Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2019
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: February, 2019
Feb 28, 2019

It's another It's a Security Thing Thursday. Craig talked about why businesses feel vulnerable to security attacks and what they can do about it.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/28/2019

Why Business Feels Vulnerable To Security Attacks

Craig Peterson 0:00
Hey everybody. Craig Peterson here. This is a little bit of a Security Thing today and it's all about two thirds of businesses. What are they thinking? You know, I've got a new section on my website at http://CraigPeterson.com that is all about security breaches and why they occurred. And I think it's really important for people to understand what's really happening out there. So that's why we're doing it. My wife and I've been putting a lot of work into that. But one of the articles that we have up there right now is from Infosecurity Magazine, and it's talking about how to in three, that's two thirds of organizations say that they are not convinced that they can avoid a breach. Now to me, that's a very big deal. I just don't get it. This was a Parliament Institute survey that was done of 600 cyber security leaders and professionals in these organizations. Now these people were people who are responsible for evaluating, selecting or implementing security solutions. And those are the only people who are supposed to take part in the survey. So it should be a pretty legitimate survey when it comes to understanding are these companies really positive about the outlooks or negative about the outlooks?

Now I can tell you that the software we use for our bigger clients is designed to be really is designed to be 100% safe, and it's better than 99.9% safe statistically after billions of attempts to hack it. Quite literally billions. It never been never been broken through.

So I know personally that there are ways to make sure that you aren't broken into. But here we go with these numbers. This is a quote right from the article vulnerability management particularly those vulnerabilities and unseen or unpatched systems is an issue for many organizations was 69% of respondents identify and delayed patching is an issue. 63% admitting they are not able to respond to alert.

Now I have seen both of these as real big problems and they may be problems for you too because delayed patching is a problem in some areas of the business more than it is in other areas of the business so for instance if you have a really good next generation firewall like what, again I keep coming back to what we're using right, but there's Cisco their Firepower firewall family ties in with their switches, ties in with the software on your computers to help make it so that if something does happen, it recognizes almost instantly.

So what they're talking about, really here are zero day attacks. In other words, attacks have never been seen before, all the way through attacks that maybe have been out there for six months like Equifax and they got hacked because they didn't patch and that's a real problem. It's a real problem and patching organizations don't do because it can mess things up. So let's say that you're a small organization. And if you're a small organization, you are probably running a website, but you're probably not doing it yourself. You probably didn't write the software for your website from scratch. Most likely you're using WordPress, or maybe Drupal which has turned into be quite the security nightmare.

But let's say you're using Wordpress. How much patching do you need to do nowadays WordPress will patch itself and there are plugins you can put into WordPress that will not only make sure the core WordPress is up to date, but all of your modules, all of the things that you've installed in WordPress, all these plugins, it'll make sure they're all up to date as well. And it does it all automatically. So rule one, make sure those are in place. And just this week it was Monday night, I guess. I don't know it was over the weekend. That's what it was. We started getting alarms from our Firepower systems telling us that we were under attack and they were trying to use some vulnerabilities in some of the common software that used on the web. And it was the software that's typically used by bigger companies. It was some middleware attacks that were underway and it recognized them, it stopped them. 

In fact this week no I think you but it's been a bad week for a tad attacks. We stopped a one of our customers. It's a fairly small company that is a very small company. But we have this technology in place for them because they are concerned about about breaches. And for some reason, over the weekend, when people are usually not there, because part of what we do is monitor when they're working, what are they doing when they're working? And what's abnormal? Well, we saw some abnormal stuff happening. And it was very abnormal stuff because they were sending files to a public file sharing service over on Google.

And so again, automated systems took over and it was stopped almost instantly, which is again a very big deal a very good deal very positive thing. So we're meeting with them today to talk about what happened, the incident and how it was responded to and who was trying to breach what, you know, how did this happen? How could this happen? And it kind of smells like it was probably an insider who was just doing something that, you know, hopefully not malicious because many times your insiders will try and steal customer lists or plans or diagrams and other things and share them with someone else. And as part of that sharing, of course, they get a little remuneration right? They get a few bucks sent their way so that might have been what happened and and the reason we didn't meet with them right away is one they the CEO was very busy this week and two, we stopped it. So what's with these two thirds of companies that think they can't stop it? Well, they probably have an antivirus mentality because antivirus does not work anymore. You need a much more integrated, much larger response mechanism in place and needs to be completely automated in order to really stop the bad guys nowadays.

But secondly I have to feel for them because you have an additional problem. And that is if you wrote the software for your business. In other words, a company like Equifax has huge department with programmers and analysts and stuff. So they write their software, they have to maintain it. So let's say they're using Apache Struts. And there is an Apache Struts attack, which is what actually happened to us this weekend. Now, in our case, it was stopped. But in many cases, it just won't be stopped. And it can't be stopped because they don't have the right stuff in place. So there's a Struts to attack because they haven't patch well why didn't they patch because they have to test their whole system. An integrated test, right? And that integrated test has to look at every component try it all tested all so it might take six months to do a patch because you can't just throw it in place. So an organization like that where you are writing your own software, I would highly advise you have one of these fully integrated systems like what we have in place for many of our clients now.

So that's what I wanted to point out. Two thirds of businesses think that they just can't avoid a breach. In fact, you can avoid a breach, it doesn't matter the size of the organization. And if your people are telling you, you can't avoid a breach, they are wrong. Okay, they either don't know what they're talking about. Or they're being way, way, way, way too honest. Because there's always a chance that there is a breach or potential breach. But based on the responses from these guys where they're saying that the obstacles are really the mitigation and patching mitigation. You can take care of patching, you can kind of take care of but you can mitigate all of these risks by using the right kinds of systems. So anyways, that's a little bit of a security thing for today.

I'm a little disappointed to see this come out I'm glad Kacy Zurkus wrote this article you'll find her on on Twitter as well as LinkedIn and the articles up on my website at http://CraigPeterson.com. You'll also find it over at Infosecurity Magazine. Take care. We'll talk to you a little bit later.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 27, 2019

Craig is on the WGAN Morning News with Ken and Matt. They talked about Zillow helping to flip houses, the YouTuber who discovered a pedophile ring in YouTube, and an app that might help stop you from procrastinating.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Youtuber Claims Online Pedophile Ring Operates Freely On Youtube

Prevent Procrastination With This Chrome Extension

Zillow Wants To Flip Your House

---

 

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/27/2019

Keeping Your Family Safe Online

Craig Peterson 0:00
Hi, Craig Peterson here. Have you ever wondered how you can keep your kids off the dark web or maybe what you can do for free, that's going to really help keep the ransomware off of your machine out of your house, out of your very small business. So hope and do it all for free. While that's one of the things I talked about this morning with Ken and Matt. It's also something we're doing a deep dive on this week in my course on DIY cyber security. So here we go. Learn how to do it right now.

Unknown 0:36
Well, guess what? We're back again. It's Wednesday at 7:38. And it's Craig Peterson time. He's here to join us to talk about all things technology. Craig, how are you this morning?

Unknown 0:45 
Hey, good morning. Doing well. Looking forward to 20 whole degrees this afternoon.

Unknown 0:50 
That's a heatwave. We're having a heatwave. Tropical heatwave. But you know, I don't know that much. You know, I want to stay inside. It's cold outside and I thought I don't have anything else to do. Why don't I go look at the dark web and see what's there. Is that a good idea?

Unknown 1:05
The dark web is an interesting place and there's there's a few ways to get on to it. But basically it's probably 90, 95% maybe even worse on the bad side. This is where the Silk Road website was and those the Silk Road website was a place where people would go and they could buy drugs illegally online if they can factor all kinds of illegal activities activity and it was tracked down. They were using bitcoin and and other types of currencies out there in order to do a little trading back and forth and they thought they were safe because it was on the dark web in the dark web supposedly is like 100% faith and they were using bitcoin cryptocurrency because that's supposed to be untrackable as well.

But I attended a really interesting lecture by the Secret Service talking about how they tracked it all down. And they arrested the guy that was running the Silk Road there on the dark web. And it's it's not a safe place. There are all kinds of nastiness that we're not going to get into right now, including things told read rooms and others that have questionable at best backgrounds to them. So you do, generally speaking, want to avoid the dark web. It is a place for various types of political activists as well. Good guys and bad guys together and do a little communications but it's also the place where they're trading our personal information. They're selling it online. I just checked it. I had a webinar that I ran to the FBI Infragard program just this week and So we went on to the dark web and poke around a little bit. And we found all kinds of stuff, including software you can use to hack people's computers for as little as $1.99 US. It's kind of a scary place, you might not want to go there Ken.

Unknown 3:16
So I should go now.

Unknown 3:19
Yeah, exactly. That's why we're not really telling them how to get out to the dark web. Because I'm sure there's some kids out there that might want to go there. And as a parent, you kind of want to keep an eye on this. It doesn't look any different. They're still going to use web browsers are still going to use the web browsers are probably already using although you can certainly use other web browsers kind of depending. But it's kind of hard to police as a parent as to where your kids are going online. That's why I really advise it. And this is part of this week's course that I'm doing. I really advise people use something called OpenDNS. There is a free version online. It's O-P-E-N-D-N-S. And I can send you more info if you want about it. But what that does is it allows you to reconfigure your web browser shows you how to do it that your web browser but your computer it shows you how to do it. They're on their website. Once you start using this it will stop your kids from going on to places like the dark web. It automatically blocks pornographic sites. And it also helps to completely almost completely eliminate ransomware. Open DNS is where you'll find it online. http://OpenDNS.com, they have a paid version which you know, it's probably a really good idea to use. And if you're a little bit more advanced, you can also use a version a version that's only 40 bucks a year and it allows you to reconfigure your router in your home so that even if your kid is a little more technically advanced and knows how to get into the DNS settings of the router in your home who is going to give out OpenDNS for every device, including those nasty Internet of Things, devices in your homes or in your small business.

If you're a larger business, you should use Umbrella. But you have to get that from special vendors like like myself, as it turns out, but the OpenDNS stuff is absolutely fantastic. If you do configured on your router in your home, it's going to help protect your whole a whole home and it'll keep Ken from going to the dark web.

Unknown 5:31 
Which he's known to do.

Unknown 5:34 
Nothing can stop me from it.

Unknown 5:34
He'll go hell or high water. Right. We're going to talk to you here. Craig Peterson here a little bit more about technology as we do every Wednesday at this time. Craig, you know, I was looking through some of these stories to talk to you about today. One of them stood out to me, the the Zillow flip house thing is pretty interesting to me because I've always been trying to figure out exactly how accurate these things are in the first place when they're sort of estimating home value because if some of these things are right then, boy, I'm sitting on a pile of cash right now.

But there are people that are exploiting the, the, like the Zillow and places like it on the internet that basically value your house and and look at things to like look for values to flip. Why don't you talk to me about the story a little bit?

Unknown 6:18 
Yeah you've got an interesting angle on it too when you're talking about this, Matt, because the question is how do you get a good value for your house? You go to someone who wants to buy your house and say, yeah, I'll pay 50 grand for you go to somebody who maybe wants to buy your house for the low price or somebody who wants to sell your house for a commission who says yes, yes, this was 75 grand and then you sit on it for a year or two or three because they've overvalued the house because they want to get every penny of commission out of it they possibly can get right and so that's your I think that's kind of part of your premise, Matt.

Is Zillow legit? Is the price that they're saying correct? And they've got these estimates on the Zillow site. I love Zillow. I poke around on it quite frequently, especially when I'm traveling to see what local real estate prices are. So, Zillow has been doing that for a while they use public records and they try and compare your house do to other houses in the area and come up with a reasonable price. But now with all of the flipping that's been going on they're taking a little bit of a different angle which is kind of cool you know there's all these show shows I don't know about you if you watch some I know my wife and kids love these shows on the Home and Garden TV I think it is, that is how to flip your house right? There's a couple that in Waco, Texas. Magnolia I think his name of their company and they buy homes and small buildings, business buildings and fix them up and and then turn around and sell them. And there are constantly people out there with the training programs on how to buy homes with no money down and then fix them up and flip them. And my wife and I looked at that at one point. And we actually went to one of these weekend webinars or seminars, I should say, and we learned a lot, but we didn't feel comfortable enough to do it.

So what's happening now with Zillow. Zillow has these estimates you mentioned. They call them Zestimates. And what Zillow is doing now is they're thinking that their database is so good that they will allow you now to go on to the website. Depending on where you are. You can look up your home and see what the value of it might be. And then you can ask Zillow, Hey, I want to get out of my house right now. I want you to buy my house from me. And so Zillow will kind of backup their Zestimate as to what your house is worth and they will buy the house and then sell it for you and what they're going to do, once you sign up with them to do this as they'll send someone out to just double check, make sure there aren't some major defects in the house that they don't know about. They will give you a very hard offer for your house. And then they'll chart you between 6 and 9% for that house for commission which is a lot more. It's almost double what most real estate companies will charge you and they they're done you're out of your house and they can just take a matter of days. And then Zillow will come in and they'll have a crew come in and fix up things that need to be fixed. Paint it up and resell your house.

So it's interesting to me to see hey wow. Now the internet is is really putting his money where his mouth is in the case of Zillow. They will backup that estimate for your house they will buy your house and you can be out of that house the matter of well, however long that however long it to do a quick inspection and the closing So, Matt, it's an interesting angle.

Unknown 10:06
We're talking to Craig Peterson our tech guru joins us, Wednesdays at 7:38. You can always go to http://CraigPeterson.com and get all the information if you can't wait to hear him on Wednesday at 7:38. You know some people believe that Matt procrastinate quite a bit. I'm not one of those people. But there are many people who think they procrastinate.

Unknown 10:26
I disagree, but I'll get to it later.

Unknown 10:28 
Is there an extension that he can do to kind of help him on this. I'm trying to help him.

Unknown 10:31 
Yeah, there's a few different things that I've used in the past that I really liked when it comes to help him with procrastination. I use something called Vitamin-R and it allows you to break your day into chunks of it. All you're really focused on at that point is what am I going to do for the next 20 minutes or so. And it's based on a message that came out of the mentality and method and the result there's whole books written on

This, but the idea is let's go ahead and focus and let's focus for short periods of time. Let's accomplish something, take a five minute break and then move on. And there is a new extension now for Chrome that is come out. It's called HabitLab and you'll find it online. I have it up on my website as well. And if you're kind of compulsive, if you're always kind of poking around on different websites, you get distracted at work or at home. This is going to be interesting for you. Yeah, I think you should have looked at it. It's based on some research that came out of Stanford University and they have all kinds of encouragement in HabitLab, some of them kind of gentle the two back on track other ones just going so far as to say no, you can't go to Facebook or wherever it is, but it really can be a time saver. A big one for people depending on what you want to do. It's got nudges built in based on the book called Nudge, which was really popular with Hillary Clinton and the Obamas to try and get people to do things. But it's based on all of that technology, some more research that came out of Stanford. And if you are online and you have the Chrome browser that you're using, have a look at it. It's called HabitLab, Ken, and it'll help you get your work done, and it'll help you from procrastinating as well. It's really kind of cool.

Unknown 12:33
We're talking to our friend Craig Peterson, our tech guru is here to talk to us about technology. Craig, you only have about a minute, two minutes to answer this question. But there's a YouTuber out there who is scaring some parents about a pedophile ring that might be operating around YouTube. Is this true? Should I be running and screaming in terror? 

Unknown 13:01
Well, man, this is something that I wish we didn't have to talk about. Well my whole tone has changed. You can probably tell about a week ago Matt Watson who is a YouTuber exposed what he's called it a wormhole into the soft core pedophilia ring and what these guys were apparently doing or are apparently doing is encouraging young kids who are under 13 years of age to post a compromising basically pictures of themselves on YouTube videos of them. Now I mentioned that 13 year age because of the fact that YouTube has a policy against people under 13 posting online. In fact I don't think they can have an account. And yet these were accounts controlled by kids under 13 and posting these pictures and these videos which means if parents were allowing them access to smartphones, were allowing them to have a YouTube account we're monitoring this close enough, but Watson's claiming he found links to actual child porn on the site. We had YouTube ads being pulled by dozens of major corporations when this came out. For some reason that didn't really hit the news, but within less than 24 hours, there is a whole hashtag campaign about this. If you're a Twitter user, check out the YouTube white top hashtag campaign. So it has hurt substantially YouTube's bottom line. Hopefully they'll do something about it. And frankly, just enforcing this under 13 years of age. You're not allowed to include these kids in any videos and they're not allowed to have any accounts. Just enforcing their existing policy would stop this ring. Hopefully people are waking up and complaining to YouTube and YouTube is going to really do something about it this time. 

Unknown 15:00
Alright. Craig Peterson our tech guru joins us Wednesdays at this time to go over the world of technology. Craig, as always, thank you very much. And we will talk to you next week sir. 

Unknown 15:00
Take care, gentlemen. Thanks.

Hey, if you are in my course here, the master course on DIY cybersecurity. I just want a quick note. Sorry I had hoped to get stuff out yesterday. It looks like it's going out first thing this morning. At least the first part of it I put way more work into it than I thought I would. Because it as I was going through some of this course material for this module, I realized that it could be really confusing for some people. So I went seriously above and beyond on this but it's taken me about another day. So sorry about that. But I think you're going to like the results. It's really going to help you just walk right through in making frankly all your computers and your business and your home a lot safer. So anyways quick apology to those people and we will be back hopefully tomorrow will be able to do another one of my real quick here security things so stick around. We'll have more here on this podcast. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 26, 2019

What is the dark web? What will you find in the dark web? Craig is on today on the Jim Polito show as they discussed the dark web, the pedophilia ring that a YouTuber discovered, and how Facebook uses its apps to track users.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

What Is The Dark Web? How To Access It And What You’ll Find

Facebook Uses Its Apps To Track Users It Thinks Could Threaten Employees And Offices

Youtuber Claims Online Pedophile Ring Operates Freely On Youtube

--- 

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/26/2019

What Is The Dark Web - Who Created It

Craig Peterson: 0:00
We had a really good webinar yesterday. Craig Peterson here for the Infragard. It's kind of cool looking at some of the patterns and what people are interested in. Yesterday, we were talking about the difference between cyber and cyber enabled crimes. Very, very hot topic. The other real hot topic that we discussed, in fact, the number one topic in the last year on the FBI Infragard webinars I've been running. The number one topic has been dark web. And that's kind of interesting, because that's what we talked about today with Jim Polito. Some history here behind the dark web. And why did the government create this thing? So here we go with Mr. Polito.

Unknown 0:47
The man who knows it all our good friend and Tech Talk guru Craig Peterson. Good morning, sir.

Unknown 0:55
Hey, good morning, Jim. How y'all?

Unknown 0:58
You're from Canada. Don't say y'all just just because you travel the country frequently.

Unknown 1:07
Isn't this the deep south? Isn't that how y'all talk down here

Unknown 1:09
For you technically it's the deep south.

Unknown 1:12
Yeah

Unknown 1:14
Speaking of the deep south, let's see Facebook which has nothing to do with the deep south uses its app to track users it thinks could threaten employees and offices. Wait a minute. So Facebook can't you know a tell me can't the tell me whether or not a real post is actually offensive or just a lot of people complained about it. But they can tell me when there's going to be like an attack at work. And not that I'm making light of that.

Unknown 1:55
It's kind of interesting. There's two interesting stories kind of along the same lines as this week. The Facebook one and then YouTube one both of which are how come they can police things they want to police but they can't police these things they don't want.

Unknown 2:10
Right? Exactly good. That's what I was trying to say. But I'm not as smart as you.

Unknown 2:18
It's interesting to look at. And that's a lot of interesting in one paragraph but to look at what Facebook is doing, and that is they have a whole security team that just cracking people who might who might threaten their employees or some of the physical offices. So for instance, there was a threat against their offices over in Europe. And Facebook picked on that really, really quickly. And CNBC ended up doing a story about it because they had more than a dozen former Facebook employees who said that Facebook is mining its social net

Unknown 3:00
Work for threatening comments against Facebook wow some cases it uses its products which are of course the Facebook app the Facebook never use it VPN that using its products to track the location of people it believes present a credible threat now this is incredibly Big Brother-esque here bottom Yeah, yeah and Facebook's other employees are out there and you know Facebook's management is saying well listen it's only legitimate Every business has physical security. We have a physical security team why wouldn't we do it? But you know when when you get right down to a Jim. Why aren't they doing this sort of thing for threats against other people warning people about it. Why aren't they reporting all of this stuff to the local police departments? Why are they trying to do it themselves.

Unknown 4:00
And why are they using their app to track these people basically without their knowledge that Facebook thinks might be a threat to themselves in this? That's where I think they really crossed the line.

Unknown 4:15
Wow. Wow. We're talking with our good friend Craig Peterson, our Tech Talk guru and at the end of this segment I'll give you, well Craig will give you a number and you'll be able to get this information plus a whole lot more. Could this ever help you know I mean, is there any way that they could use this to help him in always in almost in a bit of remember the science fiction movie Minority Report where someone Yeah, predict someone was going to commit a crime and you'd be arrested before you committed the crime and... what?

Unknown 5:01
Future crime became a crime in itself. If you are going to do that.

Unknown 5:05
You are going to commit a crime? Yeah. Which is completely contrary to our Constitution. But all right, Craig, let's suspend disbelief here for a little bit. Could you know police use this kind of modeling to see where they may be spikes in crime? Could Facebook use the same kind of stuff?

Unknown 5:26
That's why like you, you really are brilliant because you're pulling together a whole bunch of pieces. And one of the pieces that should enter into this fray here is the fact that there is already pre crime type technology in place. Then they're using it in New York City. They're using it Los Angeles. My last I heard Boston might be using this but what it is it looks at trends. It looks at social media feeds.

Unknown 6:00
To try and find agitators to try and predict where a crime is going to occur and then the police departments are using that kind of pre crime information to have police officers and units and even in some cases SWAT teams on the standby in that area because this machine learning system this are you know not quite artificial intelligence is predicting crimes there so you combine that technology that already is there is already in the field with the ability of somebody like Google or Facebook is what we're talking about right now who does collect all of this information who does sell all of this information put it all into a pot and stir it and Jim it's a civil libertarians worst nightmare.

Unknown 7:00
Yeah, I can see that. I mean it's like fire it's the good and the bad unfortunately you've destroyed your reputation by saying Jim you're brilliant I mean that's you know Craig we all know you're brilliant but if you're going to say that I'm brilliant people gonna say I don't know if I completely trust Craig Peterson. and his intellect i don't know if I.

Unknown 7:22
Most people Jim they're not thinking it through right and that's the brilliance of brilliance is seen through just the normal short term thought process. And nowadays the average millennial has a an attention span less than that of a goldfish. We're talking five or six seconds so how would somebody like that going to think the next order through and that's where the brilliance comes in Jim in and it's absolutely necessary to think this through what's the ultimate outcome, right of this type of technology?

And then look at the story on YouTube this region where we've got YouTube now ads pulled from companies like McDonald's, Disney, Grammarly. Chromebook, Purina, IKEA, Glad, GNC, Lysol. Now why did those ads get pulled? This is a story that's not really making the news but it turns out that there was a pedophilia ring, a pretty big one, a soft core pedophilia ring running on YouTube, and apparently YouTube kind of knew about it, trying to should have done something about it and absolutely didn't. So this YouTuber guy, his name's Matt Watson. Yeah, he exposed what he's calling a wormhole into this ring on the YouTube platform. He uploaded a video a week ago Sunday about all of this stuff, and it's disgusting to look at. I don't want to get into any of the details but it's right there in the open on YouTube. So you talk about Facebook tracking users is threatened Facebook and and the Facebook is insane, seemingly doing much about anything else who got YouTube now with some of the most important stuff you can imagine out in the open and it gets it so bad that advertisers have to pull their advertising to try and make YouTube do something about it. And it really makes you wonder where we're going.

Unknown 10:00
Wow, we're talking with Craig Peterson. Our Tech Talk guru. At the end of this segment will give you a number you can get all this information for free. Plus other stuff when there's a crisis. I'll explain to you how you do it. There's no obligation All right, this is a question people ask me all the time and I give them a half baked explanation. But let's get it from the guy who's an expert at explaining the technical aspects of the web in a simple way that most people can understand, probably because you wrote some of the language, some of the code for the web that's still in use today. But what is the dark web? Almost sounds like that old dark shadows. That soap opera horror. So what is the dark web?

Unknown 10:27
It does, doesn't it? Well, there, there are multiple parts to the internet. But you can think of it like an iceberg. The dark dark web and the business web are both the part that's underwater, in other words, is a part you don't see the internet inside businesses is bigger than the internet anyone else can see. And the number of apps in fact that are in use outside of the public curve, you are actually outnumber the number of apps available in the app store.

