Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2019
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Feb 20, 2019

Craig joins Ken and Matt as he does every Wednesday morning. They talked about robocalls and the Super Mario Brothers video game that sells for $100,000. Craig also shared with Ken and Matt his best malware advice.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Robocalls And Phone Scams Are All The Rage In 2019

Unopened Copy Of Super Mario Bros Video Game Sells For Record $100k

---

 

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/20/2019

Best Malware Advice - What's My Mario Brothers' Worth - Spam Phone Calls

Craig Peterson 0:00
Hey everybody, bOy getting busy this week, I'm putting together all of the content for our course. And this is really exciting. This is, I'm so excited because this is gonna be the best course ever. Anyways, so everybody who signed up for this welcome aboard. Glad to have you here this morning I spoke with Mr. Ken and Matt we went over the this whole problem that we're having with frankly, these robocalls that are coming in. The spam calls the junk calls, what does it mean? What can we do about it? So we talked about that this morning. We also talked about our friends over at Nintendo here and is your game your Super Mario Brothers game worth $100,000 or more? A kind of an interesting question right. If you have one of those sitting around in your in your attic or your basement also I did some tech support help this morning for Ken which is kind of interesting because it ties in exactly with the course I'm doing right now but if you want little tech support help and want to know how to use secure your machines what's the best browsers and stop did that this morning with Ken as well. So here we go with Ken and Matt. Happy Wednesday.

Unknown 1:27
Back again and Craig Peterson is with us now as he always is Wednesdays at this time 7:38 on Wednesday Wednesday Wednesday. Craig, how are you this morning sir?

Unknown 1:37
I am I am I'm doing pretty well this morning. It's been a busy week and now almost winter again.

Unknown 1:45
Before, I have a question to ask you because I you know I was using Firefox and I started using Chrome and I opened this link and all these you know Orbits drops. It says, don't you want to buy an airplane ticket?

Unknown 2:01
Your PC may be infected right now. 

Unknown 2:05
So what is the spyware clean your computer program to put on,

Unknown 2:12
or we learned a lot from Wreck It Ralph. And Ralph breaks the internet. And I don't know if you've seen that movie. You

Unknown 2:19
know,

Unknown 2:24
the problem is, there's a little green guys running around trying to get you to click on things. So I think you're real question is, how do I stop those little green guys? Right? Yeah. Okay. Okay. How

Unknown 2:36
do I do my computer? How do I get rid of them? Do I get pest modern pest services?

Unknown 2:43
Yeah, that's kind of what you have to do. The pop up stuff is fairly easy to stop. Famous last words and what you do what I always do, and I do this in, in Firefox, which is a little better I should

Unknown 2:56
go back to Firefox. I don't know why my daughter told me to use Chrome stopping and going back to Yeah,

Unknown 3:03
yeah, it is. Firefox is much much safer with your information just in general, right? They're not out there trying to watch everything you do and sell it all in fact, they're they're very good about making sure they're up to date and blocking things but what's the best malware? That's such a good question and last week I started I had what four different cult courses classes last week for people free ones that I did. And that's one of the top questions and it's a kind of a difficult one to ask. It's kind of like you know, what's the best helmet to wear? Well, it depends and what it depends on is what you're trying to protect against because there's a lot of nastiness out there but here goes the drum roll because if you're running Windows you have a Windows machine then you're looking for the basic protection you can turn on Microsoft software and it's got Windows Defender get that turned on and Windows Firewall get that turned on and you're pretty safe as far as everything in general goes and then there's one more piece of software that I advise everybody to get and put on their machines and that's Malwarebytes. Malware-B-Y-T-E-S. It's very very good that was

Unknown 4:21
what

Unknown 4:23
that's what Matt suggested Malwarebytes

Unknown 4:25
ladies Florio Yes. Yes, exactly. And I got a great tip from Matt last week to with this this of Facebook plugin though. Are you enjoying? It

Unknown 4:37
isn't it's life changing? But

Unknown 4:39
whatever. What's that one?

Unknown 4:41
That's the one where you can filter your Facebook feed and get rid of all i don't

Unknown 4:45
i don't do Facebook. So I don't care. Maybe you would if you could filter? No, I'm not. No.

Unknown 4:50
Yeah, it actually works quite well. Yeah,

Unknown 4:54
Malwarebytes is really, really good. And then, you know, the Facebook stuff, there's a few the little filters, but built into Chrome, you can turn on pop up blocking, and I do that as well. So with Chrome, you go to your settings. And there's got to be there's a great search bar inside of the settings and look for pop up blockers. You can do the same thing on Safari, you can do the same thing on Firefox, it makes life much easier. Now, if you're a business, you can certainly use those basic pieces of software and Apple, if you keep up to date with your patches on Apple. It's even safer from the standard virus and hacker standpoint. And then Microsoft is, but since Windows seven Microsoft to ship with some of the stuff turned on. So there's your basics I really like. And this is what we use for our professional customers. I really like Cisco's, what they call AMP, which is their anti malware protection stack. And it's a bunch of different software. But there's one other thing you guys got to do, right? So I mentioned carry on all of your default stuff right now, at least on turn it off use Malwarebytes, but there's something out there called OpenDNS. And this is a lifesaver. This is probably one of the best things you can do as well. And it's also available for free or really, really, really, really cheap depending on what you're trying to do. And what OpenDNS does is when your computer tries to find where to go online. So you type in google.com, it has to turn that name into an address. So it has to be turned into an internet address, because that's the only way to get around. Right. It's not it's like a sort of Ken's house. So where's Ken's house? Well, now you have to look it up in the phone book. Right Ken? Right. And it's 123 mainstream street in Scarborough, Maine. It's the same sort of a thing. So what happens with OpenDNS, if you're using that is the computer says, Okay, well, where's Google that it's trying to find the address and sort of asks, in this case, if you set it up, right? Ask OpenDNS, OpenDNS, okay, well, he's he's 123 Main Street, and off you go, everything's wonderful.

But if you have some malware, if you have some evil software on your site, or let's say it's trying to drive you to some adware based site or trying to get you to go somewhere you shouldn't have be cooked on something you shouldn't have is going to ask, Hey, how do I get to the Kaminski house over there in Moscow, Russia, OpenDNS is looking at that and say, Whoa, wait a minute, we know those Kaminski guys and they're tied into this unabomber guy and this is a bad place to go. And so it OpenDNS as at that point is it stops you from going there and pops up a little while doesn't pop up. But it comes up a little message on your browser saying that's an evil place to go but it also stops malware that's on your computer so one of the first things this evil software does matter where does is it phones home just like ET and tries to figure out what do you want me to do next to do you want me to infect next. Our evil plan to take over the world. And so it tries to call home so how does it call home it does the same thing it says hey I want to call home and it goes to mask OpenDNS. OpenDNS says I know who you are I'm not letting you call home and we're talking about even on their paid plan one or two bucks a computer a month just stop the bad guys from calling home. It's phenomenal OpenDNS look it up now there's better software than that we tend to use Cisco Umbrella which is the next level up from OpenDNS but there you go I just gave you my best tip ever can they keep faith and and it's Mac and Windows okay so is it just across the board is great

Unknown 8:57
doing it

Unknown 8:58
okay all right so Craig Peterson joins us at this time every Wednesday and he tells us about all the things that can needs to know about his computer I've noticed Craig by the way that on my phone I had installed a like a robo killer app which had been reasonably effective for the past few months in stopping this avalanche This is waterboarding effort of these people to try to just destroy my phone and get like a call every 30 minutes or so but in the last two weeks like I don't know if they're getting around it they got new numbers whatever but now I'm starting to get more of these stupid robo scam thing calls and whatnot again and they're always the same they're always some insurance thing or they always have a warranty to sell me or or whatnot but there's also some people that are actually like literally scamming you and saying that you know you owe money and you got to pay the police department or whatever talk to me about phone scams and 29 in 2019

Unknown 9:55
Yeah, IRS, etcetera etcetera. I've gotten most as well and the FCC just released these results of a new study. And it's a welcome to 2019 guess what half of all cell phone calls give or take this year are projected to be spam calls these these junk calls, or worse their their phishing attack phishing P-H. Not the not the kind with the line and the hook but what they're trying to do is hook you so they call up I got I was on the floor of a conference and I was actually the exhibitor and I got calls from the IRS. And like, repeatedly, you have to send money and how do you pay the IRS? Well, it turns out from this phone call that I have to buy Apple gift cards and send them to the IRS in order to make good on my debt to

Unknown 10:51
it's just crazy. So what do you do? Oh, my gosh. Well, yet you're using Hiya right, Matt? Yes. Okay. Yeah. Hiya, H-I-Y-A is very good at stopping these just in general. But it's gotten so bad because they're, they're using your local area code and prefix when they're calling you. So if a call comes in, and it looks like it's from your neighbor, because it's your neighborhood phone number, you're more likely to answer it, then it's easy to fake and they're continually faking it. And there's no end to this insight. And I hate to say that, so let me tell you what I do. Okay, guys, I've set my iPhone into Do Not Disturb mode. Now, that can be a problem, because there's people who you want to call you. Well,

Unknown 11:43
they want to be disturbed, right? Yes.

Unknown 11:46
Yeah, exactly. So on the iPhone, what's really nice is I can put it in Do Not Disturb mode. And then I can say, if someone's in my contact list, let the call through. So I have a I have thousands of contacts in my phone. And so if any of them call me it goes right through to my phone. But you know, between us nowadays, when you call someone you kind of expect to get voicemail so if it's not someone who knows you really well, and they end up in your voicemail because you have Do Not Disturb turned on and you have habitat of culture contacts through and great, okay, so your wife's college kids calls, etc. going to come right through. But somebody that you haven't spoken to, in 10 years might go to voicemail. I don't think that's a big deal. But that's what I've done. I've got higher running, I ended up buying the paid version, which is pretty good. And then on top of it now, because it's gotten so bad. And the FCC is agreeing with us. We're not crazy, at least not about this Matt, that, hey, this is going to get worse. So take a look at that. On the Android side. There's a bunch of apps that you can put on your phone. Apple doesn't let apps begin to your phone calls away. Android does. So there's a lot of different options in the Android space. But I have found this to be very, very effective.

Unknown 13:15
We are talking to Craig Peterson, he joins us every single Wednesday. Right around this time. I you know, Craig I was kind of I don't know a lot about video by new I remember Mario Brothers and and because I they were kind of cute. And they ran around a lot. Why would Why would a a video game sell for $100,000?

Unknown 13:42
I mean, seriously, What? Why? Why?

Unknown 13:46
Well, it wasn't 100,000 100,000

Unknown 13:55
Yeah, it's

Unknown 13:56
it's interesting because this version of the video games it was sealed. It was unopened. Now just because you have one that might be sealed and unopenedn, it's not probably going to sell $100,000. This was a special version at only sold in New York. And Los Angeles was called sticker sealed so it has a special sticker on it. And it was also certified by this gaming authority of some sort. 

Unknown 14:25
So it's a collectors' item is what you're saying?

Unknown 14:27
big time Okay, big time. But you know, a lot of people loved it. It was one of the big first big games frankly out there for the Nintendo 1985 was when of course it was this version of the game was released. There were some that were a little bit earlier than this but that's why it's sold for that so don't go out digging them up from the basement of the attic. The odds are excellent. Your Nintendo game is probably worth at least $5 okay but it's probably not 100,000

Unknown 14:58
that's such a bummer oh

Unknown 15:01
alright

Unknown 15:02
we're up

Unknown 15:03
Craig Peterson our tech guru joins us at this time every Wednesday and this was no exception appreciate it Craig thanks so much for joining us

Unknown 15:11
I'm gonna go to that Malwarebytes place

Unknown 15:15
yeah hey if you guys want access to that training I did last week I did record it it's a few hours worth of it all about security stuff just send me an email just me@CraigPeterson.com and and I'd be glad to make it available to Ken or anybody else who wants to. Just me@CraigPeterson.com.

Unknown 15:34
all right there it is. Ladies and gentlemen Craig Peterson the man the myth the legend is with us as usual and we'll talk again next week Craig.

Unknown 15:40
happy wetness day

Unknown 15:43
wetness day indeed. Alright, so coming up at 8:08.

Unknown 15:48
That's part of the reason I do these. These hits here on the radio. It's just so much fun. Sometimes. I have fun with these guys. They're a little bit of play around. Anyways, hope you're going to have a great we talk to you later. I'm going back to the treadmill today. Yeah. Isn't that fun? Go Craig. Start an exercise again. Have a great day. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 19, 2019

Craig is on the Jim Polito Show. This morning they talked about Microsoft dragging the Internet Explorer to the trash. They also talked about robocalls and how you can avoid them. And a little friendly teasing about Craig being Canadian.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Robocalls And Phone Scams Are All The Rage In 2019

Microsoft: Drag Internet Explorer To The Trash. No, Really
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/19/2019

Microsoft's Surprise Announcement - New FCC Study Doesn't Look Good

Craig Peterson: 0:00
Hey, hello everybody. You might hear my little Roomba going in the studio in the background. I was on with Jim Polito this morning. We talked about a couple of different things. One is what's up with all of these phone calls we're getting? The FCC has some new statistics out talking about what's going to happen here in 2019. And we also had a little bit of fun because, you know, Jim and I were kind of those kind of guys, right. So first of all, he was teasing me more than a little bit about be Canadian now, which is, you know, come on really, really Canadian. And then we also talked about Microsoft and their crazy surprising admission. So all of that and more stick around here we go. And thanks everybody. By the way, who signed up for the master course and who attended the classes last week. I think things went great. So here we go with Jim.

Jim Polito 0:57
He really is one of my favorite segments of the week because we all bask in the genius that is our Tech Talk guru Craig Peterson. And here is the aforementioned bright star. Good morning, Craig.

Craig 1:13
Hey, good morning, Jim. And we had a lot of people here over the last week, get on those little seminars, webinars, training that I had put on for free we had we had about I think it was about 400 people. So that's fantastic. And we went through backups and what to do and how to do it and how to configure the Wi Fi to make it secure. You know just some basic security stuff that everybody needs so i i was tickled pink that that many people were happy to be there. And of course, a resolve free by the it was phenomenal. And then I offered afterwards if they wanted some more help. But anyways, it's it's great to see the interest Jim and we got the bad guys on the run.

Jim 1:59
Yeah, that's great. And folks, at the end of this segment, we're going to tell you how you can get on Craig's list. And again, see how we offer this free webinar. He's not going to try to sell you anything. He's not going to hound you. And he's not going to give your name to other companies so that they can try to sell you something. It is a free service that our Tech Talk guru provides and will tell you how you can get on board. And and while he did this webinar, when there's a big crisis, he's the guy you want giving you the straight story because if he can explain it to me, he can explain it to anybody. So hey, I want to go with something funny to start with. And that I want to get into robo calls. But Microsoft is telling people to drag Internet Explorer into the trash. I mean, I'm surprised that there's still people who haven't done that. But why don't you, why don't you explain? I mean, I mean, I look at Internet Explorer. Now, the way I look at Netscape, does Netscape even exist anymore?

Craig 3:09
Yeah, well, it Yeah, no. Internet Explorer, of course, was the the kind of pivotal, their key product. In fact, it was based on some of the Netscape stuff from way back when, and, and some others, but anyways, it is a piece of trash. There's no two ways about it. I've been telling people to stop using it for forever. And there are so many reasons for it. And one of the big reasons is, it's not supported anymore, which means two things for everybody Jim. What it means that people are not going to get the full internet experiences they want to get. Because frankly, there are people who are designing websites and web apps and things are not testing against Internet Exploder, I mean, Explorer. 

Jim 4:14
Did you just say what I thought you just said?

Craig 4:17
I did. Yeah, Internet Exploder. That's kind of our pet name for it. So they're not developing forward, so you don't get the good experience anymore. In fact, if you are a developer, you know that for at least 10 years, you have to develop a website for everything else in the world, Google Chrome, and Firefox, and Opera and Epic and all these different browsers. So that's great. You got one website, and then you have to upload another website for Internet Explorer, which is crazy. So you're not going to be getting the right experience. And it just doesn't have the security updates anymore. So Microsoft's Chris Jackson said he was talking about this uses the perils of using Internet Explorer as your default browser. Now, there are a lot of people who are listening, who might work for medical, you know, like a hospital or something, and they're still stuck in the Exploder world, in those cases, because again, they develop their own software, and the people who are developing it weren't very good and didn't realize maybe I shouldn't say that, because some of them might be listening. They're the best in the world. But they were stuck with Internet Explorer. And you know, in this day and age, you're using Chrome or you're using Firefox or use Epic if you're really concerned about your security out there. Who would have thought that Microsoft and finally admit that you should drag Internet Explorer into the trash?

Jim 5:42
The thing is, now, if you have antivirus software, it will to some extent protect you. But if Microsoft themselves if they're not fixing Explorer, there's only so much you're antivirus software can do, right?

Craig 6:03
Yeah, you're absolutely right about that. Because what we're really talking about here is a huge, huge problem for for people. Microsoft is warning you that you're not going to get the right experience. Many websites don't even work with Internet Explorer anymore. You don't get the advanced. Yeah. And then on top of it, there are vulnerabilities so yeah, you're right about the security side. Jim. 

Jim 6:26
All right. We're talking with Craig Peterson, our Tech Talk guru. And at the end of this segment, I'm going to give you, well, he's going to give you a number that you can text my name to, and you'll get a lot of great free information and standard data and text rates apply. But don't worry about it. You get all this great stuff. Okay. robocalls. And phone scams are all the rage in 2019. I can attest to this and we've talked about this before. Bye. I get at least three calls a day from a number in the Brockton exchange. Now let me explain why. When I lived elsewhere, for some reason, when I changed my phone number, and this was a long time ago I got a Brockton exchange. And if you know anything about Brockton is a little bit of a rough town, nothing against everybody in Brockton. But it's a little bit of a rough town. So the first time I call people on my cell phone, generally they see a Brockton exchange and I say, I'm not talking to this guy. I don't know why I got Brockton. But I got that number decades ago and I don't want to give it up. But I get these calls from a Brockton exchange all the time. And I know it's a scam. And it's interesting how they think, well, we'll make it a local call. So Jim will pick it up, when in fact, it's probably what in the Ukraine, I'm getting the phone call from?

Craig 8:04
Yeah, there are a lot of places all around the world, they typically user A team. And what this is, is a spam call, right? So they've got someone who speaks English usually quite well. And they represented their debt collector, or they're from the IRS or they're from your bank. And the list just goes on and on. And the FCC just released a study they put together and the FCC saying that nearly half of all cell phone calls, and nearly half of them are going to be spam.

Jim 8:44 
Are you kidding?

Craig 8:46 
Half of them. Now, I can say for me, you know, I use that Hiya app, which is really helpful. But for me, I would say it is closer to 90% of my calls, or spam.

Jim 8:54
Danny is saying, Danny, you use the Hiya app.

Danny 8:57 
I use the Hiya and it stops a lot of them. But like that one, I have a Framingham exchange number, and I get a Framingham call every day it won't stop that one. It stops a lot of the other ones.

Craig 9:07
Yeah, it should give you a little warning, Danny that says possible.

Danny 9:11
It does. Yeah, and I know exactly who it is. But yeah, some of the other hires, you can just cut it off completely.

Craig 9:16
Yeah, I don't even see them. You and I would have ended up doing, and people might consider this themselves. And I kind of hate to say this, but I, you know, there's a lot of people I know. And I have all the people I know in my contacts includes everybody from LinkedIn, all of my customers and stuff. So I have like 5,000 contacts in my phone. And what I've done is I went into settings on my iPhone, and I put it into Do Not Disturb mode. And then so what happens is, you don't get any calls. You don't get any text. You don't get anything. And then there is an option in Do Not Disturb that says, but allow calls from my contacts.

Jim 10:00
Oh.

Craig 10:02 
Yeah. Tricky eh? So now if somebody.

Jim 10:04
Wait, wait, wait, wait, wait. You just said eh. Danny caught it too. Danny looked right at me when you said eh, Craig. You can take you can take the boy out of Canada, but you can't take the Canada out of the boy. Go ahead. Go ahead. Mr. Peterson

Craig 10:25 
It's a beauty eh? 

Jim 10:28
There it is. There it is. Talking Bob McKenzie.

Craig 10:30
Yeah. Exactly. Oh my gosh, back in the day, Anyways, what I do is I put my phone into Do Not Disturb mode. And then I say allow my contacts to come through. So anybody who's a contact of mine, if they call or text it's going to come right through to me. What that means is, everybody else is going to be blocked by Hiya entirely, like I never even knew they called unless I go into the app. Or they're going to get pushed over into voicemail because my phone isn't going to even alert me that someone's calling. And then I have to call them back which in this day and age how many people actually expect to speak to a person as opposed to voicemail anyways? Yeah, so so that's been my work around and with 50% of calls this year projected to be spam calls, junk calls, scam calls. You know, something people might want to consider

Jim 11:28
And look, is there any risk was one of these apps of me losing an important call. There can't be. Oh, there is

Craig 11:37
There is. There is because it's it. First of all Hiya is based on calls that people are reporting so if someone calls from 555-1212 and the call comes through to somebody and then they report it as a scam call if a couple of more people report that numbers a scam call then Hiya is gonna say okay this is a scam because they don't do any real investigation into it. There's just too many of them and there's hundreds of thousands of numbers now in Hiya. So yes, if you're if you're waiting for that call from your your new great job, you're not going to want to have Hiya turned on and you're not going to want to have your phone on do not disturb mode because they can get blocked and no question about it.

Jim 12:23
Okay. Now, Craig, as we said, if you want to get this information and have access to the genius that is Tech Talk guru Craig Peterson what you do is text my name Jim to this number

Craig 12:38
855-385-5553. That's 855-385-5553.

Jim 12:47
That's right. Standard data and text rates apply. But you'll get great information and like this free webinar that was done over the weekend by Craig Peterson. Great information. Craig. Always a pleasure eh?

Craig 13:04
Hey, take care. 

Jim 13:05
Take care. Bye-bye. Yeah. You hoser, right. Craig. Thanks. Craig Peterson, everybody. Our Tech Talk guru. I got to make sure that I send him a card on July 1 Canada Day. Yes, they have Canada Day on July 1 because they wanted to be like us.

Craig 13:24
It was funny. Anyhow, I hope you're enjoying these let me know what you think. I've gotten a lot of great comments from people. You can leave a comment on iTunes that really helps to get the word out. The more people that subscribe to my podcast and leave five star reviews and hopefully you would as well on iTunes. The more people that find out about this podcast so go to iTunes while actually here's the easiest one, http://CraigPeterson.com/iTunes. How's that for easy? http://CraigPeterson.com/iTunes. I'd really appreciate it then it's going to help to get the word out. Take care. Have a great day and we will be back tomorrow.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 16, 2019

Craig goes through some of the free training he offered this week on setting up and securing Wi-Fi, Firewalls, and Back-ups.  He has some video training on each of these on his website but they will be coming down soon.  So, go check them out.  

During the next four weeks, he will be offering a master class on DIY Security.  If that is something that interests you -- you might want to sign up.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/16/2019

Expert Cybersecurity Secrets - Introduction

Craig Peterson: 0:00
Hi everybody, Craig Peterson here. This is almost Week 1000. That's that is a lot of weeks of radio shows. And today we are going to be talking about security and securing your business and your home computers. Now, this is a really important show today because it coincides with a week worth of training video, straight training, hours of training that I produced this week. We did a live session on Thursday as well with Q and A's and I have it all up through tomorrow for you to watch. We're covering some of the top toughest things that you need to do. Explain the technology. I started with Wi-Fi and what you should be doing. How to secure your networks to keep the bad guys out. How to secure yourself when you're on the road.

I went on to firewalls, and when you should and should not use the built-in firewalls, on your computer systems. And then on Wednesday, I got into more detail. As we delved into really something I think a lot of people overlook, and that's backups. Did you know, more than 70% of the time, businesses cannot restore their data from backup even when they have a backup because it fails? So on Wednesday, I went through the 3-2-1 strategy of backups. Grandpa, father, and son on top of the 3-2-1 and explained how to do it. And then on Thursday, I went into more depth and went through three more topics. This is a lot of training and it's absolutely free. Now it is going away tomorrow. Okay. 

And the reason I'm doing that is twofold. One, these topics change security is constantly changing, you know, from my weekly newsletters that security is a huge deal and constantly evolving. So part of what I talked about this week is how to automate it. How to make it so that everything is automatically updated, automatically upgraded because it, because of the changes, you've got to do that as well as how the most professional tools out there allow you to tie your computer network into the one that I use over a billion endpoints that are being constantly monitored and have humans behind it to find if there's any problems. So that then allows you to be within one hour of the latest attacks, the latest vectors that are out there. All of that is changing constantly. So that's the first reason I'm taking it down tomorrow. 

And then the second reason is, if I don't give you guys an incentive, I've learned this right? 1000 weeks of shows. We're talking about decades, right? So I've learned that unless you set a deadline, things don't happen. And that happens with me too, right? When Well, how do you get something done? You set a deadline, right? If it wasn't for the last minute, nothing would get done. So, you need to go out there right now. That's what this is about. That's why I spend time every week on the radio explaining what's happening, why it's happening. And this week, I've got another one here. This is from the HIPAA journal. This is a ransomware attack on a podiatric office. Bobby, Bobby Yee and he has 24,000 patients. The protected health information is all locked up at the medical records encrypted.

They tried to do restores, and then you do pay the ransoms. That's something else we cover and you know, I work with the FBI, infra guard. I do the webinars for the Infragard program. And I help the people that protect our nation's infrastructure keep their data safe. So you're getting a lot of experience behind this and it's going to be absolutely huge for you.

So I'm going to pull a little piece out of one of this week's programs and play it here for you. You can still get this today if you go to my website http://CraigPeterson.com. You'll see it right there on the top of the homepage and you can watch these videos this training and you can watch the replays and you can get a lot of the benefit. Of course, you're not comfortable asking questions live, but because you're a radio show listener, you can ask me questions anytime. 855-385-5553

But this training will go down, okay. It is not going to be remaining up on my website. And there's a lot of good reasons for that. I really need you guys to do this because that's the only way that you're going to be able to keep your businesses safe. So let's get right into this. Here's a little bit of the training from this week.

Hi, everybody. Before we go further here in the training, I want to tell you a little bit about my backstory. How did I get to the point I'm at today? Well, it's not the 1990s anymore. The 1990s is when I got first hit with malware and almost lost my company. And the bottom line is you can't be complacent anymore because you can't stay in front of the hackers. You know, you might use some of the right tools today, but tomorrow you will not be using the right tools because the continually changing that's part of what I didn't realize because cybersecurity is one of the areas of business that you don't want to attract attention to. And one of the areas of business that, frankly, you have to have automated, and they have to have in place that's going to make sure that none of your data stolen, and I think you're going to have to agree that keeping your business safe isn't always as simple as people sometimes make it seem. And that's where I was back in the 90s.

Keeping your business secure comes with real challenges. You've got to go on Google and YouTube research; what the hackers are doing, then you have to research on how to deal with it out of the millions of possibilities. You have to narrow it down to something manageable, affordable, something you can do yourself; then you have to lay it all out which machines need which software? Do you need to change out or upgrade your firewall, your routers, your switches or other computers? You've got to go and buy the right software. You've got to install it on all the machines. You've got to configure it correctly so that it's going to work for you. Then once all of this is in place, and all of the research is done, you're going to have to maintain it by doing updates and upgrades, sometimes daily.

Then there's the fake updates, the ones that pop up and you can't decide if it's real or not. Right now, there's a huge fake a scam out there that says, hey, you've got to upgrade your Flash player. I'm sure you've seen that. So once you've got everything up and running up to date, you're going to have to monitor it. Are there logs you should be monitoring? What are these logs even mean? Is your computer slow because of a hack underway? Or is it just because of the latest version of the software that blew up on you? It all becomes so complex that you really can't do it anymore. Well, you can't figure it all out. You can't design that you can't lay it out. You can't install it; you can't monitor it. But there are some solutions. That's why. In this video, I'm going to demystify the process of securing your computers and your Wi-Fi. It's going to save you a lot of time, money and frustration. It's also going to keep you safer.

So in this first video, I'm going to share a framework that I developed after years of trial and error. It's called the expert cybersecurity framework. And it's a framework that's going to serve as a tremendous resource to you to eliminate the guesswork and frustration out of trying to secure your systems and provide you with expert advice if you run into problems. Listeners on my radio show know that I'll answer questions almost any time and I do that daily.

Now maybe you've already been hacked. Or perhaps you're hoping to understand better the basics of cyber security and what you need to do to help secure your business from the hackers, but maybe you need a little bit more help to make the right choices. Either way, you're in the right place because, after this first video, you'll be able to confidently secure your wireless data. Yeah, Wi-Fi can be secure. I developed the Cybersecurity Framework because I saw so many businesses who were struggling business people who were wearing 100 hats trying to get everything done and then lost everything because of a breach. Businesses who couldn't afford high-end consultants to solve the problems that small and medium businesses face every day in cybersecurity. For example, I saw a distributor who was starting to make it big in the food and beverage distribution market. They had a couple of dozen computers, but they only had antivirus software and a firewall and router that was provided by their cable internet company. They struggled every time because they kept getting hit by the latest virus or malware. Then I also saw a $10 million a year manufacturer trying to up-level their cybersecurity. They were struggling because they didn't have any professional cybersecurity resources that they could rely on. And cybersecurity software and hardware decisions were being made by somebody in purchasing. They didn't have a solid roadmap to follow. And when they got hacked, they had to shut down all operations, manufacturing, sales, distribution, and support for weeks. It cost them millions.

Do either one of those stories sound familiar to you? You know, I could go on, but I knew that people needed clarity because in full transparency that was my story too before outlining the expert cybersecurity framework and the specifics for each step. You might be wondering how I got into all of this and figured it out. Let me tell you so you can understand a little bit more about where it's all coming from. 

Back in September 1991, it had finally become legal to do business on the internet. And so I did. I'd been helping develop the networking protocols for more than a decade. And I wanted to help get businesses online. So I did, we got busy building websites there. And 91 through 93, we were setting up email servers, we even built a lottery system with a daily million dollar drawing. Some of these companies are of course, or companies that you would recognize some of these websites are still alive today in their fifth, sixth, seventh, eighth generations. We didn't have the time to worry about yet another security problem, so we stuck with the basics. After all, who would come after us we were just a small company building websites.

Then, along came Robert Tappan Morris. His father worked for the NSA, the National Security Agency, and he'd been writing code for the government to use to probe the internet. So Junior decided that he'd steal his father's NSA code and use it himself. I got nailed, and there was no one there to help me. This was the early-mid 90s. I spent days trying to figure out what had happened. I had anti-virus software. My machines weren't that far out of date; I'd applied patches from time to time. Does that sound like something that you've done? Right? It's typical, right?

I just wasn't technical when it came to malware back then. I decided that I had to invest in myself and my business. I had to learn about cybersecurity fast, and I had to clean up the mess that
Junior had left behind for me. I had to save my business. Once I got our cybersecurity under control, I started seeing massive growth in my business. With my attention now fully focused on growing my business building and maintaining the websites, I was able to quadruple my staff and income over the next few years. Finally, I could focus and get back to work. But it took getting cybersecurity under control before I could spend some serious time on my business once again.

So today I'm running cybersecurity webinars for the FBI Infragard program. I'm a keynote speaker. I do breakout sessions at conferences I've spoken for Ink Magazine more than once for their CEO symposiums I've helped more than 5000 businesses ranging from fortune 100 companies all the way on down to mom and pop operation.

Today I'm a sought after cybersecurity expert with more than 25 years of experience and almost daily media appearances. And I don't stay up late at night any more worried about some hackers stealing my business and destroying what I worked a lifetime to build. But the story doesn't stop with me. Everything I'm about to share with you is the exact plan I follow to secure my systems as well as that of my client. I'm going to reveal to you expert cybersecurity secret that I've never revealed before. And it's the plan that led me to experience more than 20 years of hack-free, virus-free, ransomware-free business. More importantly, this means I'm free to work on my business without constantly looking over my shoulders or wondering what I'm going to have to remove next. And that's what I want for you. You will be watching this video if you weren't concerned about cybersecurity, that's why I make things easy for you. So here we go.

