Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Jul 16, 2018

Have you wondered what will happen with our Jobs once Automation really takes hold? Listen in as Jack and Craig discuss Automation and the future jobs.

How about the changes in how we receive our news? I spoke with jack this morning about the changes in media and differences between TV vs Radio vs Newspapers.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

 

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/15/2018

The Future of jobs with Automation and TV vs Radio vs Newspapers

Craig Peterson[00:00:00] Hi everybody, Craig Peterson, here. I spoke this morning with Jack Heath and we talked about a couple of things. You know Jack's been in the news business for a lot of years, television news. So we talked about that specifically what is happening with the news and is there any legitimate source, anymore. Frankly, where's it all going, and jobs what's happening with jobs? You read an article in the paper this morning. So, I went into a little bit of detail about the future of jobs with technology. They're going to get better they're going to get worse. All of that, and more, so, here we go. 

[00:00:36] Joining us now on the Autofair listener line a regular contributor, the host of Tech Talk heard here on the weekends and Saturday on News Talk stations, Craig Peterson. Craig, good morning.

[00:00:48] Hello hello. Hi. How are you? Good. Doing good. 

[00:00:52] You know I saw a story this morning, thinking of you coming on and I saw it on one of the national news outlets. You think about technology and all the change with entertainment and information, and how we get stuff, and how fast or where we get it. There is one Blockbuster Video store left open in the country one and you wonder about some other retail changes because of technology that could be coming.

[00:01:19] Yeah, it's going to be a very very different world in another 10 years from now. Absolutely guaranteed. This week we've got Wal-Mart, who just obtained a patent that kind of concerning people. It's all designed to listen in to where you are and it's using the sounds to figure out how many people are in the store at the checkout. The whole retail space is going to change. And you know Walmart's got to compete. Think about Amazon, and how many small businesses Amazon has hurt? How many small businesses Wal-Mart just completely put out of business? Those guys are now at work against each other, and Wal-Mart is trying to find ways to cut their costs down because they've got stores, all of the overhead of workers, and the air conditioning and everything you have to do. It's going to be just a totally different world out there. Jack, you're absolutely right. 

[00:02:18] All right what else is going on in your tech talk world.

[00:02:21] Well, we've got concerns too right along the same lines as what you thinking of. What's going to happen with workers as these jobs disappear and basically any job that can be automated will be automated here in the near future. Especially with a shortage of workers. But, as these jobs disappear where are people going to end up at. And of course we've had this problem throughout history, when we have the Teamsters, say you know what's going to happen to us now that we no longer have horses and carriages, and of course, there have been other jobs that are followed on. But the big concern right now is, that these new jobs that are going to come about these new jobs that people are going to take as they are replaced by automated systems. These new jobs are going to be lower skilled even than they are now and lower pain. So, we could be in for some real trouble. But other economists are saying you know bottom line we ended up historically, with better jobs than we ever had before. So, maybe that's what's going to happen to, Jack. We're going to have to keep our eyes open our ears to the ground and continue to train ourselves. Everyone needs to remember, you're responsible for your career. You can't rely on your employer, you can't rely on the government, you need to improve yourself, continually. 

[00:03:46] Good stuff good stuff. And, you know I also think of you mentioned the changing work. And I just seems to me that the last few years technology more from a consumer behavioral point of view has really impacted how people get information. You know you look at the look at the media for a moment and you could argue that news talk radio has really married up well with the Web in terms of handheld phone and I Heart Radio the app and how many people can easily access that but you look at television news a traditional evening television newscast. It's already feeling and I had many years of my life that was the profession you know news throughout the day that is becoming as different ages of Americans consume differently. I don't know how many younger people watching television news. Certainly, I still like to hold a newspaper and look at it, but that's archaic to many people and they don't have the budget either, Jack you know you're in TV for so long.

[00:04:48] Look at what happened with WBIN TV and they did investigative journalism. They had people who were assigned to that to find the stories. Nowadays, we don't have I haven't any more places don't have the local news department. The all-day news that you were talking about back when you were in TV. There's not the budget forward anymore because the eyes have moved everywhere out and you're right about radio I think radio absolutely works. Obviously, the ears are down a little bit because again people are paying attention to way more things, but it's still there. Talk radio, you can have people on the radio, Experts that think about this stuff and that you don't have the budget problems that the newspapers have for instance because newspapers have to hire people to write these stories to do the background to do the investigations. On the radio, it's interactive. People love that it's more like what's been happening in social media frankly where the interaction is what's getting people's attention. So I love Radio, always have. But we're not getting the news like we used to. 

[00:06:02] You can sit down and watch the evening news with your favorite anchor and actually count on it being true even. You know and you'll get the morning newscast what used to be you know morning news, nationally. It's become a combination of an entertainment reality TV show just to kind of hold on to ratings and very little news, anyway. All right. It's not locally I do think of them WMUR to be as great.

[00:06:27] Does a great job and they're doing it. But budgets aren't like they used to be.

[00:06:32] Well let you go. Thank you, Craig Peterson, on New Hampshire today on this Monday morning. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 14, 2018

How do you protect your data from leaving with Employees? Listen in as Craig discusses what happened at Apple this week and how the lost some significant data.

Can anyone break into your iPhone?  Well maybe, but today Craig explains how Apple is trying to make it harder with their newest iOS release.  

Do you shop at Walmart?  Did you hear about the patent they were awarded this week.  Craig will fill you in on what they are trying to do and why you need to be concerned about it.  

Are you worried about Ransomware?  Craig talks about revealing news from Sonicwall and what they found.

You know the NSA has been collecting data.  But you might find what Craig has to tell you today about what the NSA is now doing and what it means for your privacy.

How valuable is your Face?  Craig will explain how large databases of Facial recognition data is going to be used. 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/14/2018

Apple Self Driving Tech Stolen. Facebook Still Abusing Privacy. NSA Deleting Phone Records. Malware Attacks Skyrocket. Walmart Eavesdropping

Craig Peterson: [00:00:00] Hi, Everybody Welcome to Tech Talk with Craig Peterson. We've got a lot of stuff to cover today. We're going to be talking about an Apple employee who's been charged with stealing their self-driving cars secrets. Apple has a new mode. You got the iPhone's latest security update. It's called USB restricted mode. We'll talk about that Wal-Mart boy. Do you work for Wal-Mart? You know someone who does well they have a new patent that is really starting to concern some of Walmart's employees. We've got a new stat here from the guys over at Sonicwall about malware attacks and guess what? Surprise, surprise, they are skyrocketing. NSA is deleting millions of phone call and text records over privacy violations. Facebook is still abusing your privacy. So here we go.

[00:00:51] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:01] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes I appreciate what you do with Forbes magazine for all these years it's one of my first go to places or talk right now with the guys and gals behind Siri. We're joined right now by the director of Kirkendall technology. We're joined right now by the CEO of Ebates Kevin Johnson on the air for more than 15 years.

[00:01:25] Over 20 million podcast downloads. This is Tech Talk with Craig Peterson

[00:01:34] Well you know the bottom line here we have an autonomous cars coming and they're coming at us really really fast. We're going to talk right now about what's happened at Apple and what might happen with your business. Frankly, if you're not really careful. An Apple engineer was just charged with criminal offenses he apparently had been working in Apple's secret autonomous car business and while he apparently might have done something wrong. Now you know President Trump has been talking about the Chinese and how they're trying to steal our technology in fact how they have stolen our technology. We already know that's the case. We already know that some of these laws about privacy about some of the things we take for granted here, patents and things just are not enforced over in communist China.

[00:02:25] Well, apparently what he did was he decided he was going to resign. So, how does he resign? Well, he is told to turn in all of his Apple gear. He's walked out the door. Now Apple has a really great policy that you should probably implement as well in your business and that policy is they walk them out the door. They take the equipment and then they do forensic analysis on that, equipment. When was the last time you did a forensic analysis of equipment for people that were leaving your business? Well, they found that he had done a few things wrong. First of all the activity of copying stuff on the network to and from devices had increased dramatically in the days before he resigned. They also found that he used Airdrop to drop some of these files from his computer to a non-Apple owned computer, apparently that of his wife he was going to take a job over in China. And apparently, he was going to take the secrets with him. So, remember whether you're talking about an employee who might have access to your accounting records or maybe it's an employee who has access to your client records. There's a lot of information you don't want walking out of the door. Can you look back in time to see what an employee has been doing? Can you erase a laptop that just doesn't get returned from an employee? Erase it remotely. Do you want your salespeople or others who have access to this information to walk away with it? And then on an everyday day to day basis. The big question is do you really want all of your employees to have access to everything. I hope you don't. I suspect you don't want that either. So, lock it down keep tabs on it and let's really try and keep this world and our businesses a bit of a safer place. I'll let you know what ends up happening with the charges here. Maybe he's convicted maybe he won't be but we'll see. This is industrial espionage of the highest degree top secret information

[00:04:44] Of course, you've heard about what's been going on with the FBI trying to get into iPhone's, local police department also trying to get into iPhone's.

[00:04:53] These things are locked down pretty well but there are a couple of companies that allow you to get into the iPhone. Employers have been using them, let's say someone leaves their employ, say they move on to a new job. What do you do with the data that's on that iPhone? Because sometimes the employees will just go ahead and lock it up and forget. I'm not going to open it up for you. All the information in there is not only lost to a business but on top of that what's happened is that iPhone has become unusable. If it's not locked to your Apple account. Now there are some ways to deal with that with employee devices reach out if you'd like to know a little bit more. But what we're going to talk about right now is Apple and law enforcement a little bit of the battle going on here. And I I don't know kind of which side they absolutely come down on with this because I don't want the bad guys to have access to complete privacy, right because then they can conduct their bad deeds their evil deeds and deeds in private. But I also don't want to have this problem of having my information available to some bad guy that just grabs my phone and walks away because I'm sitting in a coffee shop. And then they can hook it up and they can hack it.

[00:06:11] Right, do you want that. I know I don't. So Apple introduced in their latest release here in OS it's eleven point four point one. They introduced a new feature which is called USB restricted mode. Now what that does is it locks down your iPhone. You a little port at the bottom of it so that you cannot you or a bad guy, in this case, cannot access the information or the data that's on it. So they can't just plug it in and download everything from it. So, what Apple has done, is they've put a delay in if you haven't unlocked that phone for at least one hour that port is turned off. Now in my case we're talking about this coffee shop obviously, the guy if he has his little apple iPhone copier device there with him he's going to be able to take that information and he's going to be able to hook up your phone right away because you probably opened it up in the coffee shop, right. You probably had it right there so that you could use it. That's why you had it open in the coffee shop. So, it's opening in the coffee shop. He has access to it. He just takes it over to his table and puts it in a bag right. With a little battery powered device that offloads everything from your iPhone and tada he has all of your data.

