it's going to be quite the for retailers.

Unknown 3:02
Well, yeah. And but you know, I, I guess I guess more and more people are just you know, it's easy to do is sitting in your house a set of like, with Black Friday, you know, going to, you know, early in the morning and, you know, battle the crowds to go in and get a deal on a flat screen TV or a video game. But you can just sit in your house and do it. I don't think there's any turning back. But you know, part of this too is you know, you got to be careful, right? Because of all the scammers out there trying to get your information

Unknown 3:31
Yeah, I've gotten to the point now where my phone will only ring if it's a number that it recognizes that says my contact so it is getting bad out there. But yeah, there's a few tips as you're shopping online. Probably the biggest tip and and this one of course, is Justin and found out kind of the hard way when it comes to debit cards. But they can be the worst way to do online shopping. Now, Justin, you lucked out because your credit union reached out to you correct thing to do. At that point, you say thank you very much paying off and then look up your credit unions chrome number which will be on the basket that debit card and call them directly. That's the only way to verify who they are. But we can now skip that debit card, we can use some of these online payment services, things like PayPal, for instance, if all you have is a debit card. And by the way, that's not necessarily a bad thing. Or you know, just not having the credit card. But if you link your debit card, and just something like PayPal or into Apple Pay or Samsung Pay. Now your debit card is a lot more protected. Because remember, if they steal money from you, it comes right out of your checking account. And using these services like PayPal or Apple Pay protects you because the merchant never gets that credit card number. Therefore it can't be stolen. And those two companies apple and PayPal already very good about keeping your data safe. So that's probably the first tip and the best one out there. Don't use a debit card if you can don't even use a credit card. But use something like Apple Pay or PayPal online.

Unknown 5:15
And that gets to be arduous. I mean it just like what can you use?

Unknown 5:20
Yeah, exactly. It does get kind of crazy. But with the rate to we're seeing right now. You know, I run the webinars nationally for the FBI for the info guard program. And that statistics are alarming right now when it comes to businesses and consumers were talking about 60% of businesses being hacked in the next year. That's what we're looking at. And when we're talking about consumers it gets even worse because consumers just don't have the education they need to be able to tell ya this isn't the IRS or like Justin's wife did saying listen, sounds a little fishy, right? So bottom line, if it's fishy, don't follow through on on the phone call or that email never clicked on links that come in the email. So you might get a warning for instance, from your bank by email, just go to the bank's website. Or what I do is the credit cards I have been used. I have an app from the credit card company on my phone. And what's really nice about that is every time there's a credit card transaction, my phone gets a message on it just pops right up and says you know, $10 was just spent with Apple, it gives you the details you can rest a little bit more comfortably and you don't have to wait 30 or 60 days to review that transaction. When it comes in the mail. You can see it immediately. So consider that to use credit cards and credit card companies and debit cards banks that have their own the app that allow you to track all your transactions and by all means use the safest stuff up there now the safest stuff in short is Apple yeah Android yeah cash but he can't use that online. Can you know it's I can use that with PayPal

Unknown 7:19
free all the currency you can even check into hotel you know you can say you say a hotels $180 before all the taxes which make it about 240 for the night you know basic comfort in put that $500 in cash. They say I'm sorry I need a credit card

Unknown 7:33
or you can't rent a car either a car rentals you can't buy airline tickets most of the time was I'm cash so use user applicant but also consider using the Firefox browser. Firefox is available for free part of the whole Mozilla thing but it is kept up to date is is looking for scams it is trying to protect you. So if you're going online, use five Fox News. These other third party payment services Watch out for the email scam. Don't click on link. Make sure you beef up your passwords. I've I've got a whole list of these things up on my website as well. Like practice on.com all of the tips with many more details behind them. And then also a few shopping tips. My favorite this season, by the way, is the room buys on sale almost everywhere. These are these robotic vacuum cleaners. My wife loves them. I love us up in the office and use them in a home.

Unknown 8:33
They just a backup. And Craig said and PayPal is great if you have an issue with them. If you get the in my experience. Like if you something goes wrong. PayPal fixes it immediately. So I've gotten you an email once and I'll say it was a problem with your PayPal account. I don't have PayPal and well that's an issue.

Unknown 8:52
Know what I mean. Yo, you'll get a lot of these. I'll tell you it's very hard to ascertain what is bogus. And what's real. before we let you go Craig if had to say two biggest really good byes today on the tech side. What are they?

Unknown 9:05
Well as the Roomba you can get it almost anywhere online for more than $100 off which I think is a very very good five and a lot of kids love these video games. And there's a couple of games out right now that they're going to love as well. But consider some of these video game console like the new Nintendo that's out there that Justin was talking about earlier.

Unknown 9:27
All right. Thank you very much Craig. Good stuff Cyber Monday 2018 to 20% above last year I guess going to set a record is the biggest shopping day online ever. That's today and thanks Craig. And imagine a lot of people even at the workplace might be doing that I you know, of course.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 24, 2018

Did you rush to finish Thanksgiving Dinner to rush to the sales? Did you go out on Black Friday? Are you shopping today and tomorrow?  How about on-line Cyber Monday?  Well if any of these apply to you listen in for some tips on how to stay safe while you shop and where to get the best deals.

If you have been listening in to prior shows you know I have been talking about China and their different hacking activities.  Well, they are at it again and hacking even more.  Listen in as I tell you some of the ways they are doing it now.

You know that I am a fan of Two Factor Authentication when it is done right.  But unfortunately, sometimes it is not done with much thought and it fails. Today, I will talk about one type of two-factor failures.

How readily do you install apps, plugins, etc?  Today we will discuss why millions are installing hacks at the same time.

Did you hear about the government employees who caused a network compromise?  When you hear how they did it you might be surprised.  Or maybe not. 

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/24/2018

Safe Shopping Online - China Hacking Even More - Two Factor Authentication Failure - Millions Are Installing Hacks - Porn Watching Leads To Network Compromise

Craig Peterson: 0:00

Hey hello everybody. Craig Peterson here. Got a lot today as usual, make sure you visit me online. http://CraigPeterson.com. I've got some great information out there when it comes to online shopping tips, of course, right? That's this time of year when we have to deal with that. So pros & cons. In fact, there's 10 different tips that we have out there on the website. And we're going to cover some of those today as well. We finished getting everything else set up, right, there's always something you forget to do. So let's get going safer online shopping.

Craig Peterson 0:44
Well. we all shop online. This year, of course, we're going to set another record not only for travel but for what people are buying online how much money they're spending. I've got 10 tip top of my website at http://CraigPeterson.com, that you might want to pay attention to the first tip. And this is a really big one. I think most people might know about it. Some people might have forgotten about it. But it has to do with how you are paying the first part of this tip, skip the debit card, do not use the debit card. In fact, you can go one step further, if you'd like some of the companies are already offering you on an alternative. For instance, you know, you can use Apple Pay, you can use Samsung Pay, depending on where you are. Apple pay is very safe. Samsung Pay seems to be quite safe as well.

Craig Peterson 1:39
So if you have to use a debit card if you don't have a credit card, and I want 20 years without a credit card. So I know what you're feeling here. What's your thinking. And all I had was a debit card, put that debit card behind another payment system, such as Apple Pay, or Samsung Pay if you have a debit card, otherwise, don't use it. Okay, that's kind of the bottom line here. Because debit cards will cause you to know, end of grief of that information is stolen, right. So remember that there's another new trick that's out there that's been available for a few years, depending on whose credit card you have, you have to have a credit card, not a debit card in order to do this. And that is getting a temporary credit card. They'll give you a number that only works once in some cases. Visa has this MasterCard has their own program. But it only works one time because it's only working that one time.

Craig Peterson 2:41
If someone steals a number, who cares, right, just because you have a secure server, which that with that HTTPS and that little lock up in the corner doesn't mean that your data is secure, other than when it's in transit. So rule number one, skip the debit card, use Apple Pay if you can use Samsung Pay if you have to. And you know how, what I feel about some of the Android devices and the software they have. I'm not a big fan of that, right. So use those or use a temporary credit card number to shop on secure sites. Now,
what does that mean? I've had a lot of people ask over the years, hey, listen, this isn't a secure site, I don't want to enter information into it. You could have your information intercepted. And we've talked to my show before about how Russia and China both have routed internet traffic from the US from businesses to the foreign offices of the spy agencies and have

Craig Peterson 3:47
gathered information. So if you're using a secure server, you are thwarting the Chinese hackers, the Russian hackers etc. And that's a very good thing. So make sure you are using a site that the URL begins to https. Okay, so secure site. This is an obvious one, right? And yet, every time we go into a business we see this isn't being paid attention to but update all your software, make sure your operating systems up to date and make sure your browser is up to date. Use the best technology out there. A lot of people have switched to using Firefox. Now it's fast. It's designed to be rather safe and secure. They're updating it constantly. So Firefox seems to be the number one choice for security-conscious web browsers safaris quite good Chrome is quite good. Although Google I'm kind of shaking my head. If you watch this on video, Google is a company that they keep our information right there, they kind of sell our information to other people, but make sure your software is up to date. And you might want to use one of these tablets that are going to be a little more secure. We'll talk about that in just a second.

Craig Peterson 5:08
Now, email scams, who talked about these before a lot. And business email compromise has cost us companies over $12 billion over the last two years. Can you believe that $12 billion, that's a lot of money? And that money comes from these business email compromises the scams, where they get you to click on something that you shouldn't be clicking on. So what's the easiest way to deal with that I've got a solution. The simplest way to deal with business email compromise scams is to use a different email when you're online shopping. That's what I do. I've been using different email addresses for the last 30-40 years almost. Now those business email addresses that I'm using, I use a different one for every website.

Craig Peterson 6:02
So, I know now emails coming in. And it's being directed at an address that I know I've only ever used on site x. And yet it's purporting to be from PayPal It ain't right thing right. This is not them. This isn't PayPal because it's coming in from site x that I want to sell. For instance, I sign up for something on Cnet.com I use a different email address now there's a trick here you might not know and that's the use of the plus sign depending on your email system you may be able to put a plus sign so for instance if you send an email to me@craigpeterson.com. It's going to go to me if you send email to me+radioshow@craigpeterson.com. It's still going to go to me and it's going to show that it's sent to craig+radioshow@craigpeterson.com. So I have filters in place, so I know about it. But use a different email address for your online shopping at least have to write maybe more. Maybe another one for your banking. I even go so far as to recommend that you use a different computer. For some of your online shopping. And certainly for your online banking.

Craig Peterson 7:20
Just say no to clicking links. Never click a link. Just go up to the web browser, menu bar, and right in there, type in the URL of where you want to go. Don't follow those links. but beef up your passwords. You know, I have a special report on passwords. I can send that to you if you email me@craigpeterson.com. How about this. Did you like my last tip? Well, why don't you try and send it to me+password@CraigPeterson.com. And that allows me to track and say yeah, you want password stuff. And I'll be glad to send that to you. That's normally paid special report. But I'll make it available to you for free. $97 gift to you. But brief them up.

Craig Peterson 8:08
And when you beat them up. The best way to do that, frankly, is to use a password manager because they can generate some of the best passwords. We're not going to go into and what that means, But that's in the special report. You know how you should generate them what they should consist of it to deeper right now, but beef them up, okay, never give more information than is absolutely necessary. I think that's a really big deal. So if they're asking for your name and address and various other things, you might want to consider doing something I've done as well for more than 40 years and that uses a kind of a fake name now you're not trying to commit a crime here this isn't fraud but you can now track who's using it so I will spell my name differently or use part of another name like mine I even very frequently will use the website name as my name.