So that's a little bit of the training of my intro as to what I am doing, how I got to where I am at to today where obviously I've been studying and working on cybersecurity now for over 25 years. I guess that's a long time and I you know, I, as I told you, this is all free training. There are hours of it. It's not one of these hard-sell type things by any stretch because there's no offer at all until the very, very end, so I think you will enjoy it. I've had tremendous feedback. I'm just shocked and amazed and grateful to everybody who reached out to tell me what they got out of it. How good it was and how much I appreciate it. So again, you'll find it at http://CraigPeterson.com. It is up through tomorrow. So go there. Now there are hours of this stuff about how to secure your business, how to secure your home computers, how to be secure when you're on the road, what do all of these terms mean? How do you use them? So whether you're just a small business, kind of starting out trying to do more than just use that antivirus software thing came with your computer and hey, I get it right. Most people that's all they use. And frankly, that's all they know about. And these antivirus companies don't care about you. They just want to sell yet another copy of the software and hope you never call them with any problems. So I'm trying to help you get beyond these problems, and they-they are very real, and you're in this spot because they put you there. 

So I get it. So if you're just somebody new starting, you're going to learn a lot. And if you're somebody who has an IT guy or gal who is trying to take care of things, but man, are they underwater, they just don't. There's too much to do. They need a little help, maybe a little bit more training, they are going to find some real gems in this training. So sign them up for it, send them an email with the link say, hey, check this out. Follow up on this because we're going through some of the best things I've ever put together, frankly, and these are my top tips, and I walk you right through it hand in hand, showing you exactly what to do. I've got screenshots and explanations of everything. It is phenomenal stuff. So that happened Monday, Tuesday, Wednesday, Thursday this week. And if you meant to sign up and follow along, it's not too late today. It will be too late tomorrow, so make sure you check it out right here on http://CraigPeterson.com.

So let's talk about a couple of breaches. I've been doing kind of breach podcast lately as well. And I mentioned at the beginning of the show today, this ransomware attack on a podiatric, I guess, podiatric offices I've heard it pronounced both ways. And they had 24,000 records with personal health information, protected health information. This is common if you're a medical practice at all. Having 24,000 Records is nothing, and this is an attack that took place and their medical records were encrypted. Now under the HIPAA regulations you I, think it's only two hours that you can your computers can be down because part of the reason for that is what if you're patient ends up in the emergency room, needs extreme care and you can't look up the records, right? It's a very, very big deal. And the law says you have to have those records available. So getting them attacked and encrypted by ransomware means that first of all, you can't access those records. So the patient is going to be upset. And frankly, patients have died because of this before.

So it's a big deal for doctors to have people's full names, addresses, contact, phone numbers, their sex or birth date, social security number, health insurance information to have that all stolen. It's also a big deal to have all that data encrypted. Think about a regular business to have it all encrypted because now you've lost your sales records, you've lost your customer information, you've lost your orders, everything and as I mentioned earlier, nine, or excuse me, a little more than 70% of businesses cannot restore their backups. Because when they try, the restore fails. And I see that all the time. So that's one of the things that I cover this week. How to do effective backups so that you can be sure that your backup itself isn't encrypted, because I've seen that before as well. So that was what we covered on Tuesday. 

Now we had hackers who also got into a wireless network and were able to monitor what was going on. And once they're in the wireless network, they had access to the server because the server for the businesses on the same network as the wireless they hadn't segmented their network and they hadn't locked down there Wi-Fi and there are ways to do that as well. And we use in fact logins for Wi-Fi, that are restricted to specific machines. We use that in businesses that have financial information that might not want to have it out and what business doesn't have that? So they got in, they can get at their bank record and were able to transfer the funds out of the bank. You know, it only takes 90 seconds once they have access to your bank account to get that money out of the country. And some of these hacker groups are so sophisticated. They've set up their banks in their home country. So 90 seconds later, the money is wired out of your bank to their bank, literally their bank in the foreign country. Do you think their banks are going to cooperate with trying to get that wired money back? Of course, they don't. And how did they do that? Well, they did that via Wi-Fi, a Wi-Fi breach and that's what we covered on Monday is how to prevent Wi-Fi breaches.

The other Wi-Fi problem that we repeatedly see nowadays is we see piggyback on Wi-Fi wi. So you are, for instance, at an airport and you're using the VPN. And that VPN is connected to the office, and now they're piggybacking on your VPN to get to the office. And now the malware that was on the laptop at your house that you took home is now effectively in the business network because of the VPN and then spread and spread ransomware throughout the business. That's what we covered on Wednesday. What are the most effective ways to stop ransomware? And we explained firewalls and how they can stop the spreading. How Microsoft ships with firewalls, as does apple. But is it turned on? Is it configured right? Well, half the time, the answer's no. The other half the time the answers kinda. Okay, so that's what we covered on Wednesday, we went into a lot of details on that.

And then on Thursday, we went into the seven top things you can do to prevent ransomware and not have them hit you as well as data breaches. So it has been a very busy week, and the reason I'm talking about this so much as I really want you to secure your network can you don't have to use me. You don't have to hire my company. It really doesn't matter because you can do this yourself. And that's exactly what I'm doing in this training. I'm showing you step by step what to do. So you don't have to go online. Get millions of Google results. Get hundreds of thousands of YouTube results is you're searching to find out what's the best anti virus? What's the asked for ransomware or what's the best for spyware? What's the best for worms? What's the best for on and on and on.

It's all there. And I'm serious. This is I I'm sorry to beat a maybe a dead horse here. But there's still a lot of people that haven't taken advantage of this. And that might be you. So the way to do that goes right now to http://CraigPeterson.com. It's right at the top of my homepage.

Now, if you're a home user, I've had a lot of people ask questions. Is this right for me? And the answer is yes, it is because the same types of concepts that apply in a business most of those also apply to homes as well and home users. So you can check that out as well. As a home user, I don't care. This isn't to try and sell you, and you're not going to all of a sudden get a page that requires you to pay money. This is free. Believe it. And I know one radio now there are so many sponsored radio shows. So, many radios show that are trying to just plain old sell you something. I'm trying to help. It's real.

So check it out at http://CraigPeterson.com. I have helped over 5000 businesses. Now. It's probably in the neighborhood of 5500. I think it with securing their networks, getting them on the internet, making sure they have the right kind of presence. And they're all the way as you heard from the replay of one of these videos from this week. I've helped everybody from a small office, a home office all the way up through fortune 100 actually fortune 50 companies. So I know that this is going to be valuable because it's what I use with them. It's what I've used myself, and it's multiple layers of security. That's what you have to have. Just having an anti-virus package or having a via firewall isn't going to do any good. 

Just using the router and firewall that comes with your internet connection is nowhere near good enough right there. There's a lot to know and a lot to understand. And if you have any questions, listen, people, I'm here for you. I am. And I have so many testimonials from people saying that it's true. I you know, I should start recording some of them. But if you have any questions, there are two ways to reach me easily. And I'll help you anytime, anyway I can. I'll even do a little research for you online. If there's something that's specific to you. But you know what, 95% of the time it's not just you. Everybody has similar problems, but you can reach me via text. This goes right to me and my team 855-385-5553. So get out of paper and pen or get out your phone and write this down.

Email, you can just email me@CraigPeterson.com. If you want to invite me to speak at one of your events. I can do that. I charge for keynotes obviously, but I am trying to help out when it comes to all of these local companies that might need a little bit of a little bit of encouragement. Various groups. I speak to all of the time. Spoken many times everything from Rotary Clubs through a high tech council. I'm glad to help you out and glad to speak.

Again, 855-385-5553 that goes to me and my team and you can send me any question you want. And I'm more than glad to help out I have been there I have suffered before, and I'm more than glad to help you out 855-385-5553 and me@CraigPeterson.com. Make sure you watch these videos are going down tomorrow. I don't have them on YouTube. You're not going to find them anywhere. 855-385-5553 and http://CraigPeterson.com. Hey, have a great week. Fingers crossed. You don't get hacked this week, and I'll be back next week as well. Take care. Bye-bye.

--- 

Related articles:

Robocalls And Phone Scams Are All The Rage In 2019

Microsoft: Drag Internet Explorer To The Trash. No, Really

Unopened Copy Of Super Mario Bros Video Game Sells For Record $100k

Cut The Cable — Great Deal On Streaming “Stick”

Dad Fell For A “Tech Support” Scam

Two In Three Organizations Not Convinced They Can Avoid A Breach

Ransomware Gang Infects Customers Of It Support Firms

Amazon Filed A Patent Application For Tech That Could Link You To Your Identity And Job

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 14, 2019

It's another It's a Security Thing Thursday. Craig talked about how the bad guys can hack through using Wi Fi as they did to Five Guys burgers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/14/2019

Wi Fi Hack Five Guys Burgers

Craig Peterson 0:00
Hey, good morning everybody. It is a cyber security week. So it's a perfect week to have yet another cyber security thing. And that's what we're going to do right now. Talk about one of the things that has happened recently out there in the world that's really caused some cyber security anxiety. And we're going to start by talking a little bit about something that happened to Five Guys. Now, do you like Five Guys? I think, you know, they're my favorite burger place by far. There's no question about that night. I think that they understand burgers, but according to the California Attorney General's office, they received a letter from Five Guys which by the way you have to do if you have a breach and you have any customers in California. So if you have a breach and you're in New Hampshire as a business and you have one customer in California, 
you should check the law here because in sometimes it's a hundred  customers. Sometimes it's more or less. Varies from state to state. Isn't that fun?

But they informed them that the name, date of birth, social security number, address, higher date, termination date, and 401k contribution information had been stolen and it was affecting their employees. Now, they didn't say exactly how many employees were affected, but the company gave them a complimentary one year membership to Experian's identity works service. Yeah, Experian. I love them too. So keep that in mind. In this case, it said that it did happen because of one employee and that's all it takes. An investigation into the matter determined that an employee's inbox contained messages or attachments that had all that information in it. So have you ever sent for instance W2 information via email to someone else in the company? 1099 information, HR information via email? Well apparently the bad guys hacked their way into this email. Now, there's a lot of ways that they could have done it. One of them is via Wi Fi, and monitoring the Wi Fi. So let's say an employee is over at an airport, they're traveling, they connect to the airports Wi Fi system and they now access their email. There's a good chance a bad guy could be monitoring, could be fooling the email system and gaining access. I don't know that this is what happened to Five Guys that might be but when that happens, they have access to your email which means any of this type of private identifiable information could be stolen as well as bank account numbers etc etc.

So keep that in mind and also this week I talked all about Wi Fi and how to secure and how to use it when you're on the road that was on Monday. I have a special video up that you can access but you have to go to http://CraigPeterson.com and these videos these training videos it's all about the training I got hours that I did and posted this week all about the training you will find at http://CraigPeterson.com. But you only have a couple of days left before that training is taken down because I really want to motivate motivate you guys you got to get off of your collective butts and get it done. And those people who already watched the training and let me know how much you appreciate it. Hey, I appreciate the great feedback.

So http://CraigPeterson.com. Don't let you or your business get nailed by one of these Wi Fi vulnerabilities and I've got all the training for you all for free so you don't have any excuses anymore. Take care. Talk to you tomorrow. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 13, 2019

Craig is on with Ken and Matt on WGAN Morning News. They talked about hackers hacking the Nest devices and the Russians infiltrating US utilities. They also talked about how you can check if your password has been compromised using the Chrome extension Password Checkup and the website Have I Been Pawned.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Hackers Hijacked A Family’s Smart Home, Spammed Nuclear Missile Alerts

Chrome Can Tell You If Your Passwords Have Been Compromised

Report Highlights The Crazy Lengths Hackers Took To Infiltrate Us Utilities

How Hackers And Scammers Break Into Icloud-Locked Iphones

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/13/2019

Nest Cameras Being Hacked

Craig Peterson 0:00

Hi everybody, Craig Peterson here. I had a chance this morning to talk a little bit more about what I talked with Jim Polito about this a bit yesterday. But we talked a little bit more about the hackers and what's happening with them breaking into iPhones, we've got hackers who are breaking into Nest devices. Hey, if you've got any of their stuff, some of their security cameras, etc. You're going to want to hear what's happening. So that's what we covered this morning. And I'm getting a great response to these courses that I've put up. I mean, phenomenal. Really, I'm not I'm not making this up people. So if you missed them, make sure you check them because they are up today. All three of the initial training on security. It's no sales at all. This is entirely trying to help you out with securing your business network. You know it does apply to individuals as well. So you'll find all of that at http://CraigPeterson.com/concierge. You'll also find it on my homepage you can sign up for the Thursday webinar as well there http://CraigPeterson.com. All right here we go with Ken and Matt.

Unknown 1:29
7:38, WGAN Morning News Wednesday morning. The day after the storm. Day after the storm. Time now to talk to Craig Peterson, our tech guru. He joins us at this time every Wednesday to go over the world of technology. Craig Peterson, how are you sir this morning?

Unknown 1:43  
Hey that's me. Doing well.

Unknown 1:44  
Are you having bad weather over there?

Unknown 1:46  
You know we had a lot of snow and sleet to and I haven't really been out yet this morning to see if we got the rain afterwards. But yeah, there you know the birds are in and the bees haven't come out of their hive so I know it's not the best morning.

Unknown 2:00
Okay, so let's talk about some tech stuff. Um, so I have a lot of passwords, and I always worry about the being compromised. Can chrome help me out on this? I do use Chrome. 

Unknown 2:10
Yeah, Chrome is one of the better browsers out there are a lot of people have been concerned when it comes to Chrome and security, and how much is Google trying to, you know, monitor what I'm doing, etc, etc. And although Google does want your information and obviously does sell some of the information, it's interesting that they are trying to keep you safe. And I think most of our listeners would like to know about, you know, some of the details behind there but we won't get into that today but into what you're talking about here Ken, I think is really important. There's a couple of different websites out there that have been kind of collecting over time. Some of the breaches you know we mentioned there's a 750 million record file that was released a couple of weeks ago that contain people's credentials. And since then, there have been some other bigger ones. about one and a half billion people's information is out there on the web. Now, we're talking about the dark web here when I'm when I mentioned the web.

So what a bad guy does so that you understand how this works is they have a username, they have a password. Now, if they break into a new website, and the website is hopefully fairly secure least the passwords are encrypted, they'll steal the password database, and then they'll run through all of these hundreds of millions of records and try every known password. So it's important for you to not use a password that anybody else has used before. And that's what Google has done here now. There's a new Chrome extension that's called Password Checkup that you can install on your Chrome browser. And then what happens is if you go to a website, and you use credentials on that website that are known to be breached, and the database that Google's uses over 2 billion records of breached passwords and usernames, so if it's a known breach, password or username, it will alert you right then in there, which is really great. So it's called Password Checkup.

But I want to mention one other thing because Ken you mentioned you're concerned about passwords and security and that's a website called Have I Been Pawned and this is from an Australian guy out there who put it together and it will tell you much the same information as Google but it'll also if you put in your email address, it will also tell you if your email address shows up anywhere on the dark web in one of these hacks. So what I'll do is everybody that's on my SMS list. I'll text out a link directly to both of those today when we hang up so that everybody has it. You can just click on the link go to the website you can download the Password Checkup plugin you can download the Have I've Been Pawned, well not download it, but you can go to the Have I Been Pawned website and I'll send you direct link.

So if you want those, text me and do it right now, so you don't forget. Get out a piece of paper and a pencil. It's 855-385-5553 and I'll send you direct links via text when we hang up. 855-385-5553 but I think this is really good news for people who use Chrome and who want a little bit more security it's really good stuff Ken. 

Unknown 6:00
We're talking to Craig Peterson, our tech guru who joins us now as he usually does on Wednesdays, to go over the world of technology. Craig mentioned text messages. I remember a while back a lot of people in Hawaii, he got a advanced warning via text message of nuclear holocaust. And apparently this is now happening again, this may be smaller numbers of people, or what have you. Are people going to be hacking into my phone to basically tell me of the coming apocalypse?

Unknown 6:27 
Well, this is an interesting problem, because in Hawaii, when it happened was somebody messed up in the in the state and it came out as kind of a federal alert and people probably remember that the nuclear missiles were flying from North Korea and were going to strike any minute and people kind of freaked out. Well, there are of course now smart devices. And Matt, you mentioned that you've got some of these Echo devices like I do, right. And Ken do you have any of those in your home as well?

Unknown 7:00
Yes, I renamed it computer. Computer, what's the temperature outside and it goes by the way, sometimes it just lights up on its own which worries me a little bit.

Unknown 7:12  
What color does the light up?

Unknown 7:14 
Sometimes blue, sometimes yellow.

Unknown 7:15 
Okay, well the blue is because probably it thinks it heard you say the name. Yeah, say the name. And yeah, so that's probably what that is. But here's what's happening. More and more devices in our homes have built into them Alexa or Google Home or some of these other technologies and they are hackable. Now the Alexa, you know, these little Echo devices, not so much the Google Home the Apple HomePod, not so much. But in this case there. There's a story that came out this week and it was about the Nest security camera. Now interestingly enough Nest has been in the news quite a bit recently for major security problems, including allowing anybody that work that Nest to look at any video stream that is ever been recorded by any Nest camera, right.

It's kind of scary when you think about it, because I kind of liked the technology behind Nest. And what the heck are they doing giving everyone access to every security video ever. They've kind of tighten that up a little bit. But in this case, somebody hacked their Nest security cameras and they gone online and this poor family in California started getting this alert that a nuclear war and broken out missiles were headed for multiple US cities and this family California wasn't alone we know about another family this one in Texas where their Nest system was hacked and used to threaten to kidnap the baby's family. In Canada the reporting it as well that some people have been hiring hackers to break into Nest and Wink and and even tried to break into some of the Amazon devices belonging to another family.

But it's it's a little bit of a scary world so if your Nest or other device starts warning you about global nuclear war it's probably not true. But little warning systems that are on your phone and do you guys get a warning for instance about this storm that was coming?

Unknown 9:27
yeah exactly why do weather.com I got Well that's all you got a weather okay well there are alert systems in place just like the one in Hawaii it's a warned about the nuclear missiles but there are alerts systems in place that will send you things about emergency situations in the area. Some states have amber alerts to go out automatically to completely different system so we're not talking about those devices being hacked at this point it looks like Nest has the most vulnerabilities.

Unknown 9:58
We're talking to our tech guru Craig Peterson who joins us every Wednesday at 7:38. http://CraigPeterson.com. If you want to go easy as box anytime you want. So you know we're waiting for Robert Muller's report which we could get in the next year or two. However, you know there are some some evidence of Russian hackers infiltrating our utilities. What's the scoop with that?

Unknown 10:25
I love Russians. I watch the Americans. One of my favorite TV shows.

Unknown 10:32 
That was a great TV show. I hated the ending of that.

Unknown 10:37
I'm on season four so.

Unknown 10:39
Although it's probably the most realistic ending they could come up with. To be honest with you, though. I mean.

Unknown 10:45 
Oh shut up both of you.

Unknown 10:48
I can't hear you. Yeah, there. There are a number of hack attacks going on right now. The Russians are seriously considering using the internet as a first attack vector against the United States, they're also saying, Hey, we're gonna use it as defensive mechanism. We'll see what ends up happening. But there is a ton of hacking going on. And that's kind of the bottom line about all of this stuff. They are breaking into some of our phones. iCoud locked phones, you remember when people were stealing iPhones back in the early days, just grabbing them at coffee shops, right? And it got to the point that Apple did something about it, which is if you have Find My iPhone turned on on your iPhone, which everybody should do, turn that on. If your phone is stolen or your iPad is stolen, there is almost no way to recover that phone. Apple can unlock it, but that's it. Nobody else can. And so what's happening is the bad guys are coming up to people holding them a nice point or guiding point and saying unlock your phone and turn off Find My iPhone.

So the bad guys get a little bit smarter about it so that they can then resell that phone out on the black market or use it as they might want to. There's some rumors about the ability to still break into the newer iPhone 10. And you know, life goes on, right. But it's interesting to see some of the bad guys now on the streets trying to break into iPhones. But so you do it the old fashioned way. They're mugging people.

Unknown 12:32
Indeed. All right. Craig Peterson, our tech guru joins us on Wednesdays at this time to go over the world of technology. Craig, thank you, sir. And we will talk to you again next week.

Unknown 12:44
Gentlemen, take care. Thanks.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 12, 2019

Craig is on with Jim on the Jim Polito Show. They talked about the Google Chrome feature and website that can help you check if your password has been compromised. They also talked about how hackers are doing to infiltrate US utilities.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Report Highlights The Crazy Lengths Hackers Took To Infiltrate US Utilities

Chrome Can Tell You If Your Passwords Have Been Compromised
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/12/2019

How To Check Your Passwords And Why It Matters - WSJ Article About Russian Attacks On US

Craig Peterson: 0:00

Hi everybody, Craig Peterson here. Hey, I hope you're enjoying this training I'm doing this is invaluable I think. I'm giving away my best stuff absolutely free. This is just phenomenal. It's up to this week that will be taking it down because I don't want to present information that's out of date or old. So I may do something in the future again about this, but we are going through the basics this week. Stuff you need to know to keep your small business or even your home safe. But I'm really trying to help out the small business people and it's all free. It's absolutely free. The training is there. I'm not upselling anything. On Thursday, we've got a live Q and A live webinar so make sure you check it out if you haven't already. http://CraigPeterson.com. It's right there on the homepage.

Hey, this morning I talked about a couple of really cool password checkup techniques you can use some free stuff and I'm sending that out in fact everybody that's on my SMS list. If you want to be on that by the way to get the alerts about the latest hack when it's really important. I don't send out, there's hacks every hour every minute in fact. Just the big ones that might affect you. Make sure you text me just text the word Craig or your message or your question or anything because this is me This is my phone number 855-385-5553. So just text Craig to 855-385-5553.

If you do that you're not going to be even letting me know that you did anything because guess what? It's automated if you say Craig but if you say something else then it's not automated but we'll get back to you. We'll answer your questions or problems. I'd love to do that again. Just text my name Craig.

Now I will also send you this information if you want it so let me know, on the password checkups stuff. And that's the main thing we talked about. But we also talked about an article in the Wall Street Journal that just came out about the hackers and, and some implications of it that I really hadn't thought of before until I was discussing it with one of the guests that's going to be on my FBI infra guard webinar this afternoon. So lots of great stuff today. Have a great day. We'll be back tomorrow. And don't forget. Get that training. http://CraigPeterson.com.

Unknown 2:37
Here he is Ladies and gentlemen, the man who helped invent the internet. Now like Al Gore, who took credit for it. He actually wrote code that you don't realize is helping you while you're on the internet. Our good friend tech talk guru Craig Peterson. Good morning, sir.

Unknown 2:56
Good morning, Jim. Waiting for some snow. Winter is coming.

Unknown 3:00
Yeah, you love you love that. You. You. You Canadian you. You love it. You don't care. You know, it makes no difference to you Craig Peterson whether it's you know what I mean. Like when you hear that forecast, you're like, Okay Yeah,

Unknown 3:18
It's like the winter vortex, right, that came down. All the complaints about. I remember days were not high when I was walking to school is 40 below zero. Come on people. Grow up.

Unknown 3:35
That's true. Hey listen, I'm with you. Suck it.

Unknown 3:37 
Well you get used to it. I have a friend who works with me who is now down in Florida. And he's he's actually from right outside Boston, and it gets to 60 degrees and he's dressing in layers now. So I guess it's just a time thing you know, we were down there with our kids and school was still open. No one was coming in and our kids are out there running around and bathing suits every everybody else's all bundled up. So I guess it can happen.

Unknown 4:13 
I will never, I would never acclimate to Florida. I could never do it because I'm. I'm always hot. I mean, but that's just me. But hey listen it is it is what it is. Pretty soon we'll have virtual reality. You want to feel what it's like and where Craig Peterson went to school. You just press a button put on your headset and your suit and it will be like you're walking to school barefoot in the snow with little Craig Peterson. So.

Unknown 4:37
Yeah, that's coming. You're right because we've we've already got some of this stuff it isn't where I had hoped it would be by now but when you're talking about things like the Oculus and these 3d virtual reality glasses and and now there's suits you can wear it or have you seen the gamers use things but they're thinking chairs for quite a while that that will kind of you know vibrate and stuff when stuff happens. Now there's a suit. It's kind of like a vest they can wear and it squeezes them. If they got get shot, they feel it hit them in the back, or wherever it hits them. It's coming. But it's really slow. I guess most people really aren't that interested in it. And I've tried it before. And, kind of a whole home, at least for me. But, you know, us 30 year olds, we're just not as interested as the kids does.

Unknown 5:27
I love that. We're taling to Craig Peterson. And at the end of this segment, I'm going to give you will Craig's gonna give you a number and if you text my name, you'll get a lot of great information from Craig free, no obligation. He doesn't sell your name, and he doesn't try to sell you anything. And standard data in text rates apply. Okay, this caught my attention Chrome, the browser, Chrome can tell you if your passwords have been compromised. Is this difficult or could the average person like me figure out how to use this because I'd like to know if my passwords have been compromised.

Unknown 6:00
Yeah, it's a really good idea to use some of these password check up programs. You know, I've recommended one password many times to a lot of people. And in here on your show as well. It has this built in so it when you generate a password or you type on in it, double checks to see if it's been hacked or not. And there's a website out there, I'll text it out to everybody. After we get off the air. Everyone on my text list called Have I Been Pawned and that now allows you to type in your password and see if it's a known password that's been stolen before. Now why would you want to know that right? If you have a bad guy that's trying to break in what they do is they use these huge databases. We talked about one a couple of weeks ago, 750 million records in the database. And now by the way, there have been more of those databases released over the last two weeks, and were over 2 billion now. So what happens is the bad guys grab a copy of a database from some website that they've stolen it from. And oftentimes, it's encrypted. So your password has some protection on it. So what are the bad guys do they use the passwords that they have seen before out there and they try them all because it doesn't matter if they're trying to log into the website yet they're just using their computers to figure out what your password is.

So if you're using a password that is known to have been stolen previously they will test that against the database then they've got your password and now they try and login. So that's how it all works. So when you're talking about using something like Have I Been Pawned I think it's important to do that but having something like this is called password checkup. So I'll I'll put together a little thing. And I'll send it out here to everyone on my text list afterwards on password checkup, and the other website to have as many times and what happens is you you install that on to your Chrome browser. And it will now tell you if you're using a username and password combination that Google knows to be unsafe and using the same database. Yeah. Isn't that great?

Unknown 8:31 
That is good. That is good. Right up front, you'll know. Right up right up you'll know.

Unknown 8:37
Yeah, like so what will happen is it'll, it has a little pop up, it's going to be in your browser bar and it's going to warn you if you're using a password that's been known to be compromised, it'll have a pop up that comes up when you visit the website and try to use that password it will say change your password and it'll allows you right now you can say I ignore the site or you can go ahead and change your password on that site. But Google saying they have a database of 4 billion credentials that they know have been compromised, and various data breaches. And it uses those to check and see if you're legit or not. So I love that that's so important Jim.

Unknown 9:17
We're talking I'm with Craig Peterson, our tech talk guru. He is the man with the plan. And again, we're going to give you a number at the end of this segment. If you want to get more information about what he's talking about today.

Let's go to US utilities. We when we worry about hackers and cyber war, I guess I guess our utilities are Ground Zero. You knock out the utilities you don't need to roll tanks down Main Street. You've had a major impact on a country. I mean, you could defeat them in a war. So Russian hackers I guess are going after the electrical grid. Wall Street Journal had a report Friday that talked about their techniques. I know you're concerned about this. Why don't you elaborate?

Unknown 10:08 
Yeah, it's a very big deal. In fact, I'm holding a webinar this afternoon for the FBI Infragard program, talking about some of this stuff. But yeah, critical infrastructure. So important. So think about what could happen in a power failure situation. And what we're gonna be talking about this afternoon is it goes beyond much beyond what most people think about because obviously, you've got hospitals, but you've got first responders, but you've also got the guys and gals that that drive the trucks, it's scheduled the loading of the trucks. If there's no power the phone's not going to get shipped, right? It goes on and on.

And when we're talking about these types of hacks, there's another thing that can happen. Think about what we apparently did along with the Israelis to the Iranians we went ahead and we got a virus into the the Iranian plant that was manufacturing the necessary steps to make a nuclear bomb and all of these devices that were in there, but what are we gonna do? We're gonna just shut them down because all they have to do is turn them back on, right? If we shut off the power to the plant, then they just restore the power Yeah. So what we did is we made cold understood the centrifuges and understood how to play with the centrifuges and play with a monitoring system. So the Iranian operators were sitting there and everything looked normal Jim. It looked like it was doing its thing it was making this powder cake that was going to be used for nuclear war. I mean, you know, power plants not they've never done that.

And what we did is we made it look normal and we had those centrifuges, very expensive, very fancy, not like we had in our chemistry lab. We made them self destruct. So we destroyed thousands of these things. So when you're talking about the Russian hackers and what the Wall Street Journal was talking about him and what we'll be talking about later on today, in the Infragard webinar, we're talking about not just turning off the power but destroying the infrastructure Yeah, getting it to self-destruct.

Unknown 12:30
Yeah. Getting it to self destruct.

Unknown 12:37 
And if we lose, like these big transformers we have, and we talked about EMP, is the electromagnetic pulses before that happens naturally, as well as man made, it could take 30 years for us to restore all of our power here in the United States. So it's Yes, it's a very, very big deal. It's something we need to be conscious about.

It's something we need to pay attention to and I'm going to send out a text after we get off the air as password checkup plugin for Chrome and also the website you can go to detect your passwords . And then if you go to my website as well I sent out a text I think it was yesterday morning I have four training sessions this week absolutely free about Do It Yourself cyber security if your business yeah if your business here's exactly what you need to do. So I talked yesterday about securing your Wi Fi and that video's up you can watch that. I talked today about your firewalls what you need to do there. I'm talking tomorrow about the right kinds of backup, 3-2-1 backups and also what you need to do for disaster recovery. This is my best stuff, Jim. It's absolutely free. I'm trying to help people out businesses out because this is really happening Jim.

Unknown 14:00
That's why we have you here, folks. Craig Peterson. Get ready to write this number down and get ready to text my name to get this information and more from Craig Peterson. Craig. The number is?

Unknown 14:12 
855-385-5553. That's 855-385-5553.

Unknown 14:21
Just text Jim to that number. Jimmy if you like. He'll answer to both. Standard data and text rates apply. He will not sell your name. He will not try to sell you something. You'll get great information like this. And as Craig said during this segment updates when things are going on, and things are happening out there. You will know first, Craig, thank you so much for your time. We look forward to talking with you next week.

Unknown 14:50
Hey thanks, Jim. Take care.

Unknown 14:52 
Take care. Bye bye. All right, when we return a final word.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 11, 2019

Craig is on WGIR at the Auto Fair listener lines with Jack and Justin. They talked about Lowe's Iris smart home technology shutting down on March 31st as well as the things you can teach your Amazon Alexa.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Lowe’s Smart Home Device Platform Shuts Down March 31st
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/11/2019

Lowes Iris Smart Home Technology Dies - Amazon Alexa Tricks And Tips

Craig Peterson 0:00
Hey good morning everybody. I kind of have a voice left that we get this bug it's been going around. Thank goodness I don't have the flu but I'm kind of congested and here I am making videos doing all of the training this week. I just finished the firewall video explaining what they are, how to use them, when you should turn them off, when you should turn them on, how to use the free firewalls in your computers. And I was just struggling through this. It's I guess it's that time of the year right everything's closed up and you're indoors who knows maybe it's even an allergy but anyhow. So I'm a little clogged up today. What am I gonna do? What am I going to say well this morning I was on with Mr. Jack Heath and we've talked about a couple of technology things when it comes to smart homes Lowe's and if you've seen their Iris displays that's about to change. That's Lowe's whole foray into the smart home technology platform. And we also, this morning, talked about Amazon and the Alexa and the Dot and, and Justin got a new one. So talk a little bit about how I use them in my home and what Justin thinks of them as well. So here we go with Jack Heath.

Unknown 1:16
Hey, right now Craig Peterson our Tech Talk guy. And Craig joins us for a few moments on this Monday morning on the Auto Fair listener lines. Craig I guess maybe the Smart Home app by Lowe's may not be around much longer.

Unknown 1:31
Hey, good morning, Jack. Yeah, this is an interesting turn. But it's something that could be pretty easily predicted. You know, in every industry, when it starts out, there's a lot of players. We had hundreds of automobile manufacturers at the turn of the last century and goes it narrowed right down as there was consolidation. Well, Lowe's you might have noticed has something called Iris. You've probably seen it on the end caps at the local Lowe's stores. And this was their answer to home automation. And it was a pretty decent little package but you know, I kind of kept an eye on it and never saw anyone standing there looking at it. And apparently Lowe's has decided that maybe having their own smart home technology brand isn't the way to go. So they have announced that the app for Iris as well as their devices are going to be shut down on March 31, Jack, and that means that they're going to be reimbursing some people. They will be giving out some gift certificates to people. It looks like Samsung is going to kind of step in and trying to help with this whole transition, maybe take over some of the devices. But as Justin and I were talking about during the break here is Amazon man they seem to be winning this game and Lowe's is obviously lost.