[00:07:33] Now the same thing is true when we're talking about law enforcement. Obviously, if you are at a border crossing you probably already know or within 50 miles of a border. We're talking about international borders here. They can open up your devices have a look inside them make copies of them just do all kinds of things with them. And that one-hour timer obviously is not going to be, in fact, in effect. But if you lose your phone it's found on the side of the road. This will stop most people from being able to get into it. Law enforcement they're going to be able to gain access to quickly. There are some workarounds in fact that you can use to keep that port alive. We're not going to get into that right now but keep an eye out if you have an iPhone. Obviously, take the latest software update they tend to be very stable, in this case. I have it already. It is stable and I like the idea of trying to block that USB port and the ability for the bad guys to be able to get your data here, Bottom line. But if you don't have a good passcode on it. You're not paying attention to security at all. Well, you probably don't care. Check it out online. Craig Peterson dotcom

[00:08:57] If you worked for Wal-Mart you might want to listen up here right now because they've got a new patent in place. If you compare the two big retailers who are you talking about while you're obviously talking about Wal-Mart because they've got physical retail store out there. But you're also going to be talking about our friends over at Amazon and when we're talking about Amazon and Wal-Mart you're talking about two behemoths who are fighting for your business and my business. Wal-Mart. Great place to go shop you can save a lot of money. Amazon same type of thing. So, how are they going to compete? Amazon has this great advantage when it comes to costs. They don't have to maintain a retail store. They don't have to stock all of those shelves. They don't have to move the merchandise on time for you to be able to buy it. They don't have to have the people at the checkout registers or the checkout registers, right. They don't have to have all of the doors in and out they don't have to have the air conditioning. Think of all of the overhead of retail. And that's the reason why frankly Amazon has killed so many small retailers out there. So, when we're talking about the big battles ahead, Wal-Mart has to find some way to become more cost effective. So, how can they do that? Well, we already know from local Wal-Mart that they have some pretty big self-checkout areas. My local Wal-Mart has eight checkout areas. I've seen them with much bigger check out errors for you to do it yourself. So you scan it. It weighs it when you put it down so that it gets an idea. Making sure you're not trying to steal something.

[00:10:36] So you are not trying to put in something way too heavy or way too light in there and depending on where you live sometimes those scales are really picky sometimes they're not so picky but Walmart's done that helped save some costs who hasn't been to a store whether its Wal-Mart or Target or you name it where you haven't had to wait for a long time in line and that can be a very big deal. Well in this case what we're talking about is Wal-Mart being able to track you and their checkout people in the store and the patent applies to sound technology. We're talking about Wal-Mart now using sound, to figure out what youre doing in the checkout line. It's listening for things potentially like the the crinkle of the bag as a bag is used or the movement of the cart. So they know hey there's a lot of people in line I need to do something about it and even record conversations. Now that's a little bit scary, for both the consumers and for the Wal-Mart employees as well. Whether or not Wal-Mart is actually going to take advantage of this patent or if it's something that they might just license. We'll see. Time will tell. So far it's just a patent that was just awarded this week and it has to do with using sound, to track you in the store while you're buying things and that in conjunction with these RFID tags these radio frequency identifiers that Wal-Mart is already putting into most of the products, that's really going to give them a bit of a leg up, in fact, a huge leg up over other retailers. But, I don't know if it's enough to beat our friend over at Amazon

[00:12:28] We have all kinds of reports that come out about cyber security. Verizon's a real big one. They released reports quite frequently but so do many others WEBROOT. We've talked about on my radio show before there is a new study out right now that is I think there's a little bit of a surprise here. It's from our friends over at Sonicwall and it's talking about what they have been seeing. Sonicwall is a provider of VPN services, you know where you have the hardware there in your business that you want to use. They also have some firewall techniques and some specialized security software that they run. And what they're showing is that in the first half of 2018 ransomware attacks are on the rise again. Now, ransomware attacks are very scary. They're kind of nasty frankly and they're on the rise because they work. If you get hit by ransomware you have to follow a few rules here some bottom line rules. First of all the FBI strongly recommends that you never pay a ransom. However the business realities might dictate that you have to pay the ransom. But if you do pay that ransom for ransomware, remember that you may never actually get your data back up 50 percent of the time according to the FBI your data is never recovered. So remember that the other big problem when it comes to ransomware payments is if you pay and the bad guys receive it. Right. So assuming this transaction happened they now know that you pay ransoms. So, many cases ransomware perpetrators have attacked again and again at the exact same business. So be very careful.

[00:14:22] The best ways to help prevent ransomware and the best ways to help prevent real high cost when it comes to being hit by ransomware are the following. First of all, make sure you have a very good backup. Make sure that backup is tested. Test your backups. Test them frequently to make sure they're working. The next thing is you need to have not just anti virus anti virus does not cut it anymore. I can't emphasize that enough. It is just not enough. You need frankly you need kind of like an onion you need something where there are multiple layers you're you're guarding your DNS. You've got an endpoint piece of software looking at every file on the machine as it's open. You have something that the edge in your firewall. These next generation firewalls and some are better than others obviously. Now my personal preference is Cisco. That's what I sell. But I have something at the edge that says wait a minute here. This is an infected file and hopefully can go ahead and grab it and scrape it back. You know the average time it takes a small business or any business in the United States to be able to find out that it has been hacked is a good six months sometimes even longer. So, you got to be careful you've got to watch that. You have to be prudent when it comes to ransomware because as our friends at Sonicwall just told us ransomware is on the rise and ransomware can kill a business. Most businesses that get hit with ransomware or a good hack are out of business.

[00:16:00] They're out of business within six months. Not good by the way.

[00:16:04] Mystics 6 billion malware attacks during the first six months of this year compared with 3 billion attacks over the last half of 2017. We're talking about a 100 percent rise in ransomware attacks. By now everybody worldwide knows who the NSA is it's no longer. No such agency. It's the National Security Agency and the guys and gals over there have been sweeping up data. We've certainly talked about it before on my show. But did you know what they're doing now. This is a big surprise to pretty much everybody out there. The NSA has been collecting not just metadata but all kinds of data. And we've heard about FISA warrants in the news recently as it appears President Trump's campaign was monitored due to one of these FISA warrants which are designed really to help to catch spies and other foreigners who might be trying to do harm here in the U.S. Well, apparently a number of these FISA warns were flawed. And the new management that was put in place by President Trump over at the NSA has been looking at what's going on not obviously just maybe what went on with the Trump case but they are looking at all of the data what's been captured what did the Obama administration orchestrate when it started capturing all of the data on all Americans dealing with all of their communications.

[00:17:49] Well, its turned out now that under the Trump administration the NSA has started purging i.e. deleting billions of records yes those records that they were recording that are now under questionable jurisdiction are being deleted. What they're saying is they think that they may have intercepted communications between people that frankly they were not really authorized to do so instead of trying to play games with it or just try and keep it secret. They have come out and have officially announced that they did capture data. They probably shouldn't have. And rather than go through it all and try and figure out what's what what's where they're just deleting it. They're calling it technical irregularities and we're talking about a purge right now of over 685 million phone and text records records. Now that's really really huge. You know is the NSA to blame. They certainly have collected billions over the years but seeing that they are getting a little bit of oversight now makes me feel good in knowing that the NSA has identified some of these records as records they should not have and they're deleting them. So kudos. Good on you guys over there. The NSA

[00:19:18] Well, if you're a Facebook user and you've been paying attention you know that Mark Zuckerberg about three months ago agreed to stop tracking much of the information online. To be more transparent about it and to of course allow you to control some of your data. But we have some questions for Mark Zuckerberg right now due to some more information that's come out. First of all how are you making things more open and more transparent when the European Union introduces new laws about privacy. California has almost the exact same laws going into effect in 2020. So when those laws went into effect about you keeping data private about you at Facebook not only keeping the data private but letting people control their own information how is it that you try and move and that you did over a billion records from the European Union to the United States hopefully out of reach of the European regulators at least that's what it looks like to me. That's what it looks like to a lot of people who have had closer looks at it than I have. Well, now FaceBook they're facing yet another problem, because what they're also doing is they are using specialized facial recognition software. Now this software is designed for them to be able to figure out who's who in which pictures.

[00:20:50] Bottom line. What Facebook is saying is they're using it to protect your identity online. I'm not sure how much protection there is by having Facebook capturing my face and measuring all of the coordinates on my face and taking all of that data now and and putting it on to a bigger database which now becomes a database they can sell so that if I'm recognized down the street who knows what's going to happen. You remember Tom Cruise, walking by a billboard and the billboard greeting him with a new sale at the store has on just for him. You know that could be great. All right. As a marketer my marketing hat here I have that hat on and I'm thinking wow this is great. I don't have to bother people or not to interrupt people who might not be interested in my product. So, if I know who they are and I know what they've been looking for I can target them better and they're going to have a better experience overall.

[00:21:53] But the reality is some of this data is already being used elsewhere. We know in China they have a new whole new way of classifying people. They are doing kind of a social media trick over there where you have a social cred. This is what they're calling it your social cred. So if you jay walk across the street it recognizes your face because they have it on a database. It then uses that data now to lower your social cred. Doesn't that sound like something from a sci fi twilight zone type episode. So, it lowers your social cred. And then there are things you won't be able to do if you have a low social cred. So having a low social cred could stop you from getting on an airplane from opening a bank account. Obviously getting a loan. That type of data has already been used here in the U.S. for well more than a decade we've been protecting things like the Super Bowl using facial recognition technology where we have our federal databases of the bad guys of the known criminals. When you walk into that venue it looks at your face and it says Okay you're clear it's hundreds of others today anyways a gate that comes down so no you can't enter. But the police will respond if you are spotted in a stadium and you are thought to be a terrorist. So, today there is some false positives as time goes on there probably be fewer of them but maybe not, right. It depends on on how strong the state gets and whether or not it continues to move towards a socialist or communist type fascist state right. We've certainly seen that progression in the last 50 years. So, how could this possibly go wrong.

[00:23:44] Mark Zuckerberg having our information about our faces that's a biometric piece that could be used in a lot of different ways. Now, remember an iPhone 10. Right, what does that have on the front of it. It has a sensor that reads your face. And we have Android devices that will be coming out with it and more and more. So, if you can read someone's face what do you think's going to happen with the facial recognition software. What kind of value do you think there will be in a database of people's faces, Yeah. We've already seen where some of these facial recognition programs can be faked and fairly easily frankly so as time goes on as those those databases are hacked and stolen or sold, will the bad guys be able to get into my iPhone 10 or other device. Right. Will they be able to get into this thing and be able to use the this to excuse me in my face to get into this. We've got 3-D printers. If you've got a really good face print if you will because you've captured my face from the front from the side aren't all of the photos I've uploaded to Facebook all of the family photos on me and that it's it is automatically tagged me and I've noticed that by the way the auto tag thing where it's using facial recognition technology and saying hey listen we think we found this person in your picture. You want to tag them. How do you think that's working? So, will they be able to use this technology that you may not even know you're giving Facebook the permission to use, Right. Your face. Will they be able to use that technology to hack our devices.

[00:25:34] Almost certainly at least that's my bottom line.

[00:25:37] Visit me online. Hope you have a great week ahead.

[00:25:41] Craig Peterson dot com. Take care guys. Thanks for joining us today.

 ---

Related articles:

---
Former Apple Employee Charged With Stealing Self-Driving Car Secrets


Facebook Is Still Abusing Your Privacy

NSA deleting millions of phone call and text records over privacy violations

Malware attacks skyrocket in the first half of 2018: SonicWall
 - this site shows a little excerpt, needs to sign-in/paid membership?

Walmart’s Newly Patented Technology For Eavesdropping On Workers Presents Privacy Concerns


Apple’s USB Restricted Mode: how to use your iPhone’s latest security feature

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 11, 2018

Craig joins Ken and Matt talking about what a 30-second change to your computer can do, and why is it important to have the right DNS settings.