Unknown 11:01
So so there's this huge underwater component of the iceberg when it comes to the internet. And there's really two parts to that. there's what's called the dark web. It's kind of a generic term. And believe it or not, the dark web was set up the effectively by our government and our tax dollars still maintain it. And the idea behind the dark web was how do we let people who are in these countries where there's heavy oppression in Iran, etc, etc. How do we let these militants communicate with each other and communicate with us, our military or the State Department, etc. So we developed this this dark web concept around Tor and some other technologies to allow these people to be able to communicate.

Unknown 11:51
Oh wait a minute. I got it right now. So the government put this together for good and it's been taken over by the identity theft people the people you just talked about pedophilia and YouTube that's where pedophiles trade video in this dark web which was created for good and where did it, where is it ended up?

Unknown 12:19
Well it is created for good it's still used for good but the overwhelming use of the dark web is really a lot of different types of criminal activity in this day and age frankly. So now there's a conundrum here for the federal government. Do do we shut this down which they can't do by the way there's no way they could shut it down because it was designed to be unsettled and shut down a

Unknown 12:46
They did too good of a job you mean it was a government contract that did too good of a job. Yeah, exactly. So and they still want militants to be able to use it. So it's kind of stuck though there's a really interesting article on CSL online that I put up on my website that goes into this because not all of the dark web is bad. Not all of the tools by militants but if you do go out on to that dark web Be careful because it's easy to stumble on stuff that will make your eyeballs pop out.

Unknown 13:18
Yeah. Oh the real bad stuff the really really bad stuff that people want to be able to share. It's like the back alley of the internet, isn't it?

Unknown 13:33
It really is. You know, this is a place where people like Bob Kraft might find another a new massage parlor

Unknown 13:46
Oh. So wrong on so many levels. But ok, I'll let it go.

Unknown 13:51
We also have out there have been some of these sites like the Silk Road and things where people were buying and trading drugs and they was shut down. These people were caught. So just because it's on the dark web, just because you're using cryptocurrencies doesn't mean that the FBI or the Secret Service or other guys can track you down because they can and they do. So keep that in mind as well. It's a scary place to go. There are a lot of dark alleys out there we keep an eye on some parts of the dark web so that we know what's going on. And if there's something major that's where we find these huge cracks when when you know one of these places is broken into that's where we find that and that's what we use it for. But you know as a general rule, Jim they away from the dark web.

Unknown 14:45
So, you know, teach us how to access it, which is good, but at least we know what it is and why it was created. It's kind of a back alley for the government to communicate with individuals who are in countries where they don't allow the internet and yet Then it got co opted by the bad guys all right I promised that I would give you a full well that Craig would give you a phone number and you'd be able to get this information plus a whole lot other stuff you get on Craig's list. Hey, Craigslist. Hey that's pretty good I just made a pun there well good register that yeah might be a little late. But anyway you get on Craig's mailing list. How about we say that and he sends you information without annoying you. He doesn't do it constantly. But the good thing is when there's a big problem like a big hack, he tells you what to do. And it's all free. So Craig, the number that people should text my name to is what?

Unknown 15:47
It is 855-385-5553 that's 855-385-5553.

Unknown 16:00
Standard data and text rates apply and again it's it's great to get the service but Craig it's better to get you in person every Tuesday here and we appreciate your time We hope you have a great day.  Thank you. Thank you to talk to you next week.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 25, 2019

Craig is on with Jack Heath as they talked about the presidential candidate who is trying to fend off the unemployment riots.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/25/2019

Presidential Candidate And Unemployment Riots

Craig Peterson 0:00
Good morning, everybody. Very, very busy putting together all of this course material. It is really kind of fun. And it's fun helping out all of these people who signed up. We're covering a bunch of things. This last weekend. We spent the whole weekend and module last week, but in together a whole set of modules real, it's one module, but it's multiple sections in the module on securing Windows devices, Macintosh devices, mobile devices, using your free tools and installing the top notch security tools, what you should use and when you should use it. So it's been a whole lot of fun. And no, we're not taking any more people into this class right now. But it's fun. I'm feeling alive. Again, this is really quite neat. A lot of work but you know, it is a whole lot of fun as well. So this morning I was on with Mr. Jack Heath, and we had a good little chat and we took a political angle to this whole presidential race and technology and what is happening out there hearing what's happening with stop and shop here in New England, which is a New England grocery store. Is this going to impact the whole country? Again, something here in New England getting pushed out, we got a presidential candidate and Volleyed. This is really something so here we go with Mr. Heath.

Jack Heath 1:30
Alright, joining us now on the Auto Fair listener lines. Our regular contributor. Our Tech Talk guy, Craig Peterson joins us in the Auto Fair listener lines. Good morning, Craig.

Craig 1:37
Hey, good morning. I don't know Jack if you heard about this 44 year old democrat who's running for president. And he's got a real interesting technology angle to his campaign. He's trying to fend off what he's calling the unemployment riots of that he says are on the way he said, we're in the middle of the third inning of the greatest economic and technology shift in human history is named to Andrew Yang. And he brings up an interesting point about jobs and technology and automation and where everything is going. He's trying to provide a soft landing for truckers and manufacturing workers who he believes are going to be out of work, frankly, pretty soon here. Jack.

Jack 2:21
It's interesting you say that Craig early early morning I was listening and watching or reading a story that's I believe, correct me if I'm wrong, I believe, stop and shop unionized workers are potentially looking at a strike because they are in the middle of a deal. But one of the workers interviewed when asked what's their beef because they are I guess, in the retail grocery world, some of the higher paid but for example, deli workers and others, they're talking about that Stop and Shop and baggers and you know, cashiers there's so much replacement with technology, that's one reason why they're looking at possibly striking that they're, they're sort of taking their jobs and replace it with technology.

Justin 3:03
I don't use those automatic checkouts. Because I feel like it's eventually that's all there will be. And if you know, I don't like if I'm running my own groceries out, you know, do I get a check at the end of the week? You know, do I get to fill out a W two? What's going on there?

Jack 3:15
No, I it's funny. I liked I like to go through the human part. But But that's an interesting thing. So this person saying that we're going to see a lot of displacement and that's been talked about.

Craig 3:26
Yeah, and but you know, it's always been talked about. We were worried about what would happen if all the people took care of the horses once the horseless carriage came in, but you know, Justin, ultimately, where this is going and Jack and everybody is you're not going to check out yourself. You're just going to walk around the store, pull things off the shelf and walk out of the store, because it's all going to be automated. We are.

Jack Unknown 3:48
That's what Amazon's trying to do, right.

Craig 3:50
Yeah, exactly. And we're talking about nearly 10,000 of the 15,000 members of the Union there at Stop and Shop devoted to the would strike because of that. So it's a difficult thing. We've always had this with new technology. I don't think it's going away. And frankly, Jack, I think it's interesting that it's entered into the whole presidential race. 

Jack 4:14 
Interesting. All right. Well, and you know, the other thing I was thinking of you on this morning, Craig Peterson with Tech Talk is, you know, again, another big another big story is Karen Curtis with a local news talk, radio station and Florida pelt. Palm Beach has joined us saying for Robert Kraft, the Patriots owner, it's a misdemeanor in Florida what he's charged with, but it's a PR nightmare. And the social media coming out of this on Friday over the weekend. And I looked at some of the Florida, the Jupiter and that area, new sites. The social media is where the real fire comes from these stories.

Craig 4:48
it does in it. And that's impossible to crouch. It doesn't matter how rich you are, you know, you can't go pay off some local reporter to try and keep it down or maybe work with the local police department. Once that word gets out. Jack on the social media, there's a lot of people that just love to tear other people down. There's no way to stop it. But you know it it is a small misdemeanor, frankly, it's illegal, it's a crime, etc, etc. But normally, something like this would not get a whole lot of attention. You know, you mentioned earlier that the PR is where he's really going to get nailed here. But when it comes to social media, it doesn't matter. You know, we've heard just a rumor of a rumor and it spreads across the country versus the old days where it took something really substantial before there. There was much talk in the media.

Jack 5:40
Before the newspaper was read are delivered. might have been a few weeks before you'd hear something or a few days now. It's a few seconds. Thank you, Craig Peterson Tech Talk. http://CraigPeterson/.om. Thanks Craig.

Craig 5:52
Thanks, Jack.

Craig 5:53
All right. That's it for today. I will be back tomorrow with of course, Jim Polito. I always have so much fun on with him, and will will also on Wednesday. Be back with our friends in Maine. And then Thursday and Friday. I've been trying to do my Security Thing podcasts. But I'm so busy with this course. I've had a little bit of trouble with that. But I'm going to really try and do it this week as well. And today if you are an FBI Infragard member I have webinar for you this afternoon. So Craig's keeping busy plus I was approached by a CEO group here, mastermind group of some pretty big companies to speak to them, maybe do a half a day for them on some of the security stops. I gotta get a proposal together for that and more. Anyhow, I will talk to you guys tomorrow. Always make time for this. I think it's important. So take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 22, 2019

YouTube and Soft Porn? There is a YouTuber, named Matt Watson who exposed what he called a wormhole into a soft core pedophilia ring and posted this out on YouTube. In less than a week he essentially caused the cut off of advertising, some very big advertisers on YouTube. I'll tell you more about that today.

You know, I've been warning you about these smart devices and today there is a real-world example of the bad guys at work and the true invasion of our private lives.  

The Dark Web is in the News.  We'll talk about what it is, What's available. How do you access it? What you can find.

We've got Windows Defender. This is something I'm talking about in my new master course over the next couple of weeks.  Where I will teach how to secure your computers and secure them effectively.

Do you put things off?  We all do.  We'll talk a little bit that and procrastination. I will tell you about an extension for Chrome that just might help you out.

Facebook may not be trying to protect the rest of us, but they are trying to protect their own. Yes, indeed, Facebook is using its apps to track people. And we'll tell you why and how.

Flipping Houses.  Has it ever intrigued you?  I know it has me. Now, Zillow is helping you get the information you need if you are interested in buying or selling properties. They have a couple of new tools that I will talk to you about. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/23/2019

Flipping Houses The Hitech Way - Smart TVs Chrome sticks Hacked For-Profit - Pedophile Ring Operating On YouTube

Craig Peterson: 0:00
Here we go again Craig Peterson. Man we just keep pushing to that thousand week mark this is so cool. I have to thank everybody course at Clear Channel and iHeart and even before it was either one of those for putting up with me all these years and for you guys for listening right. If it wasn't for listeners there just wouldn't be a radio show and podcast. So, hey thank you very much. Of course, you can listen to me live on iHeart app. I'm not sure why they're podcasting isn't picking me up but yeah we never been able to resolve that maybe I should get somebody to work on that one as well because there was a lot of people that really enjoy it and if you want to listen to the podcast it's just http://CraigPeterson.com/iTunes and you'll find it right there. I'm also on a bunch of other ones. I'm in a SoundCloud I think I'm know I'm in TuneIn and a few of these other distribution networks out there. So have a look for it Tech Talk with Craig Peterson and don't get confused with this other guy that's been trying to steal my name and my show out in the Seattle area. No, no, no, no, it's me. I have a kind of distinctive voice. And so from that, hopefully you'll be able to figure out which one is which. Because I am the original

Now, okay, moving on. Today, we've got as usual, a whole ton of stuff. Our email should be back to usual for you guys. So, this morning, Saturday morning, you should have received the weekly show notes and those show notes go through all of the articles that I think are worth covering in the news. So let's get going. We've got a YouTuber here who has cut off essentially, he has caused the cut off of advertising, some big advertisers on YouTube will tell you about that. You know, I've been warning you about these smart devices that are out there. We're going to tell you about why. Here's a real-world example of what a bad guy has been doing. And he says he's going to stop doing it now. The dark web, what is it? What can you access? How do you access it? What can you find, and we've got Windows Defender. This is something I'm talking about in the course, my master course over the next couple of weeks about how to secure your computers and secure them effectively. So we'll talk a little bit about that and procrastination. This is kind of cool. How many of us get on the computer, we open up Chrome, we start poking around on the internet. And we end up wasting a lot of time. Well here's a Chrome extension that might help you out. Facebook may not be trying to protect the rest of us, but they are trying to protect their own. Yes, indeed, Facebook is using its apps to track people. And we'll tell you why and how. And we'll start out with this one because I think this is really cool. You've probably heard of Zillow before, it's an app. It's a website. I've used it before, you know, you go into a nice neighborhood or area of the country and say, Wow, I wonder what it costs to buy a house here. So you pop up Zillow and Zillow comes up and says, hey, yeah, here's what it costs and in this town, and here's all the houses are for sale that even now tells you about rentals and rental availability. And Zillow has been keeping a very close eye on the real estate market. It's pretty much right almost all the time. It even has a tool that will estimate what a house is worth. So it'll have its little Zillow estimate. It'll let you know what the taxes are, what the was paid for that house originally kind of pulls it all together.

Now, you've been watching on TV, there's, I think it's home and garden TV, HDTV. My wife loves this channel, and some of the stuff that's out on it. But they have these house flipping shows, there are these twin brothers that do one, there are these people in Waco, Texas, a husband and wife, I guess they're having marital issues. Now, I'm not sure. But this whole Magnolia thing and how popular it is, it's gotten so popular that even our target has picked up her chain of household decorations and everything, which is really kind of cool. When you get right down to it. And think about it. She has really built an empire along with her husband, I think it's mainly her. But you know, it's hard to tell, maybe it's him driving it. And she's just the voice for the most part. But she's definitely the decorator type. Well, these shows have become very popular, they are inexpensive to produce, at least for the most part. And the idea is that the host, and I only mentioned two shows there's a lot of them, but the idea is the hosts go in, they find a house maybe a distressed house somebody's about to get foreclosed on or something else is happening. But they find the house and they try and buy it at a deal. And oftentimes they are on foreclosed homes and they don't get a chance to inspect them beforehand. But they're still able to make a bunch of money. And that's how they're compensated. Of course, they get money from the show's production company. And there may be other money's involved to go between all of these different people involved. It's fairly expensive, obviously to produce a show. But, because the host can make so much money it costs a lot less to produce these shows and people love them right. I like those shows also where they go to different parts of the world. I saw when they were in Panama and they the show that couple three different properties and they have to decide which one they want to buy and sell your their guests and against your wife trying to figure out what it is right? Aren't those things kind of cool. Obviously, I'm not the only one that likes these just based on the numbers that are out there. And if you've seen them, you might have thought a little bit about maybe flipping a house. And there have been ads on this radio station that I'm on and others for seminars you can attend where they'll teach you everything you need to know about how to make money fast, and you do it in the real estate market. And you use other people's money. I took Bob Allen's course. read his book, and he and Mark Victor Hansen got together they put together this whole thing and I bought it all and I went to some of the seminars. I've been to these before. Multi-day seminars on buying houses and flipping them and things. I never did it because it wasn't something I was comfortable doing. You know what do I know, I certainly have done renovations in my own home before and I mean, done them, you know, built everything. Built the cabinets from scratch, and, and the whole nine yards. So, I know a little bit about it. But I never felt comfortable enough to go out and do it all on my own. How about you guys, right?

I guess it's the same thing with computer security. Most of the people that signed up for this latest master course for me were kind of wondering, what should they do? How should they do it? They didn't even know where to start. And that's kind of where I would be. And even after attending these seminars, these live events, I didn't feel comfortable enough to go out and start flipping houses, right. Well, this is interesting when we tie in Zillow because you can use it a little in order to kind of figure out is there a house I should flip. And bottom line if you are going to be buying homes and flipping them, which means you're going to renovate them, you're going to turn them into a valuable property from whatever they are now and sell it for a higher price. And hopefully higher than what it cost you to buy it and renovate it. Right? That's what flipping is when talking about flipping a house. So hopefully, you know the neighborhood. Everybody that I've read and the seminars I've attended, say get to know a neighborhood. It might be your neighborhood. It might be a close by neighborhood but know everything, know all of the houses, what are they sold for? What are they really worth? How long have they been sitting on the market? That information can help you also get a really good deal on a house.

Now, remember, I mentioned Zillow. Have you used Zillow before? Have you wondered what their model is? How do they really make money? It is obvious that they're taking somebody from the real estate agents that are are advertising in there and the leads that they're getting from Zillow. But, this is very interesting because Zillow is now getting in the house flipping business. Isn't that something. So you can now go on to Zillow. And this is cool, I even saw an ad I have it up on my website. When you look at this article that came out of Bloomberg, they have a little ad that right out of a print media about flipping your house, my you know, we want to buy your home. So people have these problems all the time where they're trying to sell their home, but they can't buy a new home until they sold the current home. And once I sold the current home, they're in real trouble now, because I got to get out of that home and 30 days or 60 days, whatever it is, which means that's all the time they have to find a new home and that just not going to work out very well for them. Been in that position before. So should I do repairs on the house before I sell it? How much repair should I do? Should I just paint the walls white, I've got to replace this floor or that flooring. I gotta fix this roof leak that's been there for a long time, right? All of these things you guys have dealt with this before. Right? And if you've ever sold a house.

Well, the company that came up with this whole business thing and came up with the programs and the website. And now the apps have something called Zestimates. Z-E-S-T, Just like Zillow. Z-I-L-L-O-W. You check it out if you haven't checked out that app or website yet.

But Zestimates now, and it's kind of a Kelley Blue Book for American homes. And they've started an instant offers business. The idea behind this is if you think you want to sell your home, you go on to the Zillow site and you get a Zestimate. And the whole idea behind this is Zillow has a pretty good idea of what your house might be worth. Because they're using some machine learning. They have all of this data about homes that have been sold in your neighborhood in your town, and what they're all worth. So if you sign up for this, it's part of this whole new breed of high tech home flippers. They've been called iBuyers before. There are some Silicon Valley startups that are doing this and real estate brokerages that have instant offer operations as well. So Zillow has kind of pulled this all together the information from Wall Street, and the finances and Silicon Valley capital, and all of these algorithms they've developed. And they can make very detailed and fine and correct really predictions about home prices.

So, these investors are buying homes on a massive scale. And because it's such a big scale, unlike the Magnolia people we talked about before, they only have to make a just a small profit out of each flip. So that's putting these real estate investors that have been flipping homes the old fashioned way, it's putting them in a bit of a bad spot. But it's interesting because this Bloomberg article goes through a specific example in the Phoenix area. And what happened was, they listed their home, they weren't sure what to do, what to fix what not to fix, normally, what would happen, right, you'd have a real estate agent come out, they look at the house and say, Well, if you fix the bathroom, you're going to get your money out. If you do the kitchen, you're not going to get your money out. And you got to fix the roof because it's got a second roofline or whatever, all of those things are right. And then you do it and you have your fingers crossed, that you're going to be able to sell that house at some point in the future. Well, in this case, what happens is Zillow make some really good estimates based on what's happening in your neighborhood. And they now have this great opportunity because they might make a good deal on it. So they hire someone to come out at that point and look at your house. So they have an appraiser who comes out and has a quick look around, makes sure there's nothing like terrible with your house, which would lower its value on the market. And then Tada, you're done. It's just absolutely amazing.

So, you know, agents in the past have really resented Zillow is market power. And they've been complaining about this whole idea behind this Zestimate and Zillow as had these estimates for a long time and saying that they're creating unrealistic expectations. But now Zillow with Zappraisal might be a way to put it has a very good business model and a very good idea of what your house is actually worth. So, keep an eye out for that if you're looking to buy a house right now today. You can go to Zillow and find out what there's Zestimate is their Zillow estimate for the value of the house. just generically speaking, assuming there are no major flaws in the home. And you can now also have Zillow buy your house from you and flip it. Now, because they only need a very small margin, you might actually do better on one of these Zillow flips. And they do charge like a six to I think it goes as high as 10%, which is higher than your normal real estate agent. But you're also guaranteed a sale and the sale is going to happen very quickly. So you know, I have to take all of that stuff into consideration when you're looking at it.

Well, we're going to come back here in just a second, I want to talk about this guy called TheHackerGiraffe and why my warnings about smart TVs are coming true, what he's been doing and why he's retiring. So, here we go.

So, this guy calls himself or called himself, I guess TheHackerGiraffe. And he said he's retired from hacking smart TVs. This is really, really interesting, because, you know, I've warned about this before, before, excuse me, we've had manufacturers who have installed cameras in your TV. And the idea is, the TV looks back at you. It's watching you while you're watching TV. And the idea for that type of spying on people is to try and figure out are you paying attention. Are you paying attention during the ads, when you look away, who's in the room, there's facial recognition software, some of these vendors are using, so they know oh, this, it's this person. And they always watch this type of show. It's that person, oh, we've got a whole family in here recognizes there's like, three, four or five faces and how often they're watching TV. And of course, that's a true invasion of our privacy. And there was a great article this week about Paul Vixie, a guy who I've admired for years and loosely worked with on some of the DNS stuff. I've used his code forever, you know, kind of advanced, techie geeky stuff on the internet. But he was all upset because he installed a machine that was calling home. And it was, I think it was a Google Home device. And it wasn't using his DNS and there's no way to change. And, you know, these devices we're putting in our homes, and we're using this Internet of Things, frankly, can be dangerous, and it can be spying on us and worse and can be used to find out by the bad guys when are people not home. That's the time to rob the house. Right? It's breaking and entering versus some form of assault that might happen.

So people should be concerned very legitimately, I think, be concerned about all of this. And when you're talking about the smart TVs, there's, even more, this guy, TheHackerGiraffe, he hacked not just smart TVs, but he hacked these Google Chromecast streaming devices and others, and his whole idea was to promote a YouTuber that he liked. Have you heard of this guy, this PewDiePie guy, you might not have a very strange guy. Very, very strange guy. But he had a popular YouTube channel he did some things that kind of forced him out of favor and that was a problem because he started losing followers. I think in fact he got completely delisted off of YouTube and he managed to get back on.

Well apparently this guy, TheHackerGiraffe and I'm looking at this article from Graham Cluley, thanks for forwarding this along it's kind of interesting just see that I don't know that he was paid I think he was paid yeah In fact he was he used Patreon in order to get paid but he was going out and hacking people's smart TV its TVs and smart TV devices and had it set up so that you turn on your TV you'd be watching a program or whatever and up would come and add to watch this PewDieGuy for his channel. There he was here's his YouTube channel click on it sort of thing it's kind of nuts when you think about it and he was doing it not just for PewDiePie he was doing for other people too.

Now I have long criticized the Huffington Post because they used black techniques in order to get followers. In other words, they cheated and lied, they did a lot of things that people have accused all kinds of people on the internet for doing but you know the ends justify the means to these people. And in this case, the Huffington Post the ends justified the means we got to get our message out there. So we've got to get bigger and stronger and last year and in fact, that's exactly what they did. Well by getting bigger and stronger, and nastier they increase their base. They  increase their base and then the rules changed and you could do the practice these dark arts back in the day to try and fool people into following your website but you couldn't do it anymore because they started getting clamped on people didn't like it and the FTC came after them saying this is illegal unfair etc and so they stopped doing it and it's not just the Huffington Puffington Post its many of these different websites and did it over the years.

So now this guy was paid to go on to your Smart TV or Chromecast devices and hack them to get you to watch their internet channel so a lot of people were asking them, Chromecast owners Why their TV suddenly showing a video promoting this YouTube superstar PewDiePie and Chromecast owners complained to Google who looked into this and started finding out oh wait a minute now this all happened because of again incorrectly configured routers that had this you p&p enabled you might have heard of this before. It's a way for you to get out to the internet and then have the internet get back to you. But it's interesting. Just because it's misconfigured doesn't give you carte blanche access to it right. I misconfigured my WiFi Why does that somehow mean to you that you have every right to kind of break in on me? That's the question.

And this guy, TheHackerGiraffe has decided he's going to retire. He posted his retirement notice online and we've seen the PewDiePie fans doing all kinds of things. Just last month, they defaced a section of the Wall Street Journal website. And of course, this TheHackerGiraffe guy and PewDiePie both claim they had no involvement in the attack. But it frankly it's interesting to look at right because we are seeing major changes in the internet and major changes in what we consider to be acceptable. So that brings us to Facebook and pedophiles. Believe it or not

I'm not saying that everybody is a pedophile on new I said Facebook, but it's YouTube on YouTube. But it's kind of interesting to look at this here. Obviously, not everybody is a pedophile on YouTube. And I'm also not saying that YouTube has pictures that are showing minors in various seriously compromising positions if you will.