Unknown 2:54
Interesting. Hey are you just as you were saying earlier what would you say you have in your home now Justin? 

Unknown 3:00
I got that Amazon Alexa Dot thing. I got a subscription to something. They sent me one for free. So listen, I know Bezos probably knows everything about me at this point but I don't care. I love the thing. You can spy on me all you want.

Unknown 3:14
Well it's just the pictures I think he's after but the other story. It doesn't spy on you. It's a real interesting technology the way it's set up. But basically when you give it the wake word, and by the way you can change that wake word. It doesn't have to be Alexa. It can be computer. It can be Amazon. You can change that. But when it when you give that wake word that's all local. It is not sending your data. It's not sending your audio up to the cloud for people to spy on. It is being processed locally. And then once it wakes up and start sending the data to the cloud. But Justin I agree with you. I've got some of these Alexas in my house too. I've got the show. I've got the Dot and I have pre-ordered the Amazon Alexa for the car. It's a little thing that's going to sit on the dashboard. But I don't know about you Justin. I have found it to be really really handy. I use it to tune into WGIR. I use it to listen to music. I get the weather report. I get a recap of the news. It's incredible.

Unknown 4:21  
So here's what I do Craig because my my kids don't listen to me. But the listen to a machine. I set a reminder to tell it to tell my daughter it's time for her to go, you know, get the shower at night because she's stuck on her phone. But when she hears Alexa, yell at her. She'll do it. It's like wow. Alexa could parent for me now too it's great.

Unknown 4:41
Alexa. Yeah. Wow. What's the next one? What is next? All right. Craig Peterson. Good stuff on this Monday morning. Thanks, Craig. Joining us in the Auto Fair listener lines.

Unknown 4:51
Take care guys.

Hey, a reminder, by the way. If you are trying to do computer cybersecurity yourself, for your business where you're just trying to keep them safe. Right. You know, you're not trying to become an expert or anything. That's what I'm doing this week. So make sure you are on it. Go to http://CraigPeterson..com. Sign up right there on the homepage. I'm giving away my best stuff for free. This is not a pitch fest. http://CraigPeterson..com,right there at the top of the page, click the sign up button. Sign up for that webinar will tell you about all of the other stuff we're doing this week and get you a little bit more information. Let's put it that way about what to do and how to do it to keep them safe. Take care. We'll be back tomorrow. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 8, 2019

Cryptocurrency is in the news, again.  I am sure you all know by now what I think of cryptocurrency as an investment. Listen in and you'll learn more of why I came to that opinion.

Browsers -- which one is your favorite?  For me, it's Epic which is a more secure browser based on the Google Chrome platform. Today, I am going to talk about some plug-ins that you can use to help keep you more secure!

The FBI seized a lot of counterfeit bills this week.  But there is an interesting twist to the story so Listen in.

Utilities are under attack.  Listen to hear about all the "unique" ways that Hackers use to break in.

Have you heard of Iris?  That is a Lowes brand smart home brand, well they are shutting it down. Listen in for more information if you are a customer with these devices. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/09/2019

Counterfeit Cash And Cryptocurrency - Lowe's Shuts Down Smarthome Iris

Craig Peterson: 0:00
Hey, another Saturday, another radio show. Craig Peterson here, enjoying our new intro music. Hopefully, you like it too. Kind of lively gets the blood flowing at least for me. Well, today we're going to be talking about a few interesting things. Have you heard one of these warnings come on your phones? They have a number of them now. For instance, they have warnings about you know, big storms coming your way. You probably heard about what happened in Hawaii with their nuclear warning. Wow. Hijackers are involved now. So we'll talk about that. What these hackers are doing.

Hey, have you invested in cryptocurrency? Do you know when I say invest? I'm just joking, right? Because cryptocurrency is just one of the silliest investments ever. Not that I give investment advice on my show/ But wow do we have some news for you. Yeah.

Chrome, this is fantastic if you use the Chrome browser and I do use it but I use Epic which is based on Chrome. You can run some of the Chrome plugins and is much safer doesn't doesn't monitor you like regular Chrome does. I gotta tell you about this wonderful tool now that you can plug right into Chrome and it's going to help you with your passwords and tell you they've been compromised. I love this one. Our friends at the FBI. This is an LA Times article and they seized a whole, I'm looking at it right now, a ton of fake $100 bills. I'll tell you about that and how they found out what was going on. And yes, they were using Bitcoin to buy them and sell them but Bitcoin and cryptocurrencies are not untraceable and proven again by our FBI and hackers and scammers how they're breaking into iCloud locked phones. And a very interesting report that is in the Daily Caller and up on my website as well about the crazy links that hackers have taken to infiltrate US utilities. And Lowe's, if you bought their Iris stuff. You got to hear what's happening with Lowe's. Now, all of this, of course, is up on my website. I did not send out the regular email of this morning. This morning's email was all about what I'm doing this coming week. I had hoped to get it done last week, just too many things came up. You know how that goes. Right? You have to take care of your customers, you have to take care of your family. And that's what I had to do last week.

So this week is the training course. You are going to love this, okay. It really is going to change your life. I'm giving away some of my best stuff for free. I'm going to teach you some things you can do yourself. And it's aimed at small businesses, medium businesses. Even larger businesses can take this information and run with it. But hopefully, they have the right people in place that are security people that know what they're doing. But if you heard me this weekend, heard my podcasts you heard about this huge shortage. 3 million cybersecurity workers short. That's guaranteed now to get a lot of people saying that they are cybersecurity experts hanging up their shingles. And they don't know what they're doing. Guaranteed. It's going to happen. Happens every time. I hated it back in the 90s when people said, Hey, I'm an internet expert. I can build your website and they had no idea what they were doing. And they hurt the whole industry. They gave us all a bad name. And I'm afraid that's exactly what's going to happen with cybersecurity.

Anyhow, DIY, you can do it yourself, you'll see a sign up on my homepage at http://CraigPeterson.com. I'm going to walk through this with you, you are going to love it if you've already been hacked. If you're concerned about getting hacked if you are already wearing 100 hats at work. And this is a security thing is just one more hats you have to wear. You have to attend this training this week. It's free. Like so much stuff that I do. Obviously, I have to pay bills, right? So hey, if you want to hire me, that's one thing. But this is the free training with my best stuff, you are absolutely going to love it. So if you did not get these articles in your email this morning. And for that, I apologize. Because I wanted to focus in on the training. And it is so so important to you. But you can find all of these articles up on my website, there's always at http://CraigPeterson.com.

So if you scroll down below the sign-up, because today, there's a sign up on my site, and it'll be up for a few more days, and I'm taking this stuff all down, right, this is not going to be up forever. If you miss it. This week, you are going to miss this training. All right. But if you scroll down on that homepage, you'll see today's articles. Because I can guarantee you with only about 20 minutes left. In today's show, I'm not going to be able to get into a whole lot of detail. So if you want to find out more, that's where you go. If you want to find out about these pieces of training because I'm going to have different trainings coming up. The odds are almost 100% that this training I'm about to do will never be done again. Okay. Because it's always different. There's always more things to know and learn. But make sure you're on my email list. http://CraigPeterson.com/subscribe or you can just text me right now get out a piece of paper and a pencil if you want to write down that number. Because this text number is my number. And you can always ask me questions. I'm always available to help we do so much stuff for free for small businesses and home users. That it's, you know, it's open to you anytime you wanted. So write it down right now. Hopefully, you got that pencil and paper in hand write down 855-385-5553 or you can text to it right now. And that way you can remember this, go back in your texting history. 855-385-5553. If you text my name to it, just text Craig, I will sign you up for my text alert. And those come out to remind you that my show is live on the Air. I also will text you when there's something big happening in the security round that you need to know about. Because the regular news sources sometimes take a week or two to catch up with the stuff you need to know.

So it's pretty rare. I do this maybe every couple of months or might be a text on that. But I'll let you know when something critical is happening. But I only let you know if you reach out to me. And the easiest way to do that is to just text me 855-385 5553 and text my name Craig and I will be more than glad to answer any questions or help you with any problems that you might be having okay? You don't have to be my customer. We will help you with you know, we're not going to spend a week with you. But we're going to help you we're going to send you on the right track.

So let's talk about some of these articles for today. Well, we're going to start with Lowe's because this is something we're going to see more and more of in the future. And you know, just like any industry, any business that's been started historically, you have a lot of people in it. And then it kind of settles down to a few big players and they buy out the smaller players. Well, we're seeing that shakeout now in the smart home business. If you've been into Lowe's or Home Depot, you've seen Smart Home stuff. In fact, in the Lowe's store, it's usually right by the Service Desk by that little counter where you return things are asked questions. And right there they have a whole bunch of different smart home devices that you can use. Lowe's also had their own stuff, and I've seen this on the end cap of over by the electric section where you have the wires and the switches and the cables and all the stuff that you might need to use in your house. You got to replace a socket or you know, whatever it might be. It's right there. And it's called Iris. I-R-I-S and you might have seen it there before. I certainly have. I poked at a little bit. But I never bought any of their stuff because I knew there'd be a shakeout and I wasn't sure that Lowe's is going to win it. And I never ever saw anyone else looking at that display.

Now the stuff up front where they've got some of the Amazon Home stuff in the Google Home stuff. Yes, I've seen people up there, but never looking at the Iris stuff. Well, Lowe's tried to become kind of the main player in smart home technology. And that's what I was all about. It was all integrated. It was all designed to do all of the things you'd normally want to do in your home. But it did not make Lowe's enough money. It just really wasn't successful. And Lowe's last November said, Hey, we're going to get out of this category, at least with our own product. And it has now announced that it is completely shutting down Iris, your app is not going to work as of March 31, 2019.

So if you bought this Iris stuff, the app's going to go away. But I've got a little bit of good news for you. Make sure you upgrade the firmware in your devices and in the app because it looks like what they've done is they have partnered with Samsung and Samsung is going to be working with them to help take over those Iris products that you already have. So it stopped charging paying customers as a January 31. So should not have received any more bills from Iris for monitoring or other things and is issuing visa prepaid cards to customers to help them migrate to other smart home platforms. So keep an eye out. The good news is you're going to get a few bucks out of Lowe's most likely if you've registered. And they also have some other gadgets that are using Zigbee. And I've had the founders of Zigbee on my show before. So if there are Zigbee compatible Z-wave compatible, or you can switch to the Samsung ecosystem. So you have some options if you're interested in doing that.

But again, the big players right now it looks like Amazon's winning this game. Google with the Google Home has some nice stuff they're not winning. Philips is now using and tying into the Amazon Echo and all the whole Amazon infrastructure as are a number of other vendors. We saw that at the Consumer Electronics Show this year where really Amazon is starting to appear almost everywhere. So that's really really good news. I think for all of us. Finally, the big shakeout might be happening and that makes you feel a lot more comfortable when it's time to buy things.

Speaking of buying things. Let's talk about this counterfeit ring and
interesting how do you promote yourself if you're a counterfeiter? Well, some of you know that I run the webinars for the FBI is Infragard program and I get different guests and, you know, I in pre-interview them, I talk with them, I have them do presentations. I do q&a with them. Right? I'm kind of in the middle of all of that stuff with the FBI Infragard program anyways, right. A little bit of an FBI insider thing, I guess. But obviously, they don't tell me anything right there. Well, they don't tell me anything that's like a secret or underway. But I do get a little bit more information the general public does. And I attended a briefing. And this was with the secret service where they were talking about shutting down a nefarious dark webring. And this ring was selling drugs online, it was selling just all kinds of things. You can find prostitution, and find everything out there on the dark web if you look for it. And they were using Bitcoin, the bad guys, in order to be untrackable, untraceable. And guess what? Of course, you're not. Yeah, there is certain degree of anonymity in cryptocurrencies. And I'm going to talk about the negative side of n Just a minute. But there is also a way to really track people and make sure that, you know, you can kind of police it. And in fact, that's what they did. The Secret Service was policing it and they did find this ring and they did get convictions on it a very interesting how they did it, and what was involved with it.

Now, we have a story that's coming out of the LA Times about a secret service agent, his name is Matthew Britsch, I guess. B-R-I-T-S-C-H. And he went online and started looking for major counterfeiters. And in case you didn't know the Secret Service, besides protecting the president handles counterfeiting cases as well.

So he was online looking for counterfeiters trying to figure out what was going on. And so he went out into the dark web and was out there trolling and there are a lot of police organizations even down to local police departments that spend a fair amount of time looking for bad guys on the dark web. They look for and catch pedophiles and counterfeiters and other things and this story is about a counterfeiter. Now he found this counterfeiter who went by the name of Billmaker, not very original I guess but that was his online persona and he promised high quality hundred dollar bills and he had a money back guarantee. He even had thought of eBay here or Etsy he even had reviews out there from fans that said his work was excellent That was really good and so apparently this the Secret Service agent said well let's give this a shot right. Here's a guy one of the reviews said very good quality and got here quick. Then other one said all passed with no issue whatsoever fresh clean bills. Billmaker's, a five-star guys the Secret Service agent he wanted those five-star reviews to help them sell more bills that were clearly his goal. So the Secret Service agent bought the bills and in September 2017 he purchased the four fake hundred dollar bills for $120 in Bitcoin which is this online cryptocurrency. Of course, the idea is, hey, bitcoins anonymous, and I'll be able to do it and everything's going to be just fine, right? So he'd been carrying on as it turns out for quite a while because these counterfeit bills arrive right on time. They were as good as promised. And when the Secret Service got their hands on them, they examined them and they found these bills were a match for about $4.1 million dollars worth of other $100 counterfeit bills that the Secret Service had found.

So, this guy named Billmaker, the nation's most prolific domestic counterfeiter. Isn't that amazing. So that September 2017 purchase sparked this nine-month investigation where they poked around more in the dark web they found more cyber-savvy criminals are using online bazaars to buy and sell more these goods from illegal firearms and illegal drugs, illegal identification. Stolen cars even they poked around but it's really interesting because I love this quote these guys were right out there quote right in the open it's all there for sale. But while it provides some anonymity to criminals, it provides anonymity to law enforcement. They can't tell who they're selling to and so we went fishing. Isn't that interesting?

So the Secret Service has made more than 15, 15 actually almost 1600 counterfeiting related arrests last year seizing 204 million and phony bills. Banks and retailers collected in addition 100 and $7 million and fake bills. It used to be these artisans who made carefully forged bills on large offset printing presses kind of like the way the federal government does it. Nowadays these counterfeiters are relying on computers scanners laser printers and they use the dark web to sell it. So it's interesting there's a lot of detail and how it happened and it's good to know this if your a security professional. In fact I there's open jobs I wanted was a Thursday I guess it was I do a podcast in case you don't know you can sign up at http://CraigPeterson.com/iTunes and you'll find them right there. http://CraigPeterson.com/iTunes. But I do a podcast called It's a Security Thing. And it's a brand new podcast. And I talked about specific security interests. You know, if you're a security guy if that's what you do as part of your job, and I was talking about these cyber crimes that are now advertising online paying $700,000 to a million dollars a year to hackers, some very serious money so they're really going after it.

And in this case, Billmaker was caught and they're using the US mail, which made it very easy for the Secret Service to find who he was. And they said they were, by the way, very impressed with the quality of the work that he had done. They had a pretty good fake security strip on them. They even felt like they were real. There's pictures in this article up on my website http://CraigPeterson.com of these bills. And the picture of the guy who was making them as a young guy would guess his early 30s based on the picture, but very interesting, interesting stuff at Oklahoma City.

Wow, we are running out of time I got to talk about this whole thing around the cryptocurrencies as well because I know some of you have bought them because you've told me. Now You already know I don't give investment advice on this show. There's other shows on the stations, another podcast, they give lots of investment advice, most of which I take with a grain of salt especially when it involves technology. But when we're talking about cryptocurrencies, yes, it's
the future there's no question it's the future. That's how things are going to shake out. But we are so early on now that I have refused to put any money into cryptocurrencies. I think it's absolutely insane to do. They are so volatile. Look at the money people have lost just this year. It's really, really nuts.

So when I saw this article this week from Gizmodo, it was a week ago, it was Sunday. So as of tomorrow, it's been a week a company in Canada is one of these crypto exchange companies. And there's lots of them, these are the places you go you give them good old American currency that you can wire in from PayPal or from your bank or on your credit card and they then turn it into the cryptocurrency of your choice. And that might be Bitcoin. There are many other cryptocurrencies out there and they then send you the cryptocurrency. Now it's kind of complicated. You have to have a wallet, these crypto exchange companies can hold your currency for you. Some of it's in hot stored some of it's in cold storage. There are passwords involved. There are big keys involved. That's what it's all about. Right? And that's part of the reason I don't trust it. Well

This crypto exchange called QuadrigaCX and if you had money in there. Listen up. QuadrigaCX has about $200 million of people's cryptocurrencies that they are holding. Its founder's is a 30-year-old guy who went to India and died in India. Okay, so that's bad, right? The CEO of any company dying it's a bad thing because all the company goes through a bit of a slump. Oh, no, CEO died CFO died, whatever it was, but in this case, the founder and CEO died and you know the slump you kind of expect but it'll be back on its feet, right? Well, in this case, Mr. 30 years, smarty pants held the keys himself and did not have anyone else with any access to the keys. So this exchange was holding roughly 92 million US dollars in Bitcoin. 1.3 million of Bitcoin cash, almost a million in Bitcoin cash SV. It had Bitcoin gold that had Litecoin and had Ether, you've heard of that, I'm sure if you're really into this. So totaling about 150 million, according to the affidavit and apparently, more as well, that brings it up to close to $200 million.

So there was a filing in Canadian courts last week about this saying bankruptcy. No one else has the passwords for it. So basically, we're talking about at least 140 million dollars lost. Now the Canadian Imperial Bank of Commerce, according to the CBC froze 26 million worth of QuadrigaCX's assets in January this year after finding irregularities for the payment processing and the documents in the Ontario Superior Court Justice concluded that 67 million worth of transactions ended up and properly transferred into the personal account of Custodian Inc the payment processor. That's part of the reason I don't buy any of these cryptocurrencies and although I don't give investment advice, I would advise you not to either. This Bitcoin is lost. Now, if you have good old greenbacks, cold hard cash, and the money burns in the fire, hey, if you can get the ashes to the Secret Service, you can get your money back. If it's torn up. If it's shredded by your dog, you can get your money back. If a crypto exchange goes out of business or loses your money. And it's happened many times, we're talking about many hundreds of millions of dollars so far that have been lost or stolen in these, you are in deep trouble.

Okay, so this week you guys have to attend. I'm going to be explaining why you need to secure your Wi-Fi network and how to do it step by step. I'm going to be explaining how to use the firewall that's on your Mac, that's on your Windows machine and how to use it. So you can still conduct business, but you can keep yourself safer. And then the lesson in the third video this week is how to do backups properly, the 3-2-1 rule of backups and how you can do it inexpensively. I'm going to show you the free tools you have. I'm going to show you some of the best companies out there to use to do some of these other things, inexpensively. Companies that I've used personally that I've advised people to use that are doing an amazing job. Right? That's what we're going to be talking about this week. And you have to sign up I'm going to put these videos up these are going to be some training videos. We're going to do a live webinar where I'm going to take your questions on Thursday and answer your questions that you can email me during the week. As you watch the videos, new ones, Monday, Tuesday and Wednesday. This week, I may do one on Thursday. But Thursday's the day I'm going to be doing the live webinars. So on Thursday, it's going to be a little bit of a busy day. So I don't know I'm going to get a video out. But this is step by step like you've never seen it before. Really.

You know, if you've been frustrated going online, trying to search on YouTube or on Google to try and find the best stuff and you hope that what comes up first is right. But you know what is not going to work properly. If you do this other thing. This is an integrated approach to make it all work. I'm even going to be showing you how to automate the whole thing so that you get the upgrade. How to use this stack of security tools so that you are not only resistant to viruses, but also to Trojans, to malware, to crypto mining, to all of the major problems that people have. So that's what I'm going to be doing and none of it costs you a dime. I'm given away my best stuff for free because I want businesses to be safe.

That's the goal. That's the goal of the Saturday show and personal as well. But this is about businesses. Businesses have lost tens of billions of dollars accorded the FBI over the last 12 months. So I want to stop that. Make sure you sign up. Visit http://CraigPeterson.com. Or check this morning's email. If you get my weekly email. There's a sign up in that as well. Make sure you follow along because this is for this week. Only. I am taking it down because this stuff changes so frequently. I don't want to leave it up and then have you get confused if someone finds it later on. I want you to stay up to date. http://CraigPeterson.com. Anyways, have a great week. I got a busy one ahead of me. Take care and be safe out there. Bye-bye. 

---

Related articles:

Lowe’s Smart Home Device Platform Shuts Down March 31st

Hackers Hijacked A Family’s Smart Home, Spammed Nuclear Missile Alerts

Chrome Can Tell You If Your Passwords Have Been Compromised

Crypto Exchange Says It Can’t Repay $190 Million To Clients After Founder Dies With the Only Password

Glowing Reviews Tout Counterfeit Cash On The Dark Web

Report Highlights The Crazy Lengths Hackers Took To Infiltrate Us Utilities

How Hackers And Scammers Break Into Icloud-Locked iPhones

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 8, 2019

It's A Security Thing Friday. Craig talks about ransomware hitting the local schools and how you can help them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/08/2019

Ransomware Hits Local Schools - A Little Advice

Craig Peterson 0:00

Hey, everybody. Getting ready for another weekend and we got a big week next week. We are doing some more courses and some more teaching. This should be fun. And what I want to talk about right now in our little, It's a Security Thing Friday is guys, you know, you're only listening to this if you're interested in security. And I've got to kind of build you up a little bit because if you're interested in security, you are probably way ahead of almost everybody else, you know. And I know of two times now where we have had some serious problems with schools personally, right here in the area. We had one that happened here in New Hampshire, and we had another one that just just happened in Connecticut. And what I'd like to propose to you guys is that since you are interested in security that you go ahead and volunteer for your school district. Now you're going to have a fight on your hand. Because there are people working for the schools. This is true in every business.
But there's people working for the schools who are supposed to be handling security and may well be doing the best job in the world. And then there may be other people who know they need a little bit more help. Or maybe they don't understand something quite right. Or maybe they need help installing some software. That's where you can come in.

So that's where you can go to your local school and say, Hey, listen, I'm kind of a security guy, even if you're not professional, right? Even if you're you haven't spent the last 10, 20, 30, 40 years worrying about security of computer systems. You may be in a better spot than some poor math teacher that has been been grabbed and dragged over and and told hey, now you are our security champion. So do that for people, right. It's a security thing. It's what we do.

We get pulled aside when we go for Christmas, or New Year's or whatever, a birthday, Hanukkah, you name it, we get pulled the side. I can't go on a visit to a family member and not spend almost the whole time on computers, trying to fix them, secure them, help them, train them. And you're the same way. Right? You have had same problem because you're the computer guy. Well, now you are the security guy or gal right obviously a lot of women out there and one of my daughters is is top notch security person.

So that's what I'm proposing to you and as I get into this little story here from Connecticut, Bridgeport, Connecticut their public schools and this is a K through 12 district, just had a big problem. There was a attack launched by a malicious outsider and it got in to their network. Now, this happens all the time. It's hard to secure against. That's part of what I'm going over this week, this next week in my course, for people how to stop this sort of thing. But it got in, and then it started to spread. And that's the other thing. We're going to be talking about this week. How to stop that spread from occurring. And the district hasn't said the amount of ransom or whether it will pay it. In other words, guess what happened and got in and started encrypting files and then demanded around some now, you know my position, you know the FBI position, don't pay ransoms it not only does it encourage these bad guys to go after other people to try and get ransom money from them. But it now confirms to the bad guys that hey, you are somebody that pays ransom, so they're going to try and go after you again. And when you have a big network, like as public school where there's a lot of people who weren't well trained or necessarily trained at all it's pretty darn easy to get into the network.

Now this article that I'm reading, it's from http://Edscoop.com is saying that the guy in charge over there, they reported it to the superintendent who reported it to the police, he's saying that several teachers have lost access to lesson plans and teaching material saved on work computers. Teacher and student work saved on cloud based platforms appear to have been unaffected. Well of course it was depending on the type of cloud platform and if they had cloud backups it might be in trouble. But if they're using Google's whole Education Suite that's a little bit of a different deal. It's not going to spread on to that. Now the district's power school platform also was on touch. Hopefully it had some really good security. The IT department reportedly reportedly began taking steps to remedy the problem over the weekend and how the district declined to say how far along the IT team is. Have you ever done that? I've had to go into companies after the fact where they don't have anything properly set up. And you got to try and recover machines. And I want to warn you when it comes to ransomware, you may not be aware of this. But new machines, of course, don't have BIOSes anymore. They boot off a special partition on the hard disk. And then that loads in some special device drivers and other things that then that then loads in Window. So it's kind of a bootstrap loader process that's involved nowadays.

So if you get some of these infections, particularly root kits, but this is also true when you're talking about the some of the ransomware, it can get pretty darn deep right there right into your machines and in be impossible to remove all most absolutely impossible to remove. So in those cases, you may have to replace the hard disk but in other machines it's that little bootstrap operating system and it's often Linux based. But it's not secured particularly well. In most cases, a little bootstrapped operating system may be in non volatile memory on the motherboard. So go to extra steps of the machines been compromised and it's a newer piece of hardware and it doesn't have the BIOS anymore. Even if it does have the BIOS go to the extra steps of making sure that you do a very low level not just a format on the hard disk, but also looking at all of the firmware and bootstrap code that's there on the machine.

Now we had a I was a speaker keynote at a big event as insurance company that is a conglomeration of a bunch of school districts up here and I spoke there and we talked about the risk and well how it's getting in and what you can do and what you don't want really want to do. And one of the attendees came up to me afterwards and said, Hey, we just got ransomware throughout the whole school now they were dealing with it and they had obviously a talk to the police, the FBI is usually not that interested in it. But the local police department will be and they started to work to restore stuff. I gave them a little bit of advice, but it is happening. And since it's a security thing, I thought I would bring it up with you guys and gals.

Go volunteer, help out your school districts, help them understand what they can do, how to prepare the 3-2-1 rules of backup, everything they need, and you can send them my way as well. I'd be more than glad to do training I do trainings all of the time. I charge for these bigger events but you know already that my master classes and other things that I do are absolutely free, these virtual events where it just doesn't take quite as much of my time as having to go someplace and and give a presentation. 

Anyhow, do that little outreach outreach you're the security guy as well So reach out to these people have a great weekend and I will be back tomorrow course with my terrestrial radio show who thought you'd ever be saying that right? 30 years ago that and I've been doing it I'm almost 1000 weeks of weekly radio shows and podcasts so it's a long time So join me tomorrow on the air or you can of course listen to it in replay right here on the podcast. So take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 7, 2019

It's time for another Security Thing with Craig Peterson. Today, Craig discusses about the cybercrime gangs advertising the high paying cybercrime jobs that are available out there.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Cybercrime Gangs Advertise Fresh Jobs, Hacking Services

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/07/2019

High Paying Cybercrime Jobs Available

Craig Peterson 0:00

Hey, good morning everybody. Craig Peterson here with A Security Thing, hey, if you aren't into security and trying to understand it and trying to fight against the bad guys, you're in the wrong place. Because that's all this is about is security. And today we have another real quick one that I think is important for everybody to understand. I heard in the ad the other day from this company that we've all heard their ads before. The company's called Lifelock. And you know, I already have a special report out about how to protect your data and keep it safe and how Lifelock is you know, essentially a waste of money. You can freeze your credit and it doesn't have to cost you a dime and all Lifelock does this come in afterwards and maybe help you clean up right? So should you do it? Shouldn't you do it? I don't know. I've got a special report about it and I've got an explainer video that I produced about it as well. And you can get that if you want. But anyhow.

What they said in that ad was that there is a job offer right now out on the dark web for $700,000 for a hacker. $700,000 a year, supposedly. So knowing how Lifelock some time to says, played a little fast and loose with things in the past, and in fact, got sued by the federal government and a whole whole big mass, I decided I would look it up a little bit. Now, the dark web is a little more difficult, right? It's not like there is Google for the dark web. Yeah, there's some search engine-ish things out there that you can use and you can do a little poking around. So I did but I also look for articles that made a similar claim because at least then you've got something to go on.

And sometimes it's an echo chamber, right? Like what happened with this whole Russian investigation thing with President Trump, where it was a democratic investigation that was entirely politically motivated. And then the it was they told it to a friend who told to a friend who told to a friend, and all of a sudden now the FBI, it's got to come in from six different sources, the same basic story. And you know, from playing broken telephone as a kid that the story changes a little bit, right, every time it's passed along. And of course, some people purposely change it. So of course, the FBI is going to get a bunch of different stories from bunch of different people and say, Oh, well, maybe there's something here, maybe we should look into it.

So I expected to find at least that online. The Lifelock this commercial, they were saying $700,000 a year for a cyber hacker to try and steal people's personality. So I figured someone had to mention it. It had to be in the regular press somewhere, right? So I go and look at some of the left wing sites like the New York Times, and then Huffington Post and don't find anything there. And I look at some of the conservative sites that are out there. I look at Google, I do a Yahoo search. I do a Bing search, don't find anything. Try a couple of dark web search engines as they are. Couldn't find anything. So once again, that leaves me kind of wondering is Lifelock pulling in another fast one on us and it might be. But here's what we did find, a website called http://banksecurityinfo.com and this is talking about cyber crime gangs advertising fresh jobs for hacking services, and it goes through and lists a bunch of payments that they'll have.Now the the jobs it's not like a job Hey, you know, we'll pay you so much they do have some of those. In fact, this one hacking group out there according to Bankinfosecurity is offering full time employees a monthly salary of 50,000 pounds, likely rising to 70,000 pounds. Now, aren't those interesting numbers out there? So if you take 50,000 pounds, that's about what 65,000 US, and you multiply that by 12, you get $780,000. Tadah! I think I found where Lifelock might have gotten some of this stuff. So it's interesting. This is called dark overlord. In case you're wondering, and you want to go apply for a job.

But there are a lot of offers out there. For hacking a web server, they'll pay you 220 to as much as $3,000. Keyloggers, 170 bucks. Denial of service attacks, and those vary from 350 to 2500 bucks. Hacking a personal computer 280 to 3500. Cell phones, it's about 500 bucks. Email hacking again, about 750 bucks. Social media account hacking about 500 bucks. Of course that varies as well. Change school grades 1200 to 3700 bucks. Wow. It's gotten expensive. And a FUD ransomware and decryptor, depends. 12 months 900 bucks. Six months 490. 1 month, 120.

So interesting, right? And they're looking for fully undetectable ransomware. So there's some decent money out there who knows about these jobs? If these are legitimate. Multi lingual candidates are desirable. It'll add 5% of your salary or commission for fluency per language. Chinese, Arabic and German being particularly desirable. And must have a winning attitude. It sounds like something you would normally post doesn't it?

so I figured you know if you're interested in security you'd like to know a little bit about this. Digital Shadows found this job advertisement out online and the dark markets really do persist but I got a warn you. Of course you can get serious US prison time if you're caught doing any of this stuff and that's probably why they pay so well. So the bad guys are out there. They're trying to get us and no surprise there we got to defend ourselves.

Anyways that's today's Security Thing and we will be back tomorrow with another one and of course on Saturday with my regular radio show. Taking Sunday off per usual while at least from doing podcasts and I hope you keep an eye out for all these master classes I'm doing. http;//CraigPeterson.com/subscribe.

Alright, have a great day. Talk to you later. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 6, 2019

Craig is on the WGAN Morning News with Ken and Matt as he does every Wednesday morning. They talked about a lot today from the Facebook and Apple feud, the AirBNBs spying on you, the shortage of cybersecurity workers, and the GDPR bagging its first tech giant Google.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

This Lamp With A Hidden Camera Could Be In Your Next Airbnb Nightmare

Facebook Shuts Controversial Program To Pay Apple Users For Data

Cybersecurity Worker Shortage Hits 3 Million

F.B. Purity Hides Annoying Facebook Applications And News Feed Updates

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/06/2019

Facebook Battle With Apple - GDPR Snares Google

Craig Peterson 0:00

Good morning, everybody. Craig Peterson here, of course. And this morning I was on WGAN and all of their affiliates up throughout the state of Maine and covering the course that also covers parts of New Hampshire. But we talked about the Facebook program, the controversial one, what's happening here, there is a big fight going on between apple and Facebook. I mean a very big fight and it looks like Apple might end up being the police, at least for their platform. They've been trying to keep Of course, our data safe now they're trying to keep the companies like Facebook, in line with our privacy as well. So good for them. So we talked a little bit about what was happening there. In fact, we talked quite a bit about that. And we talked about the EU privacy law and how it has snared its first tech giants. So here we go. 