Do you know what Incognito Mode actually does?  Craig explains to Ken and Matt the way it actually works and what it does and does not protect you from.

Find out more on CraigPeterson.com

---

Related Articles:

This 30-second change to your computer settings is the easiest way to stop hackers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/11/2018

30 Second Free Security For Your Computer and Incognito Mode 

Craig Peterson: [00:00:00] Hi everybody. Good morning Craig Peterson here this morning I was talking with Ken and Matt about a couple of different things but primarily this morning we went over a 30-second change you can make to your computer. Why is it important to have the right DNS settings. The bad guys they've got a lot of nasty software out there. They're being very successful getting that nasty software onto your computers my computers. Well, not so much, actually knock on wood. But, here, here, we talked about what you can do a very quick and easy change. I have some software that costs me money that I charge for my clients. But this-this is free and it gets you about 90 percent towards safety. So, here we go.

[00:00:52] I've had an iPhone phone since the first phone, when you had the iPhone one, and I had the first I thought I skipped every other. I mean I wouldn't get the thee and the five and the seven sure. Yeah and I think great Craig Peterson would have to agree with me that the iPhone is the greatest invention ever in the history of humankind. Would you not agree with me, Craig

[00:01:15] Well I may put fire, maybe the first maybe wheel and then maybe the iPhone. Yeah, so you know it's a funny joke the other day on Facebook somebody said you know my teacher told me in high school that you know you guys have to do this in your head. You know the math in your head because you're not going to have calculators everywhere you walk.

[00:01:34] Yeah, sure sure sure showed them. Because Craig because Matt's wife asked me what photo I have with I like an iPhone, 10 of course because why would anybody not have the iPhone 10. But, I still think the iPhone is still I think the best you can take a mortgage out for that phone. No, I'm out there. Do you pay fifty dollars a month forever for the rest with the rest life contract? But, you could upgrade. Know it doesn't. It doesn't matter what you pay because the person who dies with the most toys wins.

[00:02:07] So, it doesn't make that's true. I did not get the iPhone 10, Ken. I'm stuck with the 8 which by the way looks like are killing off next year the gonna to change the iPhone line. They released this is like the first time I think they've ever done this. Apple decided they would give mock copies of next year's models to the press. So, it looks like the 8 will be dead as of next year. And the reason I didn't do it is I don't know. I love tech. And obviously comes this way Matt I think you might be but I'm cautious with that right. Yes. Like when we're talking about the iPhone 10 you've got that whole new sensor.

[00:02:50] And, I don't know with facial recognition of the facial recognition it recognizes me no matter what you do but I'm sure the NSA also loves that because they've got it stored in a database to find me no matter what. Are you kidding me?

[00:03:05] That's a lot of people are confused about that Matt. When you're talking about whats stored where Apple is way different thing Google is with Android. None of that information like your thumbprint if you use the thumbprint scanner on your iPhone or the facial information none of that ever leaves the phone, right.

[00:03:25] See it's encrypted.

[00:03:27] Yeah. It's sort of encrypted on the phone and what's called the secure enclave. And, in fact, I don't know if you've heard about who's who you have had there.

[00:03:37] There are two paths replaced on their iPhone because they cracked it and then there are some leaders stopped working and they had to take it into Apple and that's because bottom line Apple doesn't want anybody messing with that secure enclaves stuff. And if you change the screen and you got that from the reader there is a potential that you might damage it, slightly because it's packed in elephants snot which is kind of a technical term so, that if anybody did come up with a less gross a technical term, perhaps I just believe that.

[00:04:15] I mean what's that movie with Will Smith. And you're thinking of Enemy of the State, that they could fight back with everything they need to find out about you.

[00:04:24] That movie really good movie. So, why Chapman why hide anything.

[00:04:30] Just a total mind you bought the building because you made a phone call. Right, exactly.

[00:04:36] He was the guy who going to watch the watchers. Who's going Yeah?

[00:04:40] So, many great guys who watch the watchers of the watches and the watchers and watchers. So, that's the most serious things hacking. Now you've got 30-second change your computer setting. The easiest way to stop hackers.

[00:04:56] Well, this is really, really, kind of cool it's up on my website but if you're going to have to find out more because there are instructions, right. But, here's the bottom line. Cybercrime has become huge, right now and it's expected to cost us worldwide here, more than two trillion dollars next year very, very, big deal.

[00:05:21] Ok. And it's hurting little businesses, its hurting big businesses it's hurting you and me just regular consumers as well.

[00:05:29] So, I have a product that I use and it's from Cisco it's called umbrella. And I've been using that with my clients for a long time. And what umbrella does is, if your computer tries to go someplace on the Internet. The first thing that has to do is change the name, into an address, right. You guys know that you put into a web browser something like tune-in for instance Somby go to tune-in radio to listen to the show while you're on the road for that. That doesn't mean anything to the Internet, that name. So, there's something called domain name service but it takes that name it converts it to an Internet address and then it goes to the address, it's just like if, I dropped a piece of mail in the post office and I said deliver this to Matt Gagnon, they wouldn't know where you live right.

[00:06:22] Well, probably not. We may not but you never know.

[00:06:28] He is. Well the NSA was supposed to try. So.

[00:06:33] So, the question is and if that's the case, how does this really interfere with hackers, Right?

[00:06:41] Because if you could stop the hackers from sending their post office stuff home right if you could stop them from mailing all of the stuff they stole home. That's half the battle and that's what this is all about. That's what umbrella is all about. It's not an expensive service, but I found a really great article on Marketwatch. So anybody who wants to can read this can go through the steps and what it does is, it showing you some free services that are kind of like Umbrella.

[00:07:16] They're not as good, but they're quite good. It's 90 percent effective at stopping some of these pieces of ransomware is 90 percent effective at stopping all of the malware. Because, one of the things that these pieces of malware do when they get onto your computer, one of the first things is they call home and say hey I got somebody, what do you want to do now.

[00:07:41] And, so they call home. They now can get the command and control information. OK. We're getting encrypted and it actually has to have a key so that they can now extort money out of you, if that doesn't happen they can't do any of this. So what this does and this is it really is a 30 second changes as Ken mentioned. What it does is it stops any software on your computer, legitimate or otherwise from going directly onto the Internet, and all it does is say, Hey listen before you go anywhere we are trying to figure out what the address is of the place you're trying to go to. Ask me, don't ask somebody else. So it asks that software and my customers cases it just you know umbrella and then umbrella's Whoa. Wait a minute. That is. Known Chinese or Russian or wherever it may be hacking group. We don't want you to go there. So it will now change and it will pop up a little screen that says this is dangerous, you can't go there if you're going on our web browser. But, if it's software that's trying to track your machine, 90 percent plus of the time is trying to phone home and it will be stopped. So, Ken I think this is one of the most important things people can do. It's very, very, simple. There are some free services out there that do a very good job at it and it's going to help to stop you from becoming a victim.

[00:09:12] We're talking to Craig Peterson on our tech guru joins us for some tech updates every Wednesday at this time. Craig final question for me before we let you go here today the Incognito browser. What does it exactly do if people have never used that particular feature on their web browser what is it you you're actually accomplishing.

[00:09:29] Well that's a great question. But, here's the bottom line on Incognito mode. All major browsers have a method they might call it private mode that might call it incognito which is what it is called over on Google's Chrome. But, the idea is it gives you some, Anonimity, a lot of people have been thinking the wrong way about all of this. There was a survey that was just done a little bit of a study. Most people got it wrong. So I'm glad you brought it up here's the bottom line. When you go into incognito mode on your browser it really doesn't hide much. It'll clear your cookies, when you're done. But, let me tell you when you'd want to use Incognito mode and when you wouldn't if you are trying to do something that you really, really, really, don't want anyone to know it's a new business deal or maybe you're trying to collude with Russia. Do not use Incognito mode, because it doesn't protect against anything where it comes in very handy. Let's say you share a computer you right there in the studio you Matt and Ken you share a computer.

[00:10:40] Danny uses that computer from time to time. If you go online and you start searching for a great present for a well for Ken lets say and now can use his computer what he thinks going to happen advertisements and so can begin to see that you were searching for a new table saw for him at his house and these you say, oh I know what I'm getting from my birthday. Right. That's when it comes in handy because those cookies don't get set, the advertisers don't know what you've been searching for. And you can safely browse online for your spouse or friend or whomever and not worry about getting all of those ads popping up on your computer, incognito mode does not protect you in reality 100 percent from advertisers it certainly does not protect you from bad guys. It's just a handy little feature to have. Firefox is the best at incognito mode, among all of the major browsers and the epic browser E-P-I-C is absolutely the best if you want to maintain some online privacy.

[00:11:49] I'm kind of sad that you told him what he is buying me for my birthday. It's kind of sad sad that on our tech guru joins us every Wednesday 738 go to his website Craig Peterson dot com. Thanks Craig we'll talk to you next week.

[00:12:04] Hey gentlemen take care. Have a great day.

[00:12:05] Thanks a lot Craig, I'm going to take a quick break here.

[00:12:07] You think you're getting me a chainsaw instead of a tablesaw. Just curious. You know you seem like the kind of guy I like to work with Sand's builds on this stuff. You see these hands these hands.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 10, 2018

Do you fall into the category of people based on this survey who think that the browser incognito mode helps protect their identity? Listen as Craig discusses incognito mode with Jim Polito.

 

Find out more on CraigPeterson.com

---

Related Articles:

What Your Web Browser’s Incognito Mode Really Does

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/10/2018

How Safe Is Browser Incognito Mode

 

Craig Peterson:[00:00:00] Hey, Craig Peterson here, this morning we discussed incognito mode. You get to listen in on Jim and I talking about it. But do you fall into the category of people based on this survey who think that the browser incognito mode helps protect their identity? Well, it doesn't. In fact, most people really don't understand it at all. 

[00:00:25] So, here we go with Mr.Jim, I forgot to wish him Happy Canada Day. 

[00:00:32] But, he's not holding it against me. And he's back again with more great information. 

[00:00:37] I'm talking about our Tech Talk, Craig Peterson. Good morning, sir.

[00:00:43] Hey, Good Morning. What a great morning! This isn't so bad. I'm getting used to the air conditioning and staying inside.

[00:00:55] Yeah, you know yeah avoiding the sun, that's Canadians, avoiding the sand any more than six hours of daylight is too much for a Canadian. to much. My daughter, my daughters, my eldest daughter, in fact, she just got a job over in Norway.

[00:01:10] She's only the lead on THE LEAD project managers with a company Kongsberg. They're making the world's first completely autonomous ship. 

[00:01:21] So, she's telling me about how, it's like light, the whole day over there and night and then during the winter time, of course, it's just dark all the time. Yeah. I could take that, I think it's like two weeks or something where she is in Norway and the sun basically doesn't rise.

[00:01:43] I couldn't take that. I mean I would love to be over there now. I couldn't take it. As a kid.

[00:01:51] You know we used to go we used to run around we'd leave in the morning and Mom and Dad would have no clue where we were. And I remember one-night playing kick the can and it was like 10-10 30 at night. And

[00:02:04] This is we've all grown up there in northern Canada and it never really got darker than Twilight. And, so I have no clue what time it was, such a different world out there, AHH, definitely a different world.