Craig Peterson 9:07
So again, if the website saw that, it might put seen that Peterson for instance, and then my address so they can ship the stuff to me.

Craig Peterson 9:17
Now I know something comes to an email that says hey, seen that well, who I know where they got my email address from. And I know that nothing that's in there is stuff that you know, maybe I asked for, maybe I didn't write, but its marketing material at the best and the worst. It's someone that stole CNET's database and is now trying to defraud me on something. So don't give any more information than needed.

Craig Peterson 9:44
Another really good tip here. These are some great ones, I got them up on my website. http://safewise.com has these, of course, I'm adding some more in as I go. But don't use free hotspots. They're like manna, right? Everybody uses them unless you have the right kind of VPN. And I gotta say, most people have no idea what that VPN is really doing. Most of the free VPN and the cheap VPN are stealing your data. Now, they're not necessarily stealing it to have your credit card and use your credit card against us. Some of them are, but they are stealing your data. So be careful with that public networks just plain aren't secured. Other people can also connect to your computer. And many times a bad guy will set up a fake little wireless network and make it look like hits for the coffee shop or for the story are in and when you connect to it. You're really connecting to them. And they're stealing your data. Be smart about the shopping apps that you're using.

Craig Peterson 10:49
If you're an Android, particularly people only use apps from the Play Store that does not guarantee that they're safe, by the way, because the Google Play Store is not meticulous about making sure that all of the apps are safe that they're not doing something nefarious Apple's store Apple's App Store much better about doing that. But again, you're not necessarily safe. Okay? Don't let your computer or your device remember your credit card number. You probably don't want them to remember passwords and things again, that's why you should use a password manager.

Craig Peterson 11:27
Does that make sense to you? Bottom line is is that something that you think you should be doing is it obvious I think it is so if you want that password manager information, just email me@craigpeterson.com, you'll find this article and others right there online. http://craigpeterson.com. Alright, and next up here, we're going to be talking about what China is up to.

Craig Peterson 12:00
Well, you can't think that I would do a whole show just on Cyber Monday. And shopping over the holidays. Do you think China has taken the gloves off when it comes to the theft of US technology? Now, you might call this a great microchip heist, we've seen China breaking into computer systems. In fact, right here locally, we've picked up a new security client where I'm I'm acting as their data security officer. And we found Chinese backdoors on it. But there's a great article from the la times I've put up on http://CraigPeterson.com, and it's talking about this stunning microchip heist. Our computers have memory in them. There's different types of memory, one of those types is called DRAM. It's very important memory. It's kind of typically it's the main memory for your computer. Right, not the hard disk, not the SSD. But the main computing memory that's in it, what we've been tracking this for a while. And it turns out that the US federal government has been tracking for the last couple of years Beijing.

Craig Peterson 13:11
Now, I'm not going to get into all of the details, you might want to read this article up on http://CraigPeterson.com, but it's talking about China and how they've prioritized stealing intellectual property. And they really wanted to be able to manufacture these DRAM chips.

Craig Peterson 13:27
So they managed to get this information. And believe me, they're doing it by hook or by crook, the small-medium businesses are the most attacked, they're the most vulnerable and they have the most to lose. So the Special Agent in Charge of the FBI, San Francisco office, John Bennett is saying that out there in Silicon Valley, and they've been going double time, the quote is, they don't care if they get caught, or people go to jail, as long as it justifies there. And they are not going to stop. And of course, the Trump administration has been increasing some of its rhetoric when it comes to the Chinese and what the Chinese have been doing. So it's been a big deal all the way around. It's kind of a scary thing, frankly. So that's our little bit of a china story here. When we come back, we're going to talk about some more leaky data out there.

Craig Peterson 14:26
Alright, so next up, this is kind of interesting, because all of us have SMS, right? You have a phone, SMS is the simple messaging system, a gay texting, right that you're used with your phone. And we all have these, we all use these. And we talk a lot about two-factor authentication with our clients. And I've talked about it on the on the show here before, you've got to have the ability to not only know of password but have something the best security is something you know, along with something you have so many websites have decided that the easiest way to have a two factor authentication is you've, you've got your cell phone, right, that's something you have along with something, you know, which is your password. So what do they do when you try and log in, or maybe once a week, when you try and log in, they'll send a text to you. And then that text is used to do what that text is used to send you a number so that you log in with your username and password. And then you enter that number. That's a type of two-factor authentication. And that works great except when it doesn't. So there are bad guys out there who have been very busy trying to do a couple of things to us. One is they will do sim hijacking, which is a real problem nowadays. Or in this case, we've got a massive security lapse.

Craig Peterson 15:58
This is a massive database containing tens of millions of text messages, including password reset links to factor code, shipping notifications, and more. So let that sink in. Have you ever used your phone to identify yourself I've ever used your phone to get a password reset link? Now, some of these companies that send it to your phone or are pretty smart, they realize hey, listen, that's your phone, the stuff like this could happen. And at that point, your data is exposed, right which is a very bad thing. So they put a limit on it. It's only good for maybe 510 minutes. Some of them though are good for a very long time the expose server belongs to a company called box ox and it used to be called tell centrist they're out of San Diego, California their communications company and they lost a huge number was it I'm trying to the number here in this article 26 million. Here you go text messages year-to-date.

Craig Peterson 17:05
So what was found by TechCrunch in looking at this they found passwords sent in plain text to a phone number from a dating app called battle several Booking. com customers are sent their six-digit to factor codes to log into the company's corporate network Fidelity Investments, fidelity, right, they're located right here in my town
also sent six-digit security codes to one number in Chicago. Many messages included two-factor verification codes for Google account all over the world, including Latin America, Mountain View, California credit union, it goes on and on shipping notification text sent by Amazon. That's a little less troublesome. Unless you are someone who is trying to steal some of these Amazon packages we must before but it goes on and on Huawei ID, verification phones, etc. Very, very bad. But this goes to the point of two-factor authentication. And using your phone for two FA two factor authentication. If you can avoid it, avoid it, what I do is I use an app and it's called duo. Let me pull it up here for you. Right now. If you're watching this on video, you can see my phone. If not, you're going to have to kind of imagine.

Craig Peterson 18:30
But this is my duo app. And you can see I've got my mainstream protected login, my Craig Peterson login, Facebook, Amazon, and more right here. So what happens with this is this is a special app to run on smartphones ties into these applications.

Craig Peterson 18:48
And if I am trying to log in, particularly if I'm logging into a system that has our customers data on it, it will go ahead and send notification sorry for the little coughing fit there and hit the cough button.

Craig Peterson 19:06
But it'll send a notification to my phone that the app activates. And I now have to authenticate to the app. So it uses passcodes. But it also uses biometric identification. So I'm logging into a system that has climbed information on it, obviously, that's critical, right? That's something we have to watch for. So we're logging into the system,

Craig Peterson 19:32
I am now authorized to access it. Because I've given the password I've given bio information thumbprint or face print, etc.

Craig Peterson 19:42
And so now that application knows, it really is me. So think about that use something like duo it was just bought by Cisco. It's funny, all of these companies that we've been using that Cisco ends up buying it's good because you know, we're part of the Cisco ecosystem are pretty high up actually in the Cisco installing reseller's space, but they bought it, it's now integrated. And you can expect more and more of these things as time goes forward. But these are the leaks that we worry about. This is one we found out about how many of them did we not find out about? That's what's next here. We're going to tap can talk right now about the hack

Craig Peterson 20:20
that millions of people are installing themselves. Yeah, yeah, really. And you might be doing this to this is something we're always cleaning up for customers.

Craig Peterson 20:37
Now, you are using a web browser, right? Who doesn't use web browsers nowadays, you go on, I just did some banking this morning, using my web browser. Now, again, I use a different web browser for banking than I do for other things. And I often will use a different machine kind of depends on what accounts I'm messing around with. But the internet browser is the gateway from your world to the internet world. And many of us just don't pay the type of attention, we should pay to our internet browsers. Now, everyday users.

Craig Peterson 21:10
According to this study that was done here. Very recently, information that was released from Google, nearly half of all users of Chrome on the desktop use browser extensions. Now, they can be very handy. In fact, a Chrome browser is essentially an operating system in and of itself, right. But some of these are now these browser extensions are being used to hack into people's computers by the millions.

Craig Peterson 21:43
Now simple things like unwanted advertisements is one thing. But they've been stealing passwords, they've been siphoning other sensitive information, they've been using some of these browser plugins to mind for cryptocurrency, which means your machine is now going to overheat as it's looking for cryptocurrency, which by the way, will make them money, but will cost you a lot more in only your electric bill. Why is it getting hot because it's burning all that electricity? Okay, so this is a prime target for hackers, you might not want to use them, avoid them. When possible, I do use a few. And what I tend to do is activate an extension when I need it.

Craig Peterson 22:28
So if I'm trying to figure out a Facebook Pixel, I'll turn on the Facebook Pixel extension. If I want to add something to instant paper or my pocket account so that I can use it and follow up in some of the webinars I do or this radio show. I turn it on when I need it because it's giving these devices privileged access. And that's something frankly we just don't want to do. Okay, well, I'm a million users here, just for one Chrome extension. This is getting to be a very, very big problem.

Craig Peterson 23:04
Now we're going to talk about something that is also a big problem and cost the federal government of a whole lot of money. Most of us are smart enough, right. And we were just talking about extensions to Chrome and other web browsers and how that can really cause some havoc with your security. Most of us are smart enough not to go to online porn sites or gambling sites.

Craig Peterson 23:31
Those are the two worst right now when it comes to malware. Well, this is kind of interesting because the Interior Department has this watchdog and they found that the US Geological Survey had been the source of a massive breach. And I mean, massive breach, the agency's inspector general traced malicious software to a single unnamed you USGS employee. That's US Geological Survey employee. Now, that employee reportedly used a government-issued computer to visit some 9000 tall websites. So this is according to a report that was published about a month ago, many of these prohibited pages were linked to Russian websites containing malware, which was ultimately downloaded to the employee's computer and use to infiltrate Geological Survey networks. Now that this is according to the auditors that went in afterward, the investigation found the employees saved much of the pornographic material on an unauthorized USB drive and personal Android cell phone, both of which were connected to their computer against agencies. protocol, by the way, the employee's cell phone was also infected with malware.

Craig Peterson 24:52
Well, what can we learn from this? Has this happened to you in your business? Have you got first of all in place policies and procedures that say employees cannot should not do that? And then secondly, do you have any method in place to stop them from doing that, even if they're breaking the policies, right? The policies are there, but that doesn't mean that they're going to be obeyed. So do you have the proper filters at the network edge that are going to stop people from breaking out into the internet How about on the local computers have you turned off the USB ports and you know, a lot of places do that you can turn them off in the BIOS and then the employee goes in and turns them back on which means of course, you should have at very least protected BIOS is on those machines of course nowadays and not using bio says, but the same concept applies many businesses and government agencies have decided that they have to completely disable those ports which are too bad because employees are taking their phones right the Android phone a hook it up, plug it in, let me see. Oh, look at this. I've got a charging cable right here. I think I'm going to plug my phone in. Right, and they do that now. Viruses come out from their phones that go into the computers they spread through the networks the phones become infected by infected computers so they're putting epoxy into those ports on the computers and I've had more than one client that had their employees your walk around you see all of these cables whether they're like this for an apple or regular USB cables you know micro USB or now USB C cables and we recommend that they all be removed and so we remove them all and employees get upset because they know they want to hear from their family from time to time they're not necessarily on their phone all day long.