But this is kind of interesting because a YouTuber by the name of Matt Watson just this week exposed what he called a wormhole into a soft core pedophilia ring. And he posted this out on YouTube. He uploaded it on Sunday. So it hasn't even quite been a week yet. But his video claim to reveal a frankly, what's not so underground YouTube community of adults who are encouraging very young children to upload videos of themselves in compromising situations. I don't want to go into all of this because it just disgusts me, frankly. And I'm sure would you too. Now what's happening here, because of this coming out, is major corporations have pulled all of their advertising from YouTube once this came out because remember, Facebook is supposed to be policing itself. In fact, it entered into an agreement with the Federal Trade Commission years ago about self-policing. And Facebook's been accused of not following through with the plea deal. YouTube is also trying to be self-policing. But remember I said we've seen a lot of changes over the years where you know what is acceptable is not the same today as it was a few years ago. Obviously, this is not acceptable. So all kinds of people pulled funding. YouTube's trying to figure out how can they deal with this how can they find the pictures because these are not naked pictures that are easy enough to find through a computer an algorithm that showing a certain percentage of skin etc right that you normally would look for for the typical pornography. So, in this case, it's very difficult for them.

There's a hashtag campaign over on Twitter and you might look it up if your Twitter user to find out more about this the hashtag is YouTubeWakeUp and within 24 hours these advertisers had caught on. It's crazy. We've got multiple ads from McDonalds Disney  Grammarly, Chromebook, Purina, IKEA, Glad, GNC, Lysol and many others that just said forget about this. So, Watson's calling this as a small victory. It certainly is a victory. This battle still ongoing. And frankly, the public's known for a long time about child exploitation on YouTube. But so far, YouTube has failed to adequately address the issue according to Watson and some of these other people out there.

Now, this video came out just days after multiple innocent YouTube channels were wrongly deleted after being flagged for tagging their videos with the abbreviation for child porn. And that happens all too often as well. Someone who doesn't like a YouTube channel, somebody that's a competitor in the financial space with a YouTube channel will go and flag, inappropriately flag content is being inappropriate wrong kitty porn etc. etc. So YouTube has a nightmare on their hands, right? It is like the boy who called wolf we just had that rest just this week an actor on TV who apparently came out and hired a couple of Nigerian guys, big bodybuilders to supposedly beat him up and put a noose around his neck and dump bleach on him. The accusations are flying on that front. But people do this kind of stuff all the time. So how is YouTube supposed to be able to deal with this? Even ads getting ads pulled down because of so-called inappropriate content or doesn't meet the Facebook guidelines or you know all across out there. It's difficult as an advertiser nowadays to figure this whole thing out. So interesting these videos that Watson exposes this week obviously slipped under the radar but we'll see what happens that YouTube if it simply enforces its rule that forbade uploads from users under the age of 13 that would have stopped all of these videos that we're just talking about.

So a lot more my website. Check it out. http://CraigPeterson.com. You can find everything we talked about today. Plus more including what Facebook's doing to people who threatened employees. Procrastination. This is great. a Chrome extension you should look that up. You'll find it on my website. Why Windows Defender antivirus is the most deployed antivirus and big, big businesses out there and what is the dark web how to access it what you'll find it's not all necessarily bad there certainly is enough of that but it's not all bad out there all of that. http://CraigPeterson.com, and make sure you get my newsletter because that's going to keep you up to date on all the security stuff and get you the weekly show notes as well.

Have a good great day and we'll see you next week. Take care. Bye-bye.

 --- 

Related articles:

What Is The Dark Web? How To Access It And What You’ll Find

Did Your Smart-Tv Start Showing You Shows You Didn’t Subscribe To?
“TheHackerGiraffe” Says He’s Retired From Hacking Smart Tvs To Promote Pewdiepie

Youtuber Claims Online Pedophile Ring Operates Freely On Youtube

Why Windows Defender Antivirus Is The Most Deployed In The Enterprise

Prevent Procrastination With This Chrome Extension

Facebook Uses Its Apps To Track Users It Thinks Could Threaten Employees And Offices

Zillow Wants To Flip Your House
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 20, 2019

Craig joins Ken and Matt as he does every Wednesday morning. They talked about robocalls and the Super Mario Brothers video game that sells for $100,000. Craig also shared with Ken and Matt his best malware advice.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Robocalls And Phone Scams Are All The Rage In 2019

Unopened Copy Of Super Mario Bros Video Game Sells For Record $100k

---

 

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/20/2019

Best Malware Advice - What's My Mario Brothers' Worth - Spam Phone Calls

Craig Peterson 0:00
Hey everybody, bOy getting busy this week, I'm putting together all of the content for our course. And this is really exciting. This is, I'm so excited because this is gonna be the best course ever. Anyways, so everybody who signed up for this welcome aboard. Glad to have you here this morning I spoke with Mr. Ken and Matt we went over the this whole problem that we're having with frankly, these robocalls that are coming in. The spam calls the junk calls, what does it mean? What can we do about it? So we talked about that this morning. We also talked about our friends over at Nintendo here and is your game your Super Mario Brothers game worth $100,000 or more? A kind of an interesting question right. If you have one of those sitting around in your in your attic or your basement also I did some tech support help this morning for Ken which is kind of interesting because it ties in exactly with the course I'm doing right now but if you want little tech support help and want to know how to use secure your machines what's the best browsers and stop did that this morning with Ken as well. So here we go with Ken and Matt. Happy Wednesday.

Unknown 1:27
Back again and Craig Peterson is with us now as he always is Wednesdays at this time 7:38 on Wednesday Wednesday Wednesday. Craig, how are you this morning sir?

Unknown 1:37
I am I am I'm doing pretty well this morning. It's been a busy week and now almost winter again.

Unknown 1:45
Before, I have a question to ask you because I you know I was using Firefox and I started using Chrome and I opened this link and all these you know Orbits drops. It says, don't you want to buy an airplane ticket?

Unknown 2:01
Your PC may be infected right now. 

Unknown 2:05
So what is the spyware clean your computer program to put on,

Unknown 2:12
or we learned a lot from Wreck It Ralph. And Ralph breaks the internet. And I don't know if you've seen that movie. You

Unknown 2:19
know,

Unknown 2:24
the problem is, there's a little green guys running around trying to get you to click on things. So I think you're real question is, how do I stop those little green guys? Right? Yeah. Okay. Okay. How

Unknown 2:36
do I do my computer? How do I get rid of them? Do I get pest modern pest services?

Unknown 2:43
Yeah, that's kind of what you have to do. The pop up stuff is fairly easy to stop. Famous last words and what you do what I always do, and I do this in, in Firefox, which is a little better I should

Unknown 2:56
go back to Firefox. I don't know why my daughter told me to use Chrome stopping and going back to Yeah,

Unknown 3:03
yeah, it is. Firefox is much much safer with your information just in general, right? They're not out there trying to watch everything you do and sell it all in fact, they're they're very good about making sure they're up to date and blocking things but what's the best malware? That's such a good question and last week I started I had what four different cult courses classes last week for people free ones that I did. And that's one of the top questions and it's a kind of a difficult one to ask. It's kind of like you know, what's the best helmet to wear? Well, it depends and what it depends on is what you're trying to protect against because there's a lot of nastiness out there but here goes the drum roll because if you're running Windows you have a Windows machine then you're looking for the basic protection you can turn on Microsoft software and it's got Windows Defender get that turned on and Windows Firewall get that turned on and you're pretty safe as far as everything in general goes and then there's one more piece of software that I advise everybody to get and put on their machines and that's Malwarebytes. Malware-B-Y-T-E-S. It's very very good that was

Unknown 4:21
what

Unknown 4:23
that's what Matt suggested Malwarebytes

Unknown 4:25
ladies Florio Yes. Yes, exactly. And I got a great tip from Matt last week to with this this of Facebook plugin though. Are you enjoying? It

Unknown 4:37
isn't it's life changing? But

Unknown 4:39
whatever. What's that one?

Unknown 4:41
That's the one where you can filter your Facebook feed and get rid of all i don't

Unknown 4:45
i don't do Facebook. So I don't care. Maybe you would if you could filter? No, I'm not. No.

Unknown 4:50
Yeah, it actually works quite well. Yeah,

Unknown 4:54
Malwarebytes is really, really good. And then, you know, the Facebook stuff, there's a few the little filters, but built into Chrome, you can turn on pop up blocking, and I do that as well. So with Chrome, you go to your settings. And there's got to be there's a great search bar inside of the settings and look for pop up blockers. You can do the same thing on Safari, you can do the same thing on Firefox, it makes life much easier. Now, if you're a business, you can certainly use those basic pieces of software and Apple, if you keep up to date with your patches on Apple. It's even safer from the standard virus and hacker standpoint. And then Microsoft is, but since Windows seven Microsoft to ship with some of the stuff turned on. So there's your basics I really like. And this is what we use for our professional customers. I really like Cisco's, what they call AMP, which is their anti malware protection stack. And it's a bunch of different software. But there's one other thing you guys got to do, right? So I mentioned carry on all of your default stuff right now, at least on turn it off use Malwarebytes, but there's something out there called OpenDNS. And this is a lifesaver. This is probably one of the best things you can do as well. And it's also available for free or really, really, really, really cheap depending on what you're trying to do. And what OpenDNS does is when your computer tries to find where to go online. So you type in google.com, it has to turn that name into an address. So it has to be turned into an internet address, because that's the only way to get around. Right. It's not it's like a sort of Ken's house. So where's Ken's house? Well, now you have to look it up in the phone book. Right Ken? Right. And it's 123 mainstream street in Scarborough, Maine. It's the same sort of a thing. So what happens with OpenDNS, if you're using that is the computer says, Okay, well, where's Google that it's trying to find the address and sort of asks, in this case, if you set it up, right? Ask OpenDNS, OpenDNS, okay, well, he's he's 123 Main Street, and off you go, everything's wonderful.

But if you have some malware, if you have some evil software on your site, or let's say it's trying to drive you to some adware based site or trying to get you to go somewhere you shouldn't have be cooked on something you shouldn't have is going to ask, Hey, how do I get to the Kaminski house over there in Moscow, Russia, OpenDNS is looking at that and say, Whoa, wait a minute, we know those Kaminski guys and they're tied into this unabomber guy and this is a bad place to go. And so it OpenDNS as at that point is it stops you from going there and pops up a little while doesn't pop up. But it comes up a little message on your browser saying that's an evil place to go but it also stops malware that's on your computer so one of the first things this evil software does matter where does is it phones home just like ET and tries to figure out what do you want me to do next to do you want me to infect next. Our evil plan to take over the world. And so it tries to call home so how does it call home it does the same thing it says hey I want to call home and it goes to mask OpenDNS. OpenDNS says I know who you are I'm not letting you call home and we're talking about even on their paid plan one or two bucks a computer a month just stop the bad guys from calling home. It's phenomenal OpenDNS look it up now there's better software than that we tend to use Cisco Umbrella which is the next level up from OpenDNS but there you go I just gave you my best tip ever can they keep faith and and it's Mac and Windows okay so is it just across the board is great

Unknown 8:57
doing it

Unknown 8:58
okay all right so Craig Peterson joins us at this time every Wednesday and he tells us about all the things that can needs to know about his computer I've noticed Craig by the way that on my phone I had installed a like a robo killer app which had been reasonably effective for the past few months in stopping this avalanche This is waterboarding effort of these people to try to just destroy my phone and get like a call every 30 minutes or so but in the last two weeks like I don't know if they're getting around it they got new numbers whatever but now I'm starting to get more of these stupid robo scam thing calls and whatnot again and they're always the same they're always some insurance thing or they always have a warranty to sell me or or whatnot but there's also some people that are actually like literally scamming you and saying that you know you owe money and you got to pay the police department or whatever talk to me about phone scams and 29 in 2019

Unknown 9:55
Yeah, IRS, etcetera etcetera. I've gotten most as well and the FCC just released these results of a new study. And it's a welcome to 2019 guess what half of all cell phone calls give or take this year are projected to be spam calls these these junk calls, or worse their their phishing attack phishing P-H. Not the not the kind with the line and the hook but what they're trying to do is hook you so they call up I got I was on the floor of a conference and I was actually the exhibitor and I got calls from the IRS. And like, repeatedly, you have to send money and how do you pay the IRS? Well, it turns out from this phone call that I have to buy Apple gift cards and send them to the IRS in order to make good on my debt to

Unknown 10:51
it's just crazy. So what do you do? Oh, my gosh. Well, yet you're using Hiya right, Matt? Yes. Okay. Yeah. Hiya, H-I-Y-A is very good at stopping these just in general. But it's gotten so bad because they're, they're using your local area code and prefix when they're calling you. So if a call comes in, and it looks like it's from your neighbor, because it's your neighborhood phone number, you're more likely to answer it, then it's easy to fake and they're continually faking it. And there's no end to this insight. And I hate to say that, so let me tell you what I do. Okay, guys, I've set my iPhone into Do Not Disturb mode. Now, that can be a problem, because there's people who you want to call you. Well,

Unknown 11:43
they want to be disturbed, right? Yes.

Unknown 11:46
Yeah, exactly. So on the iPhone, what's really nice is I can put it in Do Not Disturb mode. And then I can say, if someone's in my contact list, let the call through. So I have a I have thousands of contacts in my phone. And so if any of them call me it goes right through to my phone. But you know, between us nowadays, when you call someone you kind of expect to get voicemail so if it's not someone who knows you really well, and they end up in your voicemail because you have Do Not Disturb turned on and you have habitat of culture contacts through and great, okay, so your wife's college kids calls, etc. going to come right through. But somebody that you haven't spoken to, in 10 years might go to voicemail. I don't think that's a big deal. But that's what I've done. I've got higher running, I ended up buying the paid version, which is pretty good. And then on top of it now, because it's gotten so bad. And the FCC is agreeing with us. We're not crazy, at least not about this Matt, that, hey, this is going to get worse. So take a look at that. On the Android side. There's a bunch of apps that you can put on your phone. Apple doesn't let apps begin to your phone calls away. Android does. So there's a lot of different options in the Android space. But I have found this to be very, very effective.

Unknown 13:15
We are talking to Craig Peterson, he joins us every single Wednesday. Right around this time. I you know, Craig I was kind of I don't know a lot about video by new I remember Mario Brothers and and because I they were kind of cute. And they ran around a lot. Why would Why would a a video game sell for $100,000?

Unknown 13:42
I mean, seriously, What? Why? Why?

Unknown 13:46
Well, it wasn't 100,000 100,000

Unknown 13:55
Yeah, it's

Unknown 13:56
it's interesting because this version of the video games it was sealed. It was unopened. Now just because you have one that might be sealed and unopenedn, it's not probably going to sell $100,000. This was a special version at only sold in New York. And Los Angeles was called sticker sealed so it has a special sticker on it. And it was also certified by this gaming authority of some sort. 

Unknown 14:25
So it's a collectors' item is what you're saying?

Unknown 14:27
big time Okay, big time. But you know, a lot of people loved it. It was one of the big first big games frankly out there for the Nintendo 1985 was when of course it was this version of the game was released. There were some that were a little bit earlier than this but that's why it's sold for that so don't go out digging them up from the basement of the attic. The odds are excellent. Your Nintendo game is probably worth at least $5 okay but it's probably not 100,000

Unknown 14:58
that's such a bummer oh

Unknown 15:01
alright

Unknown 15:02
we're up

Unknown 15:03
Craig Peterson our tech guru joins us at this time every Wednesday and this was no exception appreciate it Craig thanks so much for joining us

Unknown 15:11
I'm gonna go to that Malwarebytes place

Unknown 15:15
yeah hey if you guys want access to that training I did last week I did record it it's a few hours worth of it all about security stuff just send me an email just me@CraigPeterson.com and and I'd be glad to make it available to Ken or anybody else who wants to. Just me@CraigPeterson.com.

Unknown 15:34
all right there it is. Ladies and gentlemen Craig Peterson the man the myth the legend is with us as usual and we'll talk again next week Craig.

Unknown 15:40
happy wetness day

Unknown 15:43
wetness day indeed. Alright, so coming up at 8:08.

Unknown 15:48
That's part of the reason I do these. These hits here on the radio. It's just so much fun. Sometimes. I have fun with these guys. They're a little bit of play around. Anyways, hope you're going to have a great we talk to you later. I'm going back to the treadmill today. Yeah. Isn't that fun? Go Craig. Start an exercise again. Have a great day. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 19, 2019

Craig is on the Jim Polito Show. This morning they talked about Microsoft dragging the Internet Explorer to the trash. They also talked about robocalls and how you can avoid them. And a little friendly teasing about Craig being Canadian.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Robocalls And Phone Scams Are All The Rage In 2019

Microsoft: Drag Internet Explorer To The Trash. No, Really
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/19/2019

Microsoft's Surprise Announcement - New FCC Study Doesn't Look Good

Craig Peterson: 0:00
Hey, hello everybody. You might hear my little Roomba going in the studio in the background. I was on with Jim Polito this morning. We talked about a couple of different things. One is what's up with all of these phone calls we're getting? The FCC has some new statistics out talking about what's going to happen here in 2019. And we also had a little bit of fun because, you know, Jim and I were kind of those kind of guys, right. So first of all, he was teasing me more than a little bit about be Canadian now, which is, you know, come on really, really Canadian. And then we also talked about Microsoft and their crazy surprising admission. So all of that and more stick around here we go. And thanks everybody. By the way, who signed up for the master course and who attended the classes last week. I think things went great. So here we go with Jim.

Jim Polito 0:57
He really is one of my favorite segments of the week because we all bask in the genius that is our Tech Talk guru Craig Peterson. And here is the aforementioned bright star. Good morning, Craig.

Craig 1:13
Hey, good morning, Jim. And we had a lot of people here over the last week, get on those little seminars, webinars, training that I had put on for free we had we had about I think it was about 400 people. So that's fantastic. And we went through backups and what to do and how to do it and how to configure the Wi Fi to make it secure. You know just some basic security stuff that everybody needs so i i was tickled pink that that many people were happy to be there. And of course, a resolve free by the it was phenomenal. And then I offered afterwards if they wanted some more help. But anyways, it's it's great to see the interest Jim and we got the bad guys on the run.

Jim 1:59
Yeah, that's great. And folks, at the end of this segment, we're going to tell you how you can get on Craig's list. And again, see how we offer this free webinar. He's not going to try to sell you anything. He's not going to hound you. And he's not going to give your name to other companies so that they can try to sell you something. It is a free service that our Tech Talk guru provides and will tell you how you can get on board. And and while he did this webinar, when there's a big crisis, he's the guy you want giving you the straight story because if he can explain it to me, he can explain it to anybody. So hey, I want to go with something funny to start with. And that I want to get into robo calls. But Microsoft is telling people to drag Internet Explorer into the trash. I mean, I'm surprised that there's still people who haven't done that. But why don't you, why don't you explain? I mean, I mean, I look at Internet Explorer. Now, the way I look at Netscape, does Netscape even exist anymore?

Craig 3:09
Yeah, well, it Yeah, no. Internet Explorer, of course, was the the kind of pivotal, their key product. In fact, it was based on some of the Netscape stuff from way back when, and, and some others, but anyways, it is a piece of trash. There's no two ways about it. I've been telling people to stop using it for forever. And there are so many reasons for it. And one of the big reasons is, it's not supported anymore, which means two things for everybody Jim. What it means that people are not going to get the full internet experiences they want to get. Because frankly, there are people who are designing websites and web apps and things are not testing against Internet Exploder, I mean, Explorer. 

Jim 4:14
Did you just say what I thought you just said?

Craig 4:17
I did. Yeah, Internet Exploder. That's kind of our pet name for it. So they're not developing forward, so you don't get the good experience anymore. In fact, if you are a developer, you know that for at least 10 years, you have to develop a website for everything else in the world, Google Chrome, and Firefox, and Opera and Epic and all these different browsers. So that's great. You got one website, and then you have to upload another website for Internet Explorer, which is crazy. So you're not going to be getting the right experience. And it just doesn't have the security updates anymore. So Microsoft's Chris Jackson said he was talking about this uses the perils of using Internet Explorer as your default browser. Now, there are a lot of people who are listening, who might work for medical, you know, like a hospital or something, and they're still stuck in the Exploder world, in those cases, because again, they develop their own software, and the people who are developing it weren't very good and didn't realize maybe I shouldn't say that, because some of them might be listening. They're the best in the world. But they were stuck with Internet Explorer. And you know, in this day and age, you're using Chrome or you're using Firefox or use Epic if you're really concerned about your security out there. Who would have thought that Microsoft and finally admit that you should drag Internet Explorer into the trash?

Jim 5:42
The thing is, now, if you have antivirus software, it will to some extent protect you. But if Microsoft themselves if they're not fixing Explorer, there's only so much you're antivirus software can do, right?

Craig 6:03
Yeah, you're absolutely right about that. Because what we're really talking about here is a huge, huge problem for for people. Microsoft is warning you that you're not going to get the right experience. Many websites don't even work with Internet Explorer anymore. You don't get the advanced. Yeah. And then on top of it, there are vulnerabilities so yeah, you're right about the security side. Jim. 

Jim 6:26
All right. We're talking with Craig Peterson, our Tech Talk guru. And at the end of this segment, I'm going to give you, well, he's going to give you a number that you can text my name to, and you'll get a lot of great free information and standard data and text rates apply. But don't worry about it. You get all this great stuff. Okay. robocalls. And phone scams are all the rage in 2019. I can attest to this and we've talked about this before. Bye. I get at least three calls a day from a number in the Brockton exchange. Now let me explain why. When I lived elsewhere, for some reason, when I changed my phone number, and this was a long time ago I got a Brockton exchange. And if you know anything about Brockton is a little bit of a rough town, nothing against everybody in Brockton. But it's a little bit of a rough town. So the first time I call people on my cell phone, generally they see a Brockton exchange and I say, I'm not talking to this guy. I don't know why I got Brockton. But I got that number decades ago and I don't want to give it up. But I get these calls from a Brockton exchange all the time. And I know it's a scam. And it's interesting how they think, well, we'll make it a local call. So Jim will pick it up, when in fact, it's probably what in the Ukraine, I'm getting the phone call from?

Craig 8:04
Yeah, there are a lot of places all around the world, they typically user A team. And what this is, is a spam call, right? So they've got someone who speaks English usually quite well. And they represented their debt collector, or they're from the IRS or they're from your bank. And the list just goes on and on. And the FCC just released a study they put together and the FCC saying that nearly half of all cell phone calls, and nearly half of them are going to be spam.

Jim 8:44 
Are you kidding?

Craig 8:46 
Half of them. Now, I can say for me, you know, I use that Hiya app, which is really helpful. But for me, I would say it is closer to 90% of my calls, or spam.

Jim 8:54
Danny is saying, Danny, you use the Hiya app.

Danny 8:57 
I use the Hiya and it stops a lot of them. But like that one, I have a Framingham exchange number, and I get a Framingham call every day it won't stop that one. It stops a lot of the other ones.

Craig 9:07
Yeah, it should give you a little warning, Danny that says possible.

Danny 9:11
It does. Yeah, and I know exactly who it is. But yeah, some of the other hires, you can just cut it off completely.

Craig 9:16
Yeah, I don't even see them. You and I would have ended up doing, and people might consider this themselves. And I kind of hate to say this, but I, you know, there's a lot of people I know. And I have all the people I know in my contacts includes everybody from LinkedIn, all of my customers and stuff. So I have like 5,000 contacts in my phone. And what I've done is I went into settings on my iPhone, and I put it into Do Not Disturb mode. And then so what happens is, you don't get any calls. You don't get any text. You don't get anything. And then there is an option in Do Not Disturb that says, but allow calls from my contacts.

Jim 10:00
Oh.

Craig 10:02 
Yeah. Tricky eh? So now if somebody.

Jim 10:04
Wait, wait, wait, wait, wait. You just said eh. Danny caught it too. Danny looked right at me when you said eh, Craig. You can take you can take the boy out of Canada, but you can't take the Canada out of the boy. Go ahead. Go ahead. Mr. Peterson

Craig 10:25 
It's a beauty eh? 

Jim 10:28
There it is. There it is. Talking Bob McKenzie.