[00:02:21] Well look, we've got it speaking of hiding in the dark. So, when you go on your web browser and you want to go into Incognito mode, I always kind of feel like is this for real. Are they really not tracking, where I'm going? Or, is it just a scam? First of all, explain incognito mode and exactly what it really does.

[00:02:53] Sure. Well, all web browsers have something kind of similar to this incognito mode. They might call it a private window, for instance, if you're using Safari, Google Chrome calls incognito mode. And, the basic idea behind this is that you can remain anonymous. At least that's what most people think, Jim. That if you use Incognito mode online, you are somehow completely anonymous and I think you can guess where I'm going with this. 

[00:03:25] Yeah, you're not. OK. So, there you go. Folks, Craig Peterson solved it for you right there.

[00:03:36] Exactly. Incognito mode is kind of nice. What it does do is, it does clear cookies when you leave your session. So, for instance, you might go online now, incognito mode is great. Like, if you are shopping for a present for your spouse or kids or whatever. So, you go into Incognito mode, and then once you're in that mode you do a little bit of shopping and poking around and then you exit incognito mode. Now, why this is nice for buying the present is, if that computer is now used by your husband or wife, for you know the other person, they won't see ads, for what you just were searching for online. So, if I know my wife, for instance, wants a brand new table saw for her birthday. 

[00:04:32] Know I don't think Mrs., I don't think Mrs. Peterson wants a table saw. I think Mr. Peterson does. But I get it. So, the ads don't pop up, because you know what I find especially if I buy a big ticket item or research a big ticket item online or Amazon, I buy one, and then Amazon sends me an ad for another one. Like Hey Amazon, I just bought one. Why would I need two? 

[00:05:01] What you can return them on Amazon. Maybe that's what it is and make the money and the turn, right.

[00:05:08] So, that is what it is good for, is good for, getting rid of cookies. But, even then, you're not anonymous as far as the websites go because the Web sites can track you based on how you have configured your web browser. Yeah exactly. Never ends does it are plugins you have the extensions set. OK. So if you really want to have the best somewhat anonymous while you're online browsing experience, the easiest thing to do is use Firefox. Firefox has added some new features so that when you're in incognito mode on Firefox, it does more than Google Chrome does to kind of keep your information private. Again you know because you don't want to be tracked you don't want cookies you don't want more ads for that new sports car or table saw, right. So, it's a good way to do it and the other one to consider seriously consider and this is the one I use quite frequently is the epic browser now. I've had the guy who founded this on my radio show before and we've talked about it but it is E-P-I-C. I see browser and what it does is it goes far beyond any other browsers in trying to keep your information safe. It does not let them set COOK tracking cookies most cookies are completely ignored. It has all of the features of Google Chrome, and yet no tracking which frankly is I think kind of nice. It's a little bit of a relief to know that and then there's another quick trick. That you can do if you want to do a google search and you're tired of Google coming up with all this information about you and everything else. You can go in you can force all of your cookies and doing that is not only going to get rid of the ads that are targeted at you but flush cookies you're going to lose access to certain Web sites that you might have signed into. You're going to have to re-sign in and stuff 

[00:07:19] Yeah. Yeah, I do. I do mine. I don't mind that too much though

[00:07:25] Right. And you know as we've found out in this last week. Well you know, Jim, you and I talked about this months and months ago. I had a secret service briefing about an extortion attempt against Mitt Romney and the Yeah, Yeah I remember that. And you know so they're using technology they thought would make them anonymous. The guy was caught. He was just convicted this last week and he's facing 20 years in prison. So, you know that bottom line even if you think that you are going to be anonymous, there's nothing anonymous online. Bottom line if you're shopping for a present go ahead and use Incognito mode makes a lot of sense or use the epic browser or Firefox.

[00:08:10] It's great stuff. Now listen, folks. That's just a sampling of the stuff you can get from Craig Peterson. He does it for free, for my listeners. All you have to do is text my name, Jim. to this number

[00:08:26] 8 5 5 3 8 5 55 53. That's 8 5 5 3 8 5 55 53. 

[00:08:36] Now, standard data and tax rates apply. You'll get the information on Incognito. Plus this one a 30-second change to your computer settings. The easiest way to stop hackers. This is all great stuff Craig won't bother, won't annoy you. He's a nice guy and when there's big stuff going on like a hack he'll send you an alert. So, you want to do this to the man from the Great White North, Craig Peterson. Craig thanks so much and best for your daughter in Norway. Tell her to enjoy it while she can. 

[00:09:14] Yeah, I absolutely will have a Beauty-day, eh? 

[00:09:19] Thanks, Craig. We'll see. Bye. 

[00:09:22] And for those who ask why we call him Craig Peterson because that's how they pronounce it in Canada. It's not Peterson. Hey, we got a final word. Don't go anywhere. 

[00:09:33] You're listening to the Jim Polito show, your safe space.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 3, 2018

How do you feel about the coming Artificial Intelligence?  I spoke with Jim Polito today about two recent studies involving artificial intelligence and what they found. I know you will find them interesting.

Find out more on CraigPeterson.com

---

Related Articles:

The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/03/2018

Machine Learning vs Artificial Intelligence and Psychotic Machines

Craig Peterson:[00:00:00] Hey, everybody. Jim Polito has got to get those phone lines fixed I called him again this morning. And what happens is, that it really sounds hollow and tinny on my side and just as bad on the side. Well, I assume they'll eventually get that fixed. I guess we'll see. But this morning, hey this is a big deal. Artificial intelligence, this morning I explained to Jim here, and to all of his listeners, he's got a huge show number one in central and western Massachusetts, It's crazy. But, anyway so millions of people out there, I explained to him and the listeners and of course now to you, right. The difference between artificial intelligence and machine learning, and I gave examples of two different pieces of artificial intelligence that have been in the news over the last month, and it's dramatic. It's scary but you need to understand this, and also which devices are safe to use. Who's tracking you and why? All of that right here, so, here we go. 

[00:01:08] Our good friend Craig Peterson still having trouble getting connected with him. But we will. And, meanwhile what he's going to talk about.

[00:01:18] When you can get at the end of the segment here, we're going to give you a number, and you text my name to that number. And Craig Peterson will send you a whole bunch of information. He won't annoy you he won't pester you, and he'll just send you important things like when there are big hacks and things. Standard data and text rates apply. But here he is, Craig. I was just telling everyone how I forgot to wish you a very Happy Canada Day. 

[00:01:46] Yes, that's right. 

[00:01:49] I missed Canada Day Sunday, July 1st. 

[00:01:52] I should have had a Molson or Labatt or a Musette, I like Moosehead here. So, yeah, it's like a cool time of year. You know we've got all kinds of celebrations. I've got a mom who's got like 10 birthdays, Wow. This is for our family here.

[00:02:16] You're a busy guy, Craig Peterson, busy. OK, Craig, it's time for you to give us the creepy story and scare us to death about a guy that can predict the future. That's I mean, I wanted to predict certain things like the power ball. I don't want him predicting other things. 

[00:02:34] Yeah, Well this is this is scary. No question about it. You know we've, we don't have, a yes, real artificial intelligence that that kind of thinks for itself not yet, it's not even born yet, really, frankly. Hey now, what, No, in reality, it is just Machine Learning. This is something that we've been working on for a very long time. And machine learning is where a machine can observe a theme and then make some assumptions based on off of those observations, right. That's the machine learning, that's kind of where we're at today. Artificial intelligence is coming around the corner, but it's not quite here yet. And, it's what scaring the living daylights out of everybody. What you're talking about right now is very, very, impressive because I sent this article to you talking about this one, study that has been done, and what they did is say they'll see this artificial intelligence, and they watched some video, and this is really kind of interesting too, and we're talking about the video, and what they were doing. But bottom line this is at the University of Bonn, over in Germany, and they said they watched about 40 different cooking videos. So, these were videos where people were cooking the different thing from salads to dinner. OK. Nothing, we would be terribly worried about. 

[00:04:14] And the computer then learned, OK and so it's watching these videos about cooking and it learned. OK, we like that. We wanted to do that stuff 

[00:04:28] Actually, right, That's right. Now, this particular took over a place a little different than what we had just about a month ago where they said the machine learning this. They said it read a channel or somebody would read it at all.

[00:04:46] Read it. Oh, I know. Read it. Yeah, yeah. 

[00:04:49] And, that people were talking, it's like a big old-fashioned board. This REDDIT. It ended up being psychotic, and everything they asked. 

[00:05:01] Wait, wait, wait, wait, hold on a second. You are now assigning reading. So, Reddit which is a program which is you know an app and everything else. OK. And it's got a guy in it, to do some stuff. You're saying that the AI in Reddit that would be like saying the AI in Facebook became psychotic. You're basically assigning a human psychiatric disorder. To 

[00:05:28] Map a program, a Web site.

[00:05:32] Yeah that's exactly what happened, this is an MIT. OK, not too far away. No. And then they made this little machine learning that way. They said it looked at the darkest corners of Reddit, to be honest about it. But they said, it just got sent to the bulletin board these people chatting back and forth about how they ended up having to name it. 

[00:05:55] Norman, what they named it. Well, first of all, you name someone Norman, in all due respect, to normal is out there you're going to automatically become psychotic, it's like you name someone, Jeeves. 

[00:06:07] Have to grow up to be a butler to those people, Right. So, this MIT named this the world's first psychopath. 

[00:06:19] Who were we, were we feeding that all too, say that now, you've seen these Rorschach ink.

[00:06:26] Yes, yes, like they show you the ink blot test. And most people look at them. It's a psychological test and say every time they look at the blot, they say, I see a naked woman. And now people see the blot and tell the therapist what they saw in it, and it's supposed to show some things in their subconscious. What they have written ordinarily offer up, or wouldn't be able to know that, or even there and offer up his, or her trying to do is get to expose what your normal thinking is.

[00:07:02] Yeah, Oh yeah. You see that naked woman, are you? You don't see this, or you like that, they bad this artificial intelligence. Well, in one of those and artificial intelligence came back, and said things like a man is shot dead, a man jumps from the window. Man is electrocuted and is hacked to death. It was just a man get pulled into a snow machine. All of them. OK, so it's totally massively Norman bait. Wow. So, that was just was last month, this month out of Germany we have we have our latest greatest clue. And, this one observing the Food Network. OK. Yeah. And, so they let us learn from watching cooking and then what they did is they said it just some very short videos and after that asked what's going to happen next. And as long as the prediction was only maybe 20-30 seconds into the future, it was actually very, very, accurate. And remember they only added 40 videos. It's not as though one of these machines could possibly go online and find videos to ingest anywhere. There's no YouTube. It just won't. When actually, I guess, YouTube does have some video. So, what's going to happen when we start feeding this type of information into the computers now. Now let's talk about our system. People out there have assistant systems for a home to go home. You've got your own theory which is the most popular one of them, both Google and Amazon right. 

[00:08:52] You've got your Amazon echoes all those things floated by the way everybody thinks Google is going to win. Why are they going to win the war when it comes to the virtual assistant, why, they have your e-mail. They have your calendars. They know where you go. They know where you are, what you know, the restaurants you're in. They basically know everything, now in the last four months. Google has tripled the number of hardware devices, that are using them. So, this year so far there are 16 hundred devices that have this type of intelligence built since and now we're up to five thousand now. Amazon still dominates that field. They've got 12000 different devices, that they have there. And this is going to be a race of races as Apple, Google, Amazon are racing to have these machine learning, the system because already Google system will look at your calendar and will tell you, hey listen I just checked your calendar and you have a meeting down here in Boston and in the traffic right now there's an accident on the pike, there is this other alternate route and that's going to take an extra 20 minutes and I know it takes you 20 minutes just to get into the car so you better go right now.