Craig Peterson 26:49
How do you deal with that right that's a problem and then add on to that the fact that they're on your network or on your business network is it being controlled is being controlled properly right? All great questions so keep an eye on this one porn watching government employee introduced a massive problem for the US Geological service How about for you in your business right. Think about it for a minute put those in place if you want more information reach out to me@craigpeterson.com got some great employee handbook sections that we can share with you we've got all kinds of good information there on the website again http://CraigPeterson.com. Make sure you sign up and that's easy enough to do and I would love for you to rate my show and my podcast. Go to http://CraigPeterson.com/iTunes. http://CraigPeterson.com/iTunes. That will take you right to my podcast on iTunes where you can subscribe and I'd really appreciate it if you did because those numbers really help us reach more people out there. And while you're there, hopefully you'll give me a five star rating. I'd appreciate it. http://CraigPeterson.com/iTunes. Have a great week ahead and we'll talk with you again soon. Bye bye.

---

Related articles:

10 Cybersecurity Tips for Online Shopping

The Security Hack Millions of People are Unknowingly Installing Themselves

Two-Factor Authentication Using Your Cellphone is Dangerous -- A Leaky Database if SMS Text Messages Exposed Password Resets and Two-Factor Codes

China ‘Has Taken the Gloves Off’ in its Thefts of U.S. Tecnology Secrets

Forget the New iPhones: Apple’s Best Product is now Privacy

The New YUBIKEY Will Help Kill the Password

This Windows File May be Secretly Hoarding Your Passwords and Emails

Healthcare.gov Breach Included Social Security Numbers and, reportedly, Children’s Info

Porn-watching Employee Infected Government Networks with Russian Malware, IG says
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 21, 2018

Craig joins Ken and Matt as they talk about Thanksgiving and about the Black Friday and Cyber Monday deals online.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:


---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/21/2018

Getting High Over The Holidays - Black Friday Cyber Monday Deals Online

Craig Peterson: 0:00
Hey everybody. I hope you're going to have a great Thanksgiving with hopefully family right Craig Peterson here. If you have face time on your Apple devices and you've upgraded to the latest iOS just in time for Thanksgiving, Apple now has group calls with FaceTime major redesign so you can get together with your family and friends over the holidays on FaceTime check that out and of course if you have like an Amazon Echo reach out and and say hi to everybody this is a great time of year and you'd hate to think that some poor people in your family or friends that you know just didn't get the kind of love and attention that maybe they should have had over the Thanksgiving and Christmas, New Year's, Hanukkah whatever you celebrate this time of year So reach out we got the tech today to do it use that tech and be kind be nice. Alright today and was on with our friends in Maine and I had a chance to talk to Ken and Matt a little bit about two different tech stories and a quick summary of all of this stuff you need for Black Friday including a website that shows you all of the circulars for the major brick and mortar retailers yeah yeah I know who would have thought that retailers still existed a in this online world there are you going to be online shopping or are you going to be going to retailers I know I'm probably going to be doing 99% of my shopping online this year by time and I'm not alone and I also think this year from the stats I've seen we may end up with more online purchases over this Black Friday Cyber Monday we can long weekend then purchases in stores physical stores so we'll see what happens there too but anyways here we go off to Ken and Matt have a great Thanksgiving Day

Unknown 2:03
Wednesday 738 time for Craig Peterson, our tech talk guru who's joining us for a special day before Thanksgiving appearance. How are you doing Craig?

Unknown 2:10
Hey doing well I'm enjoying the whole families getting together and we're smoking a couple of turkeys

Unknown 2:25
I really thought that's where you're going because you know a pot is legal in Maine and we just talked to our from soco who clearly was are protecting this morning yes so

Unknown 2:35
you know I have never tried that back back in the 70s when I was in college everybody was smoking marijuana hashish

Unknown 2:45
that would be me yeah

Unknown 2:46
yeah and I you know I remember we used to hitchhike back then you remember that Ken?

Unknown 2:53
we just go out and check we get in anybody's car somebody we didn't know they were everywhere

Unknown 2:58
yeah well I guess it has change that much because now we'll get anybody's card will pay them

Unknown 3:05
Uber and Lyft is a little different than

Unknown 3:08
the okay well I remember one time I got a ride from campus and there was a van one of those members 70s and you know no windows in the back

Unknown 3:23
it was smoking back there and so I guess maybe I did partake little bit by accident yeah yeah by osmosis if

Unknown 3:32
you're in good company because Matt Matthew

Unknown 3:36
is not a millennial, but almost has never taken either. I have made up for both of you. That's all I think. Yes, you've taken that one. And I have I have pie because I have to do what you guys don't I just I don't understand what appeals to people about it would you drink to get but that's a different that's a completely different thing. And no, I don't really not much how does very sexual it you know mellows you out I don't want to be mellow by the way if you have a bad TV show or movie. I get good. All of a sudden makes you hungry. I don't need to be, you know, fat

Unknown 4:11
ice cream and stuff. golfing and mashed potatoes while you kids. That's why. So let's talk about the text of Shall we up before be why is uniquely I mean, Facebook. Mark Zuckerberg was a bad year for them. Yeah, he saw and but seemed a little defensive. And I mean, isn't it kind of people to stop using Facebook or my face face or something like that? I mean,

Unknown 4:36
there

Unknown 4:37
was a huge amount of stock shares. And so I seems like it was silently quietly selling off some of his stock. Let's go

Unknown 4:47
Well, you'd have to assume that they that he is right. Yeah, Facebook. It's interesting, right? First of all, all of the younger kids decided they weren't getting use Facebook does mom and dad were on it, and so's they don't have this younger, younger generation coming up. It's the older people. So they they seem to be kind of now turning the way they're running the business towards the older crowd. And you look at the latest product. For instance, I received this portal from Facebook

Unknown 5:20
for now having one is, oh, it's a brand new product of pushing for this Christmas season. If you haven't seen that yet, you're going to see ads for this thing. And what it is essentially is an Amazon Echo that's tied into the Facebook ecosystem. And it allows you to have face calls with people. How's that for weird contract. So you can be a you know, you got all your Facebook, friends and family. And now you can have a video call. It's a standalone unit. We just look it up online, you'll see a portal from Facebook, and you set it on the counter or wherever. And kind of you unique thing for this device, at least for the fancier one is it follows you around the room, which I don't know, seems kind of creepy. It turns it follows you zoomed in on your face. But the idea is that they're trying to make it so that you can have Christmas or Hanukkah or whatever you're trying to do birthday celebrations with family dropping on families, which the Amazon Echo has been doing for a while. And their their motto is, if you can't be there, feel there. So that's different, right? And, and because it's always been online, it was text type messages where you type them and and then you could have some video chats. But now they're really trying to make it so that you can be there. I don't know Ken there. I've heard predictions and Facebook is on its way out. It will be dead, which of course happens all the time, right? The market leaders end up falling pies of wayside. They've certainly lost a lot of people's trust with over 30 million accounts totally hacked. Apparently, all of that information is for sale on the dark web right now hack just a few weeks ago. And I think people are just getting to the point where they're fed up with it. I I know I'm tired of at that point personally.

Unknown 7:20
And Craig Peterson, our tech guru joins us as he always does at one Wednesdays at this time to take a look at the world of technology. Craig, you mentioned a moment ago, and Amazon

Unknown 7:29
Echo. So this is an interesting

Unknown 7:32
story that I read a couple days ago about the secret recordings. This thing is making a view as you walk around your house.

Unknown 7:41
What is

Unknown 7:41
being done with those things?

Unknown 7:44
Yeah, well, this this is an interesting question. And we'll talk a little bit about frack Black Friday. You're just a sack because frankly, a lot of people are looking at those actors and and the Google homes and now those Facebook portals to have for their houses. The I think what you're referring to, is this double homicide. That is exactly

Unknown 8:04
what I am referring to. Yes.

Unknown 8:06
Yeah, right next door, New Hampshire. And here's the bottom line on those. Okay, the first of all, the echo is listening all the time. And that's true for pretty much every device in your home. But it's not recording it. And it's not sending it up to the cloud unless you give it a command. So in the case of this murder investigation, double homicide of what the police will find on that devices, nothing because it overrides the last few seconds of what uttered continually so listen to her few seconds. And it looks for its wake up word, which would be Alexa address case or, you know, hey, Google, if you got a Google Home device, and if it listens for that wake up word. And then it starts sending about third up to 30 seconds of off to the cloud. So they're not going to find anything on the device unless the murderer woke up and said, Hey, like, how do I committed double homicide

Unknown 9:12
if there is not going to be realized you just sent a bunch of Alexa.

Unknown 9:16
Yeah, I know,

Unknown 9:19
including the one that I have

Unknown 9:22
a big event going to have recorded and have it up to the cod. However, this has happened before, where they the person who was in the home, use the Alexa beforehand to order pizza, find out what time it is, what's the weather tomorrow or play my favorite playlist? That's where they might find the murderers voice on the device. So if you're thinking about buying one of these for, you know, the holidays for as a gift, I would say, go ahead. I certainly have one, I found it to be just really, really helpful. And I'm done. Worried about the technology in any market when you mute and Alexa. It has a unique hardware inside and that little, there's a red light that comes on a big red light. And the hardware can only do one of two things. It can only power the red light, or it can turn on the microphone so that red light is on there's no way within software. Even if the bad guys have hacked your device remotely. There's no way for them to turn on that microphone. So it's not so bad, frankly. But they may find stuff it's happened before. But the last big case with Amazon the Amazon Alexa file was groups all charges dismissed once the Alexa recordings were given to the police and the guy that on had previously only Alexa said, Yeah, please, you can have it Amazon, go ahead and release it because Amazon was fighting it. But Black Friday really got like a second or two here. I gotta throw some things in here. If you want to see the big door busters. There's a website you have to visit. They'll show you the all of the circulars from all of the big guys like Walmart, Best Buy target, even Amazon. They have leaked add that they were able to put up. It's called Black friday.com. You'll also see some big deals coming up from Apple over Black Friday weekend. If you're looking for a very cool gift. There is a deal going on right now. On Amazon on the new Roomba. The room by 960. It is fun. Domino, you will get $200 off. This thing checks up pet hair that you didn't even know you had. These things are beautiful. The Roomba 960 for sale on Amazon. Right? Yeah, so cool.

Unknown 11:56
You'll also see Black Friday deals on things like the new smart from all apps that are out there. Philips Hue which is a great lighting system. The Google Pixel book drops by 300 bucks. I've got all of this up on my website, by the way. So you can see some ideas there by the probably the best place to go to start. All of this is black friday.com to find the circulars that are out there right now. But do be aware of scams. But you know, guys, I think there's going to be fewer of the hacking of scams that have gone on in years past this year. A lot of retailers have smarten up. But some of them still aren't keeping our data safe. So as always be careful out there guys

Unknown 12:45
joining joining us on tech guru as he joins us every seventh or eighth grade. You have a great Thanksgiving. We'll talk to you next week.

Unknown 12:52
Take care guys. Take care of her.

Unknown 12:55
See Craig. All right. Let's toss things back.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 20, 2018

Craig is on with Jim Polito talking about Thanksgiving and the ups and downs of digital privacy. How do you stop Google from tracking your location and activities?