Craig 10:30
Yeah. Exactly. Oh my gosh, back in the day, Anyways, what I do is I put my phone into Do Not Disturb mode. And then I say allow my contacts to come through. So anybody who's a contact of mine, if they call or text it's going to come right through to me. What that means is, everybody else is going to be blocked by Hiya entirely, like I never even knew they called unless I go into the app. Or they're going to get pushed over into voicemail because my phone isn't going to even alert me that someone's calling. And then I have to call them back which in this day and age how many people actually expect to speak to a person as opposed to voicemail anyways? Yeah, so so that's been my work around and with 50% of calls this year projected to be spam calls, junk calls, scam calls. You know, something people might want to consider

Jim 11:28
And look, is there any risk was one of these apps of me losing an important call. There can't be. Oh, there is

Craig 11:37
There is. There is because it's it. First of all Hiya is based on calls that people are reporting so if someone calls from 555-1212 and the call comes through to somebody and then they report it as a scam call if a couple of more people report that numbers a scam call then Hiya is gonna say okay this is a scam because they don't do any real investigation into it. There's just too many of them and there's hundreds of thousands of numbers now in Hiya. So yes, if you're if you're waiting for that call from your your new great job, you're not going to want to have Hiya turned on and you're not going to want to have your phone on do not disturb mode because they can get blocked and no question about it.

Jim 12:23
Okay. Now, Craig, as we said, if you want to get this information and have access to the genius that is Tech Talk guru Craig Peterson what you do is text my name Jim to this number

Craig 12:38
855-385-5553. That's 855-385-5553.

Jim 12:47
That's right. Standard data and text rates apply. But you'll get great information and like this free webinar that was done over the weekend by Craig Peterson. Great information. Craig. Always a pleasure eh?

Craig 13:04
Hey, take care. 

Jim 13:05
Take care. Bye-bye. Yeah. You hoser, right. Craig. Thanks. Craig Peterson, everybody. Our Tech Talk guru. I got to make sure that I send him a card on July 1 Canada Day. Yes, they have Canada Day on July 1 because they wanted to be like us.

Craig 13:24
It was funny. Anyhow, I hope you're enjoying these let me know what you think. I've gotten a lot of great comments from people. You can leave a comment on iTunes that really helps to get the word out. The more people that subscribe to my podcast and leave five star reviews and hopefully you would as well on iTunes. The more people that find out about this podcast so go to iTunes while actually here's the easiest one, http://CraigPeterson.com/iTunes. How's that for easy? http://CraigPeterson.com/iTunes. I'd really appreciate it then it's going to help to get the word out. Take care. Have a great day and we will be back tomorrow.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 16, 2019

Craig goes through some of the free training he offered this week on setting up and securing Wi-Fi, Firewalls, and Back-ups.  He has some video training on each of these on his website but they will be coming down soon.  So, go check them out.  

During the next four weeks, he will be offering a master class on DIY Security.  If that is something that interests you -- you might want to sign up.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/16/2019

Expert Cybersecurity Secrets - Introduction

Craig Peterson: 0:00
Hi everybody, Craig Peterson here. This is almost Week 1000. That's that is a lot of weeks of radio shows. And today we are going to be talking about security and securing your business and your home computers. Now, this is a really important show today because it coincides with a week worth of training video, straight training, hours of training that I produced this week. We did a live session on Thursday as well with Q and A's and I have it all up through tomorrow for you to watch. We're covering some of the top toughest things that you need to do. Explain the technology. I started with Wi-Fi and what you should be doing. How to secure your networks to keep the bad guys out. How to secure yourself when you're on the road.

I went on to firewalls, and when you should and should not use the built-in firewalls, on your computer systems. And then on Wednesday, I got into more detail. As we delved into really something I think a lot of people overlook, and that's backups. Did you know, more than 70% of the time, businesses cannot restore their data from backup even when they have a backup because it fails? So on Wednesday, I went through the 3-2-1 strategy of backups. Grandpa, father, and son on top of the 3-2-1 and explained how to do it. And then on Thursday, I went into more depth and went through three more topics. This is a lot of training and it's absolutely free. Now it is going away tomorrow. Okay. 

And the reason I'm doing that is twofold. One, these topics change security is constantly changing, you know, from my weekly newsletters that security is a huge deal and constantly evolving. So part of what I talked about this week is how to automate it. How to make it so that everything is automatically updated, automatically upgraded because it, because of the changes, you've got to do that as well as how the most professional tools out there allow you to tie your computer network into the one that I use over a billion endpoints that are being constantly monitored and have humans behind it to find if there's any problems. So that then allows you to be within one hour of the latest attacks, the latest vectors that are out there. All of that is changing constantly. So that's the first reason I'm taking it down tomorrow. 

And then the second reason is, if I don't give you guys an incentive, I've learned this right? 1000 weeks of shows. We're talking about decades, right? So I've learned that unless you set a deadline, things don't happen. And that happens with me too, right? When Well, how do you get something done? You set a deadline, right? If it wasn't for the last minute, nothing would get done. So, you need to go out there right now. That's what this is about. That's why I spend time every week on the radio explaining what's happening, why it's happening. And this week, I've got another one here. This is from the HIPAA journal. This is a ransomware attack on a podiatric office. Bobby, Bobby Yee and he has 24,000 patients. The protected health information is all locked up at the medical records encrypted.

They tried to do restores, and then you do pay the ransoms. That's something else we cover and you know, I work with the FBI, infra guard. I do the webinars for the Infragard program. And I help the people that protect our nation's infrastructure keep their data safe. So you're getting a lot of experience behind this and it's going to be absolutely huge for you.

So I'm going to pull a little piece out of one of this week's programs and play it here for you. You can still get this today if you go to my website http://CraigPeterson.com. You'll see it right there on the top of the homepage and you can watch these videos this training and you can watch the replays and you can get a lot of the benefit. Of course, you're not comfortable asking questions live, but because you're a radio show listener, you can ask me questions anytime. 855-385-5553

But this training will go down, okay. It is not going to be remaining up on my website. And there's a lot of good reasons for that. I really need you guys to do this because that's the only way that you're going to be able to keep your businesses safe. So let's get right into this. Here's a little bit of the training from this week.

Hi, everybody. Before we go further here in the training, I want to tell you a little bit about my backstory. How did I get to the point I'm at today? Well, it's not the 1990s anymore. The 1990s is when I got first hit with malware and almost lost my company. And the bottom line is you can't be complacent anymore because you can't stay in front of the hackers. You know, you might use some of the right tools today, but tomorrow you will not be using the right tools because the continually changing that's part of what I didn't realize because cybersecurity is one of the areas of business that you don't want to attract attention to. And one of the areas of business that, frankly, you have to have automated, and they have to have in place that's going to make sure that none of your data stolen, and I think you're going to have to agree that keeping your business safe isn't always as simple as people sometimes make it seem. And that's where I was back in the 90s.

Keeping your business secure comes with real challenges. You've got to go on Google and YouTube research; what the hackers are doing, then you have to research on how to deal with it out of the millions of possibilities. You have to narrow it down to something manageable, affordable, something you can do yourself; then you have to lay it all out which machines need which software? Do you need to change out or upgrade your firewall, your routers, your switches or other computers? You've got to go and buy the right software. You've got to install it on all the machines. You've got to configure it correctly so that it's going to work for you. Then once all of this is in place, and all of the research is done, you're going to have to maintain it by doing updates and upgrades, sometimes daily.

Then there's the fake updates, the ones that pop up and you can't decide if it's real or not. Right now, there's a huge fake a scam out there that says, hey, you've got to upgrade your Flash player. I'm sure you've seen that. So once you've got everything up and running up to date, you're going to have to monitor it. Are there logs you should be monitoring? What are these logs even mean? Is your computer slow because of a hack underway? Or is it just because of the latest version of the software that blew up on you? It all becomes so complex that you really can't do it anymore. Well, you can't figure it all out. You can't design that you can't lay it out. You can't install it; you can't monitor it. But there are some solutions. That's why. In this video, I'm going to demystify the process of securing your computers and your Wi-Fi. It's going to save you a lot of time, money and frustration. It's also going to keep you safer.

So in this first video, I'm going to share a framework that I developed after years of trial and error. It's called the expert cybersecurity framework. And it's a framework that's going to serve as a tremendous resource to you to eliminate the guesswork and frustration out of trying to secure your systems and provide you with expert advice if you run into problems. Listeners on my radio show know that I'll answer questions almost any time and I do that daily.

Now maybe you've already been hacked. Or perhaps you're hoping to understand better the basics of cyber security and what you need to do to help secure your business from the hackers, but maybe you need a little bit more help to make the right choices. Either way, you're in the right place because, after this first video, you'll be able to confidently secure your wireless data. Yeah, Wi-Fi can be secure. I developed the Cybersecurity Framework because I saw so many businesses who were struggling business people who were wearing 100 hats trying to get everything done and then lost everything because of a breach. Businesses who couldn't afford high-end consultants to solve the problems that small and medium businesses face every day in cybersecurity. For example, I saw a distributor who was starting to make it big in the food and beverage distribution market. They had a couple of dozen computers, but they only had antivirus software and a firewall and router that was provided by their cable internet company. They struggled every time because they kept getting hit by the latest virus or malware. Then I also saw a $10 million a year manufacturer trying to up-level their cybersecurity. They were struggling because they didn't have any professional cybersecurity resources that they could rely on. And cybersecurity software and hardware decisions were being made by somebody in purchasing. They didn't have a solid roadmap to follow. And when they got hacked, they had to shut down all operations, manufacturing, sales, distribution, and support for weeks. It cost them millions.

Do either one of those stories sound familiar to you? You know, I could go on, but I knew that people needed clarity because in full transparency that was my story too before outlining the expert cybersecurity framework and the specifics for each step. You might be wondering how I got into all of this and figured it out. Let me tell you so you can understand a little bit more about where it's all coming from. 

Back in September 1991, it had finally become legal to do business on the internet. And so I did. I'd been helping develop the networking protocols for more than a decade. And I wanted to help get businesses online. So I did, we got busy building websites there. And 91 through 93, we were setting up email servers, we even built a lottery system with a daily million dollar drawing. Some of these companies are of course, or companies that you would recognize some of these websites are still alive today in their fifth, sixth, seventh, eighth generations. We didn't have the time to worry about yet another security problem, so we stuck with the basics. After all, who would come after us we were just a small company building websites.

Then, along came Robert Tappan Morris. His father worked for the NSA, the National Security Agency, and he'd been writing code for the government to use to probe the internet. So Junior decided that he'd steal his father's NSA code and use it himself. I got nailed, and there was no one there to help me. This was the early-mid 90s. I spent days trying to figure out what had happened. I had anti-virus software. My machines weren't that far out of date; I'd applied patches from time to time. Does that sound like something that you've done? Right? It's typical, right?

I just wasn't technical when it came to malware back then. I decided that I had to invest in myself and my business. I had to learn about cybersecurity fast, and I had to clean up the mess that
Junior had left behind for me. I had to save my business. Once I got our cybersecurity under control, I started seeing massive growth in my business. With my attention now fully focused on growing my business building and maintaining the websites, I was able to quadruple my staff and income over the next few years. Finally, I could focus and get back to work. But it took getting cybersecurity under control before I could spend some serious time on my business once again.

So today I'm running cybersecurity webinars for the FBI Infragard program. I'm a keynote speaker. I do breakout sessions at conferences I've spoken for Ink Magazine more than once for their CEO symposiums I've helped more than 5000 businesses ranging from fortune 100 companies all the way on down to mom and pop operation.

Today I'm a sought after cybersecurity expert with more than 25 years of experience and almost daily media appearances. And I don't stay up late at night any more worried about some hackers stealing my business and destroying what I worked a lifetime to build. But the story doesn't stop with me. Everything I'm about to share with you is the exact plan I follow to secure my systems as well as that of my client. I'm going to reveal to you expert cybersecurity secret that I've never revealed before. And it's the plan that led me to experience more than 20 years of hack-free, virus-free, ransomware-free business. More importantly, this means I'm free to work on my business without constantly looking over my shoulders or wondering what I'm going to have to remove next. And that's what I want for you. You will be watching this video if you weren't concerned about cybersecurity, that's why I make things easy for you. So here we go.

So that's a little bit of the training of my intro as to what I am doing, how I got to where I am at to today where obviously I've been studying and working on cybersecurity now for over 25 years. I guess that's a long time and I you know, I, as I told you, this is all free training. There are hours of it. It's not one of these hard-sell type things by any stretch because there's no offer at all until the very, very end, so I think you will enjoy it. I've had tremendous feedback. I'm just shocked and amazed and grateful to everybody who reached out to tell me what they got out of it. How good it was and how much I appreciate it. So again, you'll find it at http://CraigPeterson.com. It is up through tomorrow. So go there. Now there are hours of this stuff about how to secure your business, how to secure your home computers, how to be secure when you're on the road, what do all of these terms mean? How do you use them? So whether you're just a small business, kind of starting out trying to do more than just use that antivirus software thing came with your computer and hey, I get it right. Most people that's all they use. And frankly, that's all they know about. And these antivirus companies don't care about you. They just want to sell yet another copy of the software and hope you never call them with any problems. So I'm trying to help you get beyond these problems, and they-they are very real, and you're in this spot because they put you there. 

So I get it. So if you're just somebody new starting, you're going to learn a lot. And if you're somebody who has an IT guy or gal who is trying to take care of things, but man, are they underwater, they just don't. There's too much to do. They need a little help, maybe a little bit more training, they are going to find some real gems in this training. So sign them up for it, send them an email with the link say, hey, check this out. Follow up on this because we're going through some of the best things I've ever put together, frankly, and these are my top tips, and I walk you right through it hand in hand, showing you exactly what to do. I've got screenshots and explanations of everything. It is phenomenal stuff. So that happened Monday, Tuesday, Wednesday, Thursday this week. And if you meant to sign up and follow along, it's not too late today. It will be too late tomorrow, so make sure you check it out right here on http://CraigPeterson.com.

So let's talk about a couple of breaches. I've been doing kind of breach podcast lately as well. And I mentioned at the beginning of the show today, this ransomware attack on a podiatric, I guess, podiatric offices I've heard it pronounced both ways. And they had 24,000 records with personal health information, protected health information. This is common if you're a medical practice at all. Having 24,000 Records is nothing, and this is an attack that took place and their medical records were encrypted. Now under the HIPAA regulations you I, think it's only two hours that you can your computers can be down because part of the reason for that is what if you're patient ends up in the emergency room, needs extreme care and you can't look up the records, right? It's a very, very big deal. And the law says you have to have those records available. So getting them attacked and encrypted by ransomware means that first of all, you can't access those records. So the patient is going to be upset. And frankly, patients have died because of this before.

So it's a big deal for doctors to have people's full names, addresses, contact, phone numbers, their sex or birth date, social security number, health insurance information to have that all stolen. It's also a big deal to have all that data encrypted. Think about a regular business to have it all encrypted because now you've lost your sales records, you've lost your customer information, you've lost your orders, everything and as I mentioned earlier, nine, or excuse me, a little more than 70% of businesses cannot restore their backups. Because when they try, the restore fails. And I see that all the time. So that's one of the things that I cover this week. How to do effective backups so that you can be sure that your backup itself isn't encrypted, because I've seen that before as well. So that was what we covered on Tuesday. 

Now we had hackers who also got into a wireless network and were able to monitor what was going on. And once they're in the wireless network, they had access to the server because the server for the businesses on the same network as the wireless they hadn't segmented their network and they hadn't locked down there Wi-Fi and there are ways to do that as well. And we use in fact logins for Wi-Fi, that are restricted to specific machines. We use that in businesses that have financial information that might not want to have it out and what business doesn't have that? So they got in, they can get at their bank record and were able to transfer the funds out of the bank. You know, it only takes 90 seconds once they have access to your bank account to get that money out of the country. And some of these hacker groups are so sophisticated. They've set up their banks in their home country. So 90 seconds later, the money is wired out of your bank to their bank, literally their bank in the foreign country. Do you think their banks are going to cooperate with trying to get that wired money back? Of course, they don't. And how did they do that? Well, they did that via Wi-Fi, a Wi-Fi breach and that's what we covered on Monday is how to prevent Wi-Fi breaches.

The other Wi-Fi problem that we repeatedly see nowadays is we see piggyback on Wi-Fi wi. So you are, for instance, at an airport and you're using the VPN. And that VPN is connected to the office, and now they're piggybacking on your VPN to get to the office. And now the malware that was on the laptop at your house that you took home is now effectively in the business network because of the VPN and then spread and spread ransomware throughout the business. That's what we covered on Wednesday. What are the most effective ways to stop ransomware? And we explained firewalls and how they can stop the spreading. How Microsoft ships with firewalls, as does apple. But is it turned on? Is it configured right? Well, half the time, the answer's no. The other half the time the answers kinda. Okay, so that's what we covered on Wednesday, we went into a lot of details on that.

And then on Thursday, we went into the seven top things you can do to prevent ransomware and not have them hit you as well as data breaches. So it has been a very busy week, and the reason I'm talking about this so much as I really want you to secure your network can you don't have to use me. You don't have to hire my company. It really doesn't matter because you can do this yourself. And that's exactly what I'm doing in this training. I'm showing you step by step what to do. So you don't have to go online. Get millions of Google results. Get hundreds of thousands of YouTube results is you're searching to find out what's the best anti virus? What's the asked for ransomware or what's the best for spyware? What's the best for worms? What's the best for on and on and on.

It's all there. And I'm serious. This is I I'm sorry to beat a maybe a dead horse here. But there's still a lot of people that haven't taken advantage of this. And that might be you. So the way to do that goes right now to http://CraigPeterson.com. It's right at the top of my homepage.

Now, if you're a home user, I've had a lot of people ask questions. Is this right for me? And the answer is yes, it is because the same types of concepts that apply in a business most of those also apply to homes as well and home users. So you can check that out as well. As a home user, I don't care. This isn't to try and sell you, and you're not going to all of a sudden get a page that requires you to pay money. This is free. Believe it. And I know one radio now there are so many sponsored radio shows. So, many radios show that are trying to just plain old sell you something. I'm trying to help. It's real.

So check it out at http://CraigPeterson.com. I have helped over 5000 businesses. Now. It's probably in the neighborhood of 5500. I think it with securing their networks, getting them on the internet, making sure they have the right kind of presence. And they're all the way as you heard from the replay of one of these videos from this week. I've helped everybody from a small office, a home office all the way up through fortune 100 actually fortune 50 companies. So I know that this is going to be valuable because it's what I use with them. It's what I've used myself, and it's multiple layers of security. That's what you have to have. Just having an anti-virus package or having a via firewall isn't going to do any good. 

Just using the router and firewall that comes with your internet connection is nowhere near good enough right there. There's a lot to know and a lot to understand. And if you have any questions, listen, people, I'm here for you. I am. And I have so many testimonials from people saying that it's true. I you know, I should start recording some of them. But if you have any questions, there are two ways to reach me easily. And I'll help you anytime, anyway I can. I'll even do a little research for you online. If there's something that's specific to you. But you know what, 95% of the time it's not just you. Everybody has similar problems, but you can reach me via text. This goes right to me and my team 855-385-5553. So get out of paper and pen or get out your phone and write this down.

Email, you can just email me@CraigPeterson.com. If you want to invite me to speak at one of your events. I can do that. I charge for keynotes obviously, but I am trying to help out when it comes to all of these local companies that might need a little bit of a little bit of encouragement. Various groups. I speak to all of the time. Spoken many times everything from Rotary Clubs through a high tech council. I'm glad to help you out and glad to speak.

Again, 855-385-5553 that goes to me and my team and you can send me any question you want. And I'm more than glad to help out I have been there I have suffered before, and I'm more than glad to help you out 855-385-5553 and me@CraigPeterson.com. Make sure you watch these videos are going down tomorrow. I don't have them on YouTube. You're not going to find them anywhere. 855-385-5553 and http://CraigPeterson.com. Hey, have a great week. Fingers crossed. You don't get hacked this week, and I'll be back next week as well. Take care. Bye-bye.

--- 

Related articles:

Robocalls And Phone Scams Are All The Rage In 2019

Microsoft: Drag Internet Explorer To The Trash. No, Really

Unopened Copy Of Super Mario Bros Video Game Sells For Record $100k

Cut The Cable — Great Deal On Streaming “Stick”

Dad Fell For A “Tech Support” Scam

Two In Three Organizations Not Convinced They Can Avoid A Breach

Ransomware Gang Infects Customers Of It Support Firms

Amazon Filed A Patent Application For Tech That Could Link You To Your Identity And Job

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 14, 2019

It's another It's a Security Thing Thursday. Craig talked about how the bad guys can hack through using Wi Fi as they did to Five Guys burgers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/14/2019

Wi Fi Hack Five Guys Burgers

Craig Peterson 0:00
Hey, good morning everybody. It is a cyber security week. So it's a perfect week to have yet another cyber security thing. And that's what we're going to do right now. Talk about one of the things that has happened recently out there in the world that's really caused some cyber security anxiety. And we're going to start by talking a little bit about something that happened to Five Guys. Now, do you like Five Guys? I think, you know, they're my favorite burger place by far. There's no question about that night. I think that they understand burgers, but according to the California Attorney General's office, they received a letter from Five Guys which by the way you have to do if you have a breach and you have any customers in California. So if you have a breach and you're in New Hampshire as a business and you have one customer in California, 
you should check the law here because in sometimes it's a hundred  customers. Sometimes it's more or less. Varies from state to state. Isn't that fun?

But they informed them that the name, date of birth, social security number, address, higher date, termination date, and 401k contribution information had been stolen and it was affecting their employees. Now, they didn't say exactly how many employees were affected, but the company gave them a complimentary one year membership to Experian's identity works service. Yeah, Experian. I love them too. So keep that in mind. In this case, it said that it did happen because of one employee and that's all it takes. An investigation into the matter determined that an employee's inbox contained messages or attachments that had all that information in it. So have you ever sent for instance W2 information via email to someone else in the company? 1099 information, HR information via email? Well apparently the bad guys hacked their way into this email. Now, there's a lot of ways that they could have done it. One of them is via Wi Fi, and monitoring the Wi Fi. So let's say an employee is over at an airport, they're traveling, they connect to the airports Wi Fi system and they now access their email. There's a good chance a bad guy could be monitoring, could be fooling the email system and gaining access. I don't know that this is what happened to Five Guys that might be but when that happens, they have access to your email which means any of this type of private identifiable information could be stolen as well as bank account numbers etc etc.

So keep that in mind and also this week I talked all about Wi Fi and how to secure and how to use it when you're on the road that was on Monday. I have a special video up that you can access but you have to go to http://CraigPeterson.com and these videos these training videos it's all about the training I got hours that I did and posted this week all about the training you will find at http://CraigPeterson.com. But you only have a couple of days left before that training is taken down because I really want to motivate motivate you guys you got to get off of your collective butts and get it done. And those people who already watched the training and let me know how much you appreciate it. Hey, I appreciate the great feedback.

So http://CraigPeterson.com. Don't let you or your business get nailed by one of these Wi Fi vulnerabilities and I've got all the training for you all for free so you don't have any excuses anymore. Take care. Talk to you tomorrow. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 13, 2019

Craig is on with Ken and Matt on WGAN Morning News. They talked about hackers hacking the Nest devices and the Russians infiltrating US utilities. They also talked about how you can check if your password has been compromised using the Chrome extension Password Checkup and the website Have I Been Pawned.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Hackers Hijacked A Family’s Smart Home, Spammed Nuclear Missile Alerts

Chrome Can Tell You If Your Passwords Have Been Compromised

Report Highlights The Crazy Lengths Hackers Took To Infiltrate Us Utilities

How Hackers And Scammers Break Into Icloud-Locked Iphones

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/13/2019

Nest Cameras Being Hacked

Craig Peterson 0:00

Hi everybody, Craig Peterson here. I had a chance this morning to talk a little bit more about what I talked with Jim Polito about this a bit yesterday. But we talked a little bit more about the hackers and what's happening with them breaking into iPhones, we've got hackers who are breaking into Nest devices. Hey, if you've got any of their stuff, some of their security cameras, etc. You're going to want to hear what's happening. So that's what we covered this morning. And I'm getting a great response to these courses that I've put up. I mean, phenomenal. Really, I'm not I'm not making this up people. So if you missed them, make sure you check them because they are up today. All three of the initial training on security. It's no sales at all. This is entirely trying to help you out with securing your business network. You know it does apply to individuals as well. So you'll find all of that at http://CraigPeterson.com/concierge. You'll also find it on my homepage you can sign up for the Thursday webinar as well there http://CraigPeterson.com. All right here we go with Ken and Matt.

Unknown 1:29
7:38, WGAN Morning News Wednesday morning. The day after the storm. Day after the storm. Time now to talk to Craig Peterson, our tech guru. He joins us at this time every Wednesday to go over the world of technology. Craig Peterson, how are you sir this morning?

Unknown 1:43  
Hey that's me. Doing well.