[00:10:22] They're watching me. 

[00:10:25] And, then we had more phone problems. But, yes they are watching you. The thing to remember here is that the only one of these major companies that are absolutely dedicated to your privacy are our friends over at Apple, so keep that in mind. They do gather some information but, anything that leaves your phone is anonymized. They have no way to figure out who it was that said something, did something, went somewhere. It does store information but only on your phone. But remember that phones encrypted, it's protected, and it is not used for marketing or maybe even used for evil. Hey, did you notice the Google took to do no evil out of their corporate motto? The Web site, anyways. You don't. Don't be evil, that's what it was. It's gone now over Google, anyways. Have a great day. Have a great Independence Day, or Canada Day whatever it is coming up your way. It's a busy month here for us, in my family and it's a great month. I'm actually for the first time, in a long time, I'm actually enjoying summer this year. Even though the temperatures have been horrific, 103 degrees here in New Hampshire which is where I live, Live Free or Die, or Live Fry or Die Today. Anyways we definitely have a big heat wave enters this summer, right if you like summer, you put up with the heat. And I am actually enjoying summer this year, the heat is just not bothering me as much as it used to. Take care, Have a great day. Bye-Bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jul 2, 2018

How much learning are machines capable of?  As it turns out quite a lot.  Today, I spoke with Jack Heath about predictive AI research from the University of Bonn in Germany and what they learned as well as what Apple is learning from our iPhones.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles

The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 07/02/2018

Artificial Intelligence in Our Phones.

Craig Peterson:[00:00:00] Hey, Good Morning. I Hope you're having a great week, of course, I am when I'm recording this. We are looking forward to Independence Day, the Fourth of July, and all of our fellow Canadians out there will be having a great Canada Day, no longer Dominion Day. I’m just enjoying this time of year. Boy, we've got some serious heat here in the Northeast. I've been talking to some of my friends who are these snowbirds, who go down to Florida and I've asked them to stop bringing the 100 plus degree temperatures here to the northeast, it’s pretty bad. Hey, have you wondered about artificial intelligence. There is a scary new AI, out of the University of Bonn, over in Germany, and that's really, what I talked about this morning with Jack Heath. How's it going to affect you? Who's going to win this war series? Probably, the most well-known of these assistants that are out there. But, who's going to win? That's not always the first to market.

[00:00:58] That's for sure, on this Monday morning, because the tech never stops with Craig Peterson. His show airs on the weekends on our current stations. And, Craig joins us now, Good morning, Mr. Craig. 

[00:01:09] A good morning. You know you have a habit, a pattern of doing things. Jack, you are bound to be maybe a little bit surprised, maybe not. Have you heard about this new artificial intelligence, that is predicting the future?

[00:01:26] David Losh, not kidding. No, I haven't. I mean I've heard about AI. AI, and all this stuff and they say it's the next big the next big groundbreaking tech, but I haven't heard about predicting the future. 

[00:01:35] Yeah, this is really kind of interesting and frankly kind of creepy as well. There's a new artificial intelligence machine that has been put together, here. Over at the University of Bonn in Germany, by the way. And, what they did is they set it up to learn how these machines learn. When you talk about artificial intelligence, I mean they are really able to learn things, from their environment, right. They're not programmed to understand, that you put the right foot in front of the left foot in order to be able to walk there. They're able to understand how to move the muscles, and that's really kind of it, and then they learn how to walk. In fact, that particular computer was able to predict people’s actions. Now they were really looking at a small sample. They had videos of people cooking, and they fed the videos into the artificial intelligence, 40 of them in total and the artificial intelligence was able to look at them, and kind of analyze them about how people cook, Then, what they did is they gave them identity versus knowledge in some different videos, but not the whole video. Just a small amount of it, and then had the artificial intelligence to predict what people will do next. And it was really quite accurate. And frankly, the University of Bonn from now and you kind of scared me by saying they think that these guys will be able to predict our actions, many hours into the future. And that's a really, really, big deal. And, when we look at our new, for instance, our new iPhone, they have machine learning chip built into them and that's the next step toward artificial intelligence. 

[00:03:23] Google has a system that has really started taking hold and get traction. Google, in the last four months, tripled the number of hardware devices that are using the system and the whole goal behind it. And if you're already using Google, just that you know that. But the goal behind it is to be very predictive. So, it will remind you, “Hey you're going to go on the fourth you're going to this place or that place. It'll just remind you, that it kind of thing, without you doing anything. It's already analyzed your calendar and analyzed the traffic conditions your driving patterns how long it takes you to get to the car and told you when to leave. So, I think Jack, we have this to look forward to pretty quickly. And, in fact, Google's system has become so popular over in India, it was just launched, by the way, last month over in India. It's so popular that a half a million Indians have proposed marriage to Google. In other words, they said Google, Will you marry me, please. 

[00:04:27] Amazing. All right, Craig, good stuff. Craig Peterson with than O.N. dot com Craig man, make it a good Monday, and a great Fourth to you too.

[00:04:34] Happy Independence Day. Thank you. And tomorrow morning

[00:04:38] And my best to all of you out there, as well, all of our great listeners, I so appreciate you and appreciate you sharing it. I had a really cool thing happened last week somebody had tagged me in a post, saying. “Hey, this is the guy I was telling you about”. And, they tagged a few different people, so, that was really kind of cool. And a couple of shout outs this week as well we were able to help out a couple of other small businesses and went back and visited because you know once you get the technology in place that's kind of just the start of things right. You have to make sure it's working. It's integrated, the employees understand it. Everything else. So, you know we don't mind it, we like making those follow up visits to make sure all of the technology is in place, anyhow. Have a great week! A great Independence Day. I'll be back tomorrow, and I going to talk to Jim, take care, bye-bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 30, 2018

 

Are Internet Passwords going away?  Listen is as I explain about a plan to kill Internet passwords.

Is Facebook still tracking you? Today, I will share with you 18 things, you may not know that Facebook is tracking.

Is Minority Report coming to your local Police force? I will explain about this new, creepy, artificial intelligence out there. This may be the future, and it is, unfortunately anticipatory.

How do you feel about Automated Grocery Stores?  What do you think is going to happen when you walk into a store and you never interact with anyone? I will explain what I think about this and some of the drawbacks of this technology.

Remember the extortion case involving bitcoin and Mitt Romney's tax returns?  I will discuss what happened this week to the criminal involved.

 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/30/2018

Microsoft Passwords - Facebook and Microsoft challenging Amazon Go - Killing Passwords - AI predicting the Future - 18 Surprising things Facebook is tracking about you

Craig Peterson: [00:00:03] Hi everybody, Happy Saturday. Well, this is when the show, of course, airs every Saturday on Clear Channel and I Heart Radio. And, I hope you enjoy it if you are watching this online. Of course, many of you might be watching at any time of day anywhere in the world, it's kind of cool. And, then also it's available via podcast so, hopefully, you've been paying attention to my podcasts and watching those as well. Today, we're going to cover a few different topics, so, I want you to kind of stick around. They're all important. We're going to talk about what you need to know, about the plan to kill Internet passwords, we mentioned this on the show before. I've got some more details. List of 18 things, you may not know that Facebook is tracking, about you. We've got a pretty new, creepy, artificial intelligence out there. This may be the future, and it, unfortunately, is anticipatory. So, we'll talk about what it's doing. We've talked before about checkout-less stores. Do you think they're going to affect you? What do you think is going to happen when you walk into a store and you never interact with anyone? Is that something that could change your life for the better or the worse? We're going to talk about that, and a story that is changing the world and it's just not been reported. I reported on it, because I got this information directly from the Secret Service some months ago, while the guy involved has gone to jail. But you know if one of your family members is kidnapped you would want to know these things. First of all, you've got to solve it quickly before that family member gets hurt or killed. You also know that the odds of getting your family member back aren't that great. Depends on where this is all happening, right. 

[00:01:50] So, kidnapping is really a bad thing. Well, what do you do when there's a kidnapping? We're going to talk about that, and we're going to talk about the new high tech kidnappings that are going on. And, this is not good not good at all. And particularly we're going to talk about a kidnapping involving U.S. presidential Republican candidate Mitt Romney. I mean, this is this is just absolutely phenomenal you probably haven't heard about it unless you heard it from me so, welcome. We're getting into the show right now. 

[00:02:26] So, first of all, let's talk about this. Check out this store, OK. This is really huge because think about if you go into the store. Think about you interacting with the cash register people, right. You put all your stuff out of your grocery cart you put it on the conveyor belt. They ring it up right. They scan it, back in the old days. They knew all the prices of everything, just because they type them, right there, Right. Nowadays, they try and scan it, if it is not can they just don't know what to do, Right. Call a manager while they're trying to change all of us because of course those employees can get kind of expensive and there's not a huge margin in the grocery market. You know, I have mixed feelings about this one. I have mixed feelings, in fact about a lot of automation projects that are going on. And the reason, I have mixed feelings about this one, is frankly, the checkout and the bagging. That's the first job, for many people, Right. That's where many of us got our start and an understanding of business. In fact, to look at the problems we have in the world today, with the younger generations, and not understanding the work ethic, and you know the real entrepreneurial drives education when you're young out there selling lemonade. I delivered newspapers, right. I have had jobs, forever. I worked for some pretty big corporations when I was young, and then went on for the rest of my life to be entrepreneurial.

[00:03:59] I haven't worked for someone else since I was 18. That is a big deal, Right. So, very entrepreneurial. And, you have these opportunities to have a starter job where you learn not to mouth off to the boss. You learn that you're not the smartest person in the room, even though you are 18, and you do everything right. All of these things, think back to when you were younger. Think back to the things you learned, so now apply that to your kids or your grandkids or even to yourself. And, then let's move on to this. Check out this war that started, Amazon's been busy at it. And, we know that already. It's called Amazon Go when they have, I think that's it. I know they have at least one test store and they may have more than that right now. And, the idea is you walk in the store when you walk in you take your smartphone, and you put it on the sensor and it knows who you are. And, you have an account and your credit cards linked into the account. And, now you go around the store and there are sensors and cameras that watch you take things off the shelf, and put them in your cart. Now, there is a grocery store in the Northeast that is now basically out of business. But it is one of the last things they had tried, in order to get their business up. 

[00:05:15] I think it was Stop and Shop, they had something very similar but you would take your smartphone to scan each item, you'd put it there in your cart and then at the very end you'd get the checkout button and you'd check out and you were all done that simple. Isn't that kind of cool. Well, they went, out of business. We used it a few times I just liked the convenience and not having to stand in lines waiting for the checkout. Not having to deal with them not being able to scan it, or whatever right. I absolutely loved it. But I'm not normal. I think we've established this. So, now think about going into the store never having to wait in line never having to do anything. Do you think that there will be more theft from the store? What do you think the downside of this is? No, I'd really like to know because I think there are some very real downsides to these problems. They've got this cashier free, automated grocery store that opened in early 2018. And, they have got more planned for Chicago and San Francisco. But Amazon is not the only one out there. Turns out that Microsoft has been busy trying to do much the same thing. They have a team now, it's only what 10 to 15 people, apparently according to this report. And, I've got it up on my Web site. This is from Fortune magazine. These 10 or 15 people are working on automated systems that will allow a store to just have you check out. One of the contracts I had years ago, was with NCR ,and I developed a system that allowed them to do way more than they'd be able to do before, when it came to checkouts. 