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

How to Stop Google From Tracking Your Location And Activities

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/20/2018

The Ups And Downs Of Digital Privacy

Craig Peterson: 0:00
Hey, good morning everybody. Craig Peterson here. Massachusetts, just this week on Monday it became legal to sell recreational marijuana. Now I want you to listen to this interview with Jim and tell me if you think he's well, I don't know. Maybe he's, I think he visited a pot shop earlier this week 

Unknown 0:27
Good old Jim Polito. Oh, we had a great discussion this morning about online privacy. He brought up some really great issues it talk more than I did today. So here we go with Jim Polito. Oh, by the way, everybody have a great Thanksgiving and thanks to everybody who responded to my email that I sent out to some of those subscribers about trying to have a little get together have friends to talk about this whole problem with small business and computers and security and everything so

Unknown 1:00
Thanks to you, and if you haven't seen a response from me yet, that's because I'm going through I'm sending individual responses to everybody. So this is this is not just an in the blind to everybody. So hey, anyways, here we go with Mr. Jim.

Unknown 1:14
He's the man, the myth, the legend. Hey, you know that he wrote code that is still in use and the internet. I'm talking about our good friend and Tech Talk guru Craig Peterson. Good morning, Craig. How are you doing today, buddy? Always a pleasure to see you. Hey, good morning, doing really well. What is no way

Unknown 1:39
the snow and the cold for you is nothing. It's like, like for you. It's like you're back home. Which reminds me when his Canadian Thanksgiving Mr. Peterson well in the US they call it Columbus Day. So it's about a month earlier and with our family. We actually had another session.

Unknown 2:00
You've been September because one of my daughters with along with their husband was home from Norway and they just love Thanksgiving. So I got three shots. This thing giving this year I love Listen, I would take that I would take that it's my favorite holiday. And what's interesting, Craig is that if the Canadians are celebrating Thanksgiving around Columbus Day,

Unknown 2:24
the Canadians are probably more accurate or closer to the day the actual first Thanksgiving took place because it would have been a harvest festival and it was likely late September early October in 1621. So Craig I guess the Canadians have us beat on this one even though we had the first Thanksgiving yeah it's interesting there's all kinds of differences you know Canada they call all the indigenous people First Nations I thought cool Yeah. First Nation other words, there was a first or

Unknown 3:00
Establish a nation. I mean, they were here the whole time. But yeah, I thought the whole thing of interest, I just love the story of that first Thanksgiving and, you know, moving the Commonwealth out of really being the Caitlyn, who else? yeah how people were finally about starving to death. It's a great story. This is not sold. And I know and I'm telling it and this is a chance for a shameless plug. Even though there's no money involved in this one on wt ag on Thanksgiving morning at 9am and on why. And on Thanksgiving morning at 7am my Thanksgiving special I actually went to you know, I'm a little bit of a history buff. I went to Plymouth Plantation and produced a one hour special on it using the reactors. They're

Unknown 3:47
like I'm interviewing them in in modern day because when you go to Plymouth Plantation, they don't break character Craig. They stay in character and they become

Unknown 4:00
Hey, there's and they represent actual people who were there in the Plymouth Colony and historical people. So I interviewed them and use them in it. And then I got someone from a what they call the indigenous program there a native person who runs that program of the whopping dog. And but they, they, when you see them there in the dress of the period and working

Unknown 4:26
in the their homes of the period, but they they speak to you and you know modern parlance you know, they don't, they don't play act because they say, we don't have to play act. We're native people when

Unknown 4:41
we were here. So with all that in mind, I want to ask you about this thing with Google because it's kind of a

Unknown 4:49
it's a good bad situation. You sent me this information. So if you don't want Google tracking you

Unknown 4:58
if you want your privacy better.

Unknown 5:00
back, you will have to give up some convenience. You're going to tell us how you can do it with your smartphone and with with your iPhone or with your Android, but

Unknown 5:10
you give up to get that privacy, the suggestions and things that Google does for you that actually I prefer, because like when I go to YouTube, I like when they suggest videos to me that are videos I'd be interested in because they know what I watch. But why don't we talk about that start with start there, Craig?

Unknown 5:30
Well, it is kind of interesting, because all the major manufacturers, Google and Apple, certainly the real big ones are interested in in the whole mobile assistance marketplace. Google has something they call in a system and the idea is it really does track you particularly if you're using an Android device. So let's say for instance, that you go down to New York City and it notices that the last couple of times you've

Unknown 6:00
down to New York City, you've always been in this one neighbor of us. And it goes so far as to notice which restaurants you've eaten. And in other words, which ones you went in. And you stay for a while, right? So now you go to the north, and or you go somewhere in Boston, who knows what you like, at least out in New York the different areas yourself, too. And the idea is, the google assistant will make recommendations to you based on what you've done in the past, even in other city. Wow,

Unknown 6:33
that's really quite cool. It's very nice. But it's, it's the same time. Yeah, so Google knows that at nighttime. Your phone resides at 123 Main Street in Western Mass. And so now if his figured out Well, that's probably worth gym lifts right there on Main Street. Yep. And I seen his calendar that he has an appointment later on today. Going

Unknown 7:00
But he has another one first. And so it figures out your route for the day. The idea is, it will wake you up. It'll tell your fingers working to do now. Here's what's going on. Yeah. How about I order to Noli for you while you're in the north and you get up here? That's where they're hoping to take this whole thing. And you know what, it's already doing some of that already, because it will Google Maps. I never assigned where home was, but it eventually picked up okay, this is home free gym. This is where he lives and eventually asked me Do you want to set this as home in your Google Maps

Unknown 7:41
getting a little forward with you? Yeah, yeah. And I did only because I like to hit one button. You know, I use my smartphone is my GPS my car. I mean, these are all great things, Craig. But what you're giving up for these is privacy I'm giving

Unknown 8:00
up all of the privacy and there's a part of me. I've always been the type that has said, I don't care if what people do and what people look at me look at for me because I'm not doing anything wrong. I don't care. I mean, of course, I believe in the Bill of Rights. But you know, in terms of the government, I don't care because I'm not doing anything wrong. But there's another part of me that says, Hmm, I don't know if I like this.

Unknown 8:28
Think about this. 510 years down the road. We're going to have autonomous cars, fully autonomous cars. Yeah, and these things are going to be driving around and it's going to tie into your system and your system now is going to say you've got a meeting in you need a car I'm going to have a car pick you off at 10am. If you're not going to own a car. Certainly in 20 years. Most people won't have a car anymore yeah, and and it's going to show up well, it's a bad guy. nose mouth.

Unknown 9:00
That that Jim is going to this meeting. And let's say the bad guy wants to frame the who, who's got everything they might need. Let's say the bad guy wants to attack you. We have already cases in New York City down in Central Park where bad guys put sensors on trees and those sensors. He texted people's Fitbit as they went by and those fit bits were then track and the bad guys were able to track the specific women in order to attach them to rob them and the other various things that might have been trying to do so all of that data being there It's one thing for marketers to have it because it might be a benefit right yeah there I think there's a benefit I don't consider it annoying when you when you want to buy a car that's when you want to see the car commercials all the time right right and and the other side of it with the government is well you know

Unknown 10:00
The government gets to have a quick look at my data and say yeah, obviously Jim wasn't even he say or nearest he's not a suspect in this white cast the net that's the benefit to because now you're not getting harassed and getting pulled into the precinct again.

Unknown 10:17
So, so there's some benefits there. But the, the negative parts of all of this, ours is that data essentially gets out. Look at the about 30 million Facebook accounts. Right? You reach the goal, right, right. And big data is taking all of that is selling it it's putting this together knows and it's going to be yeah and and and that's the that's the worry. You know, it's funny, you talked about the Fitbit thing because you had a few weeks ago told us about how the government didn't want members of the military when they're deployed to put on their Fitbit because the same thing could be done the bad guys in the park who were looking to attack women by tracking their shipping.

Unknown 11:00
Bad guys in Afghanistan and Iraq would do the same thing to try to track our soldiers. So if I want to get off that, and I know at the end of this segment, folks we're with Greg Peterson, we're going to give you a number you'd be text My name to, he'll send you this information. But in standard data in text rates apply. But Craig, it's not that hard in the settings of your smartphone.

Unknown 11:23
To stop this know there's a few things that you're going to need to do. And it does obviously varies from Android, iOS, and which version of Android you're on a better etc. But basically, you go to my activity, and that's where it shows you how you're being tracked online. And once you're in there, you're logged into your Google account online by the ways what you're doing so yes, you're going to the web Google my activity. It's showing how your tracked online and you can open that button you can set it up and change it. There's six sections in there that you're going to find it

Unknown 12:00
And you can also control your Android phone tracking from there. Your phone's track tied into Google account, which probably is. Yeah, if you're an iPhone user, you can toggle off web and act as app activity, location history, there's a bunch more, this gets a little bit complicated, but we're talking about three to five minutes worth of work. Yeah, you can turn that off. And I think that's the big positive now, you should just, you know,

Unknown 12:31
expect that you're not going to get all those conveniences after you do that. And by the way, folks will get you this information

Unknown 12:39
in in from Craig Peterson, but you should expect to knock and have the convenience anymore, a lot of that will go away, no doubt about it, it's still going to track you if you're using the map application dapp obviously it needs to but other than that, the features the assistance and other things that you might like are really as he says it's going to go away.

Unknown 13:00
Alright let's go on to something else which is getting rid of your personal information online and and you were talking about Apple CEO Tim Cook talking about need for digital privacy reform I don't know that's kind of like him talking about it's like the chicken I mean the fox guarding the chicken coop but I mean how do you will send the information but but what's possible What are you able to do well again the Apple iOS platform is your least monitor a randomized everything but it's hard to reconstruct Apple can even give it to the government okay they don't have it bottom line but as you know over time it's going to become impossible Jim you know I think we are on a ship that's been scuttled yeah and the odds were going to survive this are almost zero.

Unknown 14:00
You know, from a standpoint of our privacy, it's going away. People are giving it up. We're using our credit cards all time was using Apple Pay, et cetera. And all of this is just a little bit of the time. Right? As you move from a cashless society, to an all digital society, yeah. And who knows where from man, it's To me, it's, it's scary. Tim Cook. Typing has some great ideas. And I'm glad to hear Apple really is concerned about privacy. They haven't been the best in the world about privacy, but they're nowhere near as bad as Facebook or obviously our friends at Google. All right, let's find out how to get this information. So what you do is you text My name to this number.

Unknown 14:52
855-385-5553. That's 855-385-5553.