Unknown 1:44  
Are you having bad weather over there?

Unknown 1:46  
You know we had a lot of snow and sleet to and I haven't really been out yet this morning to see if we got the rain afterwards. But yeah, there you know the birds are in and the bees haven't come out of their hive so I know it's not the best morning.

Unknown 2:00
Okay, so let's talk about some tech stuff. Um, so I have a lot of passwords, and I always worry about the being compromised. Can chrome help me out on this? I do use Chrome. 

Unknown 2:10
Yeah, Chrome is one of the better browsers out there are a lot of people have been concerned when it comes to Chrome and security, and how much is Google trying to, you know, monitor what I'm doing, etc, etc. And although Google does want your information and obviously does sell some of the information, it's interesting that they are trying to keep you safe. And I think most of our listeners would like to know about, you know, some of the details behind there but we won't get into that today but into what you're talking about here Ken, I think is really important. There's a couple of different websites out there that have been kind of collecting over time. Some of the breaches you know we mentioned there's a 750 million record file that was released a couple of weeks ago that contain people's credentials. And since then, there have been some other bigger ones. about one and a half billion people's information is out there on the web. Now, we're talking about the dark web here when I'm when I mentioned the web.

So what a bad guy does so that you understand how this works is they have a username, they have a password. Now, if they break into a new website, and the website is hopefully fairly secure least the passwords are encrypted, they'll steal the password database, and then they'll run through all of these hundreds of millions of records and try every known password. So it's important for you to not use a password that anybody else has used before. And that's what Google has done here now. There's a new Chrome extension that's called Password Checkup that you can install on your Chrome browser. And then what happens is if you go to a website, and you use credentials on that website that are known to be breached, and the database that Google's uses over 2 billion records of breached passwords and usernames, so if it's a known breach, password or username, it will alert you right then in there, which is really great. So it's called Password Checkup.

But I want to mention one other thing because Ken you mentioned you're concerned about passwords and security and that's a website called Have I Been Pawned and this is from an Australian guy out there who put it together and it will tell you much the same information as Google but it'll also if you put in your email address, it will also tell you if your email address shows up anywhere on the dark web in one of these hacks. So what I'll do is everybody that's on my SMS list. I'll text out a link directly to both of those today when we hang up so that everybody has it. You can just click on the link go to the website you can download the Password Checkup plugin you can download the Have I've Been Pawned, well not download it, but you can go to the Have I Been Pawned website and I'll send you direct link.

So if you want those, text me and do it right now, so you don't forget. Get out a piece of paper and a pencil. It's 855-385-5553 and I'll send you direct links via text when we hang up. 855-385-5553 but I think this is really good news for people who use Chrome and who want a little bit more security it's really good stuff Ken. 

Unknown 6:00
We're talking to Craig Peterson, our tech guru who joins us now as he usually does on Wednesdays, to go over the world of technology. Craig mentioned text messages. I remember a while back a lot of people in Hawaii, he got a advanced warning via text message of nuclear holocaust. And apparently this is now happening again, this may be smaller numbers of people, or what have you. Are people going to be hacking into my phone to basically tell me of the coming apocalypse?

Unknown 6:27 
Well, this is an interesting problem, because in Hawaii, when it happened was somebody messed up in the in the state and it came out as kind of a federal alert and people probably remember that the nuclear missiles were flying from North Korea and were going to strike any minute and people kind of freaked out. Well, there are of course now smart devices. And Matt, you mentioned that you've got some of these Echo devices like I do, right. And Ken do you have any of those in your home as well?

Unknown 7:00
Yes, I renamed it computer. Computer, what's the temperature outside and it goes by the way, sometimes it just lights up on its own which worries me a little bit.

Unknown 7:12  
What color does the light up?

Unknown 7:14 
Sometimes blue, sometimes yellow.

Unknown 7:15 
Okay, well the blue is because probably it thinks it heard you say the name. Yeah, say the name. And yeah, so that's probably what that is. But here's what's happening. More and more devices in our homes have built into them Alexa or Google Home or some of these other technologies and they are hackable. Now the Alexa, you know, these little Echo devices, not so much the Google Home the Apple HomePod, not so much. But in this case there. There's a story that came out this week and it was about the Nest security camera. Now interestingly enough Nest has been in the news quite a bit recently for major security problems, including allowing anybody that work that Nest to look at any video stream that is ever been recorded by any Nest camera, right.

It's kind of scary when you think about it, because I kind of liked the technology behind Nest. And what the heck are they doing giving everyone access to every security video ever. They've kind of tighten that up a little bit. But in this case, somebody hacked their Nest security cameras and they gone online and this poor family in California started getting this alert that a nuclear war and broken out missiles were headed for multiple US cities and this family California wasn't alone we know about another family this one in Texas where their Nest system was hacked and used to threaten to kidnap the baby's family. In Canada the reporting it as well that some people have been hiring hackers to break into Nest and Wink and and even tried to break into some of the Amazon devices belonging to another family.

But it's it's a little bit of a scary world so if your Nest or other device starts warning you about global nuclear war it's probably not true. But little warning systems that are on your phone and do you guys get a warning for instance about this storm that was coming?

Unknown 9:27
yeah exactly why do weather.com I got Well that's all you got a weather okay well there are alert systems in place just like the one in Hawaii it's a warned about the nuclear missiles but there are alerts systems in place that will send you things about emergency situations in the area. Some states have amber alerts to go out automatically to completely different system so we're not talking about those devices being hacked at this point it looks like Nest has the most vulnerabilities.

Unknown 9:58
We're talking to our tech guru Craig Peterson who joins us every Wednesday at 7:38. http://CraigPeterson.com. If you want to go easy as box anytime you want. So you know we're waiting for Robert Muller's report which we could get in the next year or two. However, you know there are some some evidence of Russian hackers infiltrating our utilities. What's the scoop with that?

Unknown 10:25
I love Russians. I watch the Americans. One of my favorite TV shows.

Unknown 10:32 
That was a great TV show. I hated the ending of that.

Unknown 10:37
I'm on season four so.

Unknown 10:39
Although it's probably the most realistic ending they could come up with. To be honest with you, though. I mean.

Unknown 10:45 
Oh shut up both of you.

Unknown 10:48
I can't hear you. Yeah, there. There are a number of hack attacks going on right now. The Russians are seriously considering using the internet as a first attack vector against the United States, they're also saying, Hey, we're gonna use it as defensive mechanism. We'll see what ends up happening. But there is a ton of hacking going on. And that's kind of the bottom line about all of this stuff. They are breaking into some of our phones. iCoud locked phones, you remember when people were stealing iPhones back in the early days, just grabbing them at coffee shops, right? And it got to the point that Apple did something about it, which is if you have Find My iPhone turned on on your iPhone, which everybody should do, turn that on. If your phone is stolen or your iPad is stolen, there is almost no way to recover that phone. Apple can unlock it, but that's it. Nobody else can. And so what's happening is the bad guys are coming up to people holding them a nice point or guiding point and saying unlock your phone and turn off Find My iPhone.

So the bad guys get a little bit smarter about it so that they can then resell that phone out on the black market or use it as they might want to. There's some rumors about the ability to still break into the newer iPhone 10. And you know, life goes on, right. But it's interesting to see some of the bad guys now on the streets trying to break into iPhones. But so you do it the old fashioned way. They're mugging people.

Unknown 12:32
Indeed. All right. Craig Peterson, our tech guru joins us on Wednesdays at this time to go over the world of technology. Craig, thank you, sir. And we will talk to you again next week.

Unknown 12:44
Gentlemen, take care. Thanks.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 12, 2019

Craig is on with Jim on the Jim Polito Show. They talked about the Google Chrome feature and website that can help you check if your password has been compromised. They also talked about how hackers are doing to infiltrate US utilities.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Report Highlights The Crazy Lengths Hackers Took To Infiltrate US Utilities

Chrome Can Tell You If Your Passwords Have Been Compromised
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/12/2019

How To Check Your Passwords And Why It Matters - WSJ Article About Russian Attacks On US

Craig Peterson: 0:00

Hi everybody, Craig Peterson here. Hey, I hope you're enjoying this training I'm doing this is invaluable I think. I'm giving away my best stuff absolutely free. This is just phenomenal. It's up to this week that will be taking it down because I don't want to present information that's out of date or old. So I may do something in the future again about this, but we are going through the basics this week. Stuff you need to know to keep your small business or even your home safe. But I'm really trying to help out the small business people and it's all free. It's absolutely free. The training is there. I'm not upselling anything. On Thursday, we've got a live Q and A live webinar so make sure you check it out if you haven't already. http://CraigPeterson.com. It's right there on the homepage.

Hey, this morning I talked about a couple of really cool password checkup techniques you can use some free stuff and I'm sending that out in fact everybody that's on my SMS list. If you want to be on that by the way to get the alerts about the latest hack when it's really important. I don't send out, there's hacks every hour every minute in fact. Just the big ones that might affect you. Make sure you text me just text the word Craig or your message or your question or anything because this is me This is my phone number 855-385-5553. So just text Craig to 855-385-5553.

If you do that you're not going to be even letting me know that you did anything because guess what? It's automated if you say Craig but if you say something else then it's not automated but we'll get back to you. We'll answer your questions or problems. I'd love to do that again. Just text my name Craig.

Now I will also send you this information if you want it so let me know, on the password checkups stuff. And that's the main thing we talked about. But we also talked about an article in the Wall Street Journal that just came out about the hackers and, and some implications of it that I really hadn't thought of before until I was discussing it with one of the guests that's going to be on my FBI infra guard webinar this afternoon. So lots of great stuff today. Have a great day. We'll be back tomorrow. And don't forget. Get that training. http://CraigPeterson.com.

Unknown 2:37
Here he is Ladies and gentlemen, the man who helped invent the internet. Now like Al Gore, who took credit for it. He actually wrote code that you don't realize is helping you while you're on the internet. Our good friend tech talk guru Craig Peterson. Good morning, sir.

Unknown 2:56
Good morning, Jim. Waiting for some snow. Winter is coming.

Unknown 3:00
Yeah, you love you love that. You. You. You Canadian you. You love it. You don't care. You know, it makes no difference to you Craig Peterson whether it's you know what I mean. Like when you hear that forecast, you're like, Okay Yeah,

Unknown 3:18
It's like the winter vortex, right, that came down. All the complaints about. I remember days were not high when I was walking to school is 40 below zero. Come on people. Grow up.

Unknown 3:35
That's true. Hey listen, I'm with you. Suck it.

Unknown 3:37 
Well you get used to it. I have a friend who works with me who is now down in Florida. And he's he's actually from right outside Boston, and it gets to 60 degrees and he's dressing in layers now. So I guess it's just a time thing you know, we were down there with our kids and school was still open. No one was coming in and our kids are out there running around and bathing suits every everybody else's all bundled up. So I guess it can happen.

Unknown 4:13 
I will never, I would never acclimate to Florida. I could never do it because I'm. I'm always hot. I mean, but that's just me. But hey listen it is it is what it is. Pretty soon we'll have virtual reality. You want to feel what it's like and where Craig Peterson went to school. You just press a button put on your headset and your suit and it will be like you're walking to school barefoot in the snow with little Craig Peterson. So.

Unknown 4:37
Yeah, that's coming. You're right because we've we've already got some of this stuff it isn't where I had hoped it would be by now but when you're talking about things like the Oculus and these 3d virtual reality glasses and and now there's suits you can wear it or have you seen the gamers use things but they're thinking chairs for quite a while that that will kind of you know vibrate and stuff when stuff happens. Now there's a suit. It's kind of like a vest they can wear and it squeezes them. If they got get shot, they feel it hit them in the back, or wherever it hits them. It's coming. But it's really slow. I guess most people really aren't that interested in it. And I've tried it before. And, kind of a whole home, at least for me. But, you know, us 30 year olds, we're just not as interested as the kids does.

Unknown 5:27
I love that. We're taling to Craig Peterson. And at the end of this segment, I'm going to give you will Craig's gonna give you a number and if you text my name, you'll get a lot of great information from Craig free, no obligation. He doesn't sell your name, and he doesn't try to sell you anything. And standard data in text rates apply. Okay, this caught my attention Chrome, the browser, Chrome can tell you if your passwords have been compromised. Is this difficult or could the average person like me figure out how to use this because I'd like to know if my passwords have been compromised.

Unknown 6:00
Yeah, it's a really good idea to use some of these password check up programs. You know, I've recommended one password many times to a lot of people. And in here on your show as well. It has this built in so it when you generate a password or you type on in it, double checks to see if it's been hacked or not. And there's a website out there, I'll text it out to everybody. After we get off the air. Everyone on my text list called Have I Been Pawned and that now allows you to type in your password and see if it's a known password that's been stolen before. Now why would you want to know that right? If you have a bad guy that's trying to break in what they do is they use these huge databases. We talked about one a couple of weeks ago, 750 million records in the database. And now by the way, there have been more of those databases released over the last two weeks, and were over 2 billion now. So what happens is the bad guys grab a copy of a database from some website that they've stolen it from. And oftentimes, it's encrypted. So your password has some protection on it. So what are the bad guys do they use the passwords that they have seen before out there and they try them all because it doesn't matter if they're trying to log into the website yet they're just using their computers to figure out what your password is.

So if you're using a password that is known to have been stolen previously they will test that against the database then they've got your password and now they try and login. So that's how it all works. So when you're talking about using something like Have I Been Pawned I think it's important to do that but having something like this is called password checkup. So I'll I'll put together a little thing. And I'll send it out here to everyone on my text list afterwards on password checkup, and the other website to have as many times and what happens is you you install that on to your Chrome browser. And it will now tell you if you're using a username and password combination that Google knows to be unsafe and using the same database. Yeah. Isn't that great?

Unknown 8:31 
That is good. That is good. Right up front, you'll know. Right up right up you'll know.

Unknown 8:37
Yeah, like so what will happen is it'll, it has a little pop up, it's going to be in your browser bar and it's going to warn you if you're using a password that's been known to be compromised, it'll have a pop up that comes up when you visit the website and try to use that password it will say change your password and it'll allows you right now you can say I ignore the site or you can go ahead and change your password on that site. But Google saying they have a database of 4 billion credentials that they know have been compromised, and various data breaches. And it uses those to check and see if you're legit or not. So I love that that's so important Jim.

Unknown 9:17
We're talking I'm with Craig Peterson, our tech talk guru. He is the man with the plan. And again, we're going to give you a number at the end of this segment. If you want to get more information about what he's talking about today.

Let's go to US utilities. We when we worry about hackers and cyber war, I guess I guess our utilities are Ground Zero. You knock out the utilities you don't need to roll tanks down Main Street. You've had a major impact on a country. I mean, you could defeat them in a war. So Russian hackers I guess are going after the electrical grid. Wall Street Journal had a report Friday that talked about their techniques. I know you're concerned about this. Why don't you elaborate?

Unknown 10:08 
Yeah, it's a very big deal. In fact, I'm holding a webinar this afternoon for the FBI Infragard program, talking about some of this stuff. But yeah, critical infrastructure. So important. So think about what could happen in a power failure situation. And what we're gonna be talking about this afternoon is it goes beyond much beyond what most people think about because obviously, you've got hospitals, but you've got first responders, but you've also got the guys and gals that that drive the trucks, it's scheduled the loading of the trucks. If there's no power the phone's not going to get shipped, right? It goes on and on.

And when we're talking about these types of hacks, there's another thing that can happen. Think about what we apparently did along with the Israelis to the Iranians we went ahead and we got a virus into the the Iranian plant that was manufacturing the necessary steps to make a nuclear bomb and all of these devices that were in there, but what are we gonna do? We're gonna just shut them down because all they have to do is turn them back on, right? If we shut off the power to the plant, then they just restore the power Yeah. So what we did is we made cold understood the centrifuges and understood how to play with the centrifuges and play with a monitoring system. So the Iranian operators were sitting there and everything looked normal Jim. It looked like it was doing its thing it was making this powder cake that was going to be used for nuclear war. I mean, you know, power plants not they've never done that.

And what we did is we made it look normal and we had those centrifuges, very expensive, very fancy, not like we had in our chemistry lab. We made them self destruct. So we destroyed thousands of these things. So when you're talking about the Russian hackers and what the Wall Street Journal was talking about him and what we'll be talking about later on today, in the Infragard webinar, we're talking about not just turning off the power but destroying the infrastructure Yeah, getting it to self-destruct.

Unknown 12:30
Yeah. Getting it to self destruct.

Unknown 12:37 
And if we lose, like these big transformers we have, and we talked about EMP, is the electromagnetic pulses before that happens naturally, as well as man made, it could take 30 years for us to restore all of our power here in the United States. So it's Yes, it's a very, very big deal. It's something we need to be conscious about.

It's something we need to pay attention to and I'm going to send out a text after we get off the air as password checkup plugin for Chrome and also the website you can go to detect your passwords . And then if you go to my website as well I sent out a text I think it was yesterday morning I have four training sessions this week absolutely free about Do It Yourself cyber security if your business yeah if your business here's exactly what you need to do. So I talked yesterday about securing your Wi Fi and that video's up you can watch that. I talked today about your firewalls what you need to do there. I'm talking tomorrow about the right kinds of backup, 3-2-1 backups and also what you need to do for disaster recovery. This is my best stuff, Jim. It's absolutely free. I'm trying to help people out businesses out because this is really happening Jim.

Unknown 14:00
That's why we have you here, folks. Craig Peterson. Get ready to write this number down and get ready to text my name to get this information and more from Craig Peterson. Craig. The number is?

Unknown 14:12 
855-385-5553. That's 855-385-5553.

Unknown 14:21
Just text Jim to that number. Jimmy if you like. He'll answer to both. Standard data and text rates apply. He will not sell your name. He will not try to sell you something. You'll get great information like this. And as Craig said during this segment updates when things are going on, and things are happening out there. You will know first, Craig, thank you so much for your time. We look forward to talking with you next week.

Unknown 14:50
Hey thanks, Jim. Take care.

Unknown 14:52 
Take care. Bye bye. All right, when we return a final word.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 11, 2019

Craig is on WGIR at the Auto Fair listener lines with Jack and Justin. They talked about Lowe's Iris smart home technology shutting down on March 31st as well as the things you can teach your Amazon Alexa.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Lowe’s Smart Home Device Platform Shuts Down March 31st
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/11/2019

Lowes Iris Smart Home Technology Dies - Amazon Alexa Tricks And Tips

Craig Peterson 0:00
Hey good morning everybody. I kind of have a voice left that we get this bug it's been going around. Thank goodness I don't have the flu but I'm kind of congested and here I am making videos doing all of the training this week. I just finished the firewall video explaining what they are, how to use them, when you should turn them off, when you should turn them on, how to use the free firewalls in your computers. And I was just struggling through this. It's I guess it's that time of the year right everything's closed up and you're indoors who knows maybe it's even an allergy but anyhow. So I'm a little clogged up today. What am I gonna do? What am I going to say well this morning I was on with Mr. Jack Heath and we've talked about a couple of technology things when it comes to smart homes Lowe's and if you've seen their Iris displays that's about to change. That's Lowe's whole foray into the smart home technology platform. And we also, this morning, talked about Amazon and the Alexa and the Dot and, and Justin got a new one. So talk a little bit about how I use them in my home and what Justin thinks of them as well. So here we go with Jack Heath.

Unknown 1:16
Hey, right now Craig Peterson our Tech Talk guy. And Craig joins us for a few moments on this Monday morning on the Auto Fair listener lines. Craig I guess maybe the Smart Home app by Lowe's may not be around much longer.

Unknown 1:31
Hey, good morning, Jack. Yeah, this is an interesting turn. But it's something that could be pretty easily predicted. You know, in every industry, when it starts out, there's a lot of players. We had hundreds of automobile manufacturers at the turn of the last century and goes it narrowed right down as there was consolidation. Well, Lowe's you might have noticed has something called Iris. You've probably seen it on the end caps at the local Lowe's stores. And this was their answer to home automation. And it was a pretty decent little package but you know, I kind of kept an eye on it and never saw anyone standing there looking at it. And apparently Lowe's has decided that maybe having their own smart home technology brand isn't the way to go. So they have announced that the app for Iris as well as their devices are going to be shut down on March 31, Jack, and that means that they're going to be reimbursing some people. They will be giving out some gift certificates to people. It looks like Samsung is going to kind of step in and trying to help with this whole transition, maybe take over some of the devices. But as Justin and I were talking about during the break here is Amazon man they seem to be winning this game and Lowe's is obviously lost.

Unknown 2:54
Interesting. Hey are you just as you were saying earlier what would you say you have in your home now Justin? 

Unknown 3:00
I got that Amazon Alexa Dot thing. I got a subscription to something. They sent me one for free. So listen, I know Bezos probably knows everything about me at this point but I don't care. I love the thing. You can spy on me all you want.

Unknown 3:14
Well it's just the pictures I think he's after but the other story. It doesn't spy on you. It's a real interesting technology the way it's set up. But basically when you give it the wake word, and by the way you can change that wake word. It doesn't have to be Alexa. It can be computer. It can be Amazon. You can change that. But when it when you give that wake word that's all local. It is not sending your data. It's not sending your audio up to the cloud for people to spy on. It is being processed locally. And then once it wakes up and start sending the data to the cloud. But Justin I agree with you. I've got some of these Alexas in my house too. I've got the show. I've got the Dot and I have pre-ordered the Amazon Alexa for the car. It's a little thing that's going to sit on the dashboard. But I don't know about you Justin. I have found it to be really really handy. I use it to tune into WGIR. I use it to listen to music. I get the weather report. I get a recap of the news. It's incredible.

Unknown 4:21  
So here's what I do Craig because my my kids don't listen to me. But the listen to a machine. I set a reminder to tell it to tell my daughter it's time for her to go, you know, get the shower at night because she's stuck on her phone. But when she hears Alexa, yell at her. She'll do it. It's like wow. Alexa could parent for me now too it's great.

Unknown 4:41
Alexa. Yeah. Wow. What's the next one? What is next? All right. Craig Peterson. Good stuff on this Monday morning. Thanks, Craig. Joining us in the Auto Fair listener lines.

Unknown 4:51
Take care guys.

Hey, a reminder, by the way. If you are trying to do computer cybersecurity yourself, for your business where you're just trying to keep them safe. Right. You know, you're not trying to become an expert or anything. That's what I'm doing this week. So make sure you are on it. Go to http://CraigPeterson..com. Sign up right there on the homepage. I'm giving away my best stuff for free. This is not a pitch fest. http://CraigPeterson..com,right there at the top of the page, click the sign up button. Sign up for that webinar will tell you about all of the other stuff we're doing this week and get you a little bit more information. Let's put it that way about what to do and how to do it to keep them safe. Take care. We'll be back tomorrow. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 8, 2019

Cryptocurrency is in the news, again.  I am sure you all know by now what I think of cryptocurrency as an investment. Listen in and you'll learn more of why I came to that opinion.

Browsers -- which one is your favorite?  For me, it's Epic which is a more secure browser based on the Google Chrome platform. Today, I am going to talk about some plug-ins that you can use to help keep you more secure!

The FBI seized a lot of counterfeit bills this week.  But there is an interesting twist to the story so Listen in.

Utilities are under attack.  Listen to hear about all the "unique" ways that Hackers use to break in.

Have you heard of Iris?  That is a Lowes brand smart home brand, well they are shutting it down. Listen in for more information if you are a customer with these devices. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/09/2019

Counterfeit Cash And Cryptocurrency - Lowe's Shuts Down Smarthome Iris

Craig Peterson: 0:00
Hey, another Saturday, another radio show. Craig Peterson here, enjoying our new intro music. Hopefully, you like it too. Kind of lively gets the blood flowing at least for me. Well, today we're going to be talking about a few interesting things. Have you heard one of these warnings come on your phones? They have a number of them now. For instance, they have warnings about you know, big storms coming your way. You probably heard about what happened in Hawaii with their nuclear warning. Wow. Hijackers are involved now. So we'll talk about that. What these hackers are doing.

Hey, have you invested in cryptocurrency? Do you know when I say invest? I'm just joking, right? Because cryptocurrency is just one of the silliest investments ever. Not that I give investment advice on my show/ But wow do we have some news for you. Yeah.