[00:06:59] And you know front office, back office, all sorts of things that you have to consider. But, one of these people is a computer vision expert, who used to work for Amazon Go, according to Reuters. So, that means you can expect Microsoft to get into this game. Cashier-less is coming. So, if you are working in checkout and I know my local store, my favorite store for groceries, frankly is Market Basket there are people who've been working there for 30 years, or even more. And you know good for them. But hey, if that's your only job, and automation is definitely coming to you, in coming your way, I I want to give you a little bit of warning, OK. So, keep an eye out. Very cool. How's that going to change your life? I know it will make mine a little quicker, a little easier, as I go forward, and I'm not going to be buying as much candy from that little, the little stand, they have right there at the edge, right to buy stuff, at the last minute or seconds. You know, it's probably going to hurt those supermarket tabloid magazines as well.

[00:08:10] All right, let's talk about this creepy, AI machine. This is a very cool article from The Daily Mail and it's talking about a machine that is going to work to help us, Right. Isn't that how all the science fiction shows start out. We're here to help, the right serving, human. I think that over the years so artificial intelligence is going to be helping us. And, if you are using Google's assistant, you already know they're using some machine learning to try and help you. All right, Now, the machine learning is all well and good, but in this case what's happening is right now today with assistant is looking at your calendar and send your reminder, hey listen you got that meeting coming up with your chiropractor, you need to get over there, and need to leave now or in five minutes it can remind you of things and even make suggestions your wife's birthday is coming up in two weeks. You might want to add something for her. 

 

[00:10:51] So, it is now accurately able to per detect what people are going to do next. So, it was built by a team of people over the University of Bonn in Germany. And what it did is it watched cooking videos. So, you know don't worry it's not Skynet yet, some pretty cool pictures I printed them up in black and white here, but you'll find them on my Web site. Craig Peterson dot com. This whole thing he believes, Dr. Gall that the intelligent software will eventually be able to prophesy your actions hours before they happen. So, if this team manages to fine tune this algorithm this program to be able to anticipate your actions that far in advance you can think of a lot of cool things from home gadget automation to kind of big brother's stuff. Now, do you have an Amazon Echo at home from Amazon? You just wake it up and look in a way. Now for all of you people who do have that Amazon device but think about the interfaces now, you can install different software modules onto your echo and have those software modules now control different things in your homes. So, think about controlling, for instance, the television it warms it up. Now, you need to warm up TVs anymore remember you had to turn them on wait for a few minutes for the tubes to warm up. 

[00:12:23] But you know it schedules your recordings on your DVR it is automatically going to get that cup of coffee ready for you in the morning because you're going to have a unit that has the grinder built right into it and so you just fill let up with your coffee beans and it's going to auto eject all of that coffee beans or maybe the pods into a trash can for you. And it's also going to remind you when you're shopping and you’re in the coffee aisle and are in front of the pods, Hey you need to pick up more pods because we're going to run out next Tuesday afternoon. It's going to be very, very, specific. 

[00:13:06] So, all the AI right now is really it was just watching you cooking these sorts of things are going to be used to help us understand you more. Now they used 40 different videos to teach this artificial intelligence. The recordings are about six minutes long and it was able to predict how people cook. So, they looked to recognize it. Now, remember they're not programming it to recognize something they are programming that to learn and to and to observe patterns. So, it isn't really understanding that they're cooking but it understated stood there's a second sequence of events that we needed to prepare the dish and a very far from trivial by the way and then tested how successful the learning process was. So they confronted the AI with videos and had never seen before and they were told the eye was given 20 30 percent of the clip and the AI had to kind of fill in the rest. And it did okay its accuracy right now is over 40 percent for short forecast periods and then dropped further, of course, the further it had to look into the future. It's not that smart yet, but this is coming. This is going to change our lives. And, I want to see if you have any of these concerns yourself right. 

[00:14:30] Why are people so worried about AI. Again, this is from the Daily Mail they came up with the list. I love this list so it's an issue troubling some of the greatest minds in the world. We know that we've talked about that before. Bill Gates, Elon Musk, we have many other top scientists who are worried about this and they're concerned that the AI may take over that part of the reason why Elon Musk wants to develop a colony on Mars. Elon Musk described AI as our biggest existential threat and like it's likened its development to summoning the demon. He believes super-intelligent machines could use humans as pets. Stephen Hawking said it's nearly certain that our major technological disasters will threaten humanity in the next 1000 to 10000 years. Well yeah, I think so too. Obviously, they're going to be taking jobs more than 60 percent of the people fear robots will lead to there being fewer jobs in the next 10 years. Do you think that's true? You know I do. There's a lot more. You'll see those again up on my Web site over at Craig Peterson dot com. So, make sure you check it out and get up to date on all the latest. So, Facebook, we know Facebook has been tracking us. Facebook has been promising Congress that they're really not tracking us a whole lot. 

[00:15:56] So, you know don't worry about it. Right. Not a big deal nothing to see here, but they are tracking us, and there is a list that you'll find out on Buzzfeed and up on my Web site as well, of 18 things you might not have realized that Facebook is tracking about you. Now a couple of these we talked about before, but I'm going to repeat them for those that maybe didn't catch it on a podcast, or one of my videos. So, this is in the aftermath of the Cambridge Analytica scandal which is going to have his team do some follow up. You remember he did send a follow-up report to Congress. It really didn't get a lot of press because he didn't say anything, right. So, anyhow it was a massive document and it had the written answer. So, here you go. Here's some of the information that was in their Facebook collects information from computers, phones, connected TVs, those smart TVs we've been warning about, and other web-connected devices as well as your Internet service provider or mobile operator because remember they all have access to which sites are you going to. What are you doing when you're there. It tracks the mouse movements on your computer the app and file names and file types that are on your devices. 

[00:17:18] And think about that one, right. Do you have any files on your computer you might not want Facebook to see? And maybe you don't want other sites to see because remember it's not just Facebook that can potentially see this stuff. It's other sites as well. OK. Whether the browser window with Facebook is in the foreground or background the time-frequency and duration of activities. So, they are watching you watching Facebook information about nearby what nearby Wi-Fi access points Beacon's cell towers signal strength and they use all of that to triangulate your location. OK so they also have connection formation like your IP address your Wi-Fi connection a specific location information like the GPS on your device it goes on and on here other devices nearby or on the network your available storage space the installed plugins on your browser. Whether that's your computer or your smart device to ensure using the purchases that you've made on off a Facebook website, so you don't even have to buy something on Facebook to have that happen. Your call information and a whole lot of other stuff. So, Facebook is sucking up a ton of your personal information you might not have been aware of it. 

[00:18:42] There is a lot more here in this list of 18 but it's scary. I want to also remind you about the recap chaabi noticed those and sometimes they change. These are the little boxes that show up to prove that you're not a robot. The story behind those is absolutely fascinating. So, it is tracking when you're in those boxes where your mouse is moving, and you do expect that because that's how it figures out if your robot or not because humans just don't move the mouse the same way a robot does. So, it's more than that. It is really tracking a lot of things. I've got to talk about this. This is extortion. We're going to talk more right now. And man, it's a really big deal and it's changing extortion in the Internet era is not what it used to be. 

[00:19:37] It used to be you would have something that people wanted you to give to them. Or maybe it was something that they didn't want you to disclose at all. And extortion has been around basically forever. Right. It's a very long-running crime very long running problem but it has changed in this Internet era. Now that this guy's been sentenced I can tell you a little bit about what the Secret Service had told me. You know I'd do the InfraGard webinars for the FBI. Very interesting. I get a lot of inside baseball information because of this and my membership in InfraGard, but I want to point out something here and that is that there is information I can share, and I can share it and when it's relevant to everybody I do share. So, we're going to share this one right now because it appeared in a trip wire as well as other places online. There was a guy who wanted to make some money and decided to do it illegally. So, what does he do? Well, he knows Bitcoin is a great way to never be tracked. Now for those who are listening and not watching I'm using air quotes right. So, he thought he could never be tracked. And of course, that's wrong. You can always be tracked and that can be a really big deal when you're tracking. 

[00:21:07] And with bitcoin there's certainly a degree of anonymity but based on how you use it you know and other factors you can be tracked because remember it's a general ledger system. Everyone has a ledger. They all know where the transactions are. So, in this case, he didn't know what his limits are how many times have we done that. Right. Would you have started a business if you knew how hard it would be if you knew all of the regulations and then on top of that you've got to do the marketing and the cash management you got to right take care of everything? Most of us if we knew in advance he wouldn't do it but many of us know enough not to try something we just can't do. When you're 60 years old, you don't want to learn how to skateboard right. I saw a great mean I should try and put this up on my Web site. My daughter sent it today. You know when you're a kid your injuries are, I fell off my bike, I fell out of a tree, right. When you're an adult, your injuries are more serious, I said, it's a very funny mean there's more than that to it. But, we're talking about this, he didn't know his limits. So, he decided he would try and extort money from Mitt Romney. 

[00:22:26] Well, in fact, it was more extort money from the Democrat and the Republican Party. He claimed to have access to Mitt Romney's tax returns. And, you remember the tax returns were kind of a big deal back then and during that election and of course these were a big deal in Trump's election because tax returns tend to be private. And, there are a million ways to interpret these, that are very difficult when you're talking about the complex returns. Even my return, half the time you know you look at it and you say OK, well I got to talk to the accountants about this and that and trying to understand what's going on. So, he claimed to have presidential candidate Mitt Romney's tax returns that he had stolen from the offices of Price Waterhouse Coopers. Now Price Waterhouse Coopers said no, no, no. They released a statement that it didn't happen but, this guy apparently in Nashville, Michael Mann, 37 years old of Franklin Tennessee, He said I got them. I stole them and I'm going to release them. And, then he set up two Bitcoin wallets, and the bottom line on all of this is, he's said whichever wallet reaches a million dollars first, is going to determine what I do.

[00:23:50] So, if you put money into this Republican wallet when it hits a million dollars, I will destroy my copy of Mitt Romney's tax returns. You know it was so mean, the Republicans didn't want that information disclosed. And for the Democrats, he said the opposite. Hey, if you get it up to a million dollars before the Republicans, I am going to guess what disclose the tax returns. We don't have time to finish this on the radio. If you're watching us on video, we're going to continue this. But for a while, this was a very big deal. Have a great week. Enjoy yourself. Visit me online Craig Peterson dot com. And we'll be back next week as well and make sure you subscribe to my podcasts. Craig Peterson dot com slash iTunes, subscribe right there, and I've been doing a short podcast almost every day. I release new information about what's going on. I appreciate everybody who has taken the time to subscribe. So, if you're watching on video stick around, everybody else look, for the video. You go have a great week. Bye-Bye. 