Unknown 1:00
It is the WGAN Morning news. It is Wednesday morning and it is time to talk to Craig Peterson. Craig, how are you this morning Hey, good morning guruing away. Guruing that a verb Can you

Unknown 1:09
gurus she gurus they grew all guru

Unknown 1:13
it's like French right? Yeah. Sweet to a new songs

Unknown 1:17
and French. We've just we've just raised the intelligent closure this this short clip wanted this. So let's talk about Facebook. Let's leave time at Facebook. And so there was a program to pay Apple users for data. Has that been changed now? Yeah this is interesting because I got a couple of different Facebook things in here this week including what I got from mass all new

Unknown 1:45
which is kind of cool that Facebook purity thing I checked it out after you mentioned it last week but yeah, Facebook really gotten nail here we found out just a few weeks ago that our Facebook of

Unknown 2:00
users were offered something that I kind of knew was going on here. Here's the bottom. I remember I mentioned Facebook had a VPN and don't trust it. Yes. Because VPN are supposed to be protecting your data. And I knew Facebook had a VPN and it was free, and they were tracking all of your data on it, right? So it's kind of the opposite world, right? For what you expected from VPN. Well, Facebook, apparently when a step beyond that and was paying users 20 bucks a month, I guess it was to use the VPN for research purposes. Now, personally, I don't have a big problem with that. But you guys if you know it's for research, you know, the monitor new and they're paying you 20 bucks, you kind of expect them to be monitoring what you doing right? I would assume so. I would assume so. Yeah, I don't think that's a real big deal. But as it turns out, Apple did a little bit of investigation into our friends.

Unknown 3:01
Zuckerbergville making up all kinds of words today. Zuckerbergville

Unknown 3:09
and what Apple found is that apparently Facebook has been kind of short circuiting some of the Well, some people would say lawyering some of the terms of its policy. And it looks like Apple might actually be forcing Facebook to be honest and not use our data in ways that are part of this overall agreement. That other words, Facebook's been collecting data. So Apple said, If you continue to collect data, we will see the platform. In other words, we won't let you use Apple stuff anymore.

Unknown 3:49
And so what they did is they pulled their keys, Apple pulled Facebook keys, so no, all of a sudden all of these geeks out there and Silicon Valley working

Unknown 4:00
for Facebook that are used to just pop it up their little internal Facebook app on their iPhones and having a Facebook bus come and pick them up in the morning for work along with their latte already warmed up for them in the bus. No, no, no Apple turned off their keys. So none of the apps worked on iOS anymore. And those portal Facebook we knees were I mean workers were out there waiting for their locked data show up at a bus and and messy work. So there is a big tug of war going on between apple and Facebook right now that looks like Apple might actually force it on iOS for Facebook. To be honest,

Unknown 4:46
it's something they're not really known for our right we're talking to Craig Peterson our tech guru joins us on Wednesdays at this time talking about the world of technology. Craig. Speaking of security and cyber security and whatnot. Is there a person

Unknown 5:00
Is there a problem, I guess out there in cyber security whereby we don't have enough human beings to even do the jobs to keep us all safe out there? Is this is this a problem? Well, yeah, it's a problem for a number of different angles

Unknown 5:14
right now, according to a study that was just released by

Unknown 5:18
it's a nonprofit association that that issues, some certifications and it's all about cyber security and cyber security professionals. According to this study,

Unknown 5:30
I was wrong. And you might remember I said that we were about one and a half million cybersecurity workers, Shawn and that's the number have been using for a while now they're saying that we are about 3 million cybersecurity worker shortage.

Unknown 5:47
And that's absolutely huge because what that means is two things one, we are of course, we were in great need of people who can keep our system safe from the federal government.

Unknown 6:00
All the way through the local mom and pop shops. So that's a problem. It might be good for you if you really wanted to get into the cyber security industry and get a better job better paying jobs, because these are some of the highest paying jobs in the tech field. But it's bad again now because that means everybody and their brother is going to start hanging up. I should go outside their little bio repair computer store to say I'm a computer computer security company. Now I do cyber security and I think that's going to be a problem as well. So it's always been hard to figure out who to hire to help you with your it and it's getting a lot harder to find out who can really do the cyber security for you

Unknown 6:47
to great data scientists are tech guru he's doing this morning and he's joining us as he does every Wednesday at 730 I saw on your website a a lamp that could have a hidden camera.

Unknown 7:00
And could be put in an Airbnb room. I mean is that can they do that? Well, you know can as a lawyer is you know about two party consent obviously his main considered a two party state I don't remember so one party state is Yeah, one party okay so one party state How about if I were to put a camera in your living room with the width depth somatic is a two party state means that both people have to consent to be recorded and one party state like main means if I'm on a phone call with you, I can record you without your consent. Right, right.

Unknown 7:37
I don't think so. Yeah, I think that's it. I don't think you can put a camera and then and then the other person not knowing about it. Well, this is a new a new lamp issue from Panasonic, I think is when you're talking about and it's called the HomeHawk, which is a little bit concerning. And the idea is that you can place it in

Unknown 8:00
Your home and it has this very wide angle lens it's 140 degrees. So it's basically takes one whole side of the home. It has a big camera and it streams at 180 red p resolution, which means it's considered to be high def. It's not like 4k or anything but it has a motion sensor built into it. It can detect movement, it has double A batteries to back it up in case there is a power failure. So it is kind of cool. And it's interesting to how they launched this camera. But it is designed to monitor your home. So from that standpoint, if you have it in your home to kind of keep track of maybe burglars breaking in or when the kids get home. We're probably on a good legal ground although you probably want to talk to your lawyer but how about when people might put that into an Airbnb where they're renting out their homes. We've already seen hidden cameras and Airbnb bees that are built into little clock, teddy bears, etc. These nanny cams are put into the homes. And in most cases, these things have been found to be illegal. So it's kind of cool. Maybe for your own home. It's kind of scary when you think about renting somebody else's home. And what kind of cameras might say how to get in the way in there.

Unknown 9:31
We're talking to Craig Peterson. Our tech guru joins us now as he does every Wednesday to talk about the world of technology. Craig. Another thing you have any website here is something I saw, I think last week myself, which is about those European Union policies, privacy laws that were recently instituted and they've apparently snag their first giant whale looks like Google as a huge trend that they're gonna have to pay doctors about those privacy laws, specifically in what happened with Google.

Unknown 9:58
Yeah, this is kind of interesting because they are coming here. Now California just put a similar line place. And these are called the GDPR, GDPR rules. It's I think it's a global or general data protection rules that are over there in the EU. And it's kind of scary for businesses. Because if you have any data on your team customers, and that means if they even visit your website, they can and will control the data that you have for them. You might ask, Well, how can they do anything? I'm just some little guy years and then main. Well, what they've been doing is they actually have put up a Great Firewall, kind of like the Great Firewall of China. And if you break their data, privacy rules, they block your website throughout the European Union that's already been happening. And for most people, most little businesses, who cares right that's not going to really be an impact to you but Google

Unknown 11:00
Nailed by French regulators it's not a big fight for company like Google it was 50 million euros which is a little over $50 million in real money but

Unknown 11:13
they they apparently violated these rules It was alphabetic charged under this and they said the company had not properly gained consent from users. Now I want to warn people who are here in the US who are doing email list to might be collecting some data online for people that might sign up for the email list. Even signing up to get something from you is not enough for this new generation of laws that are going to be the fact that in mass and California and other states in the feds are looking at this as well. Even just having them sign up is not considered consent under these laws. They have to take it affirmative action to say absolutely you can send me marketing message.

Unknown 12:00
So keep an eye out for this. Google is going to have to pay a fine Facebook's probably not far behind them. And if you're a business person, you might not be far behind them either because these laws already exist to some degree, and they're getting tightened up here in the US as well. So be careful with all of your online marketing and sales activities.

Unknown 12:21
Craig Peterson our guru joins us every Wednesday at 730 Guruing away. Thanks for joining us and we'll talk to you next week. Great day. Take care guys. Thanks. Thanks, Craig. All right. We're gonna take a quick break here and 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 5, 2019

This morning Craig and Jim talked about the shortage of cybersecurity workers and its impact on the security side of things.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Cybersecurity Worker Shortage Hits 3 Million

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/05/2019

Impacts Of The Cybersecurity Worker Shortage - Hiring Workers

Craig Peterson: 0:00

Hey, good morning, everybody. Patriots nation, of course, you know, Jim Polito right there in Mass. He covers of wow, about two thirds of the state. Maybe a little bit more. And Rhode Island, and parts of Connecticut and Vermont. And so what's he talking about? A courses the Patriots. So he went over time this morning, but I'll forgive them, right? I live in New Hampshire, and we're part of Patriots nation too. We claim them as our own. So this morning was a little bit shorter than usual. And I brought up some stuff. Have you ever wondered about the cyber security workers? Who do you hire? Who do the people that you hire to take care of your computers hire? Well, there are a bunch of problems right now. And it's because of the cybersecurity workers shortage so that's what I talked with Jim about this morning. So here we go. Also, of course, remember that we have this week, some of my best stuff should be going up today. I wanted to get up yesterday. But you know how that goes. Life, right. And so you'll probably see an email or a text from me as soon as it starts going up. But some phenomenal stuff on DIY security, how to secure your machines and your networks. And we're starting with Wi Fi. And then we're going on to firewall. So here we go with Jim. Make sure you visit http;//CraigPeterson.com to get signed up.

Jim Polito 1:36
Let's get right to it. Because he's going to tell us there's 3 million jobs out there in the world that need to be filled. And it's not being done. Joining us now, Tech Talk guru and good friend Craig Peterson. Good morning, sir.

Craig 1:53
Hey, good morning, Jim. Yeah, this is presenting some real interesting problems that the most obvious problem of course, is if you're shy, 3 million people that there are literally 3 million open jobs for cyber security workers that, obviously means we're going to have some security problems. But there's a second kind of unintended consequences of this sort of thing that we've seen over the last at least 30 years, 40 years in the IT business, Jim. And that is what happens in the you know, we have a fairly capitalist society. But what happens in a society where the government is not saying that we have five open cybersecurity jobs, and the market is saying you have 3 million open jobs, there's usually a couple of things that are going to happen when there's a shortage of workers or shortage of anything, right? And what's that?

Jim 2:55
When you have a shortage of workers? Well, the salary goes up, I'll tell you that much.

Craig 3:02
You're absolutely right, the price goes up. And that makes it even more difficult because the good cyber security workers are already paid a lot of money. And we're talking about hundreds of dollars an hour on an ongoing basis. And a lot of people don't realize how, how expensive it really gets. So if you got some guy out there or gal who says, wow, man, I'd love to make 80 bucks an hour. 100 bucks an hour, I want to be a cyber security guy. So now we're starting to see ads and I'm seeing that now, I captured a couple because I just couldn't believe my eyes, but ads online for I've learned to be a cyber security worker in as little as three days.

Jim 3:53
Hold on. Stop the presses. I don't know if I want a cyber security person who's learned in three days any more than I want a doctor who's learned in three weeks

Craig 4:06
That sort of thing. Exactly. I've seen it all the way across the board Jim from become a cybersecurity expert in three days, all the way up through now, this might take you a while to do and, you know, maybe you want to find a career it's a little faster, but three days all the way up to six weeks.

Jim 4:28
Unless you're somebody like Craig Peterson, who was born with this gift, okay, called intelligence, but also is predisposed to be able to understand issues of IT. I don't know if I want somebody in six weeks. I mean, like, I know the, the boys when we ask them a question about one of our devices or something, you know, they can quickly answer it, like, Oh, you do this, this and this, you know, and so, they're they're like, of that they, you know, they're they're pretty, I still think six weeks, I mean, you need a little more, but it just goes to show you that crime does pay, you know, they say crime doesn't pay. I mean, it does if you're a crime fighter, especially in cyber security. We're talking about Craig Peterson, our Tech Talk guru. Don't forget at the end of the segment going to give you a way that you can get a lot of great free information from him. So go on, sir.

Craig 5:23
Yeah, well, so this is going to be a very big deal, a figure deal because this happened back in the late 1990s where everybody wanted a website and everybody wanted to be online. And everybody wanted to be an IT worker. And all of a sudden everybody was putting their shingle out, we're starting to see this now IT organizations who are just very basic fix it shots, you know, they can tell you how to do this on your iPhone or do that on your Windows machine. Yeah, and replace a bad hard disk and now they're putting out a sheet go same they are a security provider.

Jim 6:04
Yeah. I don't know about that.

Craig 6:07
I started in New England, very first managed security services provider back in the early 90s because I got hit. I had already been on the internet for more than a decade. I started on the internet in '81. Al Gore and I were buds back then.

Jim 6:25
Yeah, I never knew that. I mean, I know you wrote some of the language, some of the code for the internet, which is the truth folks. And some of the code that runs the internet was written by Craig Peterson, but I did not know that what got you going that way was a cyber attack.

Craig 6:43
I did. I got nailed. And at that time I was what the huge web hosting company we're building site to build some of the largest properties in the country. Like you've probably heard of big yellow or super pages, and the Vendee International, a lot of work for them.

Jim 7:02
I do remember these. I guess I'm showing my age that I knew all these. Yeah.

Craig 7:07
Well, that was all me working with my clients. And so we got nailed. And I was using the anti viruses tried to do the right thing. And I couldn't find anybody that really knew security. And so that's when my kinds of career my business kind of took a bit of a dogleg and we went a different angle because I just couldn't stand seeing people who had worked all their lives to build their businesses who had tried to build a nice career who had all the retirement tied up and then have bad guys come along and take it away from them sometimes, literally, nowadays. So that's why I started that that's when I started letting people know about this and doing the radio stuff and and that's why this week I'm doing some special training on how to do the basic self security yourself for your business. I'm giving away some of my best stuff this week for free and it's so important Jim. And this 3 million cybersecurity worker shortage gets me kind of worried from a lot of angles,

Jim 8:16
And then it just goes to show you if you need 3 million people to work in cyber security, how many people does that translate to on the other side of the equation? Those who are creating the need for cyber security. Think about it. I mean, exponentially. How many more people there are working there. Craig, let's let's get the number out there to folks so that they can get this information. Plus there was a lot of other great stuff that we could have talked about today, just in the interest of time, and we can't but Craig really provides a lot of stuff free to you. This is no obligation no nothing. All you have to do is text my name to?

Craig 9:01
855-385-5553. That's 855-385-5553

Jim 9:12
And a standard standard data and text rates apply. You will get great stuff from Craig Peterson, you know if there's a big hack or a big cyber crime and you need to protect yourself. Just like last week, we talked about changing passwords for your email, that kind of stuff. He gets that information right to you, Craig. It is always a pleasure to catch up with you, buddy. We really appreciate appreciate these Tuesdays with you. And we'll talk to you next week.

Craig 9:41
Hey, thanks, Jim. Take care. 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 4, 2019

Craig is on with Jack Heath as they discussed the Super Bowl and the technology behind it.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/04/2019

Super Bowl Technology - Why Are Advertisers Wasting Their Money

Craig Peterson 0:00

Hey we want to welcome everybody Craig Peterson here. Of course living in New England the Patriots are our team. In fact that you know, we take it kind of personally here, but it wouldn't. Interesting game wasn't it. And I talked this morning with Jack  Heath, a little bit about some of the tech involved. And if they had just an amazing opportunity here to use some of the world's most advanced technology to really connect with the consumers. They didn't. It was to me, it was shocking. It was shocking. They they had some 8K broadcasts and other things. But why didn't they use the tech they could have used to engage the audience and the looks like from all of the social media online that that that's just playing right. That's a good observation. I think I got right again, hey, this week. Make sure you keep your eyes out today. Tomorrow, Wednesday and Thursday day I have some of my best ideas. Some of the best training in the industry available for the SMB marketplace. small medium business. This is of course, all about security. It's free stuff. I will have an offer at the end of all of this for people who are interested in taking it further. But this is my best stuff. It's going to be available for you. It is not a pitch fast. Believe me make sure you sign up just visit http://CraigPeterson.com right now. It is right there on my homepage. You can sign up right there. And I you know I'm putting a lot of work into this. This is taken a few months to put together I've got some amazing stuff. I've got a whole package of stuff for people who might have been hacked or want to know if they've been hacked. All of this stuff is going to be included so make sure you visit http://CraigPeterson.com. And here we go with Mr. Heath

Jack Heath 1:56
Craig Peterson our tech talk guy joins us I believe in the Auto Fair listener lines. Craig you know so much of this now is an online game versus you know the other way the people get the information as we get into this post Super Bowl Monday morning.

Craig 2:13
Good morning Jack. The technology that was there at the Super Bowl this year was just absolutely incredible least behind the scenes you had 4000 miles of fiber cable in there you had over 2000 strands of additional fiber 330 recording channels with their plane watching if you came it was just incredible 16 cameras there were a number of augmented reality sensors in fact sick network cameras where they're tracking the AR graphics they were used you know all of this text is just incredible for a game that I'm looking at all of these means that we're social media was an absolute bore and one of the ones I love the most about it was Yahoo Sports and they posted a picture on their Twitter feed of just a piece of paper that said Patriots and Rams three to three and they said our graphics team fell asleep it was it was quite an interesting game that dichotomy with all of this great tech with the new TVs there was an eight k broadcast from the field it was absolutely phenomenal you could watch multiple angles on some of these newest TVs you could do automatic replays that the tech was just incredible Jack But the game itself on much show so sure it was so great I thought kind of the highlight was Spongebob coming out but he was only there for about five seconds.

Jack 3:47
And then yeah Tony Romo trying to call a game. No it. Yeah, they look at all the matters is a W but I guess Justin and Craig Peterson, Justin and Craig. I guess if you're just if you're in a neutral state if there is such a thing because there's so many anti New England patriot fans. But if you're in another market you're watching that game just for the pure football entertainment with the NFL being all about offense I guess it kind of was you know, not as exciting

Craig 4:16
Yeah, that's absolutely true. It wasn't I don't think it was a Saturday night and I'm not a big football fan I got to admit it but you were mentioning the ads as well and how expensive they were and social media definitely had a winner the number one ad from all of the means of repost it and comment was one of the Bud Light ad that was the one that was tied in with the HBO showing the dragon for the final season of Game of Thrones. That was a huge winner last night and probably can continue to be that second incredible series. But you know, from a business standpoint, you know, I talked to Jack up in new business for years and in entrepreneur started a few different businesses over the years and, and you look at how much is spent on these and you really have to wonder what they get out of it. Now Budweiser, I get it right if they've got a name they're building a bit more of a name but there's no call to action there there's nothing that these commercials were doing using technology that would have gotten people kind of offer their seats and doing something making a positive step to get their product or anything you know that type of interaction interactivity where you can have an ad and your your clients can or prospects can they can buy your product right then and there it's not there yet it isn't radio on like on the I heart app, you can advertise to people and they can just shake their phone and it'll connect to the website that that type of interaction again, will not seen on TV we are seeing on radio with I heart and I think it's just showing the the lack of connectivity that I think is really starting to go on now. The TV guys just don't get it and they're wasting their money. My opinion, right on spending other $5 million for a 32nd commercial.

Jack 6:22
Yeah, I haven't checked the ratings course knowing when you know, you're gonna have high but nationally haven't checked them. But one of the headlines I saw overnight earlier this morning was the last great live TV event.

Craig 6:35
Yeah, yeah, that's probably not too far off from the truth that just keeps going down and down.

Jack 6:42
All right. Craig Peterson, excellent stuff. A high tech look at the big game. Last night from Atlantic. Craig Peterson. http://CraigPeterson.com. Thanks Craig.

Craig 6:50
Hey take care. Bye. Bye.

Again. Guys. Don't miss my series. This week. We'll be doing different ones. This is the one that's really going to teach you about the basics. What do you need to do for security, whether you're Soho, small, medium business. Okay. I've got some great things planned for this year. And I appreciate your signing up http://CraigPeterson.com. Take care. Have a great day. be back tomorrow with Mr. Polito. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 2, 2019

Facebook and Apple are fielding in a big way. It looks like Apple's taking this into their own hands is just fantastic. Today we are going to talk more about that.

There is a new plug-in that can help you clean up your Facebook feed. Listen in and you can learn more about that.

Hidden cameras again at Airbnb's. This thing is scary as heck. We will talk about the good and proper uses and when their use crosses the line.

We've got a cybersecurity worker shortage is all that to surprise 3 million people is where that's at right now. So we'll talk a little bit about that.

Did you know many of the Fortune 500 companies you deal with are have vulnerabilities that can compromise your personal information? Today, I will talk about their use of vulnerable server software. Yes, it is the same software that allowed hackers to steal personal data from Equifax.

I will talk about the Three, cybersecurity must-haves for small businesses. Leading up to the free training I am offering next week. 

Do you use a Mac? I will go over some basic must-haves for small business Mac users. Remember, you are not invulnerable, and there is a targeted piece of malware being used against you. Listen in to learn more.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/02/2019

Apple Holding Facebook Accountable For Privacy - Cybersecurity Tips For SMB - FBPurity Plugin For Facebook

Craig Peterson: 0:00
Hey, good morning, everybody. Craig Peterson here. And of course, we are going to talk about tech, some of the latest things, some latest articles, some of the nastiest things that are happening out there. I don't know if you've seen about this feud. But our friends at Facebook and Apple are fielding in a big way. You know, I'm asked if you listen to this radio show and if you listen to me appearing as a featured guest on some of these other shows, you know, I'm asked all the time about security and what we're going to do about our friends at Facebook. It looks like Apple's taking this into their own hands is just fantastic. So we'll talk about that and that's all due to a an article that came out that really kind of nailed them I got a really cool little tool in fact I learned it from a couple of friends of mine up in Maine who host a radio show that I'm on every week but Matt and Ken do this was actually Matt's idea but plugin you are going to love and this is going to clean up your Facebook feed.

Hidden cameras again, AirBNB. This thing is scary as heck. The Fortune 100 you know about Equifax you know above the breach. While this is not very fun. We've got a cyber security worker shortage is all that to surprise a 3 million people is where that's at right now. So we'll talk a little bit about that. Three, cybersecurity must haves for small businesses. That kind of ties into what I'm doing here next week. I've got just a ton of training for small businesses. Make sure you visit my website. http://CraigPeterson.com. This stuff is all free. I'm giving away my best stuff. absolute best stuff for free this week. So make sure you sign up. http://CraigPeterson.com.

But here's some basic must haves for small business Mac users. You are not in vulnerable, you're being targeted by piece of malware. So we got a lot going on today. And that's what we're going to be talking about right here. Of course, this is Craig Peterson. And this is Tech Talk.

There's another guy I just don't I just don't get it. But little confusion. He calls himself Craig Peterson. I've been doing this for what, 25 years now. And then he said, Craig Peterson Tech Talk. What that's me. That's not you. Anyways, here we go.

Unknown 2:41
Facebook had this controversial program. And this is really what's gotten this little bit of a war started. And the war is between Apple and Facebook. Now we all know that Facebook, their founder thought that we were idiots for giving him our information. And that now been documented in a court case over in Europe thinks we are idiots. In fact, he used a swear word an expletive in they're describing what kind of idiots he thought we were. Well, Apple is now ratcheting up its tug of war over privacy this week, you might have seen a little bit about it. But now we're going to explain what it's really about what's really going on. But there was a report that talked about Facebook collecting data on users. In fact, they were paying users for this data. Remember, I mentioned that Facebook has a free VPN and that you should never use it. Because typically, when you're thinking about a VPN, you're thinking about privacy, right? You thinking about security, hey, and people aren't going to be able to track me, have you ever used a VPN before, if you're a business person, you probably should. But you need to understand more about them. Well, Facebook had this whole VPN setup that was tracking you were you are going what you were doing what you were saying it was really just a piece of nasty spyware just crazy what they were doing. Well, they offered a $20 a month, I think it was kind of a bounty for anybody that would use their VPN. And they made it very obvious that what they were doing is tracking you they're trying to track people age 13 to 35 as much as $20 a month or it install this Facebook research app.

Now, if that's what is called a Facebook research app, and it's designed to track phone and web usage habit. And this was reported by TechCrunch. This became a bit of a big deal when they started looking into it a little bit further, because it turned out the TechCrunch report said that Google's running a data collector that also similar to Facebook's app on Apple system. So you got Google doing something that collecting all this data, and you got Facebook doing something? Well, apparently, Google pulled the plug on their little project, Apple did not pull the excuse me, Facebook did not pull the plug on their little project. And so gate Facebook. So Facebook did not get nailed, and Google did get nailed.

So this app is discontinued on Apple iOS, how those can continue to run on Android devices. Doesn't that figure, right? Android? Yeah, yeah, again, spying on you, man, Facebook's finally going to suffer some consequences for their actions. This is kind of interesting when you think about it. Because what's happened is, Apple completely pulled the plug on Facebook's development. Now, if you don't know much about the Apple ecosystem, let me explain a couple of things. Even if you're an Apple user, you might not be aware of this, if you are developing, you're trying to develop apps for iOS, you apply you pain money, and you get from Apple, a special key you can use to sign your applications. And then that key is used by Apple to verify Yes, and D. This is assigned application by developer x. And therefore it will run it'll be accepted on iOS. And Apple has some similar things in place for Mac OS, that's part of the reason Mac OS is so much safer than Windows is, well, one of the things you have to do if you write software is tested. And a lot of people do a lot of testing. And so with that developer license, you can now make your app available to people who kind of sign into your developer account, right? They don't have to have your credentials or anything, but they associate with your account, they can now use your software. So now it's kind of an alpha and beta stages before it gets its final release. So if you don't have one of these keys, if you cannot sign the software, you can't distribute it
at all, basically. So you are kind of out of business. And that's what Apple did, Apple polled Facebook's developer key. And a one more big problem. You might not be aware of this, you know, there's one millions of apps in the app stores now. It's just it's it's incredible. How many I think it's over a million just an apple store itself. And I'm sure someone's about to text me with how many. 855-385-5553, 855-385-5553. Let me know how many there are. But there's at least a million apps in the app store. But did you know that there are more apps that are not in the App Store, then are in the app store? Now, you got to ask yourself, why would that be? Well, you know, I think Craig must be talking about development, right? developer apps, not real apps that people are using everyday. Well, obviously, there's a lot of developer apps that never ever hit the App Store. But there are more internally used business apps out there. Then there are apps that are for sale in the App Store. So companies like Facebook, for instance, will develop apps to be used internally by their staff to do different things. Now, in Facebook's case, it includes things like send a bus my way a bus to work, or maybe it's pick up my clothes from the triangle, and whatever might be all of the internal apps. And Facebook was using on iOS got shot in the head, they are all down. So now there's these people who work for Facebook are used to somebody in their little bus. And that bus is not showing up anymore. There's somebody in the bus and the app doesn't work. And they're trying to get in to an office by using an app. And that's not working.

So this is very, very big. And Apple did this to basically punish Facebook for doing things that violated Apple's privacy. Apple has a whole thing they have to sign. I'm an Apple developer for iOS as well as for Mac. And when you get your developers license, you then have to accept their terms. You have to accept their contract, very big deal. No, and their contract says that you will keep our users data safe, and they did not do it. So Facebook, shut it all
down.

And we'll see where this ends up going. I'm sure they'll reach some sort of terms. I also wonder now if Facebook's going to switch from you in iOS is its primary development target and maybe switch to Android, which I think would be a mistake, but this is from Apple. They said the permission was intended solely for internal distribution of apps within an organization. Facebook has been using their membership to distribute a data collecting app to consumers, which is a clear breach of their agreement with Apple. So you know, Tim Cook hadn't been involved in this decision, Mark Zuckerberg was criticized over his handling of Cambridge Analytica over his handling of the whole Obama campaign where they gave Obama access to everything makes Cambridge Analytica look like just ridiculous bikers. They just don't know what they're doing right now, news to ask me, oh, wait a minute, you're Republican, I'm not going to give it to you. So it goes on and on extremely glib is how this was how this was described here, and Zuckerberg. So we'll, we'll see what happens. Hey, mentioned, apps and apple. So we're going to talk now about something if you have an Apple Mac, there is some new malware out there, you need to be aware of,

Hey, as I was just mentioning, we're talking about security. Apple has a lot of things in place to help secure our devices and Mojave on the desktop added a bunch of stuff that it's just phenomenal what Apple's doing. And they're doing it, I think, basically the right way. And, and it is going to provide security that we're just we can't get in any other platform. So good for them. But there is a new sneaky piece of malware out back out there that's going after Mac users. And this one is image based. Now we've seen image based attacks before. But in this case, it's a little bit different. It seems like a key piece of data that used to launch the attack has been hidden in this harmless looking white triangle. There's a little image now we saw something like this late last year, when researchers discovered criminal hackers were controlling malware using Twitter means now how's that for an interesting way to do it. So what happens is a malware got on your computer. And then it monitored a trip a Twitter feed, and then looked at the means that were placed in the Twitter feed. And hidden inside those means were the control codes for the malware, yes, they are getting very tricky.

So this new piece of malware is called VeryMal. And the image it's been linked to is using some parameters that get added to our URL in order to try and control malware. And you've seen this, I'm sure if you're an Apple user, where you go to a website, what comes up, it comes up and says, hey, you've got to update your flash bright, it's a fake Adobe Flash update, or, and of course, Adobe Flash, highly recommended to not use it, never use it, that don't use it for the last at least five to 10 years, really don't use it. And we had our friend Steve Jobs back in the day who saying we will never support Adobe Flash. And he had a lot of good reasons for it, not the least of which was he didn't like Adobe and what they were doing. But this is a fake flash up data, it's being pushed by this very mail campaign. And here's the bottom line Mac users, you don't want this app, you don't want to update your flash buy a little pop up that comes when you visit a website. legit flash up dates for Chrome comes straight from Google, they get pushed automatically with other browser updates, right.

So ignore anything that says you have to upgrade and update flash, because you don't want to even have it on your machine. And if you're using Chrome, it's going to get updated automatically. Now, if you ignore that, by the way, you might be in trouble. Because just in two days in January this year, there were more than 190,000 impressions of this image.

So that's a lot of people that might have been hit by this researchers are estimating as many as 5 million users per day have been exposed to the malware, fewer than a third the anti malware engines on the virus, total scanning service detect very mouse payload as of this morning. And these attacks, of course, they can be expensive. And we're going to be talking about that this week as well. But bottom line, a single round of attacks in January probably cost about $1.2 million to businesses. And that's on a per business basis. Now, if you're a small business, it's going to cost you less, but on average, right now it's about $120,000 per attack.

So I want to make sure that you're aware of this. I've been sending out emails this week. If you didn't see them and you didn't see my invite in this morning's email make sure you sign up next week I'm going to be holding I'm going to have four different classes I'm going to be holding a live online class we're going to be going through kind of the DIY What do you need to do to protect your business online what's your drew be watching for what kind of software can you install for free some of the stuff that you should be using this paid that's all this week we're going to give you some of my best stuff and I'm not going to charge you a dime probably have an offer for you for people who really want to go the next level but this is absolutely mandatory must attend go to Craig Peterson comments right there on my homepage. So we're going to get right now into three cybersecurity must have here some things you've got to do if you are a small business and kind of a little bit of flash ahead to what we'll be talking a lot more about this coming week on my con shares page and in the live webinars as well.

Alright, we got cybersecurity must haves for small businesses. Pop quiz, what percentage of small businesses in the United States, what percentage of small businesses in the US suffered a cyber attack in 2017? This is from an article from security today. And I've seen these stats before. So I know they're pretty much right. What would you estimate 10% of small businesses had a cyber attack 25% maybe higher?

The answer is 47% of small businesses had their networks breached at least once by cyber criminals in 2017. In other words, half of all small businesses had their networks breached in 2017. Now, almost half of those businesses that were breached once were breached twice or more. Now, that's according to a survey though, that was reported in 2018 USA Today story. So when you look at all of the data from this is the he can only really draw one conclusion. And the researchers team concluded that only about three intend small businesses would be able to even handle a cyber attack. If they were hit with one today.

So 3 in 10 could handle it, they'd be able to survive, and half of the small businesses were hit. So those numbers are pretty scary, frankly. And I want to ask you a couple of questions here. Why are you not prepared for a cyber attack? If you're a small business person, whether you own the business or you work in the small medium business, you know, maybe a $10 million a year business still considered to be a small business. But why? Well, there's a lot of reasons. Of course, small companies have limited budgets, that you don't have the IT resources you can't afford the professionals.

I got another article here from Fox Business that is saying that data breaches of course, a big problem, but they're going to get even bigger and 2019 and there is a shortage of cybersecurity professionals. There's growing globally. And right now it's at about 3 million people. That's a pretty big shortage. And then we've got all the infrastructure, get all the software we've got it all been very confusing, right? You probably spend some time on YouTube, trying to figure it out some time on Google searching around again, trying to figure it out. And it's just hard to tell what to do. And of course, that's why next week, in fact, this whole year I'm dedicating to try and help you out but this next week is the week I have a bunch of training, a bunch of video training and stuff you can watch all for free, I'm giving my best stuff away.