Unknown 15:00
Standard data and text rates apply. Craig Peterson will not pester you. He'll send you this information so that you'll be able to do it yourself. Or at least you'll be able to have the information. Should you decide you want to do it. And don't forget Craig Peterson will be back here on Friday in the seven o'clock hour. We're going to talk Black Friday, we're going to talk Cyber Monday. We're going to talk buying online with Craig Peterson. Craig, thank you so much. And Happy Thanksgiving to you, sir. Hey, thank you. Take care. Take care. Speaking of Thanksgiving, the turkey is our final word. You're listening. 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 19, 2018

Craig is on with Jack Heath talking about the role Alexa played in a New Hampshire murder trial.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Amazon Reportedly Ordered To Hand Over Echo Recordings In N.H. Murder Trial

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/19/2018

Double Homicide - Can Police Get Information From An Alexa

Craig Peterson 0:00
A good morning everybody. I sent out some emails to a few people this last weekend. Hopefully you got it on Saturday. If you are on my list, I'm going to be doing a quick one to group a six week course here. Well, not even course really. I'm going to be helping out a small group of friends with business security. So we're going to be walking through everything. I'm giving them just tons of great information. Everything from the employee handbook sections they need sounds like four dozen different employee handbook session sections, what they should be doing with their computers, what they can do for free how to make this all work some some serious training for a C levels within organizations. That includes business owners. And the idea at the end of this is they'll know who to hire, how to hire them, how to select our managed services provider, or even a break fix shop all of the questions they should ask them everything. So this is a beta program people are going to have to apply to get into this program. I think it's going to be a phenomenal thing. And I've already had quite a few responses. So if you think you might be interested, if you are a sea level or business owner and you want to get your arms around security are my people doing the right thing? Why did the IT guys always clam up when I asked him about security? Right? Have you have any of those types of questions and make sure you send me an email let me know I will this week. I think probably I don't know that this week. A lot of people are probably out for Thanksgiving but I'm going to send out a quick email but let me know and I will send you information on how to apply to be in this program we are charging for this program because it's going to take a lot of my time to guide this group. It's a beta program that's going to be leading edge but just email me@CraigPeterson.com if you are interested, get your arms around the security there and your business. Alright, so this morning I was on with Mr. Jack Heath. And we talked quite a bit about this double homicide that happened in New Hampshire and explain in more detail what type of technology is being used by these IoT devices Internet of Things the the Amazon Alexa is the Google Home

Unknown 2:27
Craig Peterson joins us on the auto fair listener line and interesting article Craig hopefully doing well. Jeff Jonas, you're talking about this on Friday is a Lexus speech protected? This goes to a case where the the technology the locks, it may have heard something that ties into a double homicide in Farmington almost two years ago.

Unknown 2:52
Yeah, good morning, Jack. It does. I spent some time talking about this case on my show this weekend. Very in here. Yeah, it's very interesting. Because we're bringing more of these devices in your homes. You mentioned the course the Amazon Alexa, Google has the Google Home. Apple has it theory. And there have been a couple of cases now. And this one is making some national news where the prosecutors felt that there may be information that's contained within that device, in this case, and Amazon Echo bottom line on this for people that do have these devices, the prosecutor doesn't really understand how the technology works. So I take a second to explain it. But also that the prosecutor may not be entirely wrong here. So jack, what happens with these devices nowadays is they're constantly listening to everything going on the environment. So that part the prosecutor has, right However, they are locally listening for their wake up word. So I'm not going to save the way help word. But you know, when you address these things, you call it by name. And then you give it a command. So nothing's going up to the cloud. Unless the device has been modified, nothing is going up and to the cloud and kill it hears its wake up word. So in the case where there was a double homicide, what would have happened is, it would have hurt the whole homicide because the the detectives in the case think that the original action took place in the kitchen, which is where the Amazon echo that they seize was located. So they think that they probably heard it and it probably did, but that Amazon Alexa sitting there is not going to be sending any of that data to the cloud. And it's only stores a few seconds worth of sound on the device locally. And then it rights over it again, now where things so they're not going to get anything from this and let's the murderer, someone else called out the wake up word, then that 32nd stream of data and it's usually only 30 seconds max would have been sent up to Amazon. And Amazon does keep it now where it might be interesting. And we've seen this before is in a case where maybe someone with crime of passion patch use the Alexa earlier in the day. So they might have ordered pizza, or they might have asked what the weather is tomorrow, etc. In those cases, that device is recording the boys and uploads it to the cloud. In fact, you can go in with any of these devices online and in the apps and listen to the commands that's been given. So in that case, the prosecutor could go to Amazon and say, Hey, listen, we need the recording and listen to see if the murderer had or the accused I had previously use that device, maybe an hour or so before the burgers and then there's a crime of passion. And now they have some suspect at least they have the voice of the suspect now in in the pre or price previous case. In the non New Hampshire case where they went ahead and subpoenaed amazon for the records. Amazon resisted them saying no, we're not going to provide that data to you. And ultimately the guy who was charged with the crime conceited and said to Amazon Yeah, go ahead and release it. They listened to what recordings were and ended up dropping all charges against the guy because there was nothing incriminating on them but it's an interesting question an interesting problem and it's got national prominence now Jack

Unknown 6:45
Well, it does and these things are so like you saying your home now and you don't think of what's captured Do you think of sort of what's live and what's happening you know, you know Alexa it's like the ad you know play me some Whitney Houston you know they're not thinking Alexa Bose final score last night of the bears game you know, people aren't thinking of what's picked up right or what's captured

Unknown 7:06
right and you know that thing what was the score the bears game that has been used in divorce cases before not not because it's the bears not the Patriots. It's been using cases before because a boyfriend or a girlfriend of the spouse comes over and uses the Alexa it's all recorded in the spouse notices wait a minute now this isn't my playlist this isn't the music I like and and who the heck like the bears and so they have the voice of the cheater and the GD right there on the device it's been used in court that way before it's funny

Unknown 7:43
how people used to say careful of stay on the phone the government might be listening and now it's like let's practice listening device into our house and set it up

Unknown 7:51
Isn't it funny and and what what else were we told don't get in cars with strangers right and don't take candy from strangers now Now we call a stranger give them money to get in their car and get takes it places guys the whole world just changed entirely hasn't it?

Unknown 8:06
Yeah

Unknown 8:08
interesting stuff and you know again this is that was a pretty pretty well known double homicide case in terms of pristine solvents murder and a friend

Unknown 8:22
you know I guess the whether or not they can get suspect from this and who knows if they're gonna you know there's such a legal ramifications right

Unknown 8:30
yeah and Amazon is going to continue to resist from what they're saying right now and really the only way they would be able to release it without any problems is for the owner to say yeah go ahead and leave those records but in this case apparently the owners debt because I imagine it was hers at the time yeah so it isn't please Cassidy I doubt they're going to get anything but maybe they will but they're certainly not likely to get a recording of the murder as it happens like what happened in the Saudi embassy over in Turkey now here we go there's a

Unknown 9:05
Alexa can help solve that but they have plenty of video they have plenty of video and other stuff to know that a mystic a show he was not leaving that console and alive. All right. Thank you, Craig. And have a great great Thanksgiving.

Unknown 9:16
Hey, thank them people right now on our homepage. If you go to dir there is a an article about travel on Thanksgiving. Google has mapped it out where you should go where you shouldn't go and when it's a really great article.

Unknown 9:32
Alright, thanks. Thanks, Craig. Appreciate it. We come back checks out over the financial show airs.

Unknown 9:36
Hi everybody. By the way. Have a great Thanksgiving if you don't hear from me, although I'll be on again Tuesday and Wednesday this week. And of course my radio show this Saturday, but I might love Thanksgiving. It's a great time for families and friends to get together so enjoy yourself. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 14, 2018

Craig is on at the WGAN Morning News with Ken and Matt as they discuss how safe our states' voting system is.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:


---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/14/2018

How safe is your State’s voting system? We compare New England voting technology with Florida’s and come up with some recommendations.

Unknown 0:00
All things technology tech guru Craig Peterson is on right now. On the WGAN Morning News with Ken and Matt.

Unknown 0:18
back again here at eggs in issues live at the Holiday Inn by the bay. This is, of course, brought to you by the PLC family of collision centers. To find one near you log on to PLC collision. com. Also carpet specialist covering your flooring needs. Located at Park Road in Westbrook united insurance, your business is different review your business coverage at United insurance.net workgroup technology partners faster, safer and easier IT solutions and support for main business online at workgroup main. com new Gen Hospitality Management. Proudly providing service selection and value for your group or companies hotel and event space needs in Greater Portland and also universe dedicated to making you a customer for life. With all that said, It's time now to turn our attention to Craig Peterson, our tech guru who joins us now as he typically does. Craig, how are you?

Unknown 1:05
Hey, good morning doing well. I'm down in Orlando. In fact right now,

Unknown 1:10
but maybe you could help them do the spouse and Broward County. What do you think about that?

Unknown 1:16
Yeah, exactly. So I was down in the swamp of stuff going on Elmer the land or stuff going on. It presents really kind of an interesting problem. And although there is obviously political implications and opinions on both sides, what seems to be happening right now is frankly, it's kind of a result of the hanging chads, you remember that back in 2000 I named al gore Yeah, exactly. And, and the problem back then really was that Florida was not using current technology because Chad's were part of punch cards, right. And, and that's technology, frankly, out of the 1800s very old technology. And by the year 2000, we had a lot better technology. Well, we're seeing that again, gentlemen. And what we're seeing is that these two counties that are having problems are using the equipment that they bought in 2002, after the federal government came out with a grant. Now, you know, I said forever, you can't have non technology, people making technology decisions, right? It's, you know, it's just such a complex topic, and particularly talking about these voting machines. So the voting machines they bought in 2002 don't hold up well, in humid conditions, guess what they have in Florida, you meditate, and they can only score one race at a time. Which means if you are trying to, for instance, look at the governor's race, you have to run a all of the ballots through the machines for the governor's race. And now we need to score the senate race. So now you got to run all those ballots through the machines, again, for the Senate, race, etc, etc. And down here in Florida, there's another race that really matters. And that race is the agriculture commissioner. I think that's the title. But in that case, obviously, Florida, a lot of agriculture, but the agriculture commissioner is the person who makes the decisions about concealed carry permits down in Florida. So the republicans are all up in arms with that. So here you go, you've got what is a 13 machines, you have to run all 250 ish thousand ballots through these machines multiple times, the machines don't like the humidity that's in the air down here. So they're jamming and just drawing balance. When they jam, it is a complete mess. And then on top of it, you seem to have a woman in charge of it, at least in Broward County, who doesn't seem to really know what she's doing. It's really a crazy thing

Unknown 4:13
that's putting it mildly. We're talking to Craig Peterson, our tech guru who joins us now to go over the world of Well, I guess the election technology would be the best place to start, since that's really dominated the news right now, you've of course, been talking to us about these machines in Florida. What would be a good option? I mean, I don't know how much you know about election machinery and the kind of ballot boxes they have, or whatnot. But you know, here in Maine, we have sort of, you know, we have a paper ballot, that we fill out the oval with, you know, with a pen, and then it gets run through a tabulating machine. And we have, like, the physical we have the physical thing, it's not connected to the internet early so says, Matt Dunlap. So it seems like we do things reasonably smartly here. What's the best system in your mind?

Unknown 4:59
Yeah, frankly, that is the best system, you know, whether or not the software safe, reliable, etc, is a completely different story. But that system allows for a real manual recount. In other words, you filled out those bubbles, right? You took some felt pen, right, and fill those in. That is something that a human to look at, right, you can, you can pull those ballots out. So the right way to do this is people fill out the ballot, the run through the machines, the machines come up with the tally. And then what you do is you spot checks, machines, spotcheck for one race or two races are all of the races and make sure everything is as it should be. Now, there will be a little bit of discrepancy because a human I might be able to determine intent better than an on him and I because some people instead of filling in that oval will, right, yes, and the machine's not going to understand that and they seize the assets spits out the ballot, and in those cases, those ballots can be looked at manually. Many states are using absolutely insane stuff. They've got Windows XP running a touchscreen. And in a lot of cases, in this election cycle, we've seen voters complaining that they tried to vote for someone and another person on the ballot was actually voted for so. So you

Unknown 6:32
aren't Craig, what's the argument for doing it that way? I mean, when I was in Virginia, we had an all digital machine ballot, and I voted that way. And it went smoothly for me. But I don't understand why you would do it that way. Is it really just to save like, on printing costs? I mean,

Unknown 6:46
it's

Unknown 6:48
Yeah, yeah, for accounting, I mean, what is it?