---

Related articles:

---
The Checkout-Less Store War Is On: Microsoft Is Reportedly Working on an Amazon Go Rival


Everything You Need to Know About the Plan to Kill Internet Passwords


The creepy AI that can predict the future: Machine that anticipates your movements several minutes in advance could pave the way for next-level Big Brother surveillance


Here Are 18 Things You Might Not Have Realized Facebook Tracks About You


Extortionist Faces 25 Years in Prison for Tax Fraud Scheme Involving Mitt Romney

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 29, 2018

Do you know if your Website is safe?  How would you know?  Well, that is what I am going to cover today.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/28/2018

Is Your Website Safe and Recent Experiences With Hackers

Craig Peterson:[00:00:01] Hi everybody, Craig Peterson, here. I want to talk about something that happened to me this week. Now, you know I host a whole lot of web servers and that means I get a lot of traffic in, and I have my own Web site right. It's a business Web site. I try and get information out by using it. This week something happened, and that is that my server was under attack. Right. So, I had a look at the logs trying to figure a few things out. Why am i being attacked? I think you might have a couple of ideas, why you think I might be under attack. But anyhow, bottom line is I started looking at everybody's logs. Did you know that your web server is probably constantly under attack, and that can cause a whole lot of bad things to happen. For instance, your web server might be compromised because of a zero-day attack, or maybe you haven't updated that web server in some time. In many cases, people never update their web servers. I just had a client that we brought on, that had done it, in probably about five years. That's a huge problem. And, I'll tell you why the bad guys want your web server, its so they can spread malware. They want to spread it to other websites, they want to send out some spam e-mails, phishing attacks and other things so, that they can take control and make some money by stealing your information, which is really a bad thing, right.

[00:01:36] Killing your Web site, means your information doesn't get any mailed anymore. They don't really care if it works, or if they break your side or not. They want to do drive by downloads, or they want to distribute malware. There was just a case this week of that happening, where their servers called Docker that lets you download complete machines that will do specific functions on, a lot of people for instance, use these Docker containers, in order to run Java software, or run a web server in this case. So, people were buying, or downloading some of these Web servers, and in this case it was a free one. So, they got it for free from our friends over at Docker. And, once they had it, then they had it installed. One person complained, and they complained that things were slow. There seemed to be a back door, obviously, this is somebody new a little bit about security, right. And, that back door turned out to be used, to have your Docker container, your Web site, mine bitcoin. And, apparently, they had made about 100000 dollars, which is real money, right. You know bottom line. So, pay attention.

[00:02:49] I can tell you on my server, the top five hits, were to the WordPress log in page, and some other control software that many Web sites choose, and I don't use, I just don't trust it. So, they were trying to hack in, just general. This was a drive by. This is a robot trying to hack in, and get at the information on my website to be able to log in take control, to put things up that I didn't want to have up. So, that's the bottom line, for today. Double check your web server logs, double check your security. Let's make sure the bad guys aren't trying to break in, or make sure they haven't already broken in. I found that, in fact, about a month ago, they had already broken in. We shut it down. This is a zero-day attack. We shut it down, immediately. We noticed it within a matter of minutes, because of the software we have in place. We were able to stop them. So, do you know, if the bad guys have gotten into your systems including your web server. Hard to tell, if you don't have the right stuff in place. Check me out online. Craig Peterson dot com and of course I'd be more than glad to answer any questions that you might have just me at

[00:04:05] Craig Peterson dot com or you can text me 8 5 5 3 8 5 55 53 that’s 8 5 5 3 8 5 55 53.

[00:04:16] Have a great day we'll be back tomorrow with another real quick daily hit. Bye-Bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 27, 2018

Do you own bitcoin or another cryptocurrency?  Listen in as I discuss blockchain technology and cryptocurrency issues with Ken and Matt.

Is Rosie the Robot your new GP? This morning, I talk briefly with Ken and Matt about AI, Artificial Intelligence in the Medical Community.

Find out more on CraigPeterson.com

---

Related Articles:


Cryptocurrency Theft: $1.1 Billion Stolen in Last 6 Months


Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular


Bitcoin’s Price Was Artificially Inflated, Fueling Skyrocketing Value, Researchers Say

The big picture: We’re getting closer to AI doctors


Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Information Disclosure

Critical Patches Issued for Microsoft Products – HIGH THREAT


Microsoft Confirms New Windows 10 Cumulative Update KB4284835 Issue


More Reports of Windows 10 Cumulative Update KB4284835 Failing to Install

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/27/2018

Blockchain technology, cryptocurrency attacks, and AI Doctors

Craig Peterson:

[00:00:00] Craig Peterson Here, Hi, Good morning. Boy, did we have a great webinar yesterday, by the way, I did one for the FBI, for their InfraGard program, that the FBI runs, and it was absolutely fantastic. We're talking about solar storms, and their effect on us, and how they could ultimately wipe out civilization. It's scary when you get right down to this stuff. The presenter was a professor at Baylor University, and for 22 years, he was with the Air Force, doing space weather, and he was talking about some of the things that really could affect us, and you know he doesn't like the hype of “hey, listen we're going to go back to the 18-hundreds, because we're going to lose all of our electronics,” but it was really interesting. Maybe we should talk about that someday. Anyhow today, with Ken and Matt, I spent a little bit of time going through two things. First of all, I went into my most in-depth description of how blockchain technology and cryptocurrencies like Bitcoin actually work, and why they are being compromised, why they're being stolen, and even how they're being stolen. So, if you have any money, or thought about putting any money into Bitcoin, you're going to want to listen in. Does that make sense to you? Right. What's the technology? How's it being stolen? And I've said for a long time that you should avoid buying these types of currencies. And I totally, totally, meant it, OK. It's a very, very, big deal. So, we talked about that, and then we spent a few minutes talking about the AI doctors and artificial intelligence. I went into that, in some detail yesterday, with Jim Polito, but we went briefly over it this morning over on WGAN and all of their affiliate stations in Maine. So, here we go with Kevin Mann. Thanks for joining us and stick around. 

[00:02:04] You're going to love this. At least I think you will. 

[00:02:08] Ok 739 on the WGAN Morning News on a Wednesday which means it's time to talk Craig Peterson, our tech guru, who joins us at this time every Wednesday. Craig, how are you? 

[00:02:19] Hey, that's me doing good. How are you guys?

[00:02:22] Well, I've had some, I've had some the cryptocurrency missing lately, you know. And why would it be missing? If any of it been stolen? 

[00:02:31] Do you think you just buy that stuff? 

[00:02:34] Come on. I went down to 7-11 and they had some on sale and I got couldn't resist.

[00:02:39] You know there's, at least there was, an ATM down in Portsmouth, is that where you bought them from?

[00:02:44] That's exactly yes, exactly. Yes.

[00:02:47] Oh, ok, Yeah, the whole cryptocurrency thing is starting to fall apart at least the way it is right now. We already know that we had major drops in the value of some of these things, like bitcoin, for instance. But, the big problem has to do with the basic premise of the technology behind so many of these cryptocurrencies and that is blockchain. Now you guys have heard about blockchain before, I'm sure.

[00:03:20] Yes, yes. 

[00:03:22] Now, the blockchain is really where you have everybody involved, has a ledger and the idea is that you and me, the three of us. We had some sort of a blockchain that we came up with. Right. And the way it works is the three of us will record every transaction that we make with each other, All right. So, for instance, if I give one of my Ken coins to Matt, I will write it down, okay, I gave a Ken coin to Matt and Matt has to write down he got a Ken Coin from Craig and then Ken has to write down. Yeah. Craig gave a Ken coin to Matt. So, follow me so far.

[00:04:07] Yes yes. 

[00:04:09] So the three of us have all written down in our two ledgers of this transaction occurred. Now let's say that they can for some reason Ken isn't available or maybe he'd missed recording the transaction. The way we know, who has how much, is based on the ledgers. Just like in a bank where you might have a ledger. And the problem comes up when one of us doesn't agree. Why? Because blockchains are based on this premise of 50 percent plus one. In other words, half of the people that are maintaining the ledgers for a particular blockchain currency plus one person have to agree that I gave a Ken coin to Matt. And, if you guys don't agree about whether or not that transaction actually occurred then it's as good as a transaction not occurring at all. So, we're talking about what's called the 51 percent attack, although technically for us that's 50 percent plus one. And here’s what's happening. What I just described is an over-simplification but it is essentially what happens with blockchain currencies. And that's why people love them because it isn't just one entity like the government saying that I owed Matt a Ken coin. So, we are as a group cooperating and sharing the information and validating the transactions. Well, Let's talk about a few here. MonoCoin, Bitcoin Gold, ThenCash, Virge, LikeCoinCash. These are few of the blockchain currencies out there that have been attacked by people, who are creating false ledgers. 

[00:06:09] So, this is a very dangerous cryptocurrency attack vector. This is something that, the NYU computer science researcher, Joseph Bono, released some research last year showing how much money you would cost to execute these attacks on the top blockchains by simply renting power, computing power rather than buying the equipment. And he said listen, these attacks are likely to increase, and we have already seen them I just named a few of them. So, you know it doesn't make a lot of sense for these guys to go after small beans. So, they're starting to go after the big ones and we're starting to see some serious attack here. We've had three successful attacks so far against ThenCash. And the guy was able to run away with well over a half-a-million-dollars-worth of the currency. We've had, already of over one point 1 billion dollars in cryptocurrency actually stolen in the last six months. And we have newspapers from the New York Times just about a week ago was reporting on this and I think we've talked about this some months ago. But the New York Times is reporting the Bitcoin price you remember, the almost 20,000 dollar value per bitcoin. Well, it turns out that it was artificially inflated. 

[00:07:36] NO, I'm shocked, shocked, shocked, shocked, shocked! 

[00:07:41] And from the very beginning always the run-up to the thousand-dollar value it looks like was completely fabricated out of thin air. So, we've got subpoenas now by American regulators, who are looking into a number of these different coin offerings. And you know I've said from day one gentleman voice these various bitcoins and and and the like using the blockchain technology is one of the reasons. And this is what we're talking about right now is that technology is not really there, yet, and you could easily lose all of the money that you, I don't want to say the word invest but that you use to buy these various types of coins.

[00:08:30] We were talking to Craig Peterson, our tech guru, who joins us Wednesdays at this very time to give us an update on the world of technology. Craig, I have a doctor’s appointment a little later this morning. Is it possible that in the future that will be with a robot?

[00:08:45] Isn't that an interesting idea? Right. We've always kind of known it was going to happen. 

[00:08:50]  Robot doctors, Yes 

[00:08:52] Yes, yes.  member of the Jetsons right. 

[00:08:55] And they were Joe Jetson and daughter Judy, Jane his wife. And, of course, Rosie. Right. And, the robot. 

[00:09:12] Yeah exactly. She was a she. But she did some diagnosis of George you know he's an idiot. I think it was one of the diagnosis. Anyhow. We had some real problems and I have some articles up on my Web site about that and I'll send them out to people who are I'll send them up to everybody who signed up for my text my SMS list because I think this is just amazing as we're spending a few minutes on because right now if you want to do research guys what do you do. 

[00:09:44] You want to research something anything you google it. Yeah, exactly you guys are both "Googleizers" right. Indeed. 