Chrome, this is fantastic if you use the Chrome browser and I do use it but I use Epic which is based on Chrome. You can run some of the Chrome plugins and is much safer doesn't doesn't monitor you like regular Chrome does. I gotta tell you about this wonderful tool now that you can plug right into Chrome and it's going to help you with your passwords and tell you they've been compromised. I love this one. Our friends at the FBI. This is an LA Times article and they seized a whole, I'm looking at it right now, a ton of fake $100 bills. I'll tell you about that and how they found out what was going on. And yes, they were using Bitcoin to buy them and sell them but Bitcoin and cryptocurrencies are not untraceable and proven again by our FBI and hackers and scammers how they're breaking into iCloud locked phones. And a very interesting report that is in the Daily Caller and up on my website as well about the crazy links that hackers have taken to infiltrate US utilities. And Lowe's, if you bought their Iris stuff. You got to hear what's happening with Lowe's. Now, all of this, of course, is up on my website. I did not send out the regular email of this morning. This morning's email was all about what I'm doing this coming week. I had hoped to get it done last week, just too many things came up. You know how that goes. Right? You have to take care of your customers, you have to take care of your family. And that's what I had to do last week.

So this week is the training course. You are going to love this, okay. It really is going to change your life. I'm giving away some of my best stuff for free. I'm going to teach you some things you can do yourself. And it's aimed at small businesses, medium businesses. Even larger businesses can take this information and run with it. But hopefully, they have the right people in place that are security people that know what they're doing. But if you heard me this weekend, heard my podcasts you heard about this huge shortage. 3 million cybersecurity workers short. That's guaranteed now to get a lot of people saying that they are cybersecurity experts hanging up their shingles. And they don't know what they're doing. Guaranteed. It's going to happen. Happens every time. I hated it back in the 90s when people said, Hey, I'm an internet expert. I can build your website and they had no idea what they were doing. And they hurt the whole industry. They gave us all a bad name. And I'm afraid that's exactly what's going to happen with cybersecurity.

Anyhow, DIY, you can do it yourself, you'll see a sign up on my homepage at http://CraigPeterson.com. I'm going to walk through this with you, you are going to love it if you've already been hacked. If you're concerned about getting hacked if you are already wearing 100 hats at work. And this is a security thing is just one more hats you have to wear. You have to attend this training this week. It's free. Like so much stuff that I do. Obviously, I have to pay bills, right? So hey, if you want to hire me, that's one thing. But this is the free training with my best stuff, you are absolutely going to love it. So if you did not get these articles in your email this morning. And for that, I apologize. Because I wanted to focus in on the training. And it is so so important to you. But you can find all of these articles up on my website, there's always at http://CraigPeterson.com.

So if you scroll down below the sign-up, because today, there's a sign up on my site, and it'll be up for a few more days, and I'm taking this stuff all down, right, this is not going to be up forever. If you miss it. This week, you are going to miss this training. All right. But if you scroll down on that homepage, you'll see today's articles. Because I can guarantee you with only about 20 minutes left. In today's show, I'm not going to be able to get into a whole lot of detail. So if you want to find out more, that's where you go. If you want to find out about these pieces of training because I'm going to have different trainings coming up. The odds are almost 100% that this training I'm about to do will never be done again. Okay. Because it's always different. There's always more things to know and learn. But make sure you're on my email list. http://CraigPeterson.com/subscribe or you can just text me right now get out a piece of paper and a pencil if you want to write down that number. Because this text number is my number. And you can always ask me questions. I'm always available to help we do so much stuff for free for small businesses and home users. That it's, you know, it's open to you anytime you wanted. So write it down right now. Hopefully, you got that pencil and paper in hand write down 855-385-5553 or you can text to it right now. And that way you can remember this, go back in your texting history. 855-385-5553. If you text my name to it, just text Craig, I will sign you up for my text alert. And those come out to remind you that my show is live on the Air. I also will text you when there's something big happening in the security round that you need to know about. Because the regular news sources sometimes take a week or two to catch up with the stuff you need to know.

So it's pretty rare. I do this maybe every couple of months or might be a text on that. But I'll let you know when something critical is happening. But I only let you know if you reach out to me. And the easiest way to do that is to just text me 855-385 5553 and text my name Craig and I will be more than glad to answer any questions or help you with any problems that you might be having okay? You don't have to be my customer. We will help you with you know, we're not going to spend a week with you. But we're going to help you we're going to send you on the right track.

So let's talk about some of these articles for today. Well, we're going to start with Lowe's because this is something we're going to see more and more of in the future. And you know, just like any industry, any business that's been started historically, you have a lot of people in it. And then it kind of settles down to a few big players and they buy out the smaller players. Well, we're seeing that shakeout now in the smart home business. If you've been into Lowe's or Home Depot, you've seen Smart Home stuff. In fact, in the Lowe's store, it's usually right by the Service Desk by that little counter where you return things are asked questions. And right there they have a whole bunch of different smart home devices that you can use. Lowe's also had their own stuff, and I've seen this on the end cap of over by the electric section where you have the wires and the switches and the cables and all the stuff that you might need to use in your house. You got to replace a socket or you know, whatever it might be. It's right there. And it's called Iris. I-R-I-S and you might have seen it there before. I certainly have. I poked at a little bit. But I never bought any of their stuff because I knew there'd be a shakeout and I wasn't sure that Lowe's is going to win it. And I never ever saw anyone else looking at that display.

Now the stuff up front where they've got some of the Amazon Home stuff in the Google Home stuff. Yes, I've seen people up there, but never looking at the Iris stuff. Well, Lowe's tried to become kind of the main player in smart home technology. And that's what I was all about. It was all integrated. It was all designed to do all of the things you'd normally want to do in your home. But it did not make Lowe's enough money. It just really wasn't successful. And Lowe's last November said, Hey, we're going to get out of this category, at least with our own product. And it has now announced that it is completely shutting down Iris, your app is not going to work as of March 31, 2019.

So if you bought this Iris stuff, the app's going to go away. But I've got a little bit of good news for you. Make sure you upgrade the firmware in your devices and in the app because it looks like what they've done is they have partnered with Samsung and Samsung is going to be working with them to help take over those Iris products that you already have. So it stopped charging paying customers as a January 31. So should not have received any more bills from Iris for monitoring or other things and is issuing visa prepaid cards to customers to help them migrate to other smart home platforms. So keep an eye out. The good news is you're going to get a few bucks out of Lowe's most likely if you've registered. And they also have some other gadgets that are using Zigbee. And I've had the founders of Zigbee on my show before. So if there are Zigbee compatible Z-wave compatible, or you can switch to the Samsung ecosystem. So you have some options if you're interested in doing that.

But again, the big players right now it looks like Amazon's winning this game. Google with the Google Home has some nice stuff they're not winning. Philips is now using and tying into the Amazon Echo and all the whole Amazon infrastructure as are a number of other vendors. We saw that at the Consumer Electronics Show this year where really Amazon is starting to appear almost everywhere. So that's really really good news. I think for all of us. Finally, the big shakeout might be happening and that makes you feel a lot more comfortable when it's time to buy things.

Speaking of buying things. Let's talk about this counterfeit ring and
interesting how do you promote yourself if you're a counterfeiter? Well, some of you know that I run the webinars for the FBI is Infragard program and I get different guests and, you know, I in pre-interview them, I talk with them, I have them do presentations. I do q&a with them. Right? I'm kind of in the middle of all of that stuff with the FBI Infragard program anyways, right. A little bit of an FBI insider thing, I guess. But obviously, they don't tell me anything right there. Well, they don't tell me anything that's like a secret or underway. But I do get a little bit more information the general public does. And I attended a briefing. And this was with the secret service where they were talking about shutting down a nefarious dark webring. And this ring was selling drugs online, it was selling just all kinds of things. You can find prostitution, and find everything out there on the dark web if you look for it. And they were using Bitcoin, the bad guys, in order to be untrackable, untraceable. And guess what? Of course, you're not. Yeah, there is certain degree of anonymity in cryptocurrencies. And I'm going to talk about the negative side of n Just a minute. But there is also a way to really track people and make sure that, you know, you can kind of police it. And in fact, that's what they did. The Secret Service was policing it and they did find this ring and they did get convictions on it a very interesting how they did it, and what was involved with it.

Now, we have a story that's coming out of the LA Times about a secret service agent, his name is Matthew Britsch, I guess. B-R-I-T-S-C-H. And he went online and started looking for major counterfeiters. And in case you didn't know the Secret Service, besides protecting the president handles counterfeiting cases as well.

So he was online looking for counterfeiters trying to figure out what was going on. And so he went out into the dark web and was out there trolling and there are a lot of police organizations even down to local police departments that spend a fair amount of time looking for bad guys on the dark web. They look for and catch pedophiles and counterfeiters and other things and this story is about a counterfeiter. Now he found this counterfeiter who went by the name of Billmaker, not very original I guess but that was his online persona and he promised high quality hundred dollar bills and he had a money back guarantee. He even had thought of eBay here or Etsy he even had reviews out there from fans that said his work was excellent That was really good and so apparently this the Secret Service agent said well let's give this a shot right. Here's a guy one of the reviews said very good quality and got here quick. Then other one said all passed with no issue whatsoever fresh clean bills. Billmaker's, a five-star guys the Secret Service agent he wanted those five-star reviews to help them sell more bills that were clearly his goal. So the Secret Service agent bought the bills and in September 2017 he purchased the four fake hundred dollar bills for $120 in Bitcoin which is this online cryptocurrency. Of course, the idea is, hey, bitcoins anonymous, and I'll be able to do it and everything's going to be just fine, right? So he'd been carrying on as it turns out for quite a while because these counterfeit bills arrive right on time. They were as good as promised. And when the Secret Service got their hands on them, they examined them and they found these bills were a match for about $4.1 million dollars worth of other $100 counterfeit bills that the Secret Service had found.

So, this guy named Billmaker, the nation's most prolific domestic counterfeiter. Isn't that amazing. So that September 2017 purchase sparked this nine-month investigation where they poked around more in the dark web they found more cyber-savvy criminals are using online bazaars to buy and sell more these goods from illegal firearms and illegal drugs, illegal identification. Stolen cars even they poked around but it's really interesting because I love this quote these guys were right out there quote right in the open it's all there for sale. But while it provides some anonymity to criminals, it provides anonymity to law enforcement. They can't tell who they're selling to and so we went fishing. Isn't that interesting?

So the Secret Service has made more than 15, 15 actually almost 1600 counterfeiting related arrests last year seizing 204 million and phony bills. Banks and retailers collected in addition 100 and $7 million and fake bills. It used to be these artisans who made carefully forged bills on large offset printing presses kind of like the way the federal government does it. Nowadays these counterfeiters are relying on computers scanners laser printers and they use the dark web to sell it. So it's interesting there's a lot of detail and how it happened and it's good to know this if your a security professional. In fact I there's open jobs I wanted was a Thursday I guess it was I do a podcast in case you don't know you can sign up at http://CraigPeterson.com/iTunes and you'll find them right there. http://CraigPeterson.com/iTunes. But I do a podcast called It's a Security Thing. And it's a brand new podcast. And I talked about specific security interests. You know, if you're a security guy if that's what you do as part of your job, and I was talking about these cyber crimes that are now advertising online paying $700,000 to a million dollars a year to hackers, some very serious money so they're really going after it.

And in this case, Billmaker was caught and they're using the US mail, which made it very easy for the Secret Service to find who he was. And they said they were, by the way, very impressed with the quality of the work that he had done. They had a pretty good fake security strip on them. They even felt like they were real. There's pictures in this article up on my website http://CraigPeterson.com of these bills. And the picture of the guy who was making them as a young guy would guess his early 30s based on the picture, but very interesting, interesting stuff at Oklahoma City.

Wow, we are running out of time I got to talk about this whole thing around the cryptocurrencies as well because I know some of you have bought them because you've told me. Now You already know I don't give investment advice on this show. There's other shows on the stations, another podcast, they give lots of investment advice, most of which I take with a grain of salt especially when it involves technology. But when we're talking about cryptocurrencies, yes, it's
the future there's no question it's the future. That's how things are going to shake out. But we are so early on now that I have refused to put any money into cryptocurrencies. I think it's absolutely insane to do. They are so volatile. Look at the money people have lost just this year. It's really, really nuts.

So when I saw this article this week from Gizmodo, it was a week ago, it was Sunday. So as of tomorrow, it's been a week a company in Canada is one of these crypto exchange companies. And there's lots of them, these are the places you go you give them good old American currency that you can wire in from PayPal or from your bank or on your credit card and they then turn it into the cryptocurrency of your choice. And that might be Bitcoin. There are many other cryptocurrencies out there and they then send you the cryptocurrency. Now it's kind of complicated. You have to have a wallet, these crypto exchange companies can hold your currency for you. Some of it's in hot stored some of it's in cold storage. There are passwords involved. There are big keys involved. That's what it's all about. Right? And that's part of the reason I don't trust it. Well

This crypto exchange called QuadrigaCX and if you had money in there. Listen up. QuadrigaCX has about $200 million of people's cryptocurrencies that they are holding. Its founder's is a 30-year-old guy who went to India and died in India. Okay, so that's bad, right? The CEO of any company dying it's a bad thing because all the company goes through a bit of a slump. Oh, no, CEO died CFO died, whatever it was, but in this case, the founder and CEO died and you know the slump you kind of expect but it'll be back on its feet, right? Well, in this case, Mr. 30 years, smarty pants held the keys himself and did not have anyone else with any access to the keys. So this exchange was holding roughly 92 million US dollars in Bitcoin. 1.3 million of Bitcoin cash, almost a million in Bitcoin cash SV. It had Bitcoin gold that had Litecoin and had Ether, you've heard of that, I'm sure if you're really into this. So totaling about 150 million, according to the affidavit and apparently, more as well, that brings it up to close to $200 million.

So there was a filing in Canadian courts last week about this saying bankruptcy. No one else has the passwords for it. So basically, we're talking about at least 140 million dollars lost. Now the Canadian Imperial Bank of Commerce, according to the CBC froze 26 million worth of QuadrigaCX's assets in January this year after finding irregularities for the payment processing and the documents in the Ontario Superior Court Justice concluded that 67 million worth of transactions ended up and properly transferred into the personal account of Custodian Inc the payment processor. That's part of the reason I don't buy any of these cryptocurrencies and although I don't give investment advice, I would advise you not to either. This Bitcoin is lost. Now, if you have good old greenbacks, cold hard cash, and the money burns in the fire, hey, if you can get the ashes to the Secret Service, you can get your money back. If it's torn up. If it's shredded by your dog, you can get your money back. If a crypto exchange goes out of business or loses your money. And it's happened many times, we're talking about many hundreds of millions of dollars so far that have been lost or stolen in these, you are in deep trouble.

Okay, so this week you guys have to attend. I'm going to be explaining why you need to secure your Wi-Fi network and how to do it step by step. I'm going to be explaining how to use the firewall that's on your Mac, that's on your Windows machine and how to use it. So you can still conduct business, but you can keep yourself safer. And then the lesson in the third video this week is how to do backups properly, the 3-2-1 rule of backups and how you can do it inexpensively. I'm going to show you the free tools you have. I'm going to show you some of the best companies out there to use to do some of these other things, inexpensively. Companies that I've used personally that I've advised people to use that are doing an amazing job. Right? That's what we're going to be talking about this week. And you have to sign up I'm going to put these videos up these are going to be some training videos. We're going to do a live webinar where I'm going to take your questions on Thursday and answer your questions that you can email me during the week. As you watch the videos, new ones, Monday, Tuesday and Wednesday. This week, I may do one on Thursday. But Thursday's the day I'm going to be doing the live webinars. So on Thursday, it's going to be a little bit of a busy day. So I don't know I'm going to get a video out. But this is step by step like you've never seen it before. Really.

You know, if you've been frustrated going online, trying to search on YouTube or on Google to try and find the best stuff and you hope that what comes up first is right. But you know what is not going to work properly. If you do this other thing. This is an integrated approach to make it all work. I'm even going to be showing you how to automate the whole thing so that you get the upgrade. How to use this stack of security tools so that you are not only resistant to viruses, but also to Trojans, to malware, to crypto mining, to all of the major problems that people have. So that's what I'm going to be doing and none of it costs you a dime. I'm given away my best stuff for free because I want businesses to be safe.

That's the goal. That's the goal of the Saturday show and personal as well. But this is about businesses. Businesses have lost tens of billions of dollars accorded the FBI over the last 12 months. So I want to stop that. Make sure you sign up. Visit http://CraigPeterson.com. Or check this morning's email. If you get my weekly email. There's a sign up in that as well. Make sure you follow along because this is for this week. Only. I am taking it down because this stuff changes so frequently. I don't want to leave it up and then have you get confused if someone finds it later on. I want you to stay up to date. http://CraigPeterson.com. Anyways, have a great week. I got a busy one ahead of me. Take care and be safe out there. Bye-bye. 

---

Related articles:

Lowe’s Smart Home Device Platform Shuts Down March 31st

Hackers Hijacked A Family’s Smart Home, Spammed Nuclear Missile Alerts

Chrome Can Tell You If Your Passwords Have Been Compromised

Crypto Exchange Says It Can’t Repay $190 Million To Clients After Founder Dies With the Only Password

Glowing Reviews Tout Counterfeit Cash On The Dark Web

Report Highlights The Crazy Lengths Hackers Took To Infiltrate Us Utilities

How Hackers And Scammers Break Into Icloud-Locked iPhones

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 8, 2019

It's A Security Thing Friday. Craig talks about ransomware hitting the local schools and how you can help them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/08/2019

Ransomware Hits Local Schools - A Little Advice

Craig Peterson 0:00

Hey, everybody. Getting ready for another weekend and we got a big week next week. We are doing some more courses and some more teaching. This should be fun. And what I want to talk about right now in our little, It's a Security Thing Friday is guys, you know, you're only listening to this if you're interested in security. And I've got to kind of build you up a little bit because if you're interested in security, you are probably way ahead of almost everybody else, you know. And I know of two times now where we have had some serious problems with schools personally, right here in the area. We had one that happened here in New Hampshire, and we had another one that just just happened in Connecticut. And what I'd like to propose to you guys is that since you are interested in security that you go ahead and volunteer for your school district. Now you're going to have a fight on your hand. Because there are people working for the schools. This is true in every business.
But there's people working for the schools who are supposed to be handling security and may well be doing the best job in the world. And then there may be other people who know they need a little bit more help. Or maybe they don't understand something quite right. Or maybe they need help installing some software. That's where you can come in.

So that's where you can go to your local school and say, Hey, listen, I'm kind of a security guy, even if you're not professional, right? Even if you're you haven't spent the last 10, 20, 30, 40 years worrying about security of computer systems. You may be in a better spot than some poor math teacher that has been been grabbed and dragged over and and told hey, now you are our security champion. So do that for people, right. It's a security thing. It's what we do.

We get pulled aside when we go for Christmas, or New Year's or whatever, a birthday, Hanukkah, you name it, we get pulled the side. I can't go on a visit to a family member and not spend almost the whole time on computers, trying to fix them, secure them, help them, train them. And you're the same way. Right? You have had same problem because you're the computer guy. Well, now you are the security guy or gal right obviously a lot of women out there and one of my daughters is is top notch security person.

So that's what I'm proposing to you and as I get into this little story here from Connecticut, Bridgeport, Connecticut their public schools and this is a K through 12 district, just had a big problem. There was a attack launched by a malicious outsider and it got in to their network. Now, this happens all the time. It's hard to secure against. That's part of what I'm going over this week, this next week in my course, for people how to stop this sort of thing. But it got in, and then it started to spread. And that's the other thing. We're going to be talking about this week. How to stop that spread from occurring. And the district hasn't said the amount of ransom or whether it will pay it. In other words, guess what happened and got in and started encrypting files and then demanded around some now, you know my position, you know the FBI position, don't pay ransoms it not only does it encourage these bad guys to go after other people to try and get ransom money from them. But it now confirms to the bad guys that hey, you are somebody that pays ransom, so they're going to try and go after you again. And when you have a big network, like as public school where there's a lot of people who weren't well trained or necessarily trained at all it's pretty darn easy to get into the network.

Now this article that I'm reading, it's from http://Edscoop.com is saying that the guy in charge over there, they reported it to the superintendent who reported it to the police, he's saying that several teachers have lost access to lesson plans and teaching material saved on work computers. Teacher and student work saved on cloud based platforms appear to have been unaffected. Well of course it was depending on the type of cloud platform and if they had cloud backups it might be in trouble. But if they're using Google's whole Education Suite that's a little bit of a different deal. It's not going to spread on to that. Now the district's power school platform also was on touch. Hopefully it had some really good security. The IT department reportedly reportedly began taking steps to remedy the problem over the weekend and how the district declined to say how far along the IT team is. Have you ever done that? I've had to go into companies after the fact where they don't have anything properly set up. And you got to try and recover machines. And I want to warn you when it comes to ransomware, you may not be aware of this. But new machines, of course, don't have BIOSes anymore. They boot off a special partition on the hard disk. And then that loads in some special device drivers and other things that then that then loads in Window. So it's kind of a bootstrap loader process that's involved nowadays.

So if you get some of these infections, particularly root kits, but this is also true when you're talking about the some of the ransomware, it can get pretty darn deep right there right into your machines and in be impossible to remove all most absolutely impossible to remove. So in those cases, you may have to replace the hard disk but in other machines it's that little bootstrap operating system and it's often Linux based. But it's not secured particularly well. In most cases, a little bootstrapped operating system may be in non volatile memory on the motherboard. So go to extra steps of the machines been compromised and it's a newer piece of hardware and it doesn't have the BIOS anymore. Even if it does have the BIOS go to the extra steps of making sure that you do a very low level not just a format on the hard disk, but also looking at all of the firmware and bootstrap code that's there on the machine.

Now we had a I was a speaker keynote at a big event as insurance company that is a conglomeration of a bunch of school districts up here and I spoke there and we talked about the risk and well how it's getting in and what you can do and what you don't want really want to do. And one of the attendees came up to me afterwards and said, Hey, we just got ransomware throughout the whole school now they were dealing with it and they had obviously a talk to the police, the FBI is usually not that interested in it. But the local police department will be and they started to work to restore stuff. I gave them a little bit of advice, but it is happening. And since it's a security thing, I thought I would bring it up with you guys and gals.

Go volunteer, help out your school districts, help them understand what they can do, how to prepare the 3-2-1 rules of backup, everything they need, and you can send them my way as well. I'd be more than glad to do training I do trainings all of the time. I charge for these bigger events but you know already that my master classes and other things that I do are absolutely free, these virtual events where it just doesn't take quite as much of my time as having to go someplace and and give a presentation. 

Anyhow, do that little outreach outreach you're the security guy as well So reach out to these people have a great weekend and I will be back tomorrow course with my terrestrial radio show who thought you'd ever be saying that right? 30 years ago that and I've been doing it I'm almost 1000 weeks of weekly radio shows and podcasts so it's a long time So join me tomorrow on the air or you can of course listen to it in replay right here on the podcast. So take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 7, 2019

It's time for another Security Thing with Craig Peterson. Today, Craig discusses about the cybercrime gangs advertising the high paying cybercrime jobs that are available out there.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Cybercrime Gangs Advertise Fresh Jobs, Hacking Services

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/07/2019

High Paying Cybercrime Jobs Available

Craig Peterson 0:00

Hey, good morning everybody. Craig Peterson here with A Security Thing, hey, if you aren't into security and trying to understand it and trying to fight against the bad guys, you're in the wrong place. Because that's all this is about is security. And today we have another real quick one that I think is important for everybody to understand. I heard in the ad the other day from this company that we've all heard their ads before. The company's called Lifelock. And you know, I already have a special report out about how to protect your data and keep it safe and how Lifelock is you know, essentially a waste of money. You can freeze your credit and it doesn't have to cost you a dime and all Lifelock does this come in afterwards and maybe help you clean up right? So should you do it? Shouldn't you do it? I don't know. I've got a special report about it and I've got an explainer video that I produced about it as well. And you can get that if you want. But anyhow.

What they said in that ad was that there is a job offer right now out on the dark web for $700,000 for a hacker. $700,000 a year, supposedly. So knowing how Lifelock some time to says, played a little fast and loose with things in the past, and in fact, got sued by the federal government and a whole whole big mass, I decided I would look it up a little bit. Now, the dark web is a little more difficult, right? It's not like there is Google for the dark web. Yeah, there's some search engine-ish things out there that you can use and you can do a little poking around. So I did but I also look for articles that made a similar claim because at least then you've got something to go on.

And sometimes it's an echo chamber, right? Like what happened with this whole Russian investigation thing with President Trump, where it was a democratic investigation that was entirely politically motivated. And then the it was they told it to a friend who told to a friend who told to a friend, and all of a sudden now the FBI, it's got to come in from six different sources, the same basic story. And you know, from playing broken telephone as a kid that the story changes a little bit, right, every time it's passed along. And of course, some people purposely change it. So of course, the FBI is going to get a bunch of different stories from bunch of different people and say, Oh, well, maybe there's something here, maybe we should look into it.