So I'm trying to take away the excuses because you've got to pull up your socks. You know, as I said, my email this week, a lot of small medium businesses thinks that their businesses are so small, so insignificant compared to these giant multi billion dollar companies and banks and agencies, you know, these these big names that we all know I'm not Equifax I'm not any of these. I'm not going to get hit. But in fact, you are. You are the real target because what I just said you have a limited budget, you lack the IT resources you can find the staff that know cyber security well enough. Sure you can talk to people who know more than you do. But do they really know enough to be able to protect you even these outsourced it firms. I'm just shocked every time I see them. When I talked to them about how little they actually know and how little they can do there just is not a whole lot of competence out there.

So anyhow. Bad news, hackers know that small medium businesses don't prioritize cyber security and that's precisely why the targeting them of your burglar makes sense, right? Go to the house with the weakest locker no lock or the windows open. And unfortunately, that's what your business looks like to them. So keep keep an eye on your email. If you haven't signed up make sure you do right now. Go to http://CraigPeterson.com. It's right there on the homepage today because we start on Monday, you can sign up you can get a free ticket to this whole event. Absolutely free.

I want to mention this study a little bit more. Studied by ISC squared, the world's largest nonprofit Association of Certified global or cyber security pros. And they're saying that we're really close to 3 million people short in the cyber security biz. And a lot of people, a lot of organizations are at risk. And of course, that's part of what I'm doing here on the radio and on the podcasts. And with these courses that we're teaching bring you up to date on cybersecurity.

This one is shocking, out of TechCrunch. It's been two years almost since Equifax had their massive breach. And we know that it expose the personal data of almost every American and a lot of Europeans and Canadians etc. It was a terrible breach. We also know that it was caused because they were using vulnerable software that was not up to date. Now, if they had upgraded it, it's called Apache Struts, if they had patched it if they had been paying attention. There was a patch released six months prior to that. Six months they had to fix it and they didn't fix it.

Well, another little study that came out of a company called Sonatype, and they monitor open source software which are patchy structure struts is a piece of open source software. And they're saying that in the last last six months or 2018, two thirds of the Fortune 100 companies downloaded a vulnerable version of Apache Struts. That's the same vulnerable server software used by hackers to steal the personal data and close to 150 million customers. Isn't that bad. All in all, by the way, more than 18,000 businesses downloaded vulnerable versions of Struts. So if you have a website and you are have a slightly larger one, if you are using Java, take a look no matter what it is.

I found three WordPress sites just simple WordPress, right. Who cares about WordPress, just this last week, three WordPress sites. I found that and I helped their owners fix them. They'd all been hacked and they were all being used for malicious purposes. They still worked as well as websites for the owners, but they were hacked. So keep your software up to date, especially software that is facing the public Internet.

Panasonic released a new home security camera earlier this month. And it looks like a floor lamp. It's one of those floor lamps that shoots right up at the roof, you know, and you get the reflective light which is really kind of nice. The long thin one I've had those for ages. In fact, those are some of the first lamps I forgot. It's called HomeHawk Floor. And it's designed to be discreet. The whole idea is you can monitor the inside of your house. There's no obvious cameras. This thing even has batteries and has local storage. They started an Indiegogo campaign and the lamp you could buy on Indiegogo 485 bucks, Panasonic just suddenly had the time.

Well, we already have reports of Airbnb owners hiding the cameras in the homes capturing the activities of the renter. So it's not exactly a new concern. But keep an eye out because this is going to be a hard one to spot.

Two more quick things here. We talked about the tug of war over privacy with Facebook that Apple is involved in and this all started with a TechCrunch article. But I wanted to mention too that you know, Facebook's been under fire for months Facebook settled they came to an arrangement with the federal government about privacy been What about a decade since that happened. And now the US Federal Trade Commission is likely to impose a record fine against Facebook for failing to protect users personal information. The District of Columbia also sued Facebook and this FTC finds going to come because of the settlement that apparently they have not been honoring.

Now another Facebook tip I learned this week about a plugin for Chrome called FBPurity, look it up online. I have it on my website. http://CraigPeterson.com. But FBPurity has been around since 2009. It's one of the top 150 highest rated Firefox extensions and I like the Firefox browser. By the way, half a million happy users. Check it out. It will let you block all of the crap that comes up in your Facebook feed. You are going to love it FB purity online. http://CraigPeterson.com. Make sure you sign up for my training this week. Okay, there's going to be three training videos I'm releasing there's going to be a live webinar we are going to be discussing small business security, do it yourself. This is all about teaching you exactly what you need to do how you need to do it and backing you up slowly. You can get your small business Small, Medium Business secure. I've helped everybody from a little mom and pop Soho all web to fortune 100 companies. We're security I'm going to help you as well. http://CraigPeterson.com. Have a great week and we will chat next week. Bye bye.

---

Related articles:

Most Of The Fortune 100 Still Use The Same Flawed Software That Led To The Equifax Breach

This Lamp With A Hidden Camera Could Be In Your Next Airbnb Nightmare

Facebook Shuts Controversial Program To Pay Apple Users For Data

Mac Users Being Targeted By A Sneaky Image-Based Malware Attack

Three Cybersecurity Must-Haves For Small Businesses

Cybersecurity Worker Shortage Hits 3 Million

F.B. Purity Hides Annoying Facebook Applications And News Feed Updates

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Feb 1, 2019

We got another security thing to talk about today as Craig discusses the zero day attack at Health Sciences North and the shortage of cybersecurity workers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 


---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 02/01/2019

SecurityThing - Zero Day Attacks - How To Protect

Craig Peterson 0:00

Hey guys. Good morning, Craig Peterson here, we got another security thing to talk about right now, as usual, right? They get bigger and bigger. And this Thursday and Friday podcast, kind of a series, if you will. I'm going to delve a little bit more into real world problems that people and businesses a face that we're all facing things to do, how to detect it, how to clean it up, and that that's really what it's all about. And of course, we're also starting our new series where we're going to be going through using a little bit of webinar technology and kind of explaining things even more getting deeper into it.

Now, we talked yesterday a little bit about some ransomware attack that happened just a couple of weeks ago down in Salisbury, Maryland. And you know, that's a pretty bad thing that happened to a police department and I see this sort of stuff all the time, my local police department has an IT guy that is you know, he's seems to be a pretty reasonable guy. But the problem is you just doesn't have enough experience. And I've seen again and again, just not handling the basic so I want to get into that right now on the opposite end of the spectrum.

Let's talk about zero day attack. So we heard of these before you will see it sometimes in the news. Oftentimes it will mention a zero day attack because it's a little bit techie. And that's what we do here on Thursdays and Fridays, this is all about a major health care hospital and their downtime. This is a hospital up in Canada. This happened on January 18. So a couple of weeks ago now, we were talking about the Salisbury, Maryland. This is Sudbury Ontario. The company is called Health Sciences North and it was infected by a zero-day virus. They had to shut down its EHR to contain the infection. And this is all based on stuff we're seeing from CBC Radio Canada.

So the staff discovered the hack on Thursday morning, prompting that system downtime to prevent the virus from spreading. See, this doesn't say what his title is, Dominic Giroux, that he said that the virus came from another hospital in the region and there's been no request for ransom. Now that does happen where there will be a kind of a ransomware attack but no ransom note. Oftentimes you get the ransom note come up on your screen and it'll have a Bitcoin number it'll have a code that used in order to generate the random encryption and it might even have a phone number of these places have some pretty good tech support that you can use in this case they're saying that other this was a zero day attack, which means that hasn't been seen in the wild before.

Now, I always kind of cringe when I hear that because so many times people use zero day attack as an excuse for having really failed and they failed because they didn't have all the stuff in place that prevent zero day attacks. If you don't allow malicious looking stuff into your network, you're much less likely to have one of these hit you. So it hasn't been seen in the wild. So none of the anti virus companies have seen it. But here's the thing that's anti virus and how many times have I said that antivirus just doesn't work anymore. I've quoted John McAfee. I've quoted the the president of Symantec. It just does not work anymore. You have to have so much more than it has to be reactive. It has to be adaptive. You have to monitored thousands of endpoints simultaneously. And what I do is i'm using Cisco and some of their top people, and they're monitoring a billion. And point four things that are happening to look a little bit weird. Now, in this case, all 24 hospitals in the region rely on HSM. And that's a very, very big deal. They are an information technology platform for these hospitals one way or the other.

Now, in order to protect the hospitals, they did stuff they should have done in the first place. Officials have implemented this is from health, health IT, security officials have implemented other preventative measures, including shutting down some systems. He explained that out of its 24 hospitals, 21 are currently operating with the main Electronic Health Record system on down time. Now for a hospital. That's a very big deal because EHR these electronic health records of course are the lifeblood of a hospital, the lifeblood of any doctor's office and to have those things down is huge. It says further 12 hospitals have the cancer system on downtime while 10 have turned off medical imaging systems.

Now all of these hospitals are relying on this one system. It the virus entered from one of the other hospitals into the system, which means they obviously had some sort of a wider area network involved here. Maybe they were using VPN for but it was too flat. And we see this every time we go into a business. I don't care what how big it is, we've had Fortune 100 companies we've gone into and their network was too flat. It wasn't segmented enough to stop an event occurring at one of their clients to not be able to get it through. In other words, it happened at one of their clients, in this case, one of these hospitals, two dozen hospitals and that then spread to the provider of all of these medical record. That's a very big deal.

So today, little lesson is make sure if you are connected to your customers or your vendors that you have the proper controls in place at your network edge because that would have stopped the the spread of this two years ago when we had that world destroying piece of malware that was crawling its way through the systems. One of our multinational client caught hit and every one of their locations had to get shut down every one of them except for the locations we were protecting. Because we did it properly again, HSM up in Sudbury, Ontario did not do it properly.

And it just goes to show this shortage of 3 million security workers isn't I don't think it's how do I put this it's important to know and it's important to have more security workers but we are in a bit of a panic now. Because we can't find the right security work. It's not we, as in my company, not Mainstream, that's in a panic because we have a very close control on who we will help because frankly, we can't help everybody. If you're not swimming towards us, we are not going to rescue from the times because it's just not worth our time. I've been doing this for too many years, I'm not going to do that anymore.

So for the people that come to us, we try and make sure that we can have the right resources for them. And here's your problem. Have you ever watched Gold Rush? Gold Rush is kind of a cool show and it's on I think it's Discovery Channel and it's about these guys up in northern Canada for the most part who are mining for gold. And if you notice from season to season, the value of the  gold changes so they get an ounce one season is worth $1,000 and other seasons were 1200, 1300, then it's worth $1,050 and it just keeps moving around. Why does it move around? Well, it's supply and demand.

So here's what's happening right now with our IT security worker force in the US and around the world. Everybody's hanging a shingle up, yeah, yeah, I'm a security guy, cuz I got this certificate from whatever it was. And yet security is so much more than completing the course, or getting a certificate from even from Cisco or anybody else. There are many, many aspects to security that people just don't understand. And, and over the course of the next few weeks and months, I will be telling you some horror stories about some of our customers. But keep in mind that if you have just a worker who's VPN in you have the same potential problem that EHR has in Sudbury, Ontario, and that my multinational unnamed client had as well they have a network connection to you.

Yes, you probably have a firewall but know that firewall just like these major corporations had firewalls, then firewalls not going to stop the malicious code unless everything's done properly. And the next gen firewalls now that's that's another thing, right everybody? Oh, we got a next gen firewall Oh yeah. All that's all well and good for you. But what does it mean what does it do? How does it integrate? How does it tie to get together with other firewalls even outside of the organization so that you know that your data is pretty darn safe it's this is all kind of technical I got to admit it but hey it's a security thing and if you're listening you appreciate the security so keep your eye open make sure you get my email every week I'm putting together all kinds of great training this year and you can subscribe by going to http://CraigPeterson.com/Subscribe.

Hey Have a great weekend and I will be back of course tomorrow with my radio show as well and that'll make it into a podcast. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 31, 2019

Craig is starting a new daily podcast called It's a Security Thing. Today's security thing discusses about the zero day virus attack on a police department in Maryland.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 


---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/31/2019

Salisbury Police Department - Ransomware Attack

Craig Peterson 0:00
Everybody, you know, I'm trying to do something a little different here. Now, you know, we were all into security, many of us that are listening, and this is going to be our Thursday and Friday for the next little while.

Anyways, I kind of a security update here is what's going on in the world helping me understand a little bit more, but this is geekier. Okay, this is going to be for the geeks amongst us, because we're going to talk about actual things that have happened over the last, you know, few weeks, month, maybe bit more, as well.

So we're going to start this out today, by talking about this zero day virus that hit we got there's a lot to talk about here. We've got a, you know, tomorrow, we'll talk a little bit more. But we've got a police department down in Maryland who got nailed. And I got to tell you both of these stories. Bottom line is they had very good backups. And that's always the first step. And I've got to warn people that because you think you have a backup, it's no indication that you really do have a backup. So keep that in mind as well. All right, that I have seen it time and time again, they think they're writing to tape or it's going to disc or going remotely. We have a client that has decided that they needed a cheaper disaster recovery solution than us. And they didn't understand what DR meant. Disaster Recovery what it really means. And what it means, by the way, is that you can get your business back online very quickly. You don't have to wait weeks in order to restore from backup tapes, or from online cloud, etc. You're back online, you're back in business in as little as five minutes, depending on on how much you want to pay.

So they were getting this disaster service from us that is designed specifically to allow them to get back on within four hours. And in reality, it's more like 15 minutes. But it's a four hour guarantee, because that's what the law requires if you are a public entity, or you are a division of a public entity, in case you didn't know, okay, so they thinking that day, we're just a division of a public company, you know, they bought us, but we do our little thing, they don't really bother us, they why they had signed up with us for disaster recovery, because we had told them, here's the law, Sarbanes Oxley, here's all your requirement. Here's what you need to be doing. And so we put it in place.

So they went out and they talked to this other vendor that all they offer is backup. Now, this is a vendor that was backing up their AS 400, which is kind of a mini computer of days gone by. Great little machine from IBM. And they had been backing this up, they were supposed to be providing disaster recovery. And everything in this company hadn't been. We were monitoring all the networks, we were looking at everything. We were taking care of all of the data transfers. And we went to our client and said, Hey, by the way,
what's this link for? Because, you know, it hasn't been active now, in six to eight weeks at all? What do you mean at all? I said, Well, you know, there's been no data transferred at all. And for a while there was kind of busy just a thought I double check, because it was out of the norm. Usually, we get more interested when there is more data than usual, as opposed to less data than usual. In this case, it was less data than usual. They said, oh, yeah, well, that's our backup line. That's for our AS400 that's our main system. Well, why isn't there any traffic on it? Well, this company who was supposed to be providing them with some form of DR service and also backup hadn't been doing it their site with their their software and everything was broken and they never noticed. And the company our client never noticed. And so they were not only out of compliance with the law, but they would have been in deep trouble, even if they just had a hard disk crash, let alone their systems are brought down by someone who's malicious. Very, very big deal.

So now that have gone to these guys that failed them already. And today, can you do a cheaper backup, you know, we need disaster recovery, too. And they say, Oh, yeah, we can do cheaper, of course, they can do cheaper and that's what I want to drive home here everybody.

They can do cheaper because they're not monitoring it. They can do cheaper because they don't have multiple generations of backups, which is another problem. Because if you don't have multiple generations of backup, what happens when you get ransomware? What happens when you get nailed like this Salisbury, Maryland police department. This happened January 24th. Okay.

So you get ransomware and your backups are overwritten because they run normally right and the overwritten with what with your data encrypted by the ransomers. So you can't get your data back. All you can get back is another copy of your encrypted ransom data. That's what they signed up for. This drives me crazy people. Absolutely crazy because they're doing the wrong thing. Of course, it costs more to do what we're doing for them, of course. But we're doing everything that should be done. We check their backups, integrity weekly.We have multiple generations of their backup going back for years, which is also required by law. Now, we don't keep every backup for all those years. But we have kind of what's called a grandfather, father, son type of relationship in these backups. And if you want to know more, let me know and I can, I can help you out. But we also spin up machines. So at least every month, all of their machines get spun up in our cloud. So we know that and not only is the backup data proper, but on top of it, their machines will come online in the cloud if they have a major failure. But no, they they went with a much cheaper option that has proven to not work already. I don't get it. I just don't get it.

So Salisbury Police. Captain Richard Kaiser, told the Daily Times of Salisbury that the police department's entire internal computer network was compromised January 9, in a ransomware attack is in negotiations with the attacker who asked for an undisclosed sum quickly disintegrated. Now, that's the normal first response is let's negotiate. And, you know, I do this work with the FBI in regard program. And the FBI is advice is always don't pay ransoms. But the police department was negotiating because I knew it was going to be expensive to restore it. Everything all that does is two things it encourages them to do it again but guess what? The second thing is it encourages them to attack you again because they know you will pay a ransom okay so is that stupid or what right and police department ok, ok. It will be a $5,000 okay no problem and then who are they going to try and attack next time the police department right.

So the captain says there was a backup system and they were able to recover stuff from backups there's no evidence anything was stolen or download of course there isn't because there was ransomware and I gotta tell you to ransomware is often used as a cover for them to steal your data in police departments ability to respond to calls wasn't hampered because they still had a paper system in place and the police are working with the FBI. Interesting eh? Salisbury, Maryland. This can happen to you this happened a couple of weeks ago in Salisbury. Something to keep an eye out for, make sure you have good backups. Make sure you understand what backups are about. And you may want to sign up for my course. Next week. I got free tickets. I'm going to give away a ton of my best information. And if you want to go further, you can go further. But I am going to get you out of this rut that you're in. Do it yourself. security done the right way. That's what this is all about. http://CraigPeterson.com.

Anyways, have a great day. And you know what, it's all just a security thing. Fellow security geeks. I will be back tomorrow. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 30, 2019

Craig is on the WGAN Morning News with Matt and Joe. Joe sits in for Ken this morning. They talked about the Apple FaceTime bug that lets you hear what's happening to the other end of the line even before they answer the call. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

How A Hacked Phone May Have Led Killers To Khashoggi
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/30/2019

Apple Facepalm - Why Is Apple Making These Mistakes - Can We Trust The News

Craig Peterson 0:00
Hey, Top of the morning to your Craig Peterson here. And it's been a very busy week. Hopefully you've been getting my emails this week leading up to a big deal. Next week, I'm going to be doing some more free teaching and helping you we're going to do handheld, guided through cleaning up your computers at your office. So this is exciting to me. I've never done this before. And it's something that I'm really dedicating 2019 to do help small businesses clean up their security stance. So this morning, I was on with Ken and Matt will actually Joe and Matt because Ken was out this morning and we got into quite a deep discussion when it comes to this whole face palm problem. Yeah, the problem that Apple's having right now and why is it what happened when Steve Jobs left? What did he really leave behind when we talked about the Apple as the corporation. And we talked about privacy in general are tied it into Khashoggi tied it into surveillance capitalism. And it was quite the discussion this morning. In fact, we went a little bit long in that segment. So here we go and shout out to all of our listeners. And I got some notes this last week to from people from who listened on the weekends. I thought that was kind of cool. They kind of binge listen to my podcast on the weekend, so shout out to the binge listeners and to all of you who reached out to people in the gym and driving into work, etc. etc. Anyways, here we go. with Joe and Matt

Unknown 1:45
Back again. 7:38 WGAN Morning News Wednesday. That means time to talk to Craig Peterson. He is with us Joe Reagan in for Ken  this morning and Craig is on the phone. Craig, how are you? Hey, good morning. And I understand you guys have some questions.

Unknown 2:00
About face time. Talk to you. Matt will mention a little bit earlier, Craig. We have questions about so many things, so many things. But yeah, I was gonna start and lead off with the FaceTime thing. So is it true that if I dial, you know, a friend of mine on FaceTime, I can secretly hear everything he's doing, and I can spy on him and then use it against him later for blackmail. Oh yeah. And it records it in a broadcast to the CIA and the Russian mafia. The Russians got a bit yeah, yeah.

Unknown 2:30
What about the Chinese time Oh, well, that's only if it's a Huawei phone right yeah. Huawei they got a new laptop out to the looks pretty cool but I wouldn't buy it they here's what's going on Apple course has some FaceTime for a long time. One of apples real big things that they're constantly bragging about. We talked about this before is how they put security first, they're not in the business of selling your information. They want to sell you a new people.

Unknown 3:00
hardware or some software, etc. And because of that people kind of expect Apple to always be the most secure device out there and it's time for the globe to turn on and off if you have any gloating music there man gloating music that's a good one. I've gotten a good ones. But hold on. Let me look for it because I do want to gloat. So

Unknown 3:25
you should probably just keep talking while I'm looking for it. Because I don't think I have anybody go for it. Okay. No gloating music. So here's what happened. Apple introduced a new feature on FaceTime. And this feature set up for group calls. kind of the thing you might have done with Google Hangouts or some of these other pieces of software out there so you can get all your family and friends on and have a call with someone Happy birthday, etc. Really kind of a cool feature with one minor problem and that is that this specific feature in FaceTime this group calling

Unknown 4:00
Had the bug that you mentioned. And this particular bug what it is, as soon as you call someone, and their phone started to ring to let them know, hey, there's a group FaceTime call coming in that the microphone would go hot on the devices that were being called. So now you could listen in while that phone was ringing because it was transmitting to you and either the audio from the other side. So as you said, All you had to do is make a group FaceTime call and you could listen in and kind of spy on whoever you're talking to. are going to talk to that even answered the phone yet, and you could hear what was going on. So it's a big phone pod, no question about that. And it is a flaw that was reported to Apple apparently a couple of weeks ago, Apple has turned off the feature so the group FaceTime is where there was a problem there was never reported problem with regular face time but it has

Unknown 5:00
has been turned off until they can fix this eavesdropping flaw and it was fired by the way by a kid

Unknown 5:07
a 14 year old man yeah exactly the cleanest the face poem by security researchers. In other words, Apple's faces in their palm at this point because Apple security team should have known better should have been tested a little bit better. And a lot of people are saying, Hey, listen, this is what's been happening with Tim Cook. He's a bean counter. He's not in love with this technology. Like, of course, you know, the previous slide that other guy that was there before

Unknown 5:39
and we're seeing more books slipping through, in fact, the latest upgrade to iOS and again, what does Apple brag about it Hey, listen, unlike most of the Android phones out there, you're going to be able to get updates are going to just install automatically. In fact, Apple Now by default is automatically installing updates include security fixes.

Unknown 6:01
Just going to install is just going to work like just going to be good you know haha you guys with the Android phones they can't get support for new security sorry I can't hear you Craig. I'm playing my gloating music

Unknown 6:19
out there now Apple latest update is breaking many people's ability to receive phone calls and use Wi Fi so yeah Facebook is kind of an understatement and apples really got a bit of a black Okay Can I ask you a question though about you know since you just mentioned Tim Cook and how we might not have quite as hands on obsessive of a style as somebody else who may have previously held his job

Unknown 6:48
Why does that somehow result in bugs I Why is the CEO involved in that at all like why should Steve Jobs Tim Cook etc be even responsible in the at the end of the day for a bug cropping up?

Unknown 7:00
For the technology being a certain way or whatnot, I mean, I suppose they certainly give leadership to the organization and whatnot. But but that really, I mean, this is a really big company with a lot of engineers and people that are creating software and and people that are creating hardware and whatnot, how in the world would it get to the point where Steve Jobs would have to be yelling at people in order to make sure there was no bug well, but that's the culture that was built inside Apple rather than building a company where you have smaller teams who are you know, have a visionary in them and saying this is really what we want to do with this design and and other software teams that that do code reviews and go through it all have more individual responsibility. Steve Jobs set up a company where he was the man he was at, and as you pointed out here, Matt was in I am for that anyway so much you said Steve Jobs would go to the these small group

Unknown 8:00
meetings that were implementing one feature in an Apple device and he would just rip them to shreds and check. Can't believe you didn't do this. And there's this problem and that problem because he was so involved. So these teams ended up getting a little bit lazy by most business standards. And we're basically relied on Steve Jobs come down, scream at people and even fire whole departments. Remember what happened with Apple Maps where Apple Maps was a major mess up a piece of trash and he wants in the meeting and said, So who's responsible for this and fired the whole department. It was just crazy. The whole team so I think that's the problem. Now in order to get around that we've got to cook is out there. Now he has a bug bounty and they're paying people who find bugs and Apple software thousands to even hundreds of thousands of dollars at a cracker conference.

Unknown 9:00
Just a couple of years ago, Apple made a surprise announcement that it would pay bounties for bugs as high as $200,000 to hackers and responsibly turned over crucial flaws. So instead of finding most of these flaws internally because you're not going to find every one of them, you know, the team that wrote the software is not the team that should be looking at what the flaws are. But they decided, hey, we'll just go to the bad guys and have them pay us well, you know what a major bug and Apple software is worth a lot more than $200,000 look at this other article I have on my site today about to showcase this Israeli company called the NSO group is a creator of some software was called Pegasus and Pegasus sells for millions of dollars and it's used by governments. It's used by oppressive regimes and apparently it might have been used by the Saudis to find peace.

Unknown 10:00
Yogi and it uses bugs in software, Apple software, Android software, you name it software in order to get around security that's some place so you end up with a person like Khashoggi you know whether you liked the guy thought he was credible or not but being tracked the software being sold to the worst of the worst according to NSA whistleblower Edward Snowden and use to track people. So if someone's going to go to Pegasus over there, and Israel, the Santa soul group and say, Hey, listen, guys, for a million bucks. I'll tell you how you can just call someone and listen in to the conversation or they gonna go to Apple and say, please Apple, give me $1,000 because I told you about this major problem, Craig and that there is an interesting point because you have a lot of you mentioned a couple times here just some of the mean just part of the the general business model of how tech is evolving towards and you know, also one of the things you're talking about today is there was a new book by Trish

Unknown 11:00
Zubov about the business models about how this is all playing into it. And really how this is creating kind of an environment of this surveillance capitalism where we as a as a as a as individuals have ever really surrendered some amount of privacy in order to achieve convenience and because we're not paying for any of these products you know we're not really the true consumer we are at the end of the day the product of this market where our data our our location and all this stuff is being sold and I don't think there's really been a whole lot whether it be whether your government that's that's exploding this or whether your private business there really hasn't been a whole lot of conversation on that right? No, not at all. And there's going to be a conversation because people are getting more and more upset. Look at what's happening with Facebook 10 years ago. Nobody was worried about the we know what Facebook was tracking today and and you had Zuckerberg in some early messages that had been released due to a lawsuit in the year

Unknown 12:00
union we had Zuckerberg said he couldn't believe what fools people were giving him this information. So there's going to be more of a conversation. Facebook's kind of pulling up that saw people are eventually going to get completely upset about it Apple is be eventually they're going to go the way of the dinosaur or they're going to pull up their socks. But that's true of every tech company out there. And Joe, when we talk about this surveillance capitalism, where our information becomes the capital that's being used. It's a very concerning thing. And it's something that the industry is talking about. Now. They are putting together some groups they are starting to come up with standards. And by 2020, we are going to see some real privacy standards in place by the industries and we'll see if government tries to do anything about it. But frankly, laws rules and regulations they're always five or more years behind where that

Unknown 13:00
technology now, he talked about that. And there's you know, recently with, you know, the European Union has been talked about for the past probably a year, year and a half about some of their things that they've started to bring forward on privacy related legislation. It's caused a huge a lot of questions to be raised about foreign tech companies that might be holding data offshore and in the rights to who owns that data and how and you know, and I think it's funny because I can't tell you any times I've seen someone post that's stupid thing on Facebook that talks about, you know, oh, I hereby resend all my personal data and Facebook has no ownership and that's that's really she's not yes i like about five of those yesterday. Yeah, still making its way around for some reason. Yeah, yeah, there is a big problem guys and gals. If you're concerned about your privacy, there's really only one way to do it in this day and age and that's just connect your devices don't go online. But you know what, I don't think that's ever happened.

Unknown 14:00
You know, but no, it's not. Yeah, well, and I think another thing that's interesting too. And it's funny because I watch, you know, the computer I'm logged on to right now, obviously, I am a guest host here.

Unknown 14:10
So I do not have an account. So I'm operating off a guest account in the news that feed that I get on this computer is completely different than the news feed. I get on my personal phone. Now, it has two questions. One, what is Ken been searching because I'm getting a lot of the things that must be related to his profile. But how much of that, you know, when you look at how the algorithms and the automation that occurs in presenting information to a set of eyeballs? How much of that controls that information and really raises questions is the legitimacy of of what we're reading each day and taking for faculty. Oh, man, we can talk about that one for hours. But here's the bottom line. We thought the internet was going to be this place that kind of democracy, democratized information. We thought the internet was going to be a place where we could have open discussions and that maybe we could come to some agreements we could negotiate we could have

Unknown 15:00
Understand the other side. But ultimately what's happened is the Internet has provided us a place where we can go and we can be more polarized than we have ever been before. And part of the reason for that is what you kind of mentioned here, Joe, that these news feeds know what we like we have a big companies like the gray lady, it's a New York Times that says, if it was not for anti Trump articles, they would not be in business anymore. So with the New York Times is obviously catering to the anti Trump crowd. But that's being pushed through out all of the technology throughout all of these news sources from Twitter, if you want to call it a new source on out where they are catering to what we want to see and not necessarily what we should see. We're seeing stuff from our news feeds that is biased towards our thinking at least.

Unknown 16:00
This bias towards what they think that we're thinking and they think we want to see. So it's bad now it's getting worse as news organizations look at the Huffington Post look at what's been happening with a number of online news sites. Now they're laying people off because people aren't going to their site so they're getting more dramatic they're putting more stuff out there that just really clickbait they're making up stuff. They're lying about technology news all the way through political news, just to get your eyeballs to sell advertising and Joe that means we're in a bad spot. And that's why Frankly, I think, you know, radio and I heart is doing so well because we have these discussions, but you aren't going to see those on the Huffington Post. not see anything on the Huffington Post. They're laying off people left and right. Craig Peterson, our tech guru joins us at this time every Wednesday.

Unknown 17:00
Appreciate it. Craig and we'll talk again next week. Gentlemen, take care. Thank you much Craig. You know you mentioned but you know we only have about a minute before the break.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 29, 2019

Craig is on the Jim Polito show as they discussed two factor authentication, how to manage your passwords, and the data breach that leaked 773 million emails.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Biggest Data Breach Yet Has Leaked 773 Million Emails. Here’s What You Need To Do Now
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/29/2019

Safe Gun Technology - Huge Hack Collection - Proper Use Of Passwords And 2FA

Craig Peterson: 0:00

Hey, good morning, everybody. Craig Peterson here. Before I was on with Jim Polito this morning, it was talking about an interesting case down in Mass where there was a guy who was defending himself with a firearm and the bad guy decided he was going to take off and he hopped into his car and the guy with a firearm hopped on the hood of the car and held the you know the bad guy right obviously this whole thing has to go to court and everything figure out you know, was he a bad guy what happened here but but anyways he was on the hood of the car pointing his gun at them just incredible. So that's what we started out with today. Talking about that, what that meant, what that means. And I talked a little bit about the technology behind guns and some of the things that have been tried and frankly, and failed. And we also correspond some time about data leaks more on 1Password. And the way to use 2FA. All of that this morning with Mr. Jim Polito, take care Have a great day, everybody and keep an eye on your mailbox. Hopefully you've been getting my emails this week. We're building up to something big next week

Unknown 1:17
Everybody. Everyone's favorite Canadian and Tech Talk guru our good friend Craig Peterson. Good morning sir Good morning Jim How you doing today Craig I'm doing well interesting topic when it comes to firearms some technology proposed over the years you know these these guns we see on the sci fi movies they can only be fired by the rightful owner or someone who's on the guys side yeah and the fields of the years one what was interesting was you were a mike medic rings and that was used to unlock the city as this gun and then they're continually our proposals by

Unknown 2:00
Senator Schumer and other results as the years that they somehow build in some sort of computer thing that may be reached your fingerprints, or maybe he says DNA, none of those types of things, actually working guns. And that's just the work of science fiction Southern. There's really a lot of misunderstandings about firearms and using them safely and what the law allows and and what technology can do with them

Unknown 2:27
to go around corners with the Angelina Jolie and

Unknown 2:34
Mr. And Mrs. Smith or

Unknown 2:38
one of them. But anyway, it's understanding. Yeah, yeah, it is. And look, the bottom line is the real technology that the best control guns is between your ears. That's the real technology. So hey, here we go again. Craig. 773 million emails. What's going on?