[00:09:55] So, you go online you Google. Now I want to a word of warning, Dr. Google doesn't have his medical degree, yet. OK. But we're seeing all kinds of interesting problems when it comes to our medical diagnosis. For instance, right now artificial intelligence has been shown to be better than radiologists at reading most x-rays. Now that's a very, very, big deal frankly when you look at it. And during the decade of 2010 to 2020, it's estimated, that doctors will have to have doubled their knowledge three times over the course of that 10 years. And we all know that we're not the best at remembering things, right. We're not the best at figuring things out. And it turns out that physicians are not either, because there are so many advances in technology, medical technology, going on and on and on. In fact, we already had an X Prize awarded for you remember bones in Star Trek with his. You have this sensor right. We already have the next prizes awarded for one of those things although it doesn't sound as good as bones as it was. But here's the bottom line. Give it another five to 10 years, and you will have an app on your smart device that will be able to do analysis, of your medical condition. 

[00:11:33] It's going to be absolutely amazing once the stuff and do you'll get a diagnosis. You might go into the human doctor, which of course computers aren't don't have any bedside manner right. I want to talk to somebody who I can talk to I can relate to, Right. So, those are still going to be physicians are still going to be things that computers aren't going to be able to figure out at least for the next couple or a few decades. There's no question about that one, but you can do various types of diagnosis right now just from a photo for obviously for skin cancer and for other things. So, Matt no today you're not going to be able to go see your computer doctor. Some of the human doctors can't remember every possible disease treatment or medical order article, AI can. And there's a lot of money going into having AI, artificial intelligence doctors, and by the way it's going to be free. 

[00:12:34] Ultimately, it's going to be, I don't need Obamacare. That's Craig Peterson who joins us every week on the comp at all of the information, Thank you so much. We'll talk to you next week. 

[00:12:55] Hey gentlemen thanks. Bye-Bye. All right time for a quick break. 

[00:13:01] Hey, I figured there's probably a few people wondering about InfraGard, real quick.

[00:13:06] Just go to InfraGard dot org online I N F R A G A R D dot org, online. Have a great day and we'll chat again tomorrow. Bye-Bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 26, 2018

Will your next Dr. be a robot?  Listen in as Jim and I talk about the future of medicine and why older doctors might not be as good as the new intern on his staff.

Find out more on CraigPeterson.com

---

Related Articles:

The big picture: We’re getting closer to AI doctors

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/26/2018

The Future of Medicine: Are Doctors as Good as a Machine

Craig Peterson:[00:00:00] Hi everybody, Craig Peterson Here. This morning I had an interesting conversation. Have you ever wondered about Dr. Google, right? How many of us have not gone online? Typed in our symptoms and tried to do a little bit of self-diagnosis. Well, this morning with Jim, I talked about that problem a little bit I'm glad, Jim kind of saved my butt on that one. But we talked about the stats the studies that have been done looking at medicine and medical practitioners. And we went into some details of what the future of medicine holds and frankly it's going to be in your hand.

[00:00:42] Here we go with Jim Polito, here. He's got a great story for us today and a lot of other great stories I'm talking about our tech talk guru, Craig Peterson. 

[00:00:53] Good morning sir. Good morning Jim. All right so you're telling me. That very soon, I could be going to the doctor and it could be the Robot from Lost in Space. Let me tell ya, he's got some mean pinchers. You know hands, I don't know if I want them you know, doing anything. 

[00:01:15] Are we talking about we're talking about the original one from the 60s. 

[00:01:19] The original one, like you know the one with the with the arms like the dryer vent. You know you like it. Yeah, yeah, that one. OK. So, but tell me now, AI artificial intelligence. 

[00:01:36] You're saying that it's going to be part of the future of healthcare.

[00:01:40] Oh, in a big way and there's a lot of reasons it should be the future. And, there is some really interesting stuff that I dug into, in fact in relation to this particular story. So, for instance, Jim you’re, you know, you're over 40. 

[00:01:58] So, just a little bit just a hair over 40 years old. 

[00:02:03] You know they recommend that you go in for colon cancer screening. 

[00:02:09] Seriously, I've been doing that since I was 40 because my grandmother died of colon cancer. So, yes. 

[00:02:15] How about that? Then women are going in for breast exams, you know it’s very common. And yet in both cases now, we've got a whole lot of dispute in the medical industry for instance, there was a study done on colon cancer experts, recently and it showed that of them agreed it had these, colon cancer experts some said screening has no value all the way through other colon cancer experts who said it absolutely has value. 

[00:02:52] We have things like for instance this is another medical fact, right. It's been around for a long time. If a little kid is sick you're going to see a doctor or you're sick you have a fever. Doctors have been prescribing aspirin for over 100 years.

[00:03:11] Yet recent studies are showing, that prescribing aspirin or other and antipyretic to reduce fevers can be significantly more risk than just allow you to run its course. You know what's a really big here. Right over here. You know we've all heard of old wives tale, right. You know how about Dr. tales. Now another doctor, John Landis he studied the phenomenon and he looked at medical academia and he found that he's come out of the medical academia environment, are more likely to have research claims that are false than research claims that are true. 

[00:04:01] This is not good. So, no this is all bad. 

[00:04:07] All right medicine very complex. It's very hard to find easy answers. And I'm going to tell you about one more real quick study here, and that is how what kind of doctor age do you prefer. 

[00:04:24] You know what. I don't really care. 

[00:04:26] I've never I had to see a specialist when I was a little kid, I had a man who was my pediatrician, then I had a woman. I'm one of those I'm one of those rare people who doesn't care, as long as I feel that you're a competent physician. I don't, It doesn't matter to me at all.

[00:04:44] Well, I'd prefer to see a doctor, you know my GP, my general practitioner, that I can relate to, right. That's kinda number one, right. If its’ a specialist. Yeah, I don't care if they don't have any bedside manner or they can even speak English. it meaningless it doesn't matter to me. Right. But when they're talking to the doctor and we're trying to evaluate if I should have that colon screening or what I should do. I want someone I can relate to that. 

[00:05:14] I mean, Francis Murray, my doc is still out and Springville like you said you heard. Yeah, I mean I can relate to them. I have a great rapport with them. 

[00:05:24] You've gotta have that. But, there's another study out that shows that doctors who are, our age. In other words, doctors who are older who are more than ten years out of medical school are more likely to make mistakes and cause harm to their patients. Than doctors who recently graduated from medical school, even in many cases than interns than some of the older doctors. What I'm kind of building up to here is all of these different studies I was looking at as part of this article are showing that in reality, medicine is, like with computers right, you know, what router should I get because they're all vulnerable right now, right. That the exact question everybody has, and how can you tell if someone is an expert. You're right it's hard. It's almost impossible because this field is changing so fast well the older tech field has a direct impact on medicine as well. So, the thinking here is just like you go to Google right now you might ask a question you know the number one radio show in western Springfield. Very simple. All right. Simple but it's going to get to the point where it will be free for you to get a real diagnosis from your smartphone, probably from Google or Microsoft, or one of these other companies but you won't be able to get a free diagnosis that better than you would get from an expert. Now, it's going to be hard to relate to that non-person. 

[00:07:17] See that's the thing. And where do I have to put that smartphone to get that diagnosis? 

[00:07:23] Yes. I don't know. I don't know if my protective case could handle that. 

[00:07:29] Well, we've already got that for your iPhone. We've already got something that just requires you to you plug it into the iPhone port on the bottom of your phone all you do is put four fingers on it and it will do a cardiac evaluation for you and will send the information directly to your daughters or your doctor. should do with them. Students who graduate in 2020 are going to experience or doubling of knowledge, what they learned in the first three years of medical school will be just 6 percent of what's known at the end of the next decade from 2010 to 2020. We've had four doublings of knowledge and we have had and they expect that to continue. So, how can anybody keep up with that? And that's where AI might be very interesting.

[00:08:21] Oh my god that is fascinating. Now look I I know that people are going to hear what you're saying. and say, oh that means I could just go right online right now and diagnose myself. And that's not what it means. We want to make sure everybody understands that. So, you need to get. One of the actual stories that will describe this to you and the easy way to do that is to text in my name. 

[00:08:46] Jay I am Jim to this number 8 5 5 3 8 5 55 53 that’s 8 5 5 3 8 5 55 53 and standard data and text rates apply. 

[00:09:04] But you'll get this information plus a whole lot of other information that will help you to make look, right, Craig the wise decisions for yourself. The more information you have the better you can make a decision and that's actually what is best in healthcare.

[00:09:23] You're absolutely right and be careful Dr. Google cannot diagnose and many doctors are going to be very upset when you run in with your printouts from your Google search, it’s not there yet another decade and we certainly will be.

[00:09:39] Wow that's incredible. Craig always a pleasure always an interesting segment and we look forward to talking with you next week sir. 

[00:09:47] Take care.

[00:09:48] Thanks Jim All righty. Thank you. That was great, man. I'm glad that we discussed that at the end. You have got to be careful do not go to the Internet and try to do the self-diagnosis, it's good to gather information on the internet but the relationship with the doctor that is the most important thing. OK, we have a final word when we return. 

[00:10:12] Ok. Got to point out something else. For those of you who I promised the free insider memberships to. Now, this is something we will end up charging for, but for now, there are a few people I offered it to. So, if you are part of this insiders group where we are sharing all kinds of special reports and things and you're giving feedback kind of helping out with a few things. If you're part of that, I want to let you know we have made some progress and we've got the software set up now so it's ready to send out your logins. We have a bunch of materials already in there. So, those will become available and everything takes longer and costs more. So, sorry it's not out there yet but this. This is exciting. This is a bit of a test for us, something new. We haven't done before you know we tried the Facebook group and we had hundreds of people sign up, but we just didn't have that type of interactivity that I really wanted to see so it wasn't helping a lot. But this insider thing, I think is going to be really good. So, keep an eye out in your e-mails and for those that I promised that I'd sign you up, and I you know I can probably still take a few more people, let me know if that's what you want to do. OK. Take care.

[00:11:30] And we'll be back tomorrow. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 26, 2018

Is your data safe when you are mobile? Craig discusses all about data transfer and virtual private networks in this daily podcast.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/25/2018

Is Your Data Safe At The Beach

Craig Peterson:[00:00:00] Hi everybody, Craig Peterson here. It is a beautiful day in the Northeast. I am just enjoying it. It got me to thinking about being outside of course, its summertime. We love to go to the beach, we love to travel around. So, we can talk a little bit today about some of the misconceptions people have about traveling and using Wi-Fi and security, because yeah, I do. A friend was over last night and while we got to talk about this. Yeah, I had a friend come over last night and he was here, talking about Wi-Fi and going online. He was very interested in the whole concept of being private and safe online. And this is a really big topic for us, as we're talking about, right now. In the summertime, we go to coffee shops, we go to restaurants, we go to the beach and we're often jumping onto Wi-Fi, public Wi-Fi. Many times, we're using our cell phones to get to places and you know the cell phones, of course, many of them have shared data plans. Mine does. And on top of that, I have the ability to use my cell phone as a wireless hotspot, as a personal hotspot, which is really, really, cool. So, what should you do? What should you avoid? This is kind of a really, big deal.

[00:01:28] Now, he was saying that he heard an ad and this ad was guaranteeing, it was promising him, that if all he did was use their VPN software that he would be safe, and no one would be able to monitor him. Of course, he is concerned about the bad guys, but they were saying, listen this is so safe, that even the FBI and the government can't monitor you. Not, that he's concerned about that, right, but you know you don't want your information stolen, no matter who it is. And, we