Unknown 6:52
Yeah, it is. The argument for that is that if you're trying to have 5 million people casting votes, it's much easier to have those voting machines where everything is calculated automatically. Some of the voting machines like that do have an audit trail, that they spit out a piece of paper, most of them, frankly, don't have a good audit trail, and there's no way to manually recount them. So it's insanity. We, you know, and you already know, we do not have any national elections, we have 58 elections, and the states typically leave it up to the counties to perform the voting. So we've got thousands of different jurisdictions that are in charge of voting. So they're going to choose different machines, different versions of those machines, they're going to try and update the software on them. Some of these machines are a little on the complex side, although they're getting simpler for the people working, not the polls, but working the election, the secretaries of states and things. So it's a this is a problem, this going to continue on. And last, everybody switches to what main de because I know New Hampshire uses a similar system. In fact, I think it's the same system throughout New England, we have a lot of those, and they're moving around the country. But that's the only way to do it. And then, of course, the other part that's a real problem right now in Florida has to do with people seeing what's happening. The light of day is the best disinfectant. And when you're talking about having the physical balance, like our us here in Maine, it's fantastic because everyone can look at them. You can have multiple people who are monitoring all at the same time, and they're not letting people in to monitor the balance to monitor the accounts or anything else. So that's the political side of it. Right? I personally think that's absolutely insane thing. Let people in light of day make it so they can be hand counted. And I think everything gets a lot better quickly.

Unknown 9:00
We are going to Craig Peterson Tech Talk. He joins us on Wednesday. 738 let's talk about a little fake news. Um, how easy is it to create fake news Craig

Unknown 9:14
I know this is really an interesting case because we now have the technology where we can put a person's face on to someone else so let's say you wanted to show someone committing a crime all you have to do is have an actor some sort go ahead commit the crime all fake you know and then the computers can now monitor everything that's going on track the whole thing map it and put someone else's face on makes a body look similar. It's absolutely crazy you guys remember Lord of the Rings? The movie series? Of course, of course. And did you ever see the behind the scenes the videos of how they did this with Gollum and he had those white golf balls all over him think

Unknown 10:07
that that's how you used to have to do it today You don't have to do it that way at all. So when you're talking about fake news is that extends all the way out to the video world that frankly some of these videos that you're looking at are fake. In fact, one of the videos on Facebook that got millions of views showed this jet airliner just a passenger plane doing loops and slips just before it landed and it was shared like crazy it was absolutely fake there's no way that jet could do what was being shown and yet it went out to millions of people who believe it happened so we're going to have to be very prudent consumers of news as we go forward because it's so easy to fake right it's easy now fake email addresses this easy to fake phone numbers how many times a day you get a call from one of these spam pies right trying to sell you something or they're from the IRS right lately it's been for me it's been insurance and by car insurance but it's it's so fake and it's something we just got to be aware of. Be careful you really can't believe your eyes anymore.

Unknown 11:26
No, you cannot well, Craig Peterson our tech guru, leaving us with that bit of hope and optimism. Appreciate a Craig we will talk to you again next week.

Unknown 11:34
Take care guys. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 13, 2018

Craig is on today with Jim Polito talking about how technology is helping with our problem with plastic bags and plastic waste and how China has been hijacking the internet backbone of western countries.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/13/2018

Recycling Plastic Bags - How Technology Is Solving The Problem

Jim Polito: [00:00:00] I'm talking about our good friend and our Tech Talk guru Craig Peterson. Good morning, sir.

Craig Peterson: 0:06
Hey, good morning, Jim. You know when it when it comes to plastic bag, there have been some technologies that have come out about that, about being able to because I'm told over and over. Oh, you can't put them in single stream. Because with the other plastics, they'll jam up the machine.

Unknown 0:24
It's like, it's like smart people like you, Craig could figure it out. That's why we have some people like Craig Peterson and others, because they figure out these problems for us. Like they got us to the moon. They got us a smartphone, they got a heart transplant, like oh, that guy's gonna die. Why? Well, he needs a new heart kid. Well, can't you take one from somebody else and put them in there? I never thought of that.

Unknown 0:52
Well, I may a basement stairs guy first off that's where you're like me and Danny. Yeah, yeah, exactly.

Unknown 1:00
Choose a plastic bag with a plastic bag as opposed to a plastic flowers. Yeah, you gotta get done. You know, I will have to send you on a plastic flowery thing. Yeah. Craig. So you can be like the rest of the guys. So that's number one, which is the easiest. You guys are already doing it. But there are a couple of new technologies that are out right now. First of all, and this was only discovered this year, they were digging through some of these massive, you know, trash heaps that are out our landfills and what they found was really really interesting they found plastics that has been degrading now it's not supposed to be great when it down on the ground. Yeah, styrofoam was degrading a few other things with the grading and in various ways. And what they found was there's a bacteria that has now come into being that they had never seen before. According to the research I was reading and this

Unknown 2:00
bacteria will digest any and all plastic for, you know, like it's flat 95% of plastics that are out there. So what they're starting to do is they're, they're trying to make sure, first of all that this plastic isn't about to, you know, studied in our cars or something if they spread it around. But the idea is they'll take this and they will start spreading it into the environment of the land cells and it will start eating up all of the plastic which is really good. So that's number one that is brand new. And number two, that's been around for a while. Most of these small plastic bags that we get from the stores such as Walmart and others are designed to be biodegradable, and if they are out in the open and exposed to the sun, they will break down and break down very quickly. It's only a matter of months. And so those tree is brand new and number two, that's been around for a while.

Unknown 3:00
Most of these small plastic bags that we get from the stores such as Walmart and others are designed to be biodegradable and if they are out in the open and exposed to the sun they will break down and break down very quickly it's only a matter of months and so those trees that have plastic bags in them that you mentioned if they're the newer plastic bags they will just fall apart into pieces very small pieces at first and then completely break down wow the problem is already solved frankly thank you but but no we have to feel good and go out there and say we're going to do that and as I said my town is taking away styrofoam too so I'm gonna you know get my takeout order wrapped in newspaper

Unknown 3:53
you know I mean that's that's basically what it's boiling down to

Unknown 3:58
why

Unknown 4:00
But many times that Intel Penn and Teller did an episode about that on their show and they were actually able to convince people to use I think it was 17 different recycling bands you know one for soil toilet paper one score so no timers at different in court or South that have come in contact with raw chicken

Unknown 4:25
and and it was absolutely amazing to be able to do it yeah

Unknown 4:31
no, I didn't is that from their show which I did see some episodes where you can't say the name of the show on the air yes yes that was a cable show and it was it was a good show and then add in its name it had a curse word which was funny

Unknown 4:49
yeah well then you know they did that and I had a chance to talk to potential at but the reason they did that was that they

Unknown 4:59
you can

Unknown 5:00
You can say someone's line and you can't say someone's misrepresenting or misleading but you can call it that subtle swear phrase. Yeah, be banned. We can say BS. There you go. So you can call it BS and you can't be sued for that. That's right. He said, they spent a lot of time with the lawyers on that whole thing. So that's what I called it, but they would they did this study, they found the original guy that had come up with this study that says we're about to be very 10 three deep with trash from coast to coast. Yeah. And this daddy was incredibly flawed, actually had him bottom there show, unbeknownst to him being on their show. But it was incredibly flawed. And they pointed out how all the trash from the whole country would fit into an area that was like 10 miles.

Unknown 5:57
I mean, you people begin to

Unknown 6:00
And then reporters rewrite it and it suddenly becomes the truth and it becomes accepted. And it's Wait a minute, just like the Did you know the whole eight glasses of water a day. No one can tell us where that came from. And there are many physicians who will say, well, it's important to be hydrated but Who said anything about eight glasses of water a day? I wrote I read a study on that one. Yeah, apparently it came as well as the 10,000 steps a day Yeah. came from a Japanese marketing campaign a lovely

Unknown 6:39
there was no science behind it at all. Yeah, but it was a marketing both own channel marketing campaign. Just like you know, breakfast is the most important meal of the day of baking in a while. I know bread bacon and eggs was a marketing campaign. Yeah, you didn't eat bacon and eggs for breakfast. It was all marketing Yeah, well.

Unknown 7:00
So, yeah, it people tend to fall into this. It's a headline people read, right? If it bleeds, it leads. Yeah. And so, you know, we heard about that barge of trash of New York City. Oh, yeah, it floated out there. And remember that one? Yeah, man. So all these people are thinking that somehow there's no way to dispose of the trash. But it turns out there is a plastic bag many of them now, and that this technology is easy and cheap can biodegrade in the sun. And we've got a brand new thing nature's taking care of it is, you know, factory of it's breaking it all down. Well, if you believe in natural selection, you believe in evolution. You believe in the origin of species, then you know that Mother Nature will find a way and bacteria that wouldn't ordinarily eat plastic. Well, all of a sudden a mutation and DNA somewhere says hey, look at this and we can eat

Unknown 8:00
Plastic and digest it. Just like there are certain bacteria that can eat oil pollutants. Anything else? Craig? We're running out of time. What's a good ad line from what you've got this week? And then we'll get folks the information so they can get on your list and get everything that's going on this week. Yeah, there's a lot that I think the number one thing that you might want to mention real quickly is that a lot of people have been getting on President Trump with him going out and Shane China is stealing intellectual property. talked about this a little bit on the on your show before. Yes. And the reality is now we have found that China has been hacking Now I mentioned the different type of hacking, China Telecom, big telecommunications company out of China. They have a presence in the United States they've been using their presence in the US to reroute our

Unknown 9:00
traffic through China certain companies they will go after company or an internet service provider and I'm not going to get technical and how they do it but they will route all of the traffic of China they will break the encryption they'll capture everything we're talking about email traffic website traffic banking traffic, everything we routed to China them back to where it's supposed to be. People hardly ever notice sometimes it's been six months or more that they've been monitoring a company or in some cases, government offices and sustainability. So so basically

Unknown 9:37
it's basically like in the old days there the rerouting all of my mail that comes to my house through their processing center. They're opening it up. They're looking at it, resealing it and then having it delivered to my house without a gem. Wow,

Unknown 9:55
Craig, you've been a big help today while actually helping us with the plastic issue.

Unknown 10:00
But not just that with this information. And folks, you can get all this information from Craig Peterson. All you have to do is text my name to this numbe.r 855-385-5563 855-385-5563.

Unknown 10:20
That's right. And Craig will get back to you with that information. Standard data in text rates apply. He will not annoy you. He will not sell your name. He won't try to sell you anything. He's just going to provide you with great information. And Craig, thank you so much for your time, buddy. You were a big help today. Hey, take care. Take care. Bye bye. All right, when we return

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 12, 2018

Craig is on with Jack Heath talking about the midterm elections, the voting machine hacking, and China hacking our telecoms networks.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/12/2018

Florida Election Technology - China Hijacking Networks

Jack Heath: 0:00

Craig Peterson, our Tech Talk guy. His show Tech Talk. Craig Peterson joins us now at the Auto Fair listener lines. Good morning Craig.

Craig Peterson: 0:05
A Good morning. I've been following what's been going on with the Florida week count of ballots. The technology behind all of that stuff Jack, it's really kind of interesting.

Jack 0:16
Yeah? Well, interesting is one way to put it. And who knows what the outcome will be Craig. Your guess is probably as good as the people counting the votes.