Unknown 3:11
Yeah, as you as you were saying earlier this morning, it really is time to change your password again, your email password. And to that, and I'm continuing to recommend 1Password. It's a piece of software that now not only keeps track of your password and your accounts and automatically will fill them in for you on websites, as long as you remember your master password. Yeah, but it also keeps track of hacks, it keeps track of what passwords have been found out on the dark web. Yeah, really, it says all kinds of things. So what we're finding now is three quarters of a billion email addresses which tens of millions of passwords. This is likely a collection of passwords and email accounts that they've been found over the years.

Unknown 4:00
It's all the put together and is now being sold on the dark web.

Unknown 4:06
And if they're successful in using the gym, and that's what really kind of kept me going here, because the only reason that the bad guys is successful in using these passwords, some of which are older, is this piece, reuse the same credentials on multiple services. Yeah, and that simple, it's that so so they get one from you, and they get them all. Yeah, well, that's kind of what it is right? If you use the same email address, and you use the same password on multiple websites, or let's say you use it on your face website. And let's assume the bank has reasonable security and email says it's probably as reasonable security right? And then you use the same email address with the same password on Joe's morning cartoon website. And Joe's cartoon site gets hacked.

Unknown 5:00
Now what happens is the bad guys take your your email address and your password from Joe's cartoons that they stole. And they try it on Bank of America and you name it every major bank out there and the end you if you use the same email address and the same password, they are in your bank account information. It's just that simple. We're talking with our good friend Craig Peterson. And at the end of this segment, we're going to give you a number and you can text My name to it. And when you do, you'll get all of this information from Craig Peterson. He will not annoy you with incessant messages or try to sell you anything. It's just it's a great service that he offers to listeners to the show which we truly appreciate. Standard date and text rates apply. Okay, what was it password one is the Is it an app that you were talking about to help manage your passwords and protect you

Unknown 6:00
It's called 1Password. Oh 1Password. Just 1, and then password. Now they have some 3 levels, I use the paid stuff, we use it for businesses. So there's one other thing that you got to do. And that's called two factor authentication. And 1Password support a lot of two factor authentication sites. But at the very least, set up two factor authentication, sometimes a brief abbreviated to App a. And what that allows them to do now is in the simplest form, send a text message to your phone. So by the way, if you lose your phone, you might have some issues here. And if you also lose your phone number, change your phone number. Remember if you've used it for two factor authentication, but the idea is you try and log in on the website and then the website confirms what you know which is your username and password with something that you

Unknown 7:00
You have, which is your cell phone. Or in the case of one password, you've got the 1Password app on your phone. And that type of basic security something you know, along with something you have. So even if the bad guys have your know side to say, have your email address and your password, they don't have your phone. So if they try and log into your account, or if you try and log into your account, your your bank or whatever site you're going to, he's going to go ahead and send you a text message with a confirmation code. You then enter that confirmation cozy, and then you're all set. So if someone tries to log in and was on authorized, you're going to get that text message with that confirmation code. And immediately you're going to know something is a foot Now there are some major things in progress. This year, we're going to see some major advances because Google Chrome already has

Unknown 8:00
This built in so far is getting it a lot of browsers are getting and it's using some special types of two factor authentication the Yubikey than others and and I'm going to put together the master class that will have for the listeners again absolutely free for them to attend that explains how to do this yes particularly if you're a business you've got a fiduciary responsibility to keep data safe particularly personal information and you know I've got to help house because it's happening to everybody and Jim you brought up at three quarters of a billion

Unknown 8:39
in that one file that everybody okay

Unknown 8:45
yeah that is downtown. What's a huge But no, it is huge. Now I was reading that this is called what in the hacking world collection number one which means there could be

Unknown 9:00
More collections on the way Yeah, they're almost certainly are going to be

Unknown 9:06
you know that what here's what happens they say seals the data they break into a website and they use different technologies sequel injection other things but they use technologies to get at the database this behind the website and then once they're they have access to that database so just dump everything out of it because most businesses just hard keeping it safe enough, right you shouldn't be able to do that. But anyways, they dump it out and then they go ahead and they go to keep it as an eBay for the bad guy that goes to these websites on the dark web. Yeah, allow options allows them to sell things and then they start selling them and then after a while that data becomes signs of sale. So they sold your email address and password for effectively a fraction of a penny as part of our collection of a breach. And now it's been 16

Unknown 10:00
months since they did it last so they building these collections This is all collection of a one Jim because it's the biggest ever but there are dozens if not hundreds of these collections out there already and it's you have not changed your password in the last few months you are incredibly susceptible to having your data stolen your money stolen and your identity stolen and we talked before about this you could get pulled over by a police officer the side of the road for a broken taillight. Yeah, and all of a sudden it's a felony

Unknown 10:36
in the could happen to you because your data with solar you gotta keep up on that. I know, can you imagine that, that there's a warrant out for you, you know, and that's a standard part and folks don't understand a warren check is a standard part of a pullover just to make sure there's no outstanding warrants for you. And let's say somebody did take your identity.

Unknown 11:00
They went out and they did something that resulted in a warrant guess what they're gonna rescue and then you can you imagine you're trying to explain to the cop

Unknown 11:12
never been I've never been on the floor right you're

Unknown 11:17
you're you are in jail kissing the pavement and 10 degree weather is this can happen. Look at one password. This is it. One password is how you'll find it online. There's a couple of others that are okay. last pass is pretty good. But I really if you want the best stuff, one password is the way to go. Change your passwords, make it a year New Year's resolution, get one password, have it generate the passwords for you. There's lots of videos on how to use it out there and then go and use it all year long. Start using two factor authentication. You are the only one who cares enough about your personal information, frankly.

Unknown 12:00
really do anything as far as these big companies out there that lose your data, you're just the balance sheet entry. It's your life. You've got to take control. There's a lot of other information about this. There's information about other things. And Craig Peterson has it all. And as I said earlier, all the jab to do is text My name to this number 855-385-5553. That's 855-385-5553 standard data and text rates apply Craig as usual, right on top of things. We really appreciate the time

Unknown 12:40
Talk to you next week when we return a final word.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 28, 2019

This morning, Craig was on with Jack Heath discussing two things: One was the software sold by an Israeli used to track Khashoggi, and the impact of the current government shutdown.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

How A Hacked Phone May Have Led Killers To Khashoggi
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/28/2019

Impact Of Government Shutdown - Hacked Phone May Have Led Killers To Khashoggi

Craig Peterson 0:00
Hey, good morning, everybody. Craig Peterson here. We had a great webinar session on Friday for all of those who signed up to find out more about their credit and keeping it locked up for free. So thanks everybody for attending. And also, of course, for all of your questions. And if you did sign up, that replay will be available probably a little bit later on this week, we're going to do a little bit of cleanup, because of course, the tech guys webinar recording didn't work quite the way we wanted it to. But anyway, so we'll have that out a little bit later on this week, we got more stuff coming out, I have really kind of turned a new leaf this year, you know how I've been trying to help people for ever, and particularly small businesses, because they're the hardest hit right now with the most to lose of everybody when it comes to the hackers. So I am starting a whole new series this year of webinars and all kinds of information, informational products, etc, etc. So that's all this year. And it starts this week. So as of Monday, and we're talking about January 28, you should be starting to see some emails from me on a daily basis here for the next week or two where I have kind of a little bit of background what I've been doing and going beyond just my background, then starting to give away way more information. So keep an eye on your mailbox email box. Thanks everybody over the weekend, who reached out to say hello and and thanks. And thanks to you for letting me know. And you know it, it's great to hear people who are grateful for all of the work that you do. This is really quite the labor of love.

So this morning, I was on with our friend Jack Heath. And we talked about two different things. One really was, I think, frankly, very disturbing. And that is some software sold by an Israeli firm that may have been used to track Khashoggi the, you know, that quote, journalist, unquote. And, of course, there's all kinds of articles one way or the other on that, but CNN wires, and it was also repeated another places in the news, Fox had this story as well. But I've got this up on my website. The story from CNN wires is saying that this software is called Pegasus, and it's dangerous. And it's being used by some of the worst regimes in the world to track people. And then in this case, maybe even killed people. Of course, they're denying it. We talked a little bit too, about the impact of the government shutdown. And there was, I think, a very big impact. I've been reading articles about what's been happening with some of the contractors who are never going to get paid for this government shutdown, who are handling security for various federal government agencies. So we talked a little bit about that. And of course, I mentioned the surveillance state and surveillance by government. But there's a whole new concept and you might find this interesting. It's an article that was in The Guardian, I have it up on my website at http://CraigPeterson.com. But welcome to the age of surveillance capitalism. Now, I'm not fond of the term capitalism here because it's really not a capitalistic thing, per se. But the everybody from your phone company on out is selling your personal data. So what does that mean to you? I think you might find that interesting up on my website. So here we go with Mr. Heath

Jack Heath 3:44
Right now. We bring in our tech talk guy Craig Peterson. His show Tech Talk airs on iHeart news talk station. He joins us on the Auto Fair listener lines. Craig, is there a tech talk angle or connection to the government shutdown? I mean, did we learn anything about you know, how we're doing in terms of efficiencies and all that, When, when, when there are fewer government workers? Or, or is that something you didn't look at?

Craig 4:08
Hey, good morning Jack, that the shutdown have had a number of impact. And when it comes to some of the technology side, and one of the biggest ones that people have been worried about is the impact to our cybersecurity. And of course, that's something I pay close attention to. And with the government shutdown in place, there were a number of different agencies that did not have all of this cybersecurity people that they would normally have available. Remember that we're talking about a number of different types of people impacted, you've got the employees who will be paid, apparently, within the next week or so. But you also have the contractors, many of whom will never be paid. And many of the people who are handling security for various federal government and state government agencies. But in this case, of course, certainly concerned about the Fed, many of those people are actually contractors, and with more than 1 million unfilled security jobs nationwide, I'm afraid what might well have happened here is that many of these contractors who are good security, they can find a job in the private sector and our setup with this whole government mass have left the via employee, basically, at the federal government are now going over to the private industry. And we may have seen some serious, unforeseen circumstances here where the best people who can easily get another job did get another job and the cyber security specialist. So the ones that I'm very, very worried about,

Jack 5:50
Well, again, then other people would say, unless they had a household where they had a federal worker, in some cases, couples are married, they both work for the federal government unless you were directly impact. And a lot of people said, Well, you know, I didn't really didn't affect my life that much. 

Craig 6:02
Well, if you get outside those contractors who are doing security, and I've read a few articles about some, but if you get outside of those contractors, frankly, there doesn't seem to have been a ton of impact on the technology front, you know, some things have slowed down, the IRS has multiple attempts at trying to put a new computer system in place, and they continue to fail, of course, that was put aside and, and various other things. So we, from a technology standpoint, I think the biggest impact is going to be on some of the contractors who were not paid and will never be paid, and frankly, may never be able to recover that money. So you're right, Jack. I think that the impact is is a little bit overblown in the media. But I do know some people who were directly impacted in the security realm.

Jack 6:53
Interesting right, what else is catching your eyes we begin this week?

Craig 6:57
Well, we of course know about to show be a little bit here and what ended up happening with his stats and the, you know, alleged murder at this point, there is an Israeli based cyber company called the NFL group. And so and they were condemned as the worst of the worst by Edward Snowden. Remember him the NSA whistleblower? Well, apparently they have been selling software to governments, including Saudi Arabia, and other governments who are very repressive. And these tools that they have are set up for spying on people for burglary. And in fact, their software which is called Pegasus, you can look it up and find out a lot about it is malware that is used by governments to to send a message to someone on their smartphone or on their computer, but in this case, into Shelby with Khashoggi it's the smartphone and all they have to do is click on the link in that text message comes in, and now the phones compromise they have access to the microphone and camera and depending on the phone, which is why again, I keep advising people don't use Android, but apparently they may have had some involvement with a showpiece das although they're denying that they did anything wrong because the Saudis had access to Pegasus or something similar, and it was used to track him find out where he was at what he was doing. He was monitored. And this is alarming, frankly, in this age of surveillance. where companies are severely miss our government surveillance and more. We've got to be very, very careful because the bad guys are doing it as well.

Jack 8:49
Interesting. All right. Craig. Check it out. Craig Peterson, O-N. http://CraigPeterson.com. Thanks, Craig.

Craig 8:54
Hey, thanks, Jack. 

Craig 9:00
Hey, over the weekend, by the way, my weekend radio show somebody pointed out that there is a bed of music that kind of gets a little bit loud during one part of the audio so. Hey, thanks for pointing that out. If you do have things like that, that you notice we're always trying to improve but sometimes they sneak past right you can always email me@CraigPeterson.com with questions or comments. That's me@CraigPeterson.com. Take care. Have a great day. We'll be back tomorrow.

 ---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 26, 2019

I know you have heard of SpearPhishing - but it has nothing to do with how fishing is done in the South Pacific.  It is a targeted attack and you need to understand how it happens and why it is so effective - Listen in as I discuss this in detail.

There is a lot of cover-up going on for the malfeasance in DC these days.  Who better to blame than the Big Bad Russians.  With the DNC who can't seem to protect their systems, whenever something happens they immediately blame the Russians.  Well, not so fast.  Listen in today and I will tell you that it is not always the Russians especially when it comes to the DNC.

Do you know what the Largest Data Breach Ever is? I will cover that in today's show!

The Global Data Privacy Regulation went into full effect in May last year and they have now snared their first big fine against a company who failed to comply. Listen in and I will tell you who it was and why they were caught. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/26/2019

What Is Spear Phishing Really - DNC Says Russians Attacking Them Again - Largest Data Breach Ever - GDPR Snares First Big Fine

Craig Peterson: 0:00

Hey, good morning, everybody. Craig Peterson here with our new bumper music. As I said last week, I'm gonna like this. It's kind of cool. It's a, it's called bound and determined and I got the licenses to use this. So, you probably hear it again, that's for sure. Hey, show number 991, almost 1000 weeks of shows. How's that for a long time. And of course, we've been podcasting now one of the longest podcasters out there, but I've never really done any the heavy promotion so, all of you who have found the show either on the radio or heard me as a guest or see me as a regular on TV, etc. and found this as a podcast. Welcome to you and everyone listening over the air. Hey, hi. Howdy everybody, of course, I am on every Saturday at this same time we're having to cut it back a bit. I had a three hour show for many, many years and that was kind of fun and I had a lot of different guests on and it just got to be all-consuming because it was taking us, my wife was helping out and of course I was doing a lot of work and I would say it probably was in the order of two to three full days a week to put together a three hour show on Saturday. Because you know me, right, I like to do the research like to have great guests when I do have guests and try and put everything in order so a whole lot of work and we cut it back in the stations had some paying customers that wanted the time I was on and a chance for them to make some more money from some other people really good thing so I'm not paid for this I do this out of love this is definitely a labor of love and I have had so many wonderful emails from everybody, not everybody, but from so many people out there it was everybody but so many people out there just thanking me for it because they realize the amount of effort I put in some you know some just been too kind. It's been phenomenal, so thanks, to everyone that's reached out and said hello. Everybody who has rated the podcast over on iTunes. We keep trying to follow up with Iheart to get it on their podcast platform and it just hasn't happened. It's just weird. So, I'm on a number of other platforms out there platforms and want me to pay to be on them hey I'm not there I do you have a content provider. I use Libsyn because I was hosting at myself for a lot of years and Libsyn has some better stats and statistical programs and things that are you know useful for us because that way we can see who's listening where they're listening and everything and I find that interesting and get to see trends in the shows and whether or not it really makes sense for me to keep it up so for now anyways it's making sense because there's just so many wonderful people saying wonderful things about it and we may go back to an hour I'm not sure depends on what happens on these radio stations that I'm on but I am on every week as well on iHeart. I am covering pretty much just didn't New Hampshire with Jack Heath every Monday morning at about 730 and of course we're discussing the latest in security and technology topics but I'm on with him at 730 on a whole bunch of stations in fact a few different chains of stations that I'm on. And I am on Tuesday mornings in Mass in Worcester and in Springfield but two second biggest and third biggest cities in the state of Mass. And I'm on with the Jim Polito show there. And on Wednesdays. I'm on in Maine up on WGAN and their affiliate stations throughout the state of Maine.

So I'm probably gonna keep doing those. I don't see why wouldn't do those. And I want to keep doing this radio show as well because it is helping a lot of people. And that's our goal. Yesterday afternoon, we had a special seminar you should have gotten and I'm not going to harp on you anymore. I've sent like three or four emails to everybody. You should have gotten my free special report on how to keep your information safe from hackers because they got it right. There's no two ways about it. You're right. You know, you've got to have been part of that one of these hacks. I'm going to talk today about another big hack that was uncovered just in the last week or so. So, if you have been hacked and you have had your accounts taken or credit card compromised, it's not your fault. Okay. It really isn't. It's a fault of these companies and government organizations because the feds have been hacked to who just have not cared enough about your security. And really, they don't care. They could hire someone like me, internally, to take care of their security. Heck, they could hire me, but they just don't care. They don't. Right, you are to them a bottom line figure you're expendable if your information was stolen, they look at it and say, Well, how much is it going to cost us if we have to go to court on this. And they figure, well, it's going to be cheaper because most people aren't going to sue and even if they do maybe we can turn it into a class action. And then that'll be cheaper for us, right on and on and on on who hasn't heard this stuff before. It just happens too much and has happened to all of us. And I think that's just a crying shame. So that's what that special report for not remind you to can about it. But if you didn't get it, make sure you check your email because there's no charge for any of this stuff. And yesterday afternoon, I had a walk through some people wanted me to spend some time with them. So we split them up into small groups and did walk and everything with them. So that happened yesterday as well. So shout out to everybody that was on yesterday. glad you were able to join us.

Now today, we have a lot to talk about looks like the DNC and the Russians, or again, this huge email breach. We're going to talk about some scams, it gets kind of technical. And I get into the very technical stuff when I do the webinars for the FBI in regard program. And I'm not going to get real technical with you guys. But I want you to understand a little bit about what's going on. So if you are a business person, you can talk security with your security people and make sure they are covering this very interesting backstory here on Khashoggi and how they may have been able to find him and where did that recording come from? And the surveillance capitalism, great article from The Guardian and the EU privacy law. You've heard me talk about GDPR, and we've helped a lot of companies with that summer concern. I gotta tell you, almost no companies are concerned about it. Well, it looks like Google might be concerned they just got nailed for violating that new law. So let's get going here. Let's talk about what's been happening with these Russian hackers.

You know, I've always wondered just what did the Russians do? Did they do much of anything, they seem to like to just kind of mess around just like we to frankly, you know, it's not as though we are not out there looking at trying to use technology as a first strike capability or defensive capability. We're continually probing other people's networks and monitoring what's going on. So, to hear that the Russians, for instance, are trying to break into something, It's not as though they are our mortal enemies, The fact that they're trying to get in, doesn't mean they are mortal enemies, it does mean that the very least they're trying to get our information and probe our infrastructure, right.   Can we agree on that? Now, when it comes to the political side of things, I think things get a little bit different because frankly, I think in those cases, the Russians are trying to do something different. I think in those cases, the Russians are trying to find information about our policies or politics, just like that might try and get into the State Department or get into the NSA or FBI or something else, just like they have forever, just like we have forever. Have you ever watched a spy movie, right? It's been going on forever. Ethan Hunt, right? What does he do the Tom Cruise character? He's trying to get into things. He's trying to influence things. He's trying to get information to protect informants and everything out. So what has changed isn't the desire of the various nations to get it our information or get it everybody else's information. But what has changed is just the way they're doing it. They don't have to have women trying to seduce like they used to have, they don't have to have so many of these things, because all they need to do is get someone to click on a link. We know about Podesta again, the DNC link where he went ahead, and he clicked on it, a phishing email. Well, was that aimed at him because of his tie to the Clinton campaign, the Obama government or just because he had an email address? The results the same, they got the information, the big question is, did they use it? And what did they use it for?

So now we have a story that came out this last week from the Democratic National Committee. And apparently, they're there, according to this article, and seen it written by Edward Moyer trying to come back and hack them some more. Now. I don't know what's going on. I'm sure the Russians are trying to infiltrate I look at now look at my firewalls right at my home, I look at the firewalls at our office, I look at the firewalls. We are maintaining, you know, managing for businesses all over the world — some of the huge businesses, some of them very small businesses. And I asked myself, what's going on here because I'm seeing attacks, I don't have a server that I can think of that isn't being at least probed almost every second and some of them multiple times a second. So they're being probed. Is that an attack? They're trying to log into these servers. Is that the attack? They may? In my case, they haven't been able to get in, at least not that I've been able to tell, but they try and go to the next level. Is that an attack? Where is the attack? What is the attack vector? When is it an attack? So when the Democratic National Committee says that, following the midterm elections last year, Russian hackers again started going after them. What does that mean? So here's the quote from them. In November 2018, dozens of DNC email addresses were targeted at a spear phishing campaign. Although there is no evidence the attack was successful. The DNC said in court documents filed Thursday What does that mean?

That's the big question, and when you hear about these sorts of attacks from in the political realm you've got to step back and think about a little bit let's talk about the terms, they're using their let's try to make a little bit of sense about it. Because this is a security thing fishing campaigns are where someone sends out an email trying to get you clicked on it. And typically phishing on this case it's about PH is a giant G, but it's the same concept of throwing a fishing line in and see what bite now you might use a lower that you know is good for carp or lower. That's great for rainbow trout of your up in the Pacific Northwest. But that doesn't mean that you're necessarily going to hook one of those and the same things true. You go off the coast of Boston, you're doing deep sea fishing, and you're hoping to catch what may be, hey, I made man catch up to now. Or maybe I can catch a swordfish or you know, the list goes on and on. So you use a lure to get the fish that you want. And hopefully, you'll catch it. The same thing with a phishing attack online; you write a letter, you write an email that looks attractive to the types of fish the types of people you want to catch. So if you want to catch people who are political activists on the left, maybe you send out an email saying, you know this, that this is about to explode underground and credible information about President Trump, and I can't believe it and got to click here. Contrarywise, on the left, you can't believe what Chuck and Nancy just did, right. And they try and get people to click on it. So that's kind of a still a general fishing campaign. But what's this spearfishing campaign, a spear phishing campaign is where again, think about how the South Pacific where you've got an Islander Pacific Islander out there, and they've got a spear maybe it's one of those Trident Spears, you know, the one that has the three tips on it. Have you seen those before, and you can make those yourself probably seen them on survivor, and they're watching in the water. And they see in the water I just under the surface of fish they want to get. So they stab it, they grab that fish, now they've got it, and life is good. They captured that fish. So they were aiming for that fish. And they caught that fish that spearfishing. And in the in the security business when we say spearfishing. We typically mean the going after an individual.

Now there are regular phishing attacks that some educated people might call spear phishing, for instance, they might have your name and email address from a vulnerability. So let's say they got all your information from our friends over at the credit reporting agency last year. So now they've got your name and your email address, and they send out 200 million emails. And each one of them, of course, is going to an individual email address, and it includes the name of the person. And it's including the name of the person that was in the breached record, so is that spearfishing. It's aimed at one person, but a lot of people will call it spearfishing. But security professionals are not going to call that a spear phishing attack. That is a phishing attack. That's like casting a net or dropping a line in and hoping you're going to get them, but it's a little more personal. So instead of the net that you might have had five years ago with phishing attacks, where it's just a generic Nigerian prince type scheme, it moves on to we're going to use a specific type of lower that might work. That's still a phishing attack to now where we're going to make that lower very attractive because we're going to include your name, we're going to make it look legit.

So they might send it out as though it's from Bank of America. And it's got your name in it. And it's got a number in it looks like an account number. It looks like a Bank of America. So you click that is technically not a spear phishing attack. Now, I fought these types of battles forever. Yeah, you know, for instance, what's a hacker versus a cracker. I was a hacker as a kid, that didn't mean I was trying to break into anything. I just hacked it programming because I wasn't a professional. I hadn't been trained; I didn't have enough experience. A hacker was not a bad guy. A hacker was just somebody who was semi-professional. And frankly, in today's world, I would say 90%, maybe 95% of all programmers are hackers. They're not professionals. They don't understand the whole system. They're just taking a drag and drop the component from a Microsoft Visual Basic or C sharp or Java; they're using the just this generic component that they don't understand anything about other than if I feed it this. Hopefully, I'll get that out. That's called hacking. That's the classical definition of hacking. So you try it does it work on doesn't work. Okay, so let's try something else. Let's try and figure this out. That's a hacker.

A cracker is someone who goes in. No, I'm not a cracker. Okay, I'm a white guy. But in crackers. Somebody goes in and tries to break into something tries to crack in just like a Safecracker. So you have programmers that are crackers. And I've been fighting this for 20, 30 years, trying to help people understand there is a difference. And the majority of people out there that call themselves programmers are actually hackers. They're not professionals. They don't have enough experience. They don't understand the whole flow, and all of the implications and side effects of everything they're doing, and you don't want in most cases, that's fine. In most cases, that's all you need your small business, you're trying to build a little database, who cares if you're a professional programmer, doesn't matter. It matters when course is now live, start getting involved, Monday starts getting involved. But even at that, you know, the, there's a lot of hackers working for companies that are taking their our lives into their hands. Anyways, now I'm fighting this next door, I don't know, maybe I should give up on it. Maybe it's a lost cause for me.

But this next world war is phishing campaigns, I look at it and say there's a number of different types of fishing you've got the guys cast and big nets, little catch anything, hopefully, you got the guys that are are using a lower to try and catch up a specific type of person, and then you got the guys that are going after one person and that's spearfishing, and based on this article, I would say that the democrats are misleading people or the whoever is the spokesperson doesn't know what spearfishing is, which is probably the most most likely option here. You know, I try not to put too malice what can easily be attributed to stupidity or ignorance, right.

And in this case, it's probably ignorant. Because if you look at this article on seeing that it says spear phishing is sending bogus emails disguises legitimate ones to full recipients. Well, no, not true. That's only a part very small part of it. Because it also has to do with who you are going after.

Now, I mentioned this a little bit earlier. Let's get into a couple of details on it. I don't know if this was the biggest, biggest breach ever. Obviously, we don't know everything about every breach that's occurred. We know there's been huge breaches of the IRS and huge ones over at the Federal Department of what do they call it, the where all the employees federal employees go through, including background check information, everything, there's just been huge ones out there. And we know about Equifax. We know about so many of these others. This is being called collection number one, because it's thought to be a collection made from multiple hacks that have occurred over who knows how long

So, Troy Hunt, he's a researcher, security researcher down in Australia. And he goes around, and he cruises the dark web. And he's got friends on it. And he kind of comes up with some, I think, some good data, some good information that people should be aware of. And that's why I'm bringing it up right now. And it's kind of a security thing, right? He's a total security geek. And he is he's in love with this stuff. And he makes some money from it, too, which is good. I think he supports himself from that very thing. Well, this collection is one that he found. And they're thinking that it may contain data from as many as 2000 sources, 87 gigabytes of data in all and it has information on some 773 million accounts. So that's three quarters of a billion email addresses and passwords. While it's got about 21 million passwords. As part of this, it's been for sale amongst hackers could be used for credential stuffing. This is a technique where the bad guys are trying multiple email addresses and passwords on as many different apps and services they possibly can. So people are taking lists like this that have email addresses have a password and trying to figure out, figure out where else they might work. And again, this goes back to you are hacked. Okay, that's got to be one of my new solo pins, right? It isn't a security thing anymore. It's an everybody thing you have been having, don't worry about it, you've been hacked, okay, you have to worry about your data and how it's going to be used. But this just reinforces that, frankly, European privacy law, the GDPR French regulators have now fined Google 50 million euros. That was on Monday for via violating the European Union GDPR. Now that's not a lot when you look at Google and how much money that they made, which was like, I think alphabet was about $33 billion in revenue in its most recent quarter, okay, but a lot like the US $2.7 billion fine against Google for anti trust in 2017, which was a record the fine maybe less important than the changes that Google is going to have to make to its privacy and not just for people who are clearly in the European Union but people world why the so there may be some some dramatic actions here against a number of us tech giants. And I think that's going to be good for all of us. Frankly, these GDPR date which is the general data protection regulation, those rules went into effect a few years ago they gain teeth in May of 2018 to almost a year now and this is big this is really big we're seeing GDPR equivalent legislation being worked on in mass in California federal in fact the GDPR had some basis on some guidelines that mass was publishing so this is just one country France and they ruled the Google violated it because they hadn't properly gained consent from users to use their personal data for online advertising now if you signed up for my email list basically anytime in the last few years but it's been very obvious for about six years you've probably noticed so if you go to http://CraigPeterson.com/subscribe meaning by the way, if you do that go to slash subscribe on my website you will get all of my show notes every week and you'll also get information about hacks that are occurring occurring in real time you'll get information also about the free master classes I have and everything else okay so if you haven't already you should do it. http://CraigPeterson.com/subscribe.

But if you do that, you'll notice now that there's two checkboxes on there that you have to click that acknowledge that I can send you an e-mail. So you're consenting to that and that I can promote to you because I might send you an email where I say hey, this is the best thing since sliced bread you got to get this software and whether I make a dime off it or not. That's considered a marketing email even if I'm trying to help you out so you have to click both those boxes before I will allow you to subscribe and then on top of it you hit subscribe and you're not subscribed yet I will send you an email right away saying hey thanks for signing up but you got to click here because I got to confirm you are who you are so that you know some guy that doesn't like you and wants to subscribe to every email list known to man can't just go to my site and the thousand other sites and sign you up so you're not going to get any emails from me unless you double opt in and you also confirm that you really want them on that page now this is something as well that you should be doing if you have a business and you have a website you have to be doing this. And if you want more tips on this let me know just email me@CraigPeterson.com. That might be a great topic for one of our master classes what you need to do in order to comply with these new privacy laws. But let me know know right, I don't know unless you tell me you can either text me back if you're on the SMS list or you can respond to my email if you're on my email list and just let me know that you want to know more about your business website what you should do to comply with GDPR to be glad to let you know okay, I don't charge for this stuff. This really is something I want you guys to know about. You need to know about. So we're going to run through really quickly a few little flashes one looks like a hacked phone may have led the killers to Khashoggi very, very big deal. And apparently, it was software from this company called Pegasus and Israeli based cyber company that makes acting tools that are sold to evil governments worldwide as well as to lessee for governments worldwide. The goal is to automate us welcome to the age of surveillance capitalism you're going to want to read this again it's up on my website http://CraigPeterson.com This is from the guardian and the notes by the way, listen to a podcast all of this is in my show notes as well on popular WordPress plugin was hacked by an angry former employee. I've got that up on there. If you're using multi lingual WordPress, you've got to check that out again on my website. It's all right there and who is checks keep an eye on your domain if you own your own domain as a business because there are scams going on. All right all of that to http://CraigPeterson.com. Make sure you subscribe. http://CraigPeterson.com/subscribe, you'll see it all there. Have a great week and keep an eye on your email box because I got a phenomenal thing coming up here. And I'm going to be starting to send out some emails about it this week. Little bit of training is going on. Have a great week. Take care and we'll chat again next week. And I'll have my next podcast out on Monday. Bye Bye. Thanks for joining us.

---

Related articles:

Biggest Data Breach Yet Has Leaked 773 Million Emails. Here’s What You Need To Do Now

DNC Says Russian Hackers Hit It Again With Phishing Effort After Midterms

How A Hacked Phone May Have Led Killers To Khashoggi

‘The Goal Is To Automate Us’: Welcome To The Age Of Surveillance Capitalism

EU Privacy Law Snares Its First Tech Giant: Google

Popular WordPress Plugin Hacked By Angry Former Employee

How A Who Is Check Could Have Halted A Scam
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 23, 2019

Craig is on WGAN this morning with Ken and Matt in their usual banter. They discussed the tech solutions for border security, the tech trends for 2019, and how to rename Alexa.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is It Feasible For Russia To Use Bitcoin To Avoid Sanctions From The United States?

The Biggest Tech Trends Of 2019, According To Top Experts

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/23/2019

Tech Solutions For Border Security - Russia Using Bitcoin To Bypass US Sanctions - Renaming Alexa

Craig Peterson 0:00
Hey everybody, I hope you've taken the time to look at that special report that I offered this week. Of course, it's it's free, right? Isn't that always the case and I have a little bit of an upsell for you, it's really cheap. And I just want to cover my costs on a webinar that we're going to hold about this on Friday. But you can freeze your
credit and you can do it for absolutely nothing. And then I personally think it's way better than going to these credit monitoring companies that all they'll do is after the fact try and help you clean up a little bit of the mess right. So freeze it, make sure you get that that special report if you haven't already checked your email because you should have gotten an email from me.