So I expected to find at least that online. The Lifelock this commercial, they were saying $700,000 a year for a cyber hacker to try and steal people's personality. So I figured someone had to mention it. It had to be in the regular press somewhere, right? So I go and look at some of the left wing sites like the New York Times, and then Huffington Post and don't find anything there. And I look at some of the conservative sites that are out there. I look at Google, I do a Yahoo search. I do a Bing search, don't find anything. Try a couple of dark web search engines as they are. Couldn't find anything. So once again, that leaves me kind of wondering is Lifelock pulling in another fast one on us and it might be. But here's what we did find, a website called http://banksecurityinfo.com and this is talking about cyber crime gangs advertising fresh jobs for hacking services, and it goes through and lists a bunch of payments that they'll have.Now the the jobs it's not like a job Hey, you know, we'll pay you so much they do have some of those. In fact, this one hacking group out there according to Bankinfosecurity is offering full time employees a monthly salary of 50,000 pounds, likely rising to 70,000 pounds. Now, aren't those interesting numbers out there? So if you take 50,000 pounds, that's about what 65,000 US, and you multiply that by 12, you get $780,000. Tadah! I think I found where Lifelock might have gotten some of this stuff. So it's interesting. This is called dark overlord. In case you're wondering, and you want to go apply for a job.

But there are a lot of offers out there. For hacking a web server, they'll pay you 220 to as much as $3,000. Keyloggers, 170 bucks. Denial of service attacks, and those vary from 350 to 2500 bucks. Hacking a personal computer 280 to 3500. Cell phones, it's about 500 bucks. Email hacking again, about 750 bucks. Social media account hacking about 500 bucks. Of course that varies as well. Change school grades 1200 to 3700 bucks. Wow. It's gotten expensive. And a FUD ransomware and decryptor, depends. 12 months 900 bucks. Six months 490. 1 month, 120.

So interesting, right? And they're looking for fully undetectable ransomware. So there's some decent money out there who knows about these jobs? If these are legitimate. Multi lingual candidates are desirable. It'll add 5% of your salary or commission for fluency per language. Chinese, Arabic and German being particularly desirable. And must have a winning attitude. It sounds like something you would normally post doesn't it?

so I figured you know if you're interested in security you'd like to know a little bit about this. Digital Shadows found this job advertisement out online and the dark markets really do persist but I got a warn you. Of course you can get serious US prison time if you're caught doing any of this stuff and that's probably why they pay so well. So the bad guys are out there. They're trying to get us and no surprise there we got to defend ourselves.

Anyways that's today's Security Thing and we will be back tomorrow with another one and of course on Saturday with my regular radio show. Taking Sunday off per usual while at least from doing podcasts and I hope you keep an eye out for all these master classes I'm doing. http;//CraigPeterson.com/subscribe.

Alright, have a great day. Talk to you later. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 6, 2019

Craig is on the WGAN Morning News with Ken and Matt as he does every Wednesday morning. They talked about a lot today from the Facebook and Apple feud, the AirBNBs spying on you, the shortage of cybersecurity workers, and the GDPR bagging its first tech giant Google.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

This Lamp With A Hidden Camera Could Be In Your Next Airbnb Nightmare

Facebook Shuts Controversial Program To Pay Apple Users For Data

Cybersecurity Worker Shortage Hits 3 Million

F.B. Purity Hides Annoying Facebook Applications And News Feed Updates

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/06/2019

Facebook Battle With Apple - GDPR Snares Google

Craig Peterson 0:00

Good morning, everybody. Craig Peterson here, of course. And this morning I was on WGAN and all of their affiliates up throughout the state of Maine and covering the course that also covers parts of New Hampshire. But we talked about the Facebook program, the controversial one, what's happening here, there is a big fight going on between apple and Facebook. I mean a very big fight and it looks like Apple might end up being the police, at least for their platform. They've been trying to keep Of course, our data safe now they're trying to keep the companies like Facebook, in line with our privacy as well. So good for them. So we talked a little bit about what was happening there. In fact, we talked quite a bit about that. And we talked about the EU privacy law and how it has snared its first tech giants. So here we go. 

Unknown 1:00
It is the WGAN Morning news. It is Wednesday morning and it is time to talk to Craig Peterson. Craig, how are you this morning Hey, good morning guruing away. Guruing that a verb Can you

Unknown 1:09
gurus she gurus they grew all guru

Unknown 1:13
it's like French right? Yeah. Sweet to a new songs

Unknown 1:17
and French. We've just we've just raised the intelligent closure this this short clip wanted this. So let's talk about Facebook. Let's leave time at Facebook. And so there was a program to pay Apple users for data. Has that been changed now? Yeah this is interesting because I got a couple of different Facebook things in here this week including what I got from mass all new

Unknown 1:45
which is kind of cool that Facebook purity thing I checked it out after you mentioned it last week but yeah, Facebook really gotten nail here we found out just a few weeks ago that our Facebook of

Unknown 2:00
users were offered something that I kind of knew was going on here. Here's the bottom. I remember I mentioned Facebook had a VPN and don't trust it. Yes. Because VPN are supposed to be protecting your data. And I knew Facebook had a VPN and it was free, and they were tracking all of your data on it, right? So it's kind of the opposite world, right? For what you expected from VPN. Well, Facebook, apparently when a step beyond that and was paying users 20 bucks a month, I guess it was to use the VPN for research purposes. Now, personally, I don't have a big problem with that. But you guys if you know it's for research, you know, the monitor new and they're paying you 20 bucks, you kind of expect them to be monitoring what you doing right? I would assume so. I would assume so. Yeah, I don't think that's a real big deal. But as it turns out, Apple did a little bit of investigation into our friends.

Unknown 3:01
Zuckerbergville making up all kinds of words today. Zuckerbergville

Unknown 3:09
and what Apple found is that apparently Facebook has been kind of short circuiting some of the Well, some people would say lawyering some of the terms of its policy. And it looks like Apple might actually be forcing Facebook to be honest and not use our data in ways that are part of this overall agreement. That other words, Facebook's been collecting data. So Apple said, If you continue to collect data, we will see the platform. In other words, we won't let you use Apple stuff anymore.

Unknown 3:49
And so what they did is they pulled their keys, Apple pulled Facebook keys, so no, all of a sudden all of these geeks out there and Silicon Valley working

Unknown 4:00
for Facebook that are used to just pop it up their little internal Facebook app on their iPhones and having a Facebook bus come and pick them up in the morning for work along with their latte already warmed up for them in the bus. No, no, no Apple turned off their keys. So none of the apps worked on iOS anymore. And those portal Facebook we knees were I mean workers were out there waiting for their locked data show up at a bus and and messy work. So there is a big tug of war going on between apple and Facebook right now that looks like Apple might actually force it on iOS for Facebook. To be honest,

Unknown 4:46
it's something they're not really known for our right we're talking to Craig Peterson our tech guru joins us on Wednesdays at this time talking about the world of technology. Craig. Speaking of security and cyber security and whatnot. Is there a person

Unknown 5:00
Is there a problem, I guess out there in cyber security whereby we don't have enough human beings to even do the jobs to keep us all safe out there? Is this is this a problem? Well, yeah, it's a problem for a number of different angles

Unknown 5:14
right now, according to a study that was just released by

Unknown 5:18
it's a nonprofit association that that issues, some certifications and it's all about cyber security and cyber security professionals. According to this study,

Unknown 5:30
I was wrong. And you might remember I said that we were about one and a half million cybersecurity workers, Shawn and that's the number have been using for a while now they're saying that we are about 3 million cybersecurity worker shortage.

Unknown 5:47
And that's absolutely huge because what that means is two things one, we are of course, we were in great need of people who can keep our system safe from the federal government.

Unknown 6:00
All the way through the local mom and pop shops. So that's a problem. It might be good for you if you really wanted to get into the cyber security industry and get a better job better paying jobs, because these are some of the highest paying jobs in the tech field. But it's bad again now because that means everybody and their brother is going to start hanging up. I should go outside their little bio repair computer store to say I'm a computer computer security company. Now I do cyber security and I think that's going to be a problem as well. So it's always been hard to figure out who to hire to help you with your it and it's getting a lot harder to find out who can really do the cyber security for you

Unknown 6:47
to great data scientists are tech guru he's doing this morning and he's joining us as he does every Wednesday at 730 I saw on your website a a lamp that could have a hidden camera.

Unknown 7:00
And could be put in an Airbnb room. I mean is that can they do that? Well, you know can as a lawyer is you know about two party consent obviously his main considered a two party state I don't remember so one party state is Yeah, one party okay so one party state How about if I were to put a camera in your living room with the width depth somatic is a two party state means that both people have to consent to be recorded and one party state like main means if I'm on a phone call with you, I can record you without your consent. Right, right.

Unknown 7:37
I don't think so. Yeah, I think that's it. I don't think you can put a camera and then and then the other person not knowing about it. Well, this is a new a new lamp issue from Panasonic, I think is when you're talking about and it's called the HomeHawk, which is a little bit concerning. And the idea is that you can place it in

Unknown 8:00
Your home and it has this very wide angle lens it's 140 degrees. So it's basically takes one whole side of the home. It has a big camera and it streams at 180 red p resolution, which means it's considered to be high def. It's not like 4k or anything but it has a motion sensor built into it. It can detect movement, it has double A batteries to back it up in case there is a power failure. So it is kind of cool. And it's interesting to how they launched this camera. But it is designed to monitor your home. So from that standpoint, if you have it in your home to kind of keep track of maybe burglars breaking in or when the kids get home. We're probably on a good legal ground although you probably want to talk to your lawyer but how about when people might put that into an Airbnb where they're renting out their homes. We've already seen hidden cameras and Airbnb bees that are built into little clock, teddy bears, etc. These nanny cams are put into the homes. And in most cases, these things have been found to be illegal. So it's kind of cool. Maybe for your own home. It's kind of scary when you think about renting somebody else's home. And what kind of cameras might say how to get in the way in there.

Unknown 9:31
We're talking to Craig Peterson. Our tech guru joins us now as he does every Wednesday to talk about the world of technology. Craig. Another thing you have any website here is something I saw, I think last week myself, which is about those European Union policies, privacy laws that were recently instituted and they've apparently snag their first giant whale looks like Google as a huge trend that they're gonna have to pay doctors about those privacy laws, specifically in what happened with Google.

Unknown 9:58
Yeah, this is kind of interesting because they are coming here. Now California just put a similar line place. And these are called the GDPR, GDPR rules. It's I think it's a global or general data protection rules that are over there in the EU. And it's kind of scary for businesses. Because if you have any data on your team customers, and that means if they even visit your website, they can and will control the data that you have for them. You might ask, Well, how can they do anything? I'm just some little guy years and then main. Well, what they've been doing is they actually have put up a Great Firewall, kind of like the Great Firewall of China. And if you break their data, privacy rules, they block your website throughout the European Union that's already been happening. And for most people, most little businesses, who cares right that's not going to really be an impact to you but Google

Unknown 11:00
Nailed by French regulators it's not a big fight for company like Google it was 50 million euros which is a little over $50 million in real money but

Unknown 11:13
they they apparently violated these rules It was alphabetic charged under this and they said the company had not properly gained consent from users. Now I want to warn people who are here in the US who are doing email list to might be collecting some data online for people that might sign up for the email list. Even signing up to get something from you is not enough for this new generation of laws that are going to be the fact that in mass and California and other states in the feds are looking at this as well. Even just having them sign up is not considered consent under these laws. They have to take it affirmative action to say absolutely you can send me marketing message.

Unknown 12:00
So keep an eye out for this. Google is going to have to pay a fine Facebook's probably not far behind them. And if you're a business person, you might not be far behind them either because these laws already exist to some degree, and they're getting tightened up here in the US as well. So be careful with all of your online marketing and sales activities.

Unknown 12:21
Craig Peterson our guru joins us every Wednesday at 730 Guruing away. Thanks for joining us and we'll talk to you next week. Great day. Take care guys. Thanks. Thanks, Craig. All right. We're gonna take a quick break here and 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 5, 2019

This morning Craig and Jim talked about the shortage of cybersecurity workers and its impact on the security side of things.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Cybersecurity Worker Shortage Hits 3 Million

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/05/2019

Impacts Of The Cybersecurity Worker Shortage - Hiring Workers

Craig Peterson: 0:00

Hey, good morning, everybody. Patriots nation, of course, you know, Jim Polito right there in Mass. He covers of wow, about two thirds of the state. Maybe a little bit more. And Rhode Island, and parts of Connecticut and Vermont. And so what's he talking about? A courses the Patriots. So he went over time this morning, but I'll forgive them, right? I live in New Hampshire, and we're part of Patriots nation too. We claim them as our own. So this morning was a little bit shorter than usual. And I brought up some stuff. Have you ever wondered about the cyber security workers? Who do you hire? Who do the people that you hire to take care of your computers hire? Well, there are a bunch of problems right now. And it's because of the cybersecurity workers shortage so that's what I talked with Jim about this morning. So here we go. Also, of course, remember that we have this week, some of my best stuff should be going up today. I wanted to get up yesterday. But you know how that goes. Life, right. And so you'll probably see an email or a text from me as soon as it starts going up. But some phenomenal stuff on DIY security, how to secure your machines and your networks. And we're starting with Wi Fi. And then we're going on to firewall. So here we go with Jim. Make sure you visit http;//CraigPeterson.com to get signed up.

Jim Polito 1:36
Let's get right to it. Because he's going to tell us there's 3 million jobs out there in the world that need to be filled. And it's not being done. Joining us now, Tech Talk guru and good friend Craig Peterson. Good morning, sir.

Craig 1:53
Hey, good morning, Jim. Yeah, this is presenting some real interesting problems that the most obvious problem of course, is if you're shy, 3 million people that there are literally 3 million open jobs for cyber security workers that, obviously means we're going to have some security problems. But there's a second kind of unintended consequences of this sort of thing that we've seen over the last at least 30 years, 40 years in the IT business, Jim. And that is what happens in the you know, we have a fairly capitalist society. But what happens in a society where the government is not saying that we have five open cybersecurity jobs, and the market is saying you have 3 million open jobs, there's usually a couple of things that are going to happen when there's a shortage of workers or shortage of anything, right? And what's that?

Jim 2:55
When you have a shortage of workers? Well, the salary goes up, I'll tell you that much.

Craig 3:02
You're absolutely right, the price goes up. And that makes it even more difficult because the good cyber security workers are already paid a lot of money. And we're talking about hundreds of dollars an hour on an ongoing basis. And a lot of people don't realize how, how expensive it really gets. So if you got some guy out there or gal who says, wow, man, I'd love to make 80 bucks an hour. 100 bucks an hour, I want to be a cyber security guy. So now we're starting to see ads and I'm seeing that now, I captured a couple because I just couldn't believe my eyes, but ads online for I've learned to be a cyber security worker in as little as three days.

Jim 3:53
Hold on. Stop the presses. I don't know if I want a cyber security person who's learned in three days any more than I want a doctor who's learned in three weeks

Craig 4:06
That sort of thing. Exactly. I've seen it all the way across the board Jim from become a cybersecurity expert in three days, all the way up through now, this might take you a while to do and, you know, maybe you want to find a career it's a little faster, but three days all the way up to six weeks.

Jim 4:28
Unless you're somebody like Craig Peterson, who was born with this gift, okay, called intelligence, but also is predisposed to be able to understand issues of IT. I don't know if I want somebody in six weeks. I mean, like, I know the, the boys when we ask them a question about one of our devices or something, you know, they can quickly answer it, like, Oh, you do this, this and this, you know, and so, they're they're like, of that they, you know, they're they're pretty, I still think six weeks, I mean, you need a little more, but it just goes to show you that crime does pay, you know, they say crime doesn't pay. I mean, it does if you're a crime fighter, especially in cyber security. We're talking about Craig Peterson, our Tech Talk guru. Don't forget at the end of the segment going to give you a way that you can get a lot of great free information from him. So go on, sir.

Craig 5:23
Yeah, well, so this is going to be a very big deal, a figure deal because this happened back in the late 1990s where everybody wanted a website and everybody wanted to be online. And everybody wanted to be an IT worker. And all of a sudden everybody was putting their shingle out, we're starting to see this now IT organizations who are just very basic fix it shots, you know, they can tell you how to do this on your iPhone or do that on your Windows machine. Yeah, and replace a bad hard disk and now they're putting out a sheet go same they are a security provider.

Jim 6:04
Yeah. I don't know about that.

Craig 6:07
I started in New England, very first managed security services provider back in the early 90s because I got hit. I had already been on the internet for more than a decade. I started on the internet in '81. Al Gore and I were buds back then.

Jim 6:25
Yeah, I never knew that. I mean, I know you wrote some of the language, some of the code for the internet, which is the truth folks. And some of the code that runs the internet was written by Craig Peterson, but I did not know that what got you going that way was a cyber attack.

Craig 6:43
I did. I got nailed. And at that time I was what the huge web hosting company we're building site to build some of the largest properties in the country. Like you've probably heard of big yellow or super pages, and the Vendee International, a lot of work for them.

Jim 7:02
I do remember these. I guess I'm showing my age that I knew all these. Yeah.

Craig 7:07
Well, that was all me working with my clients. And so we got nailed. And I was using the anti viruses tried to do the right thing. And I couldn't find anybody that really knew security. And so that's when my kinds of career my business kind of took a bit of a dogleg and we went a different angle because I just couldn't stand seeing people who had worked all their lives to build their businesses who had tried to build a nice career who had all the retirement tied up and then have bad guys come along and take it away from them sometimes, literally, nowadays. So that's why I started that that's when I started letting people know about this and doing the radio stuff and and that's why this week I'm doing some special training on how to do the basic self security yourself for your business. I'm giving away some of my best stuff this week for free and it's so important Jim. And this 3 million cybersecurity worker shortage gets me kind of worried from a lot of angles,

Jim 8:16
And then it just goes to show you if you need 3 million people to work in cyber security, how many people does that translate to on the other side of the equation? Those who are creating the need for cyber security. Think about it. I mean, exponentially. How many more people there are working there. Craig, let's let's get the number out there to folks so that they can get this information. Plus there was a lot of other great stuff that we could have talked about today, just in the interest of time, and we can't but Craig really provides a lot of stuff free to you. This is no obligation no nothing. All you have to do is text my name to?

Craig 9:01
855-385-5553. That's 855-385-5553

Jim 9:12
And a standard standard data and text rates apply. You will get great stuff from Craig Peterson, you know if there's a big hack or a big cyber crime and you need to protect yourself. Just like last week, we talked about changing passwords for your email, that kind of stuff. He gets that information right to you, Craig. It is always a pleasure to catch up with you, buddy. We really appreciate appreciate these Tuesdays with you. And we'll talk to you next week.

Craig 9:41
Hey, thanks, Jim. Take care. 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 4, 2019

Craig is on with Jack Heath as they discussed the Super Bowl and the technology behind it.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/04/2019

Super Bowl Technology - Why Are Advertisers Wasting Their Money

Craig Peterson 0:00

Hey we want to welcome everybody Craig Peterson here. Of course living in New England the Patriots are our team. In fact that you know, we take it kind of personally here, but it wouldn't. Interesting game wasn't it. And I talked this morning with Jack  Heath, a little bit about some of the tech involved. And if they had just an amazing opportunity here to use some of the world's most advanced technology to really connect with the consumers. They didn't. It was to me, it was shocking. It was shocking. They they had some 8K broadcasts and other things. But why didn't they use the tech they could have used to engage the audience and the looks like from all of the social media online that that that's just playing right. That's a good observation. I think I got right again, hey, this week. Make sure you keep your eyes out today. Tomorrow, Wednesday and Thursday day I have some of my best ideas. Some of the best training in the industry available for the SMB marketplace. small medium business. This is of course, all about security. It's free stuff. I will have an offer at the end of all of this for people who are interested in taking it further. But this is my best stuff. It's going to be available for you. It is not a pitch fast. Believe me make sure you sign up just visit http://CraigPeterson.com right now. It is right there on my homepage. You can sign up right there. And I you know I'm putting a lot of work into this. This is taken a few months to put together I've got some amazing stuff. I've got a whole package of stuff for people who might have been hacked or want to know if they've been hacked. All of this stuff is going to be included so make sure you visit http://CraigPeterson.com. And here we go with Mr. Heath

Jack Heath 1:56
Craig Peterson our tech talk guy joins us I believe in the Auto Fair listener lines. Craig you know so much of this now is an online game versus you know the other way the people get the information as we get into this post Super Bowl Monday morning.

Craig 2:13
Good morning Jack. The technology that was there at the Super Bowl this year was just absolutely incredible least behind the scenes you had 4000 miles of fiber cable in there you had over 2000 strands of additional fiber 330 recording channels with their plane watching if you came it was just incredible 16 cameras there were a number of augmented reality sensors in fact sick network cameras where they're tracking the AR graphics they were used you know all of this text is just incredible for a game that I'm looking at all of these means that we're social media was an absolute bore and one of the ones I love the most about it was Yahoo Sports and they posted a picture on their Twitter feed of just a piece of paper that said Patriots and Rams three to three and they said our graphics team fell asleep it was it was quite an interesting game that dichotomy with all of this great tech with the new TVs there was an eight k broadcast from the field it was absolutely phenomenal you could watch multiple angles on some of these newest TVs you could do automatic replays that the tech was just incredible Jack But the game itself on much show so sure it was so great I thought kind of the highlight was Spongebob coming out but he was only there for about five seconds.

Jack 3:47
And then yeah Tony Romo trying to call a game. No it. Yeah, they look at all the matters is a W but I guess Justin and Craig Peterson, Justin and Craig. I guess if you're just if you're in a neutral state if there is such a thing because there's so many anti New England patriot fans. But if you're in another market you're watching that game just for the pure football entertainment with the NFL being all about offense I guess it kind of was you know, not as exciting

Craig 4:16
Yeah, that's absolutely true. It wasn't I don't think it was a Saturday night and I'm not a big football fan I got to admit it but you were mentioning the ads as well and how expensive they were and social media definitely had a winner the number one ad from all of the means of repost it and comment was one of the Bud Light ad that was the one that was tied in with the HBO showing the dragon for the final season of Game of Thrones. That was a huge winner last night and probably can continue to be that second incredible series. But you know, from a business standpoint, you know, I talked to Jack up in new business for years and in entrepreneur started a few different businesses over the years and, and you look at how much is spent on these and you really have to wonder what they get out of it. Now Budweiser, I get it right if they've got a name they're building a bit more of a name but there's no call to action there there's nothing that these commercials were doing using technology that would have gotten people kind of offer their seats and doing something making a positive step to get their product or anything you know that type of interaction interactivity where you can have an ad and your your clients can or prospects can they can buy your product right then and there it's not there yet it isn't radio on like on the I heart app, you can advertise to people and they can just shake their phone and it'll connect to the website that that type of interaction again, will not seen on TV we are seeing on radio with I heart and I think it's just showing the the lack of connectivity that I think is really starting to go on now. The TV guys just don't get it and they're wasting their money. My opinion, right on spending other $5 million for a 32nd commercial.

Jack 6:22
Yeah, I haven't checked the ratings course knowing when you know, you're gonna have high but nationally haven't checked them. But one of the headlines I saw overnight earlier this morning was the last great live TV event.

Craig 6:35
Yeah, yeah, that's probably not too far off from the truth that just keeps going down and down.

Jack 6:42
All right. Craig Peterson, excellent stuff. A high tech look at the big game. Last night from Atlantic. Craig Peterson. http://CraigPeterson.com. Thanks Craig.

Craig 6:50
Hey take care. Bye. Bye.

Again. Guys. Don't miss my series. This week. We'll be doing different ones. This is the one that's really going to teach you about the basics. What do you need to do for security, whether you're Soho, small, medium business. Okay. I've got some great things planned for this year. And I appreciate your signing up http://CraigPeterson.com. Take care. Have a great day. be back tomorrow with Mr. Polito. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 2, 2019

Facebook and Apple are fielding in a big way. It looks like Apple's taking this into their own hands is just fantastic. Today we are going to talk more about that.

There is a new plug-in that can help you clean up your Facebook feed. Listen in and you can learn more about that.

Hidden cameras again at Airbnb's. This thing is scary as heck. We will talk about the good and proper uses and when their use crosses the line.

We've got a cybersecurity worker shortage is all that to surprise 3 million people is where that's at right now. So we'll talk a little bit about that.