Craig 0:24
Yeah, exactly. Well, the problem here really seems to be related to what happened in 2014. Of course the hanging chads, the ballots, and problems back then. Florida and a lot of states around the country after the federal government put some funding in in '02, but Florida bought a bunch of equipment and the equipment they bought to count the votes was out of date when they bought it. So now they're trying to count the votes in Palm Beach County and a few other states have the same stuff. And Jack, they can only count one the election at a time. In other words, they have to run all of the balance sheets through the machine that counts for governor and then they have to rerun, reprogram the machine and rerun all of the ballots on the machine again, now to count the votes for Senator, etc, etc. So it's really crazy all of the work they have to go through. And then the machines themselves are having problems. Because, you know, Florida has this whole humidity thing. And you know what humidity does to paper. And with these old machines that are kind of nearing the end of physical life, as well as technical life, they are jamming up the machines, and that caused voting problems, and it is now causing problems with the recount. So there definitely seem to be some reasons outside of the politics for these counts, taking so long and being done so poorly,

Jack 1:55
Could be a coin toss at the end of the day might be as reliable, I just think they could have three different recounts, get three different results. Is that close?

Craig 2:03
Yeah, it does go that way. Many times in some of these recount, and there's talk now in Florida, that there could well be a manual recount. But you know, on top of all of this, there appears to be some incompetence, mixing in folks that were already deemed to be invalid with valid votes. And we know from two years ago, destroying ballots even though the court order they not be destroyed. So there's the person side of all of this, as well as the technology side. I think more than anything else, in order for people to feel confident that the votes count, we've got to keep up with the technology, we have to be secure. In fact, these machines in Florida two years ago in 2016, were known to be vulnerable to attack and not be secure. So we've got to keep this up so that we can count on our election results being but at least partially valid.

Jack 3:03
Yeah, well, who knows? Who knows where that's. I'll tell you it's gonna be quite a process can be quite some time to in the Lago coast, you know, imagine being these candidates and their campaigns and the intensity in and around this is going to show and not dissipate anytime soon. What else is catching your eye from a Tech Talk point of view?

Craig 3:19
Well, we've got some more evidence about China and China hacking. In fact, right now, we're seeing that China has been involved very, very heavily in hijacking networks of US, not just corporations, but internet service companies. China Telecom, you've been involved in this for a number of years now. And the bad part about all of this, and the way China's doing it is people just won't notice some of these hijacks that have happened, have taken all of the data that was going to or from a company, the websites, their emails, everything else, routing them through China breaking encryption and doing who knows what with that data. So again, this is something that the course the Trump the whole Trump Organization is looking into now and the government but just trying to figure out what's happening? Why is it happening? And I think the administration's on the right track China has been really taking advantage of our US corporations and I picked up a new client a few weeks ago they are small manufacturer right here in New Hampshire and their intellectual property. All their designs are everything that they've worked on for decades now is in the hands of the Chinese. So now they get to compete against their own designs from a manufacturer in China because the Chinese People's Liberation Army hacked their systems and they have no idea. This is a huge problem, Jack and something I've been doing some training with the FBI on on those webinars that I run, but it's happening every day. We gotta be careful not to do something more about it.

Jack 5:07
All right. To learn more, go to Craig Peterson with an O-N.com. http://CraigPeterson.com. Thanks, Craig.

Craig 5:12
Hey. Thanks, Jack.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Nov 10, 2018

Are you familiar with Business Email Compromise also called BEC Listen in today and I will tell you why you need to be concerned about this.

Businesses getting hit by other cybercriminals right here.  I will be going through some of my most recent customers and why they ended up calling us.

So what's up with the Chinese have been stealing our intellectual property.  We will talk more about this today in quite a bit of detail

What Browser do you use?  There are many to choose from.  Today I will talk about why you need to be concerned about the browser you use.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 11/10/2018

China Monitoring US Communications - Stop Using Microsoft Edge - Cellphones Just Aren't Secure

Craig Peterson: Hello everybody Craig Peterson here for another half hour of Tech Talk. You can hear me online Of course on iHeart make sure you tune into your iHeart Radio stations. You'll find my
podcast also out pretty much everywhere and iTunes I really appreciate it when you take a few minutes and make a comment. I read them all over also on my website so you can go to http://CraigPeterson.com/iTunes. Well, today we are going to be talking about a couple of things I think

Craig Peterson 0:34
you're going to find interesting one, we're going to tell you why you don't want to download Chrome, or at least ways not to download it. People are really getting scammed here with cell phones. Are they really secure? What does that mean? China has been hacking the vital internet backbone of many Western countries and MIT This is really interesting. We've talked a little bit before on the show about the whole trolley car dilemma we're talking about a little bit now, too, because MIT has conducted a study and they have completed it, I signed up for it and answered some of their questions. This was a while

Craig Peterson 1:13
back that I did it. I think it was the same study. But anyhow, we'll talk a little bit about that showed our self driving cars kill the cat, the elderly, or the baby, the results of the poll are in and they vary based on where you live. Ultimately, here, we're talking about some pretty exciting and interesting stuff.

Craig Peterson 1:36
Now, also, this week, I gotta warn everybody, particularly small business people, we picked up a couple of new clients again this week with major infections. Now the FBI is warning and they put out a warning here very recently about business email compromise. This is for small businesses who don't really have their security together, their people aren't doing the right term meaning. And even if you are, you might get nailed. There was an article in the news this week about one government employee clicking on a link in a website, I guess it came from a website and ended up compromising thousands of government computers. So it is a real problem.

Craig Peterson 2:20
And most businesses that get hit by this stuff end up out of business, the small ones do the bigger ones typically have a bigger budget to deal with. So in the case this week, it's a small company, family owned second generation. And they make things here in the US, which is really rather cool. And they thought they were safe, because they had three computers, that's all they had a couple of dozen employees who did the assembly of their product. And they were very careful about taking their computers offline off the internet when they didn't need to be on the internet. Well, we found 12 different major infections across just one computer. It's amazing what's been happening

Craig Peterson 3:08
and who knows what kind of data has been compromised from. So just, you know, everybody be careful out there. And we're going to have more training courses, keep an eye out. I've been really busy. The whole thing with the FBI Infraguard program where I'm running their webinars for them now, nationally, and it's just been very busy the last couple of weeks, I'm putting some stuff together, we're talking about a big summit that we're going to do maybe in the spring. In fact, this last week, there was a big head honcho meeting down in Quantico talking about it, but hopefully we'll have the security summit next year. I'm really

Craig Peterson 3:44
pushing to make it so that it's not just for FBI government, in regard people, because that's typically what I'm doing when I'm running these webinars for the FBI, you're just as a normal company person, you can't attend them. So I'm trying to get it so that second quarter next year, we can have this big summit anybody can attend for free. That's, that's what I'm aiming at here. Because I'm trying to get the information out and you'll be able to learn a whole lot. It's, you know, the plan is it's going to be a weeklong summit, we're going to have 50 or 60 different topics, different speakers, and we're going to arrange them into different tracks and you know, the whole big thing. So it'll be a huge, huge, huge thing. And hopefully, the FBI is going to say, Fine, go ahead. But you know, sometimes not, it can be difficult to convince them to

Craig Peterson 4:39
do things even if they don't have to do it. If I'm going to do all my work, all the work in my team is going to be helping out. So hopefully we'll be able to do that because there's so much good information that is available and you don't have to become an expert. That's the nice thing about it. Right? If you're trying to run a business, you're you're busy running your business you don't want to worry about the whole thing cyber thing and that's where we've been able to help out a whole lot with the FBI Infragard program free to join it takes a few months they do a basic background check. They don't call it an FBI background check because it's not but it's the FBI that does it but it's not one of these things where

Craig Peterson 5:18
like justice Kevin Oh, where they're drilling into everything in your background everyone we've ever mapped her anything it's just you know, I more like have emerged anyone recently type of background check so check it out Infragard.org you'll find that out there online you can sign up if you're involved in the critical infrastructure and I think it's important to do because there are alerts coming out from there all the time now let's get down to some of the articles from this week and if you got my newsletter this morning hopefully you did you can read along Of course I spent a lot of time doing commentary you're not going to find that in the newsletter and if you do don't

Craig Peterson 6:00
get my weekly newsletter sign up right now Craig peterson.com slash subscribe that's Craig C R A I G Peterson with an o.com slash subscribe. And right there on my homepage to there's a sign up if you want to be informed about some of these other free business webinars that we're having. Again, no charge people. This is

Craig Peterson 6:23
real. I'm I'm the real thing I'm trying to help out. I've been doing this for decades and decades, very long time. And I really want to help out I want to help you out if you're a home us. In fact, we had another brand new client come on board, she attended one of our webinars. And one of the ones that I did on ransomware a couple of
weeks ago, you know what, I'm going to have to send out a thing, invite you guys on to the replay because we got a lot of great feedback from it. But she's a non-paying client. And that's absolutely fine. Her husband in her had a business and he passed on, she sold the asset, shut down the business and had all of this stuff on her computer, which has, you guessed it - ransomware. So we are hopping on her machine and getting her all taken care of, and she is so grateful, you know, just a listener, I don't have a business can you help me out. And that's what we're here to do. So we're doing a cyber health assessment for her indication of compromise clean up after the ransomware, she has a basic backup.

Craig Peterson 7:41
And I thought this company did a better job than apparently, they're doing, I'm gonna have to look into this a little bit more and do a webinar on backups. But according to her, and it's a name, you all know if you know anything about backups. They only keep one generation for her. So she's not sure the backup they have is also encrypted with ransomware.

Craig Peterson 8:05
So she might be in big trouble. But that's the whole 321 rule. When it comes to backups at all, I'll have to explain. If you're interested, sign up. I will explain this. We do this site and kind of stuff offline because I don't want to drill down too deep on the radio show and lose too many people. But we will do one on backups. We've got some other scheduled to how to treat data at rest and encryption, encrypted vaults and all that stuff. Just trying to make it easy for everybody. So she's really worried because, you know, her husband passed on all of the records, they're all of the business records are there and she got ransomware, 60% of small businesses this year are expected to have a similar thing happened to them.

Craig Peterson 8:51
What would happen to your business do you think that would help or hurt? Yeah, yeah, 60% of businesses are expected to get one of these nasty pieces of nastiness from the bad guys. And of those 60%, 50% are expected to go out of business within six months. So by the end of the year, middle of next year, we will have a lot of small businesses who will be out of business and somewhere helping her out and we can help you out to we're not charging This is free. I have committed the resources to do 100 of these small business cyber health assessments to

Craig Peterson 9:32
toward in 2018, so we still have some left that we will do we the last quarter 2018, there's 100 available. You know, we normally charge for these but for listeners, I really want to help believe me, I want to help. That's why I do all of this volunteer work. I volunteer for the FBI and infer guard program to run the webinars. I am here to help bully me know a lot of people will tell you that I have hundreds and hundreds of recommendations along those lines. So don't don't feel afraid. Don't feel pressured because I'm not selling anything. Okay. I just visit right now. Craig Peterson. com, make sure you sign up to get notified about our future webinars because we'll we'll do more and they will continue on past the backup stuff. So let's get into some of the additional stuff China's doing right now.

Craig Peterson 10:30
Well, you know, China has been very involved in espionage. And you've heard it in the news, some of the news like Fox, etc. They tend to carry the whole story, Wall Street Journal, things like CNN whose viewership by the way down 40% in the last year more people according to the stats I saw this week, more people watch Cartoon Network, then watch CNN. So that shows you how credible they are is a news source. But anyhow, the Chinese have been stealing our intellectual property. And we caught the Chinese red-handed, no pun intended in a company or right here, right here, local, which just totally blew me away that they had three back doors into their systems and they were stealing all of their intellectual property.