So this morning with our friends Ken and Matt we of course, had a few different discussions we talked about the border because they had been going on and on they were yelling. Ken yelling actually not mad, I had a guest that had called him a was crazy all about the border border security. And I had to kind of straighten out a couple of things here about what technology could do, what are the basic problems and even kind of tip my hat little bit as to which way I lean on that one. So we talked about that we talked about your Amazon Alexa and how to change its name, so that it isn't waking up all the time by someone saying the wrong wake up word. And there are three words you can use to wake it up. So I talked a little bit about that. And one more thing when we're talking about our security and and what you should be doing, I've got a special course that's going to be starting up here in just a few weeks. And it's not just a course because I know you don't all want to be security experts, right? You just want to solve your security problem, I get it. Finally, I think okay, so I, I have this whole thing we're going to back you up. I've got commitments from my technology people, my engineers that work for my company, my technicians all the way up to my third level tech support, I'm going to be offering a complete technology turnaround for you from you know, security standpoint, in just a couple of weeks. And I'm going to work with you, I'm going to explain how this all works. I'm going to show you how to secure your computers absolutely secure them. And we're also now going to be able to have tech support available for you as part of this all inclusive package. How's that for a big deal.

So if you are a tech guy at a company, we're not going to move in on your space, we're going to help you with securing your business doesn't matter how big the businesses can be a Soho can be a multi million dollar public company, because we we deal with everything in between, frankly, including both of those edges. So I am so excited about this. I went through this yesterday with my team. And we explained what was going to happen and laid out all of the plans. And there's a lot of work for us involved. We've never offered this before. In fact, no one has ever offered this before. But it's a complete security technology turnaround, where we will hold your hand, we're not just going to sell you some software and run away. In fact, you don't even have to buy any software from us. This is all about educating you about the security problems, how to fix them yourselves. And you are backed by our engineers. Now thinking about thinking about our friends at Microsoft. If you ever called Microsoft for tech support,

Unknown 3:54
right? Have you ever paid them the $300 they want I know I've even paid the the $300 they want for a single tech support call one call lasting no more than two hours. And when you think about all of the computers that you have, and you're trying to get those computers all fixed up and working. Don't you wish you had somebody to explain it all to you. Right there are you one of those people who's tried it and and stumbled and said, Forget about it. And you don't want to upgrade your computer because you just know something's going to break. And you just know yet can be able to fix it. And you just know you're not going to be able to open a dozen support tickets with Microsoft and four or $5,000 later you might be back on your feet, right? If that's the case,

Unknown 4:47
do you think that would help you that this whole thing would help you because that's what we're going to be offering. So this is exciting. This is new, we've never done it before. So keep your eyes on because this is coming up in a couple of weeks. I am going to be sending out some emails on this in a couple of weeks. And you'll find out more. And I'm going to have a webinar kind of explaining what we're doing that I'm going to make an offer. And that's it. I'm only doing this this one time. And hopefully if it's right for you. You will sign up. So anyhow, here we go with Mr. Ken and Matt on WGAN and all of their affiliates in Maine

Unknown 5:31
Ken got some food and a little happier now.

Unknown 5:38
So I got a little... by the way do I might sound

Unknown 5:43
Do you think Craig Peterson.

Unknown 5:45
Craig Peterson, our tech guru. He has you know, you joke about me having 17 kids. He actually may have 17. I think probably older than me.

Unknown 5:52
probably say let me guess you I'm going to say 50 now. 45.

Unknown 6:01
You're like this to my youngest kid is 23. Oh my god. Our eldest is 35.

Unknown 6:07
So you got to be me. And then you could have been 20, you know.

Unknown 6:10
Well, that's my my wife turned 60 this year. Wow.

Unknown 6:14
Alright, so that's Wow. Okay. Yeah.

Unknown 6:18
39. Yeah,

Unknown 6:20
well,

Unknown 6:22
too. So

Unknown 6:25
there you go. Hey, Ken. Yes. All of this discussion about the border? I thought maybe we might want to talk about a couple of little technology things that might

Unknown 6:33
please do take my mind off this. I think that's a great idea.

Unknown 6:36
lasers.

Unknown 6:38
Me, what about late

Unknown 6:40
Are you talking about lasers pointed at Tom Brady's face at football games? Because I'm a little concerned about that.

Unknown 6:46
Exactly. Now, it's an interesting debate, frankly, because there are so many aspects of it. That's too bad that there's just so much focus strictly on the wall. I you know, you look at this, what's the wall for courses, physical barrier to prevent people from crossing. But as you guys have both talked about before, we've got a big problem with people overstating visas, we're trying to keep people out of the country illegally. We, you know, we talked a few weeks ago about these new biometric systems like the ones that will scan your eyes looking for a potential lies that that was I'm actually I don't think we spoke about it. That was in my, you know, my website. But here's some of the technologies they're looking at right now. If you fly out of Orlando, there's this new biometric system that does look at your eyes. But to identify you, as a unique person, we've got other biometric systems that are starting to be deployed. And the idea is that we can catch people very quickly, who are trying to enter illegally. So someone, for instance, decides that they're going to come in the country, they come here, they commit a crime of some sort, they are arrested. And if we do capture their biometric information, and then they leave to go home to visit family or whatever, and they come back at that point, now we can stop them, we can catch them, we can detect illicit behavior with different types of scanners, we can screen migrants, we can put more technology at our ports and, and more scanning more surveillance to see what's going on. It's like President Trump that suggested that. And what we're talking about here are, again, what Ken was mentioning this morning, we know that most of the drugs that are crossing the border are coming to our major ports of entry. Of course, we don't really know how much is coming elsewhere, because we don't monitor that closely. But we can do a much better job of even having dogs at the borders that are sniffing that are looking for some of these things. But then you run into problems like I have clients, a couple of them, I can think of off and that have parts of their equipment manufacturer to Mexico, and then they ship it up here, they do final assembly in the US and then they sell their products. Well, at that point, now you're causing problems for our economies, and for American businesses, American jobs, because you're stopping the some of the flow of this, or at least you're slowing it down impeding it, but you know, there are some things we can do with our existing ports that are going to improve things. Obviously, we can't track people, even the little bit of biometric things we've heard about before, where you stick a chip under the skin that's just playing not going to work because the only can be helpful if they're right there at a scanner. So forget those types of ideas. But it's very difficult problem. There is some technology that divine to try and solve some of this problem. But I also want us to be a little bit cautious here because both sides are pretty upset about what's happening right now. And I want to be conscious because we tend to need jerk many times and I don't want to have this backscatter radar problem like we've had at the airports where you've got backscatter x rays being used, and there's a lot of questions about how much harm they were doing, initially, how much time they still might be doing, and we put them in places a quick response to some of the terrorist actions that happen that are very rare and should we be should we be knee jerk? And I don't know I I don't think so. But there's a lot of discussion frankly, from my standpoint, it's frustrating that the democrats completely reject an empty and and Chuck Schumer. Nancy Pelosi rejected Trump's proposals before he even made the proposals. How do we have a national dialogue about this? And how do we come to a new set of laws and new technology, new regulations, new employees, when nobody seems to want to talk this want to yell?

Unknown 11:08
Craig Peterson, our tech guru, just talk about the world of technology. And what's happening, talked a little bit about border wall stuff. Let's get into more general technology topics, though, if you will. I you know, there's a lot of things we look back at 2018 and sort of see the trends that we saw starting to develop and things that we saw in technology and whatnot, what as you look forward to 2019, do you see as the top trends that we're going to be talking about

Unknown 11:34
all year? Yeah, this is kind of interesting. We've had a bunch of different trends over the years. And I said in the past, hey, this is that the year of the medical hack, for instance, right, where I think that our, our, our hospitals are going to be hacked, etc. And we've had years where it was, wow, this is the year of high def TV this year, I don't think we're going to have any big breakthroughs, you know, over iPhone was more than a decade ago now. And then the iPad came shortly afterwards. But I think this year is going to be kind of setting the pace for the future, and the groundwork for the future. And it's going to be really big, it's going to make change the world within the next two to three years, frankly, in some ways, you're not going to recognize the future five years from today, because of some technology that's rolling out this year. Now, we've mentioned before the 5G rollouts that are starting to happen, this is the new technology for our cell phone systems. And what this technology does is it provides incredibly fast service 10 times faster or more in some cases than what we have today for our cell phones, and also provides for many more millions, actually more than billion new devices to be attached to these networks. So what does that mean ultimately? Well, that means that our friends in the cable TV business are going to finally face some serious competition and our cable TV, if you will, you know, our TV is going to be in the future in most areas of the country. Of course, if you're in rural rural Maine, you're not going to see this right away. But it's in his faith major competition, because our cell phone carriers are going to be able to provide very inexpensive, very high speed internet that will be price competitive with what you have in your house, even right now. So so your cable may not even be used for internet anymore. And they'll be providing streaming video services, including local TV, that's all coming in about two to three years, Apple isn't even going to do a 5G phone this year. They said that won't happen until next year. But some of the other vendors are going to do it, they're going to kick their toes in. And 2019 is going to be known as the year of really kind of laying the groundwork for a much different future when it comes to data. And I want to add one more thing to this. And that is we are seeing serious push back now to large lack of privacy, misuse of data. And people are very upset. Government agencies are upset. As you know, the chairman pie of the FCC. FCC is very upset about this. And there is work of foot in Congress as well. So we're going to see more regulations. We're also going to see the industry itself try and pull up at socks. So expect to see a little bit of a an industry movement probably let her friends at Facebook, because they've got such a black guy this year. It's going to try and protect our privacy, which I think very important thing because we really haven't been doing anywhere near enough about it.

Unknown 15:09
We're talking to Craig Peterson is our tech school joins us Tuesdays at 7:38.

Unknown 15:14
before we let you go you know I did get Alexa for Christmas. And I

Unknown 15:18
Alexa play who

Unknown 15:20
I did

Unknown 15:20
change it to computer though, because I thought it was much better. That's called a computer. Ah,

Unknown 15:25
so what you can change? Yes.

Unknown 15:27
Whoa, whoa, whoa.

Unknown 15:29
Limited. A sorry, Craig. We're going to talk we're talking to our tech experts. Only a few seriously, you can

Unknown 15:35
say Alexa changer, your

Unknown 15:39
your name

Unknown 15:40
yet.

Unknown 15:42
or changing reading or?

Unknown 15:43
Yeah, I'll

Unknown 15:44
use a computer. I can do like a star trek thing. And I can be like, computer

Unknown 15:47
computer. Yeah, but

Unknown 15:51
that's happening today. I'm gonna go ahead and go home.

Unknown 15:53
What else? It is on store for us from Amazon. Are they going to have this and every wall we have? Are they going to be having cameras? This

Unknown 16:00
is this a minority report? Are we turning into Minority Report? That's my question. I'm talking about biometrics reading eyeballs. That's the first thing I thought about was Tom Cruise going into the gap.

Unknown 16:10
Minority Report.

Unknown 16:11
By the way, for those of you whose radio who's electrodes are now streaming live, which is what I do in the morning, when I wake up, you can change this culture wake up word. And the way to change it to computer is you're going to your Alexa app on your phone. You tap that little hamburger menu settings and scroll down to wake word.

Unknown 16:31
Yeah. And then we have

Unknown 16:32
that drop down menu.

Unknown 16:35
Yeah. And then you can call it either Amazon Echo or computer,

Unknown 16:40
right? All right. And that's all you have to do. We didn't get major Barrett's voice to do it back to you know, yes.

Unknown 16:47
You know what I have? I have a skill that all I have to do is say le x a red alert and it sounds the virus from the original Star Trek series

Unknown 17:03
Barrett some

Unknown 17:06
point

Unknown 17:08
because I don't think you can buy that one. Yeah, yeah, it's kind of cool. So yeah, there's 100 million dollar these things now in people's hands. These Alexa and they are continuing to grow. And they are being embedded now. And more and more devices. Apple this year at CES. That was their big thing, if you will, their announcement was Apple is now making Siri available in TVs and other third party devices. So we're going to see more and more integration. And it looks like Amazon might be winning this smart speaker were

Unknown 17:42
indeed. All right, Craig. Craig Peterson, our tech guru joining us, you know, as it usually does on Wednesdays here can you say joins, we have about two minutes left Craig. So make this one a brief one, but Russia and bitcoins is this some way of getting around sanctions?

Unknown 18:00
Interesting story and Bitcoin is Bitcoin apparently because of fraud and initial trading where they did some trading back and forth between a few guys in order to drive the price of bitcoin up. And that's there's there's some evidence to support that now. There is a rumor floating around that our friends over in Russia that are looking to get away around us sanctions and they're going to get around our sanctioned by using Bitcoin in sac what the, the, the whole rumor drives to is that Russia could purchase Bitcoin to replace the US dollar as a reserve currency and there's saying, Hey, how about we use Bitcoin or some other blockchain technology in order to sell oil for oil trading instead of the US dollar? So the big question is, is this real legit, or not? All the research I've done online seems to indicate that it is not legit, although, who knows? Maybe it was a bit of a trial balloon by the Kremlin. But if Russia work to do that, of course, it would drive the value of Bitcoin way up. Because this Russian economist there's only one guy that said this said that Russia was going to put 10 billion in Bitcoin, I would not call that an investment. By the way, this is not investment advice either, but I don't know what's going to happen. But it is an interesting idea with cryptocurrencies. Could other countries get around us sanctions by switching over to Bitcoin or other currencies?

Unknown 19:43
Great question. We're gonna leave it there Craig is we're out of time appreciate you joining us as always, and we'll talk to you again next week.

Unknown 19:48
Hey gentlemen, take care. Thanks Craig

Unknown 19:50
all right we're gonna come back at the other end of this with our eyeballs

Unknown 19:55
Hey and once again everybody thanks for listening thanks for downloading thanks for subscribing and we'll be back on Saturday with another one of my Saturday weekend radio shows right here and by the way I you know for a little while twice now I've done dailies here for the podcast if you like my podcasts please let me know and also if you think I should be doing dailies go back to dailies if you'd appreciate it if it's worth the effort because I really want to help out here but when I don't get the feedback it's it's hard to know right how helpful my being but let me know me at Craig Peterson calm. Should I start doing more podcasts more direct podcast talking about but what's happening out there or is my weekly Saturday summary and my discussion that I put up here on my Monday Tuesday Wednesday podcast. Is that enough for you? Let me know me@CraigPeterson.com. Have a great day. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 22, 2019

Craig is on with Jim Polito talking about iPhones - how Microsoft is recommending it, what to do with your old iPhones, and upgrading your iPhones.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/22/2019

Microsoft Recommending iPhones - What Should You Do With Your Old iPhone - Upgrading iPhone

Craig Peterson: 0:00

Hey good morning everybody. Hopefully you got my emails I sent one out Friday I sent one out on well it sounded Of course my regular email but that special report that I put together you know the free one that talks about how to freeze your credit is available now and it's going to be a you know it's going to make a big difference in your life. I ended up reaching out as a member of the great and powerful media community in the press I reached out to the four major wrist credit reporting agencies out there and I talked to them about what the best ways are to protect your data okay well you got to all this personal information this latest hack 750 million records found online and probably wasn't one hackers probably bunch of data put together all of that stuff in one box 750 million records it's just crazy so you got to make sure that your data is safe that it's all kept safe and what's the best way to do that they told me I put together the special report I've got a free upgrade to you can get the special report better free upgrade coming this Friday I'm going to do a one just one webinar we're going to answer your questions I'm going to review the whole thing explained it all and that will be live on Friday and if you take the upgrade you're going to also be able to get that replay of it so you can work through it later on again so hopefully you got that if not send an email to me@CraigPeterson.com or check your spam box your junk box. Make sure me@CraigPeterson.com is in your contacts. Okay, this is important. And I've got a lot more special reports coming up. I've got a really great offer coming up here in the first week of February. So keep your eyes out for that as well. And everybody have a great day. I spoke with Jim this morning all about the iPhone. So if you've been wondering about upgrading, if you have a Microsoft phone and you heard the latest news, or even if you didn't hear the latest news, listen in because here we go with Jim

Unknown 2:14
man, one of the most popular segments on the show. And I'm talking about our friends at Tech Talk guru. Craig Peterson. Good morning, Craig.

Unknown 2:24
Hey, good morning. You know, it's it's too bad. That great looking guys like us. You know, our faces don't come through. But at least our voices are there, right.

Unknown 2:37
You and I could scare varnish off a mahogany table.

Unknown 2:42
You know what I mean? You know what happened?

Unknown 2:48
You're very handsome man. Craig. Just like me. How about

Unknown 2:53
two very young, very young to Yes,

Unknown 2:55
very young. Hey, I want to call an audible here much like Tom Brady does. Every once in a while. When he gets up to the line of scrimmage and changes his mind.

Unknown 3:06
In the past couple of weeks. My Apple

Unknown 3:13
iPhone 6 has been 6S or whatever it is, has just been. It's telling me Jim, I want you to put me down. You know what I mean? It's it's telling me that and and I said to Kathy God, I hate to spend money on a new phone. And she said, Well, ask Craig Peterson what he thinks. And I said, Well, I yeah. I said, I'm going to tell him. I want apple. And I'm going to tell him that I don't think I need the apple 10 or whatever it is. So right now I'm with a six. Craig, what would you recommend? I do? Because I know there's a lot of other people out there who have the same dilemma right now.

Unknown 3:57
Yeah, well, in fact, I don't know if you heard about Microsoft is small software company up in Seattle.

Unknown 4:04
rings a little bit of a bell. I I noticed that bill Bella check. had one of their tablets. Yeah, during Sunday night's game, and he threw it if that means anything, he actually threw it. Yeah,

Unknown 4:18
he's done that before. This was

Unknown 4:20
not because the tablet wasn't functioning those because the ref wouldn't pay attention to something he was showing him on the tablet. But

Unknown 4:29
yeah, well, it's at Microsoft. And, you know, they've come up with some all kinds of me to products that include that Surface tablet that was advertised like crazy on the game. Because of course, they had to keep going to replace and they they had Microsoft Surface all over the replay.

Unknown 4:48
But Microsoft has one of the things is their phones, right? They've got Windows Phone, and it's the bend the answer to so many people that just they love and adore windows. And it's what they're used to supposed to be compatible. Yeah, exactly. Well,

Unknown 5:09
about a week ago, Microsoft announced that, hey, switch to an iPhone,

Unknown 5:17
we're not going to have Windows phone anymore. Microsoft is is completely killing off their windows phone line. 100% gone.

Unknown 5:30
So if you thought about switching to Windows 10 Mobile on your Windows Phone, it's time to have a serious look at the iPhone or maybe an Android phone. Because the Windows 10 Mobile support page says that they're going to stop sending as of December 2019 this year. So you got almost a year it's going to stop sending new security updates, non security hot fixes, there will be no more free assessment support options. No technical content updates from Microsoft available unless you pay extra

Unknown 6:07
so it is dead. So Jim, you're constantly one this is I think this is a great tactical move move from Microsoft. Because Come on. There is one phone out there that that people should buy today. And right now that the iPhone, so you're right to say, Hey, listen, I've got this success. Yeah, what should I do next? It probably should be apple. And apparently Microsoft agrees with you.

Unknown 6:36
Hey, listen, if I can get Bill Gates to agree with me that I'm all set. That makes me that makes me brilliant. Oh, yeah, that's right. He's not running the company anymore. is he now? So then? Okay. So then I don't listen. You know me. I don't want to, you know, spend a lot of money I just needed decent, reliable phone. I don't need it to make my coffee in the morning. I need because I can't do my job. Without it. It is it is my show prep. 24/7. Is that device in my hands. So it's

Unknown 7:15
amazing. Yeah, well, there's a couple of things you could do here. So let me run through the options because I'm sure there's a lot of listeners kind of in the same boat right now maybe looking to get out of Android space because it is so dangerous. But here are your options. First of all, Apple has introduced that policy now for very inexpensive battery replacements. And that means as a rule it's less than 50 bucks

Unknown 7:43
done it already I took the deal that you said to take and I put put the battery in for 30 bucks.

Unknown 7:49
Right, even better back then. Absolutely. So that's your first option for people to consider. The next option is if you are really tight for money most carriers have deals on last two generations sometimes even three generations of Apple phone okay so most of these carriers will give you for cheap money you know just we're talking about some of them have even had deals for a box for an iPhone seven Now unlike Microsoft and Android the seven still going to be supported for a few years to come. Right so it's not a bad thing I have an iPhone eight Yeah, I like you did not get the 10 the eight has the same internal gap as the iPhone can get. Ok now the new tans the XR and the access Max and stuff those guys have a little bit faster guts but I can tell you the iPhone eight as the great new camera technology not the absolute latest greatest but it's phenomenal including the real smart portrait mode it even has a processor dedicated to taking pictures Jeremy it will make you a phenomenal picture taker

Unknown 9:10
wow I'm already actually I'm not bragging a good photographer

Unknown 9:14
Well there you go

Unknown 9:17
I know how to compose a shot so wait a minute because my friend Peter who's a regular listeners iPhone 6. Come on Jim time to upgrade to the x axis

Unknown 9:32
if I was in the market today I

Unknown 9:34
Peters a wealthy man. Peters a very well, yeah,

Unknown 9:37
there you go. I would not get the access. And part of it. Reason is, I don't like the newest technology. Here's the tech guys saying I like to stay a generation or so behind unless

Unknown 9:50
somebody else feel the pain, right. So seriously, consider the iPhone eight. It it's a great phone. And I've got to put the burden for Apple to say have dramatically decreased some of the costs options here on the new iPhone axis. And one of them is that you can trade in your older iPhones and get even as much as $300 towards the purchase of a new phone. Wow. And look at the rental options. Because some carriers like T-Mobile, for instance, have a rental deal works an extra depends on the phone, but tend to only it's $30 a month for one of these brand new iPhone access with the facial recognition. And so then what happens is if if you keep the phone and keep reading it for two years, it's yours. And if you decide to leave the plan, you just return the phone. They'll give you a new one if you want to under the rental agreement. So look at that if you can't afford the files of dollars or more even for the newest latest greatest phone look at the iPhone eight and look at rental option for the iPhone tense. But me personally right now, today, I would do an iPhone eight. And if money was really tight, and I could get a great deal on an iPhone seven. Have a serious look at that too. And refurbished phones from Apple come with really great warranties. So have a look at that as well. Because there are repurpose phones available from Apple. And you can save a ton of money by doing that.

Unknown 11:29
I got my answer. And that was a great segment. I know that we didn't get to the stuff that Craig sent me. But I knew that I know that other phone and I can tell now by all of the messages I'm receiving from listeners, Craig, that that was a big deal for everybody. So all the stuff we were going to talk about fear not you can get it you can get it every single week. Did you hear me every single week because Craig puts together all of this information. And all you have to do is text to my name to this number 855-385-5553. 855-385-5553

Unknown 12:18
standard data and text rates apply. But you get all of this great information. And if there's ever a big issue, there's a hack. There's a Oh, one of the credit reporting agencies gets hacked. Craig Peterson is there by your side to tell you what to do. And he doesn't charge you for this. He doesn't sell your name to anyone. And he doesn't take advantage of the fact that he has your cell phone number by bombarding you with texts. So do it. It's it's worth it. And Craig, thank you so much for your time. I really appreciate the good advice.

Unknown 12:59
Thank you, Frank German and good idea to follow Cathy's advice too.

Unknown 13:07
Bye Bye. Thanks

Unknown 13:08
Craig Peterson everybody one of the most popular segments on the show when we return a final word you're listening to the Jim Polito show, your safe space.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 18, 2019

Have you heard of Ring?  Well they make some pretty cool video doorbells.  But today we are going to tell you about some things they did not get right.

Bitcoin is in the news but so is Russia.  We are going to talk about how huge this is and what Russia is up to.

And we have to talk about Alexa? Did you know there are 100 million of them out there?  We will talk about what that means.

We've got these huge corporate websites and not just any website getting hit but other sites hacking going on an unprecedented scale.

Did you get a Smart TV for the holidays? Did you ever stop to think why was it so affordable?  Well, we will discuss spying and your privacy as it relates to you TV. 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/19/2019

New Privacy Concerns with Ring Doorbell Camera, Smart TVs Collecting Your Data, Rumors about new Russian Bitcoin

Craig Peterson: 0:00
Hey everybody. I love this beat. This is Craig Peterson. This is show number 990. Isn't that just amazing? We get right down to it. That's a lot of weeks because 990 is one per week. Okay, we're not talking about these guys that are doing dailies, although I have done dailies, that's not part of this. That means we are a matter of what a couple of months out from show number 1000. Wow. That's a lot of show. So anyways, welcome everybody. Hope you're having a good day and hope you like this bumper music. I don't know I kind of like this.

It was between this and a kind of a Beatles-ey type rock song. I really like them, right? These songs I think you got to choose it's got to be whoever the host is that decides that

But I'd love to hear from you too. And what you think I I think Sheryll who does most of our show transcriptions might not like having a lot of music in the background. But I'm kind of liking this, I don't know,

I never played the guitar. I played a lot of instruments over the years, you know, back when I was a kid, right? I kind of stopped when I had a family

That's really nice. It's got a nice beat to it. Anyhow, we're going to talk about tech as we always do. And of course, a lot of that tech has to do with security, as it always does. And we've had a few shows this year so far. But it's been a busy year. And I haven't really been trying to keep up on all the latest latest latest stuff. So that's what this week is all about. And I want to start by talking about some of this Bitcoin stuff because I think this is absolutely huge, and what Russia is doing, and this is going to drive up the price of bitcoin. We've got now 100 million Alexa devices that have been sold. So what's next for us out there after they've got 100 million of them? What does that mean to us? We've got this huge corporate website and not just website but other sites hacking going on an unprecedented scale. So what's happening there? What does it mean to your business? Do you think your websites been acting strangely, maybe this has been going on, particularly if it's been acting badly, the top tech trends of 2019 according to the tech experts out there. And the simple reason, by the way, if you got a new Smart TV for the holidays, why was it so affordable? Well, you will believe this, I think, hey, it's kind of scary, frankly.

And if you've been worried about your TV spying on you, while Ben Gilbert from Business Insider has some news for you, and we'll start out with Amazon's Ring. Now, this is a pretty cool device.

In fact, my wife wants one of these for our house. And I've thought a lot about it that the Ring started with just kind of a doorbell with a built-in security camera. You've probably seen these before, right and you can have the strangers come up to your door and ring the doorbell and that I think the commercial shows someone on a beach in an in a tropical area and just sitting there answering the door on their phone and seeing who it is and what's going on which is really cool. But this article from the Intercept is talking about excuse me talk

Rings frankly abysmal privacy practices. And there have been a number of reports about that in the news over the last little while, but they've got cameras all around. Now it's not just the doorbell. These devices are providing high definition feeds from all around the house. We're talking about the doorbells, but also in garages and on bookshelves. And it's not just for keeping tabs on your home while you're away. But a lot of people are using them kind of like nanny cams to find out also when their kids are home when they get home from school, that they bring some friends with them. Maybe some friends, Mom and Dad don't like it. There's all kinds of things are used for neighborhood watches. People are putting together boards where all of the cameras in their neighborhood are on one website you can go to, and you can see what's happening in the neighborhood. You know, that can be really good. I know my wife helped to found a kind of a neighborhood watch thing here in our neighborhood. And everyone kind of keeps tabs on what's going on. And the founder of Ring his name is, or she I'm not sure, Jamie Siminoff, he said that our mission to reduce crime and neighborhoods has been at the core of everything we do at Ring. And you know, that marketing message has really hit with consumers. Frankly, they got a $1 billion acquisition from Amazon, who now owns Ring. And that's kind of nice if you have the Alexa as we mentioned a little bit earlier, 100 million of them out there right now. So that that Ring device ties into all of that.

So despite this mission that they have talked about to keep people a d their property secure, the company's treatment of video feeds has been anything but secure. And this is according to people who have been talking to the Intercept to say they're pretty darn familiar with what's going on. According to one source, starting in 2016, Ring provided its Ukraine based research and development team, virtually unfettered access to a folder on Amazon S3 cloud storage that contained every video created by every Ring camera everywhere around the world. Now, this is just if this is true, this is just an enormous invasion of privacy. And we're talking about a list of highly sensitive files and could be browsed and viewed by these developers over in Ukraine, you know, could be wonderful people.

But if it's out there on S3, if there are any security lapses, we know Ukraine got hit really badly last year, or actually a little more than a year ago now with some malware, some ransomware that was aimed specifically at Ukraine and companies, what's going on here?

Well, apparently these files are also not just on S3, but they were left unencrypted. And they said that was it because of the expense of implementing encryption and lost revenue opportunities. Because of restricted access and you know, all the excuses you can think of.

Now, you might be familiar with Uber's God Mode. We talked about it here on the show before Uber, of course, that ride-sharing service where people are taking their vehicles and are driving the streets and picking up strangers for money, right. It's not what mom said not to do when we were a kid. But Uber had this God Mode that let anyone in the company basically look at every ride that was currently occurring, where everyone was, who was getting a ride, they were watching celebrities. And just crazy what Uber was doing.

This is vaguely familiar of that, isn't it? And in fact, I think it's kind of worse because now you've got the video. So who knows, right? reporters, competitors, email addresses, all of these people could view all of their cameras. That's all they needed in order to get at the data. And apparently, there were instances of Ring engineers teaching each other about who they brought home after romantic dates. In other words, they were watching each other as well. So this is something we have to be careful of. We know about some of the risks that we've heard for years, about nanny cams, baby cams being hacked. And believe me, they are. If you bought yourself a camera system for your office, and your little bit worried about it well, if you bought it, and it was just one of these lower-end camera systems that most of these video surveillance companies sell. Or if you bought it at Harbor Freight or the local big box door, almost all of those are a very high percentage. And I've seen numbers as high as 90% of them have been hacked by the Chinese, very hackable, let me put it that way by the Chinese and many of them have been hacked. And we have done that we've seen that we have come into a business who was having security problems, they thought maybe there were security problems, they thought maybe there were viruses on their machines. So they brought us in, we checked, Of course, the word viruses on their machines, but what did they come from, they were being hacked from the camera system that was installed. Some cases one case it was installed by a professional firm, but you know, people don't want to pay money for the good stuff from Cisco or some of these other resellers that really check this and keep tabs on this and so that's what happens so you know, it's going to happen.

If you're using these types of devices hopefully like in the case of Ring, you've got Amazon buying them and Amazon kind of whip you into shape so I think it's important to keep that in mind. Right. Ring very big company they paid a billion dollars for it. You think they do a little bit better than that, don't you?

Well, let's talk about TVs now. Smart TVs.

You know smart TVs, have been all the rage. I who was I was at my one of my brother's houses, I think it was. Oh, it was my mom's house and they had just bought a smart TV over the holidays and they had set it up and I had to help them reconfigure some things because they just didn't have it configured right. And it was kind of interesting to ask some questions of her and her Smart TV because it has all of these features on it. She's got it hooked up to the internet so she can stream Hulu and Amazon and she can stream her CBC stuff that she wants to stream from Canada when she is down in the US. She was completely oblivious to the potential problems here but here's another one to add to your list and to seriously complain when you are going to buy a smart TV about these things spying on you right because you have a right to be upset It doesn't say anywhere on the label that they're spying on you but Have you wondered why that smart TV was so cheap right they remember how much they used to be Why are they cheap well here's a great story Ben Gilbert over the Business Insider and of course all of these articles I've mentioned today including the ones I'm going into more detail on are available at my website http://CraigPeterson.com hopefully you are a member of my insiders email and you got an email comes out every Saturday morning if you're not subscribed, just go to http://CraigPeterson.com/subscribe. You'll get all of this and more when there are big hacks or big things happening in the news that I think are worth you knowing about. And kind of jumping on top of I will let you know, and I let you know via that email list. So you will see these articles right there. You just click on the links, I'll take you right to my website.

But here's what Business Insider had to say. The vast majority of televisions available today are smart TVs. We knew that right? You go into any store. That's what you see that they have internet connections, and they aren't connected to the internet. Sometimes it's via wireless because the Wi-Fi in our homes has gotten so good and sometimes as via hardwire, but they've gotten internet connections. I've got advertisement placement as part of the TV where the TV recognizes that maybe the channel you're watching has a commercial coming on right now. So the TV overlays a commercial or to overlay it in the corner. They also have streaming services built into them. So despite the all of this added functionality, think about what that all costs to put together right there. They aren't Roku that aren't making the hardware and then selling streaming services. They aren't Apple TV who is selling new or the Apple TVs set-top box and also making the real money off of streaming services, right. They're not a fire stick where Amazon can give it to you at a great discounted price. Because Amazon selling new video content, right. All of that stuff just plain adds up.
We have to seriously consider what business these people are in. You know, you can go out right now you can buy a 65 inch 4K Smart TV with HDR capability for less than 500 bucks.