Did you know many of the Fortune 500 companies you deal with are have vulnerabilities that can compromise your personal information? Today, I will talk about their use of vulnerable server software. Yes, it is the same software that allowed hackers to steal personal data from Equifax.

I will talk about the Three, cybersecurity must-haves for small businesses. Leading up to the free training I am offering next week. 

Do you use a Mac? I will go over some basic must-haves for small business Mac users. Remember, you are not invulnerable, and there is a targeted piece of malware being used against you. Listen in to learn more.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/02/2019

Apple Holding Facebook Accountable For Privacy - Cybersecurity Tips For SMB - FBPurity Plugin For Facebook

Craig Peterson: 0:00
Hey, good morning, everybody. Craig Peterson here. And of course, we are going to talk about tech, some of the latest things, some latest articles, some of the nastiest things that are happening out there. I don't know if you've seen about this feud. But our friends at Facebook and Apple are fielding in a big way. You know, I'm asked if you listen to this radio show and if you listen to me appearing as a featured guest on some of these other shows, you know, I'm asked all the time about security and what we're going to do about our friends at Facebook. It looks like Apple's taking this into their own hands is just fantastic. So we'll talk about that and that's all due to a an article that came out that really kind of nailed them I got a really cool little tool in fact I learned it from a couple of friends of mine up in Maine who host a radio show that I'm on every week but Matt and Ken do this was actually Matt's idea but plugin you are going to love and this is going to clean up your Facebook feed.

Hidden cameras again, AirBNB. This thing is scary as heck. The Fortune 100 you know about Equifax you know above the breach. While this is not very fun. We've got a cyber security worker shortage is all that to surprise a 3 million people is where that's at right now. So we'll talk a little bit about that. Three, cybersecurity must haves for small businesses. That kind of ties into what I'm doing here next week. I've got just a ton of training for small businesses. Make sure you visit my website. http://CraigPeterson.com. This stuff is all free. I'm giving away my best stuff. absolute best stuff for free this week. So make sure you sign up. http://CraigPeterson.com.

But here's some basic must haves for small business Mac users. You are not in vulnerable, you're being targeted by piece of malware. So we got a lot going on today. And that's what we're going to be talking about right here. Of course, this is Craig Peterson. And this is Tech Talk.

There's another guy I just don't I just don't get it. But little confusion. He calls himself Craig Peterson. I've been doing this for what, 25 years now. And then he said, Craig Peterson Tech Talk. What that's me. That's not you. Anyways, here we go.

Unknown 2:41
Facebook had this controversial program. And this is really what's gotten this little bit of a war started. And the war is between Apple and Facebook. Now we all know that Facebook, their founder thought that we were idiots for giving him our information. And that now been documented in a court case over in Europe thinks we are idiots. In fact, he used a swear word an expletive in they're describing what kind of idiots he thought we were. Well, Apple is now ratcheting up its tug of war over privacy this week, you might have seen a little bit about it. But now we're going to explain what it's really about what's really going on. But there was a report that talked about Facebook collecting data on users. In fact, they were paying users for this data. Remember, I mentioned that Facebook has a free VPN and that you should never use it. Because typically, when you're thinking about a VPN, you're thinking about privacy, right? You thinking about security, hey, and people aren't going to be able to track me, have you ever used a VPN before, if you're a business person, you probably should. But you need to understand more about them. Well, Facebook had this whole VPN setup that was tracking you were you are going what you were doing what you were saying it was really just a piece of nasty spyware just crazy what they were doing. Well, they offered a $20 a month, I think it was kind of a bounty for anybody that would use their VPN. And they made it very obvious that what they were doing is tracking you they're trying to track people age 13 to 35 as much as $20 a month or it install this Facebook research app.

Now, if that's what is called a Facebook research app, and it's designed to track phone and web usage habit. And this was reported by TechCrunch. This became a bit of a big deal when they started looking into it a little bit further, because it turned out the TechCrunch report said that Google's running a data collector that also similar to Facebook's app on Apple system. So you got Google doing something that collecting all this data, and you got Facebook doing something? Well, apparently, Google pulled the plug on their little project, Apple did not pull the excuse me, Facebook did not pull the plug on their little project. And so gate Facebook. So Facebook did not get nailed, and Google did get nailed.

So this app is discontinued on Apple iOS, how those can continue to run on Android devices. Doesn't that figure, right? Android? Yeah, yeah, again, spying on you, man, Facebook's finally going to suffer some consequences for their actions. This is kind of interesting when you think about it. Because what's happened is, Apple completely pulled the plug on Facebook's development. Now, if you don't know much about the Apple ecosystem, let me explain a couple of things. Even if you're an Apple user, you might not be aware of this, if you are developing, you're trying to develop apps for iOS, you apply you pain money, and you get from Apple, a special key you can use to sign your applications. And then that key is used by Apple to verify Yes, and D. This is assigned application by developer x. And therefore it will run it'll be accepted on iOS. And Apple has some similar things in place for Mac OS, that's part of the reason Mac OS is so much safer than Windows is, well, one of the things you have to do if you write software is tested. And a lot of people do a lot of testing. And so with that developer license, you can now make your app available to people who kind of sign into your developer account, right? They don't have to have your credentials or anything, but they associate with your account, they can now use your software. So now it's kind of an alpha and beta stages before it gets its final release. So if you don't have one of these keys, if you cannot sign the software, you can't distribute it
at all, basically. So you are kind of out of business. And that's what Apple did, Apple polled Facebook's developer key. And a one more big problem. You might not be aware of this, you know, there's one millions of apps in the app stores now. It's just it's it's incredible. How many I think it's over a million just an apple store itself. And I'm sure someone's about to text me with how many. 855-385-5553, 855-385-5553. Let me know how many there are. But there's at least a million apps in the app store. But did you know that there are more apps that are not in the App Store, then are in the app store? Now, you got to ask yourself, why would that be? Well, you know, I think Craig must be talking about development, right? developer apps, not real apps that people are using everyday. Well, obviously, there's a lot of developer apps that never ever hit the App Store. But there are more internally used business apps out there. Then there are apps that are for sale in the App Store. So companies like Facebook, for instance, will develop apps to be used internally by their staff to do different things. Now, in Facebook's case, it includes things like send a bus my way a bus to work, or maybe it's pick up my clothes from the triangle, and whatever might be all of the internal apps. And Facebook was using on iOS got shot in the head, they are all down. So now there's these people who work for Facebook are used to somebody in their little bus. And that bus is not showing up anymore. There's somebody in the bus and the app doesn't work. And they're trying to get in to an office by using an app. And that's not working.

So this is very, very big. And Apple did this to basically punish Facebook for doing things that violated Apple's privacy. Apple has a whole thing they have to sign. I'm an Apple developer for iOS as well as for Mac. And when you get your developers license, you then have to accept their terms. You have to accept their contract, very big deal. No, and their contract says that you will keep our users data safe, and they did not do it. So Facebook, shut it all
down.

And we'll see where this ends up going. I'm sure they'll reach some sort of terms. I also wonder now if Facebook's going to switch from you in iOS is its primary development target and maybe switch to Android, which I think would be a mistake, but this is from Apple. They said the permission was intended solely for internal distribution of apps within an organization. Facebook has been using their membership to distribute a data collecting app to consumers, which is a clear breach of their agreement with Apple. So you know, Tim Cook hadn't been involved in this decision, Mark Zuckerberg was criticized over his handling of Cambridge Analytica over his handling of the whole Obama campaign where they gave Obama access to everything makes Cambridge Analytica look like just ridiculous bikers. They just don't know what they're doing right now, news to ask me, oh, wait a minute, you're Republican, I'm not going to give it to you. So it goes on and on extremely glib is how this was how this was described here, and Zuckerberg. So we'll, we'll see what happens. Hey, mentioned, apps and apple. So we're going to talk now about something if you have an Apple Mac, there is some new malware out there, you need to be aware of,

Hey, as I was just mentioning, we're talking about security. Apple has a lot of things in place to help secure our devices and Mojave on the desktop added a bunch of stuff that it's just phenomenal what Apple's doing. And they're doing it, I think, basically the right way. And, and it is going to provide security that we're just we can't get in any other platform. So good for them. But there is a new sneaky piece of malware out back out there that's going after Mac users. And this one is image based. Now we've seen image based attacks before. But in this case, it's a little bit different. It seems like a key piece of data that used to launch the attack has been hidden in this harmless looking white triangle. There's a little image now we saw something like this late last year, when researchers discovered criminal hackers were controlling malware using Twitter means now how's that for an interesting way to do it. So what happens is a malware got on your computer. And then it monitored a trip a Twitter feed, and then looked at the means that were placed in the Twitter feed. And hidden inside those means were the control codes for the malware, yes, they are getting very tricky.

So this new piece of malware is called VeryMal. And the image it's been linked to is using some parameters that get added to our URL in order to try and control malware. And you've seen this, I'm sure if you're an Apple user, where you go to a website, what comes up, it comes up and says, hey, you've got to update your flash bright, it's a fake Adobe Flash update, or, and of course, Adobe Flash, highly recommended to not use it, never use it, that don't use it for the last at least five to 10 years, really don't use it. And we had our friend Steve Jobs back in the day who saying we will never support Adobe Flash. And he had a lot of good reasons for it, not the least of which was he didn't like Adobe and what they were doing. But this is a fake flash up data, it's being pushed by this very mail campaign. And here's the bottom line Mac users, you don't want this app, you don't want to update your flash buy a little pop up that comes when you visit a website. legit flash up dates for Chrome comes straight from Google, they get pushed automatically with other browser updates, right.

So ignore anything that says you have to upgrade and update flash, because you don't want to even have it on your machine. And if you're using Chrome, it's going to get updated automatically. Now, if you ignore that, by the way, you might be in trouble. Because just in two days in January this year, there were more than 190,000 impressions of this image.

So that's a lot of people that might have been hit by this researchers are estimating as many as 5 million users per day have been exposed to the malware, fewer than a third the anti malware engines on the virus, total scanning service detect very mouse payload as of this morning. And these attacks, of course, they can be expensive. And we're going to be talking about that this week as well. But bottom line, a single round of attacks in January probably cost about $1.2 million to businesses. And that's on a per business basis. Now, if you're a small business, it's going to cost you less, but on average, right now it's about $120,000 per attack.

So I want to make sure that you're aware of this. I've been sending out emails this week. If you didn't see them and you didn't see my invite in this morning's email make sure you sign up next week I'm going to be holding I'm going to have four different classes I'm going to be holding a live online class we're going to be going through kind of the DIY What do you need to do to protect your business online what's your drew be watching for what kind of software can you install for free some of the stuff that you should be using this paid that's all this week we're going to give you some of my best stuff and I'm not going to charge you a dime probably have an offer for you for people who really want to go the next level but this is absolutely mandatory must attend go to Craig Peterson comments right there on my homepage. So we're going to get right now into three cybersecurity must have here some things you've got to do if you are a small business and kind of a little bit of flash ahead to what we'll be talking a lot more about this coming week on my con shares page and in the live webinars as well.

Alright, we got cybersecurity must haves for small businesses. Pop quiz, what percentage of small businesses in the United States, what percentage of small businesses in the US suffered a cyber attack in 2017? This is from an article from security today. And I've seen these stats before. So I know they're pretty much right. What would you estimate 10% of small businesses had a cyber attack 25% maybe higher?

The answer is 47% of small businesses had their networks breached at least once by cyber criminals in 2017. In other words, half of all small businesses had their networks breached in 2017. Now, almost half of those businesses that were breached once were breached twice or more. Now, that's according to a survey though, that was reported in 2018 USA Today story. So when you look at all of the data from this is the he can only really draw one conclusion. And the researchers team concluded that only about three intend small businesses would be able to even handle a cyber attack. If they were hit with one today.

So 3 in 10 could handle it, they'd be able to survive, and half of the small businesses were hit. So those numbers are pretty scary, frankly. And I want to ask you a couple of questions here. Why are you not prepared for a cyber attack? If you're a small business person, whether you own the business or you work in the small medium business, you know, maybe a $10 million a year business still considered to be a small business. But why? Well, there's a lot of reasons. Of course, small companies have limited budgets, that you don't have the IT resources you can't afford the professionals.

I got another article here from Fox Business that is saying that data breaches of course, a big problem, but they're going to get even bigger and 2019 and there is a shortage of cybersecurity professionals. There's growing globally. And right now it's at about 3 million people. That's a pretty big shortage. And then we've got all the infrastructure, get all the software we've got it all been very confusing, right? You probably spend some time on YouTube, trying to figure it out some time on Google searching around again, trying to figure it out. And it's just hard to tell what to do. And of course, that's why next week, in fact, this whole year I'm dedicating to try and help you out but this next week is the week I have a bunch of training, a bunch of video training and stuff you can watch all for free, I'm giving my best stuff away.

So I'm trying to take away the excuses because you've got to pull up your socks. You know, as I said, my email this week, a lot of small medium businesses thinks that their businesses are so small, so insignificant compared to these giant multi billion dollar companies and banks and agencies, you know, these these big names that we all know I'm not Equifax I'm not any of these. I'm not going to get hit. But in fact, you are. You are the real target because what I just said you have a limited budget, you lack the IT resources you can find the staff that know cyber security well enough. Sure you can talk to people who know more than you do. But do they really know enough to be able to protect you even these outsourced it firms. I'm just shocked every time I see them. When I talked to them about how little they actually know and how little they can do there just is not a whole lot of competence out there.

So anyhow. Bad news, hackers know that small medium businesses don't prioritize cyber security and that's precisely why the targeting them of your burglar makes sense, right? Go to the house with the weakest locker no lock or the windows open. And unfortunately, that's what your business looks like to them. So keep keep an eye on your email. If you haven't signed up make sure you do right now. Go to http://CraigPeterson.com. It's right there on the homepage today because we start on Monday, you can sign up you can get a free ticket to this whole event. Absolutely free.

I want to mention this study a little bit more. Studied by ISC squared, the world's largest nonprofit Association of Certified global or cyber security pros. And they're saying that we're really close to 3 million people short in the cyber security biz. And a lot of people, a lot of organizations are at risk. And of course, that's part of what I'm doing here on the radio and on the podcasts. And with these courses that we're teaching bring you up to date on cybersecurity.

This one is shocking, out of TechCrunch. It's been two years almost since Equifax had their massive breach. And we know that it expose the personal data of almost every American and a lot of Europeans and Canadians etc. It was a terrible breach. We also know that it was caused because they were using vulnerable software that was not up to date. Now, if they had upgraded it, it's called Apache Struts, if they had patched it if they had been paying attention. There was a patch released six months prior to that. Six months they had to fix it and they didn't fix it.

Well, another little study that came out of a company called Sonatype, and they monitor open source software which are patchy structure struts is a piece of open source software. And they're saying that in the last last six months or 2018, two thirds of the Fortune 100 companies downloaded a vulnerable version of Apache Struts. That's the same vulnerable server software used by hackers to steal the personal data and close to 150 million customers. Isn't that bad. All in all, by the way, more than 18,000 businesses downloaded vulnerable versions of Struts. So if you have a website and you are have a slightly larger one, if you are using Java, take a look no matter what it is.

I found three WordPress sites just simple WordPress, right. Who cares about WordPress, just this last week, three WordPress sites. I found that and I helped their owners fix them. They'd all been hacked and they were all being used for malicious purposes. They still worked as well as websites for the owners, but they were hacked. So keep your software up to date, especially software that is facing the public Internet.

Panasonic released a new home security camera earlier this month. And it looks like a floor lamp. It's one of those floor lamps that shoots right up at the roof, you know, and you get the reflective light which is really kind of nice. The long thin one I've had those for ages. In fact, those are some of the first lamps I forgot. It's called HomeHawk Floor. And it's designed to be discreet. The whole idea is you can monitor the inside of your house. There's no obvious cameras. This thing even has batteries and has local storage. They started an Indiegogo campaign and the lamp you could buy on Indiegogo 485 bucks, Panasonic just suddenly had the time.

Well, we already have reports of Airbnb owners hiding the cameras in the homes capturing the activities of the renter. So it's not exactly a new concern. But keep an eye out because this is going to be a hard one to spot.

Two more quick things here. We talked about the tug of war over privacy with Facebook that Apple is involved in and this all started with a TechCrunch article. But I wanted to mention too that you know, Facebook's been under fire for months Facebook settled they came to an arrangement with the federal government about privacy been What about a decade since that happened. And now the US Federal Trade Commission is likely to impose a record fine against Facebook for failing to protect users personal information. The District of Columbia also sued Facebook and this FTC finds going to come because of the settlement that apparently they have not been honoring.

Now another Facebook tip I learned this week about a plugin for Chrome called FBPurity, look it up online. I have it on my website. http://CraigPeterson.com. But FBPurity has been around since 2009. It's one of the top 150 highest rated Firefox extensions and I like the Firefox browser. By the way, half a million happy users. Check it out. It will let you block all of the crap that comes up in your Facebook feed. You are going to love it FB purity online. http://CraigPeterson.com. Make sure you sign up for my training this week. Okay, there's going to be three training videos I'm releasing there's going to be a live webinar we are going to be discussing small business security, do it yourself. This is all about teaching you exactly what you need to do how you need to do it and backing you up slowly. You can get your small business Small, Medium Business secure. I've helped everybody from a little mom and pop Soho all web to fortune 100 companies. We're security I'm going to help you as well. http://CraigPeterson.com. Have a great week and we will chat next week. Bye bye.

---

Related articles:

Most Of The Fortune 100 Still Use The Same Flawed Software That Led To The Equifax Breach

This Lamp With A Hidden Camera Could Be In Your Next Airbnb Nightmare

Facebook Shuts Controversial Program To Pay Apple Users For Data

Mac Users Being Targeted By A Sneaky Image-Based Malware Attack

Three Cybersecurity Must-Haves For Small Businesses

Cybersecurity Worker Shortage Hits 3 Million

F.B. Purity Hides Annoying Facebook Applications And News Feed Updates

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 1, 2019

We got another security thing to talk about today as Craig discusses the zero day attack at Health Sciences North and the shortage of cybersecurity workers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 


---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/01/2019

SecurityThing - Zero Day Attacks - How To Protect

Craig Peterson 0:00

Hey guys. Good morning, Craig Peterson here, we got another security thing to talk about right now, as usual, right? They get bigger and bigger. And this Thursday and Friday podcast, kind of a series, if you will. I'm going to delve a little bit more into real world problems that people and businesses a face that we're all facing things to do, how to detect it, how to clean it up, and that that's really what it's all about. And of course, we're also starting our new series where we're going to be going through using a little bit of webinar technology and kind of explaining things even more getting deeper into it.

Now, we talked yesterday a little bit about some ransomware attack that happened just a couple of weeks ago down in Salisbury, Maryland. And you know, that's a pretty bad thing that happened to a police department and I see this sort of stuff all the time, my local police department has an IT guy that is you know, he's seems to be a pretty reasonable guy. But the problem is you just doesn't have enough experience. And I've seen again and again, just not handling the basic so I want to get into that right now on the opposite end of the spectrum.

Let's talk about zero day attack. So we heard of these before you will see it sometimes in the news. Oftentimes it will mention a zero day attack because it's a little bit techie. And that's what we do here on Thursdays and Fridays, this is all about a major health care hospital and their downtime. This is a hospital up in Canada. This happened on January 18. So a couple of weeks ago now, we were talking about the Salisbury, Maryland. This is Sudbury Ontario. The company is called Health Sciences North and it was infected by a zero-day virus. They had to shut down its EHR to contain the infection. And this is all based on stuff we're seeing from CBC Radio Canada.

So the staff discovered the hack on Thursday morning, prompting that system downtime to prevent the virus from spreading. See, this doesn't say what his title is, Dominic Giroux, that he said that the virus came from another hospital in the region and there's been no request for ransom. Now that does happen where there will be a kind of a ransomware attack but no ransom note. Oftentimes you get the ransom note come up on your screen and it'll have a Bitcoin number it'll have a code that used in order to generate the random encryption and it might even have a phone number of these places have some pretty good tech support that you can use in this case they're saying that other this was a zero day attack, which means that hasn't been seen in the wild before.

Now, I always kind of cringe when I hear that because so many times people use zero day attack as an excuse for having really failed and they failed because they didn't have all the stuff in place that prevent zero day attacks. If you don't allow malicious looking stuff into your network, you're much less likely to have one of these hit you. So it hasn't been seen in the wild. So none of the anti virus companies have seen it. But here's the thing that's anti virus and how many times have I said that antivirus just doesn't work anymore. I've quoted John McAfee. I've quoted the the president of Symantec. It just does not work anymore. You have to have so much more than it has to be reactive. It has to be adaptive. You have to monitored thousands of endpoints simultaneously. And what I do is i'm using Cisco and some of their top people, and they're monitoring a billion. And point four things that are happening to look a little bit weird. Now, in this case, all 24 hospitals in the region rely on HSM. And that's a very, very big deal. They are an information technology platform for these hospitals one way or the other.

Now, in order to protect the hospitals, they did stuff they should have done in the first place. Officials have implemented this is from health, health IT, security officials have implemented other preventative measures, including shutting down some systems. He explained that out of its 24 hospitals, 21 are currently operating with the main Electronic Health Record system on down time. Now for a hospital. That's a very big deal because EHR these electronic health records of course are the lifeblood of a hospital, the lifeblood of any doctor's office and to have those things down is huge. It says further 12 hospitals have the cancer system on downtime while 10 have turned off medical imaging systems.

Now all of these hospitals are relying on this one system. It the virus entered from one of the other hospitals into the system, which means they obviously had some sort of a wider area network involved here. Maybe they were using VPN for but it was too flat. And we see this every time we go into a business. I don't care what how big it is, we've had Fortune 100 companies we've gone into and their network was too flat. It wasn't segmented enough to stop an event occurring at one of their clients to not be able to get it through. In other words, it happened at one of their clients, in this case, one of these hospitals, two dozen hospitals and that then spread to the provider of all of these medical record. That's a very big deal.

So today, little lesson is make sure if you are connected to your customers or your vendors that you have the proper controls in place at your network edge because that would have stopped the the spread of this two years ago when we had that world destroying piece of malware that was crawling its way through the systems. One of our multinational client caught hit and every one of their locations had to get shut down every one of them except for the locations we were protecting. Because we did it properly again, HSM up in Sudbury, Ontario did not do it properly.

And it just goes to show this shortage of 3 million security workers isn't I don't think it's how do I put this it's important to know and it's important to have more security workers but we are in a bit of a panic now. Because we can't find the right security work. It's not we, as in my company, not Mainstream, that's in a panic because we have a very close control on who we will help because frankly, we can't help everybody. If you're not swimming towards us, we are not going to rescue from the times because it's just not worth our time. I've been doing this for too many years, I'm not going to do that anymore.

So for the people that come to us, we try and make sure that we can have the right resources for them. And here's your problem. Have you ever watched Gold Rush? Gold Rush is kind of a cool show and it's on I think it's Discovery Channel and it's about these guys up in northern Canada for the most part who are mining for gold. And if you notice from season to season, the value of the  gold changes so they get an ounce one season is worth $1,000 and other seasons were 1200, 1300, then it's worth $1,050 and it just keeps moving around. Why does it move around? Well, it's supply and demand.

So here's what's happening right now with our IT security worker force in the US and around the world. Everybody's hanging a shingle up, yeah, yeah, I'm a security guy, cuz I got this certificate from whatever it was. And yet security is so much more than completing the course, or getting a certificate from even from Cisco or anybody else. There are many, many aspects to security that people just don't understand. And, and over the course of the next few weeks and months, I will be telling you some horror stories about some of our customers. But keep in mind that if you have just a worker who's VPN in you have the same potential problem that EHR has in Sudbury, Ontario, and that my multinational unnamed client had as well they have a network connection to you.

Yes, you probably have a firewall but know that firewall just like these major corporations had firewalls, then firewalls not going to stop the malicious code unless everything's done properly. And the next gen firewalls now that's that's another thing, right everybody? Oh, we got a next gen firewall Oh yeah. All that's all well and good for you. But what does it mean what does it do? How does it integrate? How does it tie to get together with other firewalls even outside of the organization so that you know that your data is pretty darn safe it's this is all kind of technical I got to admit it but hey it's a security thing and if you're listening you appreciate the security so keep your eye open make sure you get my email every week I'm putting together all kinds of great training this year and you can subscribe by going to http://CraigPeterson.com/Subscribe.

Hey Have a great weekend and I will be back of course tomorrow with my radio show as well and that'll make it into a podcast. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1