Craig Peterson 11:24 
Imagine that right? I mentioned this before in the show, but you spend all this time all this effort with developing your intellectual property, developing your hardware, your software, all the designs, and this particular company again, it was an older gentleman that was running it he'd been running it all of his life, his entire investment, his life savings were tied up in the business and the Chinese were headstone and it also imagine competing against your own designs being made in China. Can you imagine that? Imagine how that would turn out. You are competing against your own designed, manufactured in China.

Craig Peterson 12:05
So China has been very busy in stealing our intellectual property. They really are people, this is not just our widgets better than yours. It's, hey, we made your widget better her reminds me of a joke from the 70s of you know, the Russians us invented something, and the Russians, quote, already invented it and quote, and then the Japanese, of course, made it smaller and cheaper back in the day. And of course, it's not Japan anymore. It is China.

Craig Peterson 12:35
Well, there is a new report out right now talking about a Chinese state owned telecommunications company that's been hijacking the vital internet backbone of Western countries. Now, this is according to an academic paper published just this week by researchers from the US Naval War College and Tel Aviv University. So these are people that really know what they're talking about.

Craig Peterson 13:01
And they're saying that the culprit here is China Telecom. This is the country's third largest telco, and they're an internet service provider, just like it here in the US, right? You might have Verizon or at amp T. Nowadays, Comcast is doing this sort of thing. But in this case, China Telecom has a presence inside North America, and has had presence inside our network since the early 2000s, when it created its first Point of Presence. So how do you think that might affect you, or might affect our networks here, they've been doing this they've had upon your presence for almost 20 years now. And as it turns out, here's what's happening. They've created these points of presence centers, these data centers,

Craig Peterson 13:47
and according to this report, these Chinese data centers are doing nothing more than rerouting internet traffic

Craig Peterson 13:55
between all of the smaller networks that make up the larger internet and are monitoring it now This happens all day. Every day. We do this right. Mike company is an internet backbone router

Craig Peterson 14:10
where we take stuff from archive and smaller networks. And we use protocol called BGP, and we tie all these networks together, and we send it out to the quickest shortest route on other networks. These are called autonomous systems, a SS and now you have huge companies like Google, oh, and Verizon, and others, all the way down through small little guys, you know, university networks, maybe banks, web hosting companies, companies like ours and others that are all doing this.

Craig Peterson 14:42
So apparently, what they've been doing is hijacking BGP announcement and it's kind of interesting because the studies have been showing that China Telecom started abusing this BGP protocol, which is used to route between the network,

Craig Peterson 15:00
China Telecom has been doing it at least ever since it entered into this pact and 2015. Now remember, September 2015, Obama and the president of China entered into this agreement, right, that China was going to stop all government back cyber operations, right. And I laugh as though, you know, really, really, you think they're going to stop it all? Yeah, cuz he asked, right,

Craig Peterson 15:29
no, they didn't stop it. In fact, they ratcheted up right then and there so that this agreement necessitated new ways to them get all the information. So they did enter China Telecom, the research is saying that they've built a route tracing system monitoring, the BGP announcements and distinguishing pattern suggesting accidental or deliberate hijack, you know, we've seen the Russians do this before. And, you know, we really are in a Cold War right now, frankly,

Craig Peterson 16:04
the Chinese are a little more concerning than the Russians are, I don't know if you saw this week. But the Russians biggest dry dock St. And they're only aircraft carrier. The only one the Russians have was damaged when this dry dock saying so Russia is not a huge challenge to us like China is becoming especially in the South China Sea. So they've got a system online, they've been watching it a lot of stat

Craig Peterson 16:32
in October 2016 traffic from several locations us to a large Anglo American bank headquarters in Milan, Italy, hijacked by China Telecom traffic from Sweden and Norway to the Japanese network of a large American news organization hijack to China for about six weeks. Now, the only way people really even notice this is things tend to get a little bit slower February 2016 for about six months routes from Canada to Korea were hijacked by China Telecom and routed through China traffic to the mail server and IP addresses of a large financial company in Thailand hijacked during April, May, July 2017. Some of the hijack attacks by the way, started in the U.S.A, were trying to telecom has a presence.

Craig Peterson 17:25
So it's very, very interesting here, China's network, very cut off on the rest of the world. And China is working with Google right now in developing the system to track all of their people even closer than they're being tracked right now very, very closed and yet their routing all of this traffic through their network so they can have a good look at them. So be careful out there. They really are out to get us it's it's amazing. I'd hate to think that some a war-ish stance or posture was taken by China. And they did all of this stuff more maliciously, than

Craig Peterson 18:02
they're even doing it right now. So be Be careful. And we have seen China now in various customer networks here, right here in the northeast United States. And, of course, other people are seeing them all over the country. We're seeing them, the FBI seen them, everybody seen them, China, it is a real risk right now.

Craig Peterson 18:31
Now, you know, I've talked about Microsoft before, you guys know, I have no love loss for Microsoft. Although I also have to say that I have been using some of their services more and more lately. And, and using them with my customers.

Craig Peterson 18:45
Microsoft has a new Office 365 stack. And they have one that even includes the operating system. And I got to say, given kudos here, because they are doing a very good job with it. Now, they're not solving all the problems. Security isn't the best. But it's not the worst. And I think you're much better off with a no 365 implementation than going for Google's implementation. But that has to do with security. And also has to do with keeping your data confidential.

Craig Peterson 19:17
People who download and install Windows, Windows 10, specifically, you notice there's a new browser, Microsoft's Internet Explorer, a total piece of junk that was so far out of date, it was crazy. So many companies have written software that's dependent on so-called features, also known as side effects in the Microsoft Internet Explorer Explorer browser that you have to be careful. So my little word of advice just off of the side here, if you're in business at all, and you're thinking about having a website and having some features on it, do not use Internet Explorer, don't test for it, that's not your target. Nowadays, the number one browser out there by far as Google Chrome.

Craig Peterson 20:09
So if you're designing a website, make sure chrome works on it. If it works on it, you know, good for you, right? But Windows 10 comes with the Edge browser. And most people are thinking that the Edge browser really has one purpose in life. And that is to download Chrome or Firefox, Firefox being the better of the two at least right now. And if you want to be absolutely safe, you're probably best to run the epic browser, okay, will be very careful. Because if you run edge on your Windows 10 PC, and you don't have the URL for Google Chrome, and you

Craig Peterson 20:53
type download Chrome into the address bar. And if you click the first result provided by Bing search, tried, who's ever heard of being before well being is Microsoft search engine and they had been contracting to third parties to provide the results are trying to do it now themselves. But if you go into your new Windows 10, you open up the web browser, it's called Edge and you type in download Chrome, and you click on the first entry. The first URL, you are going to get highly visible Google Chrome ads for months.

Craig Peterson 21:34
Okay, Google and Firefox know this being can't be bothered, apparently, to fix this problem. So be very careful. Okay. The top result for download chrome was Google online.

Craig Peterson 21:51
It's a fake site. It's a pretty good copy of Google's chrome landing page, it looks general enough genuine enough to fool people the downloads called

Craig Peterson 22:02
chrome setup.exe. And the digital signature if you take a close look is signed by alpha criteria limited, and that's definitely not Google. So go to Google.com. And from Google.com, if you need to do a search is probably the easiest way to do a do a search for Chrome and stop using Edge. It is not a good browser. Okay, just don't use it. Use Chrome or use Mozilla's Firefox, something to seriously look at

Craig Peterson 22:37
and believe how fast this half hours going and goes quick, doesn't it?

Craig Peterson 22:41
Well, we're going to hit a couple more articles here really quickly. One has to do with cell phones. You might remember President Obama when he took office, he had his wonderful little Jimmy have a crack Barry, I think it was he had his little Blackberry that he used. And he didn't want to give it up because

Craig Peterson 22:58
he'd been using it for so many years. And he had so many friends on it. And he could, you know, text back and forth and have great messages, emails,

Craig Peterson 23:07
I can get it right. And now we've got President Trump The 4am 2am

Craig Peterson 23:13
is sending a tweet and he's using just regular phones. And there's anybody can tell. Now

Craig Peterson 23:18
President Obama was finally convinced by the Secret Service to stop using his own personal device. And he got a secured government device. But it looks like President Trump has still been using his cell phone since he became president. And that presents all kinds of potential security vulnerabilities. No question about it, even if it's iOS and fits Apple what Apple being much better than Android when it comes to security. But even if it's Apple, you got problems.

Craig Peterson 23:50
Now, the security rules do prohibit them from using a regular

Craig Peterson 23:52
cell phone throughout his presidency. But apparently he's using Twitter on his phone. So the question is, who else is listening in? Who might grab his Twitter account? Who might be able to listen to cell phone calls, who might be able to turn on the microphone in his smartphone and listen in on the conversation or turn on the camera

Craig Peterson 24:15
in it, right? Many companies or companies, many countries are trying to listen in, we know the NSA is listening in to everything they can they do bulk data collection that get as much

Craig Peterson 24:30
cell phone and texting information as they can possibly get from as many people as I can possibly get. And then they use that later on to figure out who spoke with whom. And if this person is a risk, then that person might be. So who else are they talking to? Right? You get into two hops, three hops, five hops away as they try and figure out who's who, right. Well, some of these other countries are going specifically one on one. And potentially there are two there's two basic places that you can eavesdrop on pretty much any communication system at the end point, obviously, which is the phones themselves. And if it's a smartphone, it can be compromised. I don't care who makes the phone and the other is during transmission. So cell phone attacker could also eavesdropping on the cellular network. And we've talked about those devices, Sting Ray devices that can be put up that are fake cell towers that allow a third party to listen in. Obviously, there's problems with all of this right now. 2016, WikiLeaks they published a series of classified documents listing target selectors. So these are phone numbers the NSA is searching for

Craig Peterson 25:50
and they included senior government officials from Germany including Chancellor Angela Merkel,

Craig Peterson 25:54
France, Japan, many other countries now

Craig Peterson 25:59
other countries don't have the worldwide reads the NSA

Craig Peterson 26:01
has but when you consider what we were just talking about with China and China Telecom being able to get into our networks and reroute traffic eavesdropping, including eavesdropping of the President's phone it's not inconceivable that absolutely for sure. Now if you

Craig Peterson 26:21
missed last week, well I did the ransomware webinar I've got more coming up we're going to be doing a webinar on backup absolutely free not selling anything no credit card needed there it goes out enough disclaimers I really want to help out make sure you visit http://CraigPeterson.com right there on the homepage. You can sign up to be notified when my next webinars going to be these are typically 45 minutes to an hour. They are information packed. I will give you replays of them if you attend and we've got a lot of people that are asking about it. So check it out, http://CraigPeterson.com. http://CraigPeterson.com and have a great week everybody. Take care. Bye bye.

---

Related articles:

China Has Been 'Hijacking the Vital Internet Backbone of Western Countries'

Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware 

Nobody’s Cellphone Is Really That Secure 

You Might Be Able To Collect $100 From Yahoo’s Massive Data Breach

All the Fun Things You Can Do If You Steal Someone's Identity

How China Rips Off The iPhone And Reinvents Android

Brain Implants Used To Treat Parkinson's Can Be Hacked And Used To Control People, Scientists Warn 

MIT Reveals Who Self-Driving Cars Should Kill: The Cat, The Elderly, Or The Baby?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

1