That's a massive piece of technology. It's going to last you for years. Are you kidding 4K? I don't have 4K my house. My TV is half the size of this one. Right? How can you get it for that cheap? Well, there is a caveat. Some manufacturers that are selling these TVs are making their money on the back end. Now we understand the back end with your fire stick, you understand the back end with your Apple TV or your Roku because they're all making money off of the streaming. But how about the TV set? Well the TV manufacturer may also have deals with these you know Australian providers so that they get a little bit of a cut in the action just like you buy a Windows PCs especially if you buy it retail you know if you get a Windows PC from us it's going to be clean but these retail machines that you buy come pre-loaded with all kinds of crapware. Right? Right? They've got Norton Antivirus or Symantec can have viruses tho those are going to do you any good. And they've gone to these games that you can play, they've got all of this stuff that you can have, if only you pay them money, right. So you get a free 30-day trial or something. But you know, you have to go through all the trouble taking the software off of your machines. So they make an extra 10 bucks per machine. It's estimated by putting all that junk on your machine before you buy it.

So how are the TV manufacturers going to make that extra money? Well, they are collecting data like the types of show you watch which ads you're watching when you're flipping channels, right? The eyeballs, that's what they want to know, and your approximate physical location. And we talked before on the show about how some of these people manufacturers are actually even using cameras to figure out who's watching the TV.

Now, there is an interview on The Verge. They have a podcast, and they had Vizio chief technology officer on there. I think his name's Bill Baxter, and Vizio is a big TV company. I have one of their TVs. And he was talking about how this technology works. And he said this is a cutthroat industry. This is a direct quote. I've found it here. It's a 6% margin industry. The group greater strategy is I really don't need to make money off the TV. I need to cover my costs. So more specifically, companies like the Vizio, V-I-Z-I-O, don't need to make money from every TV they sell because they're making money on the back end. So there's the answer you can tell your friends if they're wondering why those TVs or smart TVs are so cheap now you know the answer.

And we're going to talk about Russia here right now and the whole Bitcoin thing.

Now we just had a Canadian sentenced to death over in China and we know that two Chinese executives we had, Huawei executives and that made the news was arrested in Vancouver, Canada when she was changing airplanes there. And another Huawei executive with just arrested last week as well I think that was in South Korea but I don't remember and Huawei courses in trouble I heard just I think it was the last couple of days that Huawei is up on some criminal charges, which you normally don't see for Corporation. But it's a real problem.

Why was there a warrant for that Huawei executive to be arrested that caused her to be arrested in Vancouver? Well, there was a warrant because the United States is accused, Huawei of violence, this sanctions against Iran. So Canada honored that warrant and arrested her and you know, the aftermath is still kind of kind of me trying to figure out there.

So what does this all mean? Why did I bring this up? And when I'm mentioning Russia? Well, there are also sanctions against Russia. And there is a lot of fake news out there as well. Right? But the big fake news started with was Dan Rather, right, who was who made up completely made up this story about George Bush, President Bush and his lack of service and what he did in the Texas National Guard, completely fabricated, right. And then he lost his job over the whole thing and got defensive about it, and you know, it, it was the wrong thing to do. And that was really, really the beginning of the fake news that we have today.

So fake news. We've been seeing I'm going to put this up on my website. Hopefully, that'll be up by the time the show's over here. We got my people working on it, but hopefully what we find is that this is fake news as well. So here's what's been going on. If you listen to me before, you know I am not a fan of cryptocurrencies, not because of the fact that cryptocurrencies can help you maintain a degree of anonymity And believe me, it's only degree people can be tracked down, they have been tracked down and they have been arrested, okay, criminals doing evil things with Bitcoin. Now, there's nothing wrong with Bitcoin or these other things, you know, cryptocurrencies, as far as you're using them for legal purposes. And of course, if you make a profit in selling any of these cryptocurrencies, you have to report that to the Internal Revenue Service, right? Pretty straightforward, pretty simple.

Well, how does this tie into Russia and Iran and China? Here's how it ties in. There's rumors that Russia is looking to buy bitcoin and the rumors are that it's going to invest about $10 billion in Bitcoin.

Now, this is an economist that's saying that the guy's name is Vladislav Ginko, and we'll see what happens because he's saying hey, this could start as early as February 2019. Well, first thing why would Russia buy bitcoin?

Well, according to this economist Russia wants to get away from the US dollar as being the world's currency and when you buy and sell oil it's always done in US dollars right so he's saying that we've got our wonderful president or prime minister the president of Russia Putin over there saying hey listen we want to get away from the US dollar so let's make Bitcoin be the reserve currency for the world now uh. How would that be something? What do you think that would do the price of bitcoin? Bitcoin that struggling to get back up to $4,000. Remember it at one point in some markets it was as much as $40,000 but generally speaking was about 18,000, 20,000 at its peak. So it's a lost a lot as have pretty much every other cryptocurrency and these initial coin offerings that were happening every day, last year, they're pretty much dead now. Because the cryptocurrency boom has faded. It's faded in a very big way.

So what do you think that starting a rumor that Russia was going to put $10 billion into bitcoin? What do you think that would do to the value of Bitcoin?

So we're looking at this saying, okay, maybe that's legitimate. We've got the Trump administration, adding some more Russians to the list of sanction entities that US companies and persons cannot trade with. And the sanctions, of course, are this aggressive stance that the Trump administration has had against Russia, although Trump's been colluding with Russia. So he, you know, the Trump administration has been much tougher on Russia than any previous modern administration.

So maybe they would, maybe they wouldn't, but I'm looking at all of this same, you know, maybe really, what we're looking at here is not that Russia is looking to buy bitcoin, and maybe they are, maybe they've considered it, but no one except Ginko was saying that they're seriously considering that is this another fake news and that may be what it is if it's not fake news I don't know maybe Bitcoin to be something to put money into this is not investment advice you know I've never bought any of this stuff I don't want any of this stuff because it's it's frankly way too volatile but I thought I'd bring it up because it's an interesting angle and from what I've been able to tell online doing research on all of these various cryptocurrency websites this is not a legitimate story well we were not going to have time to get to all of the articles today. As I mentioned before you can get them by just going to my website at http://CraigPeterson.com. Read my newsletter that hopefully you get every week my little insider newsletter letter and you get that by going to http://CraigPeterson.com/subscribe. And hey I want to shout out here and a big thanks to everybody who's left comments we got a few comments on my podcast the more of those we get you know the more coverage we get the more people that are going to hear about the podcast well I've been doing this for a very long time huge labor of love here for everybody I really am trying to help you out so please share but also leave a comment go to http://CraigPeterson.com/iTunes. http://CraigPeterson.com/iTunes and that'll take you to a place where you can subscribe right there on iTunes. They are the 800-pound gorilla. I would really love it if you subscribe there because that's where the numbers come from. that the show is rated on and leave some five-star comments. Hopefully, I've earned five stars from you. But do it right there. subscribe and leave a comment. I so appreciate it. http://CraigPeter son.com/iTunes.

Okay, so we got a couple more minutes. Let's talk about the biggest tech trends of 2019. This is a FastCompany article FastCompany still seems to be a pretty good magazine, I have a subscription to it. And I enjoy a lot of the articles. But they're saying that this might be more of a quiet year, 2019 more about laying the groundwork than any historic breakthroughs. And what is the groundwork? Well, number one, the growth of AI. Artificial intelligence is really going to grow. It's frankly, most of its still really machine learning. But IBM is actually now selling quantum computers, how's that for amazing? And these things are going to change the whole world of cryptology for prediction for weather, a prediction for earthquakes at a kind of everything. Okay, so that's kind of rolling out right now. I think they've only sold one of those quantum computers. They had one on the floor at CES this year, and they may be putting more of them out there.

We're also going to see technology that is really going to kind of blur some of the boundaries between what's real and what's synthetic. When it comes to the reporting you're reading. You might have noticed this already articles that the English kinda is terrible in right? Have you noticed that? So we're gonna have more synthetic media This year, we're going to have more ethical questions. As we have these autonomous vehicles rolling out an AI rolling out. Consumers may start adopting some more these are you know AR glasses, really, we'll see what happened. 5G is going to really start rolling out this year, it's going to start showing up in some phones, we're going to have new user interfaces available because of the virtual reality an augmented reality, we're going to see more on the wireless side, you might have heard me a few months ago, talking about how Wi-Fi is about to change again, we're going to seem more the slow death of cable TV is has become to be known. It's going to move over to frankly, our wireless devices, voice platforms, you know, you've seen Alexa, Google Home rise up, we've seen Siri kind of plod along but that's going to be improving as well. So keep an eye on your mailbox. You should have gotten an email from me this week. yesterday. Yeah, Friday. And I made a note of it too, in this morning's newsletter. I have something going on right now. This is my first in a series of special reports. It's absolutely free. All you do is make sure you are on my email list and you can sign up for but this is why you should not be buying some of this so-called insurance for identity theft and what you can do for free. So I'm writing that absolutely free. I have a special I actually have like four or five special surprise bonuses that are part of that everything there is for free. And if you want to attend some of my master classes, there's information about all of that there. So check your email for an email from me@CraigPeterson.com and have a great week. Take care, everybody. Bye-bye.

---

Related articles:

Airdrop Assaults On The Rise As Criminals Cyber Flash Strangers
Are Your Holiday Gifts Safe?
Apple Watch Can Now Detect Your Irregular Heart Rhythms And Other Problems: Here’s How It Works
Facebook Never Really Cared About Connecting The WorldHow To Stop Apps From Tracking Your Location
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 16, 2019

Today Craig spoke with Ken and Matt on the WGAN Morning News about a number of subjects including following up on their discussion of dogs and Craig told them about his new rescue dog, a Great Dane named Velma.

Then they got into the Technology and Ken mentioned he was going to be traveling soon and wanted to know how he could protect his data while traveling.

Then Matt asked about the new eye-scanning technology that is being tested now that can identify if you are lying.  Bottom line it still relies on your physical response and can still be manipulated by the biases of the tester.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

6 Ways You Put Your Data At Risk When You Travel
Why I Use Vpns All The Time (And So Should You)
The Best VPN Services
“Blade Runner” Eye-Scanning Lie Detector May Be Coming To A Dystopian Future Near You

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/16/2019

Adopted A Great Dane - Guinea Hens vs Chickens - Staying Safe While Traveling

Craig Peterson 0:00

Hey good morning everybody. I was just looking at some of my LinkedIn stats and if you haven't linked into me over on LinkedIn you can go ahead in LinkedIn

Unknown 0:09
but I was kind of cool because one of the videos I put together on Facebook and tracking you got like 1300 watches over on LinkedIn who knew I videos on LinkedIn anyhow that's pretty cool so thanks everybody that watched that and a few people commented so thanks for that as well in my posts over there getting more and more popular in the videos and stuff so this is good all the way around thanks everybody I really appreciate it and I appreciate everyone who subscribes to this podcast if you're not subscribed and this is subscribers that really count with the numbers here so I appreciate you listening but if you subscribe it really helps us out go to http://CraigPeterson.com/iTunes or you just search for me on rape whatever platform you like to listen to podcasts on. And there are you know, there's one other Craig Peterson out there. He's up in Washington state he and I have had some run-ins before where he was using my popularity to try and build his own credibility and but he's not me, right I'm the guy so the best way is http://CraigPeterson.com/subscribe for my email list. And http://CraigPeterson.com/iTunes to subscribe to my podcast slash iTunes and you can get this all automatic, then it really does help us out helps out a lot, because that's where the numbers really come from those subscribers is water counted. All right. This morning, I was on with our friends Ken and Matt. And Matt is looking to get a little puppy dog. So there's a litter he's been looking at and trying to figure out which dog that his kids want. And he and his wife one can, what name are they going to have it? So they were talking about that before I got on that the air this morning. So I had the guide get on and straighten them out. Oh, right. Isn't that always the case, though, somehow. And we talked about a couple of topics. We talked a little bit about putting your data at risk when you travel. There's a great article I have up on my website, you probably want to check out. But we talked a little bit about it. And a little bit about the VPN situation. And Matt had a quick question about that eye-scanning a lie detector as well. We've got our new information data starting to come out we're sending out this week, we're almost done. Wow, talking about a labor of love. Almost done with putting together this whole new special report system for you. You guys are going to love it. And hopefully that's going to happen this week. We've got it all planned out. And we've been working on it every day for the last week or so. Because it's not just this one special report on how to lock down your credit. But we're talking about a whole series of them. We've got 50 of them in the pipeline right now. So we're trying to make this whole system work with a special founding member of my insider portal, which is going to be absolutely free for this basic membership forever. But it's a beta thing. We're going to try a few things out. This is going to be fun, I think. And we've already got a couple of people who are in the alpha test already. So you know, kudos to you know who you are. And those people will be in beta that respond for this latest special report on how to lock down your credit for free and keep an eye out for that. That should be out this week. Again, if you're not on my email list, you already know how just rewind http://CraigPeterson.com/subscribe, right? We got all of that here today. So off we go with Ken and Matt. And we'll be back at this weekend, if not before maybe with a couple more videos. So here we go.

Unknown 4:01
And we are back again. It's time for Craig Peterson, our tech guru to join us he does so at 738 every Wednesday. This Wednesday being no exception

Unknown 4:10
during our you know, except to that 738

Unknown 4:13
Good Mornings whether we got a new puppy to well actually sees three and a half years old. This is our fourth rescue great game and she's just amazing. And her name is Velma. How's that for great? Velma?

Unknown 4:29
Velma? The Great Danes are really

Unknown 4:31
big.

Unknown 4:34
I mean,

Unknown 4:35
like I told the girls they need to knit her an orange turtleneck sweater. Stay warm

Unknown 4:41
Velma

Unknown 4:43
assume you named after the Scooby Doo character

Unknown 4:47
name. She came with

Unknown 4:48
and or or or you're great on from 1840

Unknown 4:59
Well, good for you.

Unknown 5:03
Well, you know

Unknown 5:05
the dog named Blanche

Unknown 5:08
doors Well, I wasn't gonna neighbor Hillary right.

Unknown 5:14
pet stores in California Petros in California, they cannot sell brand new dogs. Is it where they have to shell rescues now? California course. Of course. That's the way things work

Unknown 5:26
for

Unknown 5:28
low on Yes.

Unknown 5:31
First Lady.

Unknown 5:33
Yeah, like long names my most of my dogs been named after like different guns and other manufacturers of different things over to

Unknown 5:44
guns like Beretta.

Unknown 5:51
Yeah, exactly. And Winchester and you know that's that sort of thing that's what we've had German shepherds and as I said, Our fourth grade

Unknown 6:00
he thought about a Bischon or Boston Terrier cute dog

Unknown 6:06
or something a little you know I like the big dog that just you know

Unknown 6:10
you know what comes out a big dog

Unknown 6:12
what outside

Unknown 6:14
a happy dog

Unknown 6:16
no, I

Unknown 6:16
know but you'll still step in it that's all I gotta say.

Unknown 6:19
For the chickens take care of that though they break it all off and you know it's also stepped on it right away but yeah they do and they eat more, of course, then

Unknown 6:28
whoever thought we'd be talking about dog poop chickens you go to a bag you go to a bag of dog food a week you

Unknown 6:36
know the chickens do keep away the

Unknown 6:39
the text

Unknown 6:41
they do actually not as good as getting him but you know on on that point to can

Unknown 6:47
about the back Are you from the 1800s what

Unknown 6:53
you got chickens

Unknown 6:59
we found is he's a technologist

Unknown 7:05
that why I drive a 1980 Mercedes diesel right no electronics so

Unknown 7:11
probably hear that thing coming from about six miles away

Unknown 7:13
and see it too about the dog food Ken is that we found a what's called a higher quality dog food, I guess I was buying it at the local Walmart or whatever, you know. And we found this other stuff that a dog food store we brought the dog in and they had a food tasting for Velma. And they had like eight different feeds of foods out there for her I'm used to using the word "feed" for the chickens. So I this feed and she got to try the different the different foods and which one that she liked. And then they had this treat tree and she found a treat you really like and so we said okay, well we'll track it. It's like a pound for pound it's like eight times as much as pie as the big box. Right and but she only eats about an eight says much of it. So worth something. We felt the same price and she looks so much better. And she has more energy.

Unknown 8:10
How about some of your chickens are getting

Unknown 8:13
slowly he actually got into some chicken because we had we had you know dead ones. We had some and she found the bones in the trash and stuff and she pulled them out and started eating them. But um. Yeah, but you got to be careful chicken bones with dogs.

Unknown 8:31
Yes, you do.

Unknown 8:32
Yes you do

Unknown 8:35
with what Danes turkey gives them because one of our Danes got into the turkey carcass after Thanksgiving and bloody diarrhea not a good thing to talk about eating breakfast Let's move on. And that's animal

Unknown 8:49
answers

Unknown 8:52
animal expertise talking about getting developers

Unknown 9:00
ology I'm going to be traveling Yeah if I don't catch pneumonia from my wife, or cold from Matt, and a week and a half. So what should I do to prevent the risk of my data? Or data,

Unknown 9:14
data? Or data? Yeah, when you're traveling, etc. I had a couple of questions from like, you guys know, I have a weekend radio show that I of course podcast as well that you can find on my website. But

Unknown 9:30
oh, yeah, there you go. Slash iTunes, if you want the past, but I know you guys are also podcasting my segments here. Although people who are listening for the tech today might be slightly disappointed. But the the the whole thing about traveling and data and the show on Saturday was about VPN and trying to keep your data safe the VPN. And of course, we've talked before about how Facebook kind of fool people into thinking using their VPN would make them safe. So I got a great article up on there about traveling and what you have to be careful for because everybody tries to hop on to Wi-Fi. Now, we don't do it with our phones, like we used to. Nowadays, we're doing it with our laptops, because our phones have great data plans, right? Almost everybody. And we all know that come next year, 2020 data is going to get even better. But we've seen breaches in the hotel chains. We know about breaches that have been happening at airports, even breaches of airplanes systems while they are in flight, and where people took them over the Wi-Fi that's onboard the planes. And we're using that to hack into people on the plane who are using the Wi-Fi. Now the good news is the planes main systems used for the flight controls are a different system than they're using for the Wi-Fi. So that's very, very good. But according to a new Pew Center research poll security poll that was done, in the study, they found that even though there's been all these encrypted networks and websites using encryption, and that's made the internet safer. In general, there's just no such thing as being too careful. So be careful with your credit cards. Use those little anti-scanning wallets that you can get. So the RF IDs can't be scanned, use devices built-in safeguards, the fingerprints of some print on your phone, whether it's a Samsung, or an apple, that some print reader does tend to be a lot safer, particularly on Samsung than the new facial recognition system. So use the thumbprint on it's available in no one to use 12 digit passcode pin, like how to make sure your devices are encrypted, that standard with Apple. And it's absolutely available for pretty much every other manufacturer out there, including the Android just turn that stuff on, don't connect to public Wi-Fi, if you can avoid it, connect to your cell phone. And your cell phone probably has data sharing on it. So you can tell it from your cell phone, etc. etc. You know, your rental cars, your Bluetooth, when you connect to that rental car, that car will usually upload your contact list and things and you don't want that for the next guy to come around and use or the people who are taking care of the cars to steal it. Because it's going to have your home address in there. It's going to have all kinds of stuff. And you got to be careful with that too. So either doesn't connect to the Bluetooth in your car or make sure you delete it. When you leave your car at the airport. delete your phone. First of all, your data goes away. Just all kinds of great tips. And again, they are up there on the website

Unknown 12:43
talking to Craig Peterson, our animal answer man, who's here occasionally giving us an update about technology. Craig, am I going to have trouble lying to people in the future? Oh, this is this is a concern for me.

Unknown 12:56
Yeah,

Unknown 12:57
well, if you are a politician, you might want to really be careful, okay, because there's this new Blade Runner technology. And what's really kind of interesting about this from my standpoint to is Mark Cuban's, the guy that founded this company back in 2014, it's called the ID tag and it's kind of like a polygraph for the I have words of it, but it's about 1510 15%

Unknown 13:27
more accurate according to the manufacturer, it's already in use 500 customers 40 countries but what it does is it looks at your eyes and watches for the response of your pupils in your eye as you are being interviewed by someone and the whole idea is if you lie your eyes going to react in a certain way It only takes about 30 minutes as opposed to a couple of hours for a normal polygraph. And I've got to say both cases polygraph and this new eye lie detector is not 100% the people who are administering the test are going to introduce their own personal biases on what's going on. But you know, give a little bit of time because ultimately you're going to see something like this at us by our friends, TSA, it's already been used by some of the embassies out there and who knows, we'll see just how accurate it really is. But it's about $25,000 to buy one of these and that makes it a lot cheaper than some of the polygraph equipment that's out there and might be good for just basic research of crimes and potential criminals

Unknown 14:47
are joining us every Wednesday at 730. And if you do have any questions about Great Danes or pets, feel free to go to his website. Craig Peterson, the dog whisperer. com just click that for joining us. We'll talk to you next week.

Unknown 15:04
Take care guys. Thanks. All right.

Unknown 15:07
I would never have a great day. What do you say, a huge giant,

Unknown 15:15
I could say is leave a big Ken. Alright, everybody. Talk to you later. Take care. Bye-bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jan 16, 2019

Today Craig spoke with Ken and Matt on the WGAN Morning News about some subjects including following up on their discussion of dogs and Craig told them about his new rescue dog, a Great Dane named Velma.

Then they got into the Technology, and Ken mentioned he was going to be traveling soon and wanted to know how he could protect his data while traveling.

Then Matt asked about the new eye-scanning technology that is being tested now that can identify if you are lying.  Bottom line it still relies on your physical response and can even be manipulated by the biases of the tester.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

6 Ways You Put Your Data At Risk When You Travel

Why I Use VPNs All The Time (And So Should You)

The Best VPN Services

“Blade Runner” Eye-Scanning Lie Detector May Be Coming To A Dystopian Future Near You
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 01/16/2019

Craig Peterson 0:00 Hey good morning everybody. I was looking at some of my LinkedIn stats, and if you haven't linked into me over on LinkedIn you can go ahead and link-in

Unknown 0:09 but I was kind of cool because one of the videos I put together on Facebook and tracking you got like 1300 watches over on LinkedIn who knew I videos on LinkedIn anyhow that's pretty cool so thanks everybody that watched that and a few people commented so thanks for that as well in my posts over there getting more and more popular in the videos and stuff so this is good all the way around thanks everybody I really appreciate it and I appreciate everyone who subscribes to this podcast if you're not subscribed and this is subscribers that really count with the numbers here so I appreciate you listening but if you subscribe it really helps us out go to Craig Peterson comm slash iTunes or you just search for me on rape whatever platform you like to listen to podcasts on. And there are you know, there's one other Craig Peterson out there. He's up in Washington state he and I have had some run-ins before where he was using my popularity to try and build his credibility and but he's not me, right I'm the guy so the best way is Craig Peterson dot com slash subscribe for my email list. And Craig Peterson dot com slash iTunes to subscribe to my podcast slash iTunes and you can get this all automatic, then it really does help us out helps out a lot, because that's where the numbers really come from those subscribers is water counted. All right. This morning, I was on with our friends cannon, Matt. And Matt is looking to get a little puppy dog. So there's a litter he's been looking at and trying to figure out which dog that his kids want. And he and his wife one can, what name are they going to have it? So they were talking about that before I got on that the air this morning. So I had the guide get on and straighten them out. Oh, right. Isn't that always the case, though, somehow. And we talked about a couple of topics. We talked a little bit about putting your data at risk when you travel. There's a great article I have up on my website, you probably want to check out. But we talked a little bit about it. And a little bit about the VPN situation. And Matt had a quick question about that i scanning a lie detector as well. We've got our new information data starting to come out we're sending out this week, we're almost done. Wow, talking about a labor of love. Almost done with putting together this whole new special report system for you. You guys are going to love it. And hopefully that's going to happen this week. We've got it all planned out. And we've been working on it every day for the last week or so. Because it's not just this one special report on how to lock down your credit. But we're talking about a whole series of them. We've got 50 of them in the pipeline right now. So we're trying to make this whole system work with a special founding member of my insider portal, which is going to be absolutely free for this basic membership forever. But it's a beta thing. We're going to try a few things out. This is going to be fun, I think. And we've already got a couple of people who are in the alpha test already. So you know, kudos to you know who you are. And those people will be in beta that respond for this latest special report on how to lock down your credit for free and keep an eye out for that. That should be out this week. Again, if you're not on my email list, you already know how just rewind Craig peters.com slash subscribe, right? We got all of that here today. So off we go with Ken and Matt. And we'll be back at this weekend, if not before maybe with a couple more videos. So here we go.

Unknown 4:01 And we are back again. It's time for Greg Peterson, our tech guru to join us he does so at 738 every Wednesday. This Wednesday being no exception

Unknown 4:10 during our you know, except to that 738

Unknown 4:13 Good Mornings whether we got a new puppy to well actually sees three and a half years old. This is our fourth rescue great game and she's just amazing. And her name is Velma. How's that for great Selma?

Unknown 4:29 Selma? The Great Danes are really

Unknown 4:31 big.

Unknown 4:34 I mean,

Unknown 4:35 like I told the girls they need to knit her an orange turtleneck sweater to stay warm

Unknown 4:41 Elmo

Unknown 4:43 assume you named after the Scooby Doo character

Unknown 4:47 name. She came with

Unknown 4:48 and or you're great on from 1840

Unknown 4:59 Well, good for you.

Unknown 5:03 Well, you know

Unknown 5:05 the dog named Blanche

Unknown 5:08 doors Well, I wasn't gonna neighbor Hillary right.

Unknown 5:14 pet stores in California, they cannot sell brand new dogs. Is it where they have to sell rescues now? California course. Of course. That's the way things work

Unknown 5:26 for

Unknown 5:28 low on Yes.

Unknown 5:31 First Lady.

Unknown 5:33 Yeah, like long names my most of my dogs been named after like different guns and other manufacturers of different things over to

Unknown 5:44 guns like Beretta.

Unknown 5:51 Yeah, exactly. And Winchester and you know that's that sort of thing that's what we've had German shepherds and as I said, Our fourth Great Dane

Unknown 6:00 he thought about a Bijon or Boston Terrier cute dog

Unknown 6:06 or something a little you know I like the big dogs that you know

Unknown 6:10 you don't come out a big dog's Frank

Unknown 6:12 what outside

Unknown 6:14 green a happy dog

Unknown 6:16 no I

Unknown 6:16 know, but you'll still step in it that's all I gotta say.

Unknown 6:19 For the chickens take care of that though they break it all up and you know it's also stepped on it right away but yeah they do, and they eat more of course than

Unknown 6:28 whoever thought we'd be talking about dog poop chickens, you through a bag you go to a bag of dog food a week you

Unknown 6:36 know the chickens do keep away the

Unknown 6:39 the text

Unknown 6:41 they do actually not as good as getting him, but you know on on that point to can

Unknown 6:47 about the back Are you from the 1800s what

Unknown 6:53 you got chickens

Unknown 6:59 is the we found is he's a technologist

Unknown 7:05 the when I drive a 1980 Mercedes diesel right no electronics so

Unknown 7:11 probably hear that thing coming from about six miles away

Unknown 7:13 and see it to about the dog food can is that we found a what's called a higher quality dog food I guess it is it is buy it at the local Walmart or whatever, you know. And we found this other stuff that a dog food store we brought the dog in and they had a food tasting for Velma. And they had like eight different feeds of foods out there for her I'm used to feed and check it so I this feed and she got to try the different the different foods and and which one that she liked. And then they had this treat tree, and she found a treat you really like and so we said okay, well we'll take it. It's like, pound for pound it's like eight times as much as the big box. Right and but she only eats about an eighth as much of it. So, worth something. We felt the same price and she looks so much better. And she has more energy.

Unknown 8:10 How about some of your chickens are getting

Unknown 8:13 slowly he actually got into some chicken because we had we had you know dead ones. We had some and she found the bones in the trash and stuff and she pulled them out and started eating them. But um. Yeah, but you got to be careful chicken bones with dogs.

Unknown 8:31 Yes you do.

Unknown 8:32 Yes you do

Unknown 8:35 with what Danes turkey gives them because one of our Danes got into the turkey carcass after Thanksgiving and bloody diarrhea, not a good thing to talk about eating breakfast Let's move on. And that's animal

Unknown 8:49 answers

Unknown 8:52 animal expertise talking about getting developers

Unknown 9:00 technology I'm going to be traveling Yeah if I don't catch pneumonia from my wife, or cold from Matt, and a week and a half. So what should I do to prevent risk of my data? Or data,

Unknown 9:14 data? Or data? Yeah, when you're traveling, etc. I had a couple of questions from like, you guys know, I have a weekend radio show that I of course podcast as well that you can find on my website. But

Unknown 9:30 oh, yeah, there you go. Slash iTunes, if you want the past, but I know you guys are also podcasting my segments here. Although people who are listening for the tech today might be slightly disappointed. But the the the whole thing about traveling and data and the show on Saturday was about VPN and trying to keep your data safe the VPN. And of course, we've talked before about how Facebook kind of fool people into thinking using their VPN would make them safe. So I got a great article up on there about traveling and what you have to be careful for, because everybody tries to hop on to Wi Fi. Now, we don't do it with our phones, like we used to. Nowadays, we're doing it with our laptops, because our phones have great data plans, right? Almost everybody. And we all know that come next year, 2020 data is going to get even better. But we've seen breaches in the hotel chains. We know about breaches that have been have happening at airports, even breaches of airplanes systems while they are in flight, and where people took them over the Wi Fi that's onboard the planes. And we're using that to hack into people on the plane who are using the Wi Fi. Now the good news is the planes main systems used for the flight controls are different system than they're using for the Wi Fi. So that's very, very good. But according to a new Pew Center research poll security poll that was done in study, they found that even though there's been all these encrypted networks and websites using encryption, and that's made the internet safer. In general, there's just no such thing as being too careful. So be careful with your credit cards. Use those little anti scanning wallets that you can get. So the RF IDs can't be scanned, use devices built in safeguards, the fingerprints of some print on your phone, whether it's a Samsung, or an apple, that some print reader does tend to be a lot safer, particularly on Samsung than the new facial recognition system. So use the thumbprint on it's available in no one to use 12 digit pass code pin, like how to make sure you devices are encrypted, that standard with Apple. And it's absolutely available for pretty much every other manufacturer out there, including the Android just turn that stuff on, don't connect to public Wi Fi, if you can avoid it, connect to your cell phone. And your cell phone probably has data sharing on it. So you can tell it from your cell phone, etc. etc. You know, your rental cars, your Bluetooth, when you connect to that rental car, that car will usually upload your contact list and things and you don't want that for the next guy to come around and use or the people who are taking care of the cars to steal it. Because it's going to have your home address in there. It's going to have all kinds of stuff. And you got to be careful with that too. So either don't connect to the Bluetooth in your car, or make sure you delete it. When you leave your car at the airport. delete your phone. First of all, your data goes away. Just all kinds of great tips. And again, they are up there on the website

Unknown 12:43 talking to Craig Peterson, our animal answers man who's here occasionally giving us an update about technology. Craig, am I going to have trouble lying to people in the future? Oh, this is this is a concern for me.

Unknown 12:56 Yeah,

Unknown 12:57 well, if if you are a public Titian, you might want to really be careful, okay, because there's this new Blade Runner technology. And what's really kind of interesting about this from my standpoint to is Mark Cuban's, the guy that founded this company back in 2014, it's called the ID tag, and it's kind of like a polygraph for the I have words of it, but it's about 1510 15%

Unknown 13:27 more accurate according to the manufacturer, it's already in use 500 customers 40 countries but what it does is it looks at your eyes and watches for the response of your pupils in your eye as you are being interviewed by someone and the whole idea is if you lie your eyes going to react in a certain way It only takes about 30 minutes as opposed to a couple of hours for a normal polygraph. And I've got to say both cases polygraph and this new I lie detector is not 100% the people who are administering the test are going to introduce their own personal biases on what's going on. But you know, give a little bit of time because ultimately you're going to see something like this at us by our friends, TSA, it's already been used by some of the embassies out there and who knows, we'll see just how accurate it really is. But it's about $25,000 to buy one of these and that makes it a lot cheaper than some of the polygraph equipment that's out there and might be good for just basic research of crimes and potential criminals

Unknown 14:47 are joining us every Wednesday at 730. And if you do have any questions about Great Danes or pets, feel free to go to his website. Craig Peterson, the dog whisperer just click that for joining us. We'll talk to you next week.

Unknown 15:04 Take care guys. Thanks. All right.

Unknown 15:07 I would never have a great day. What do you say f huge giant

Unknown 15:15 I could say is leaving a big can. Alright everybody. Talk to you later. Take care. Bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1 2 3 4 5 6 7 Next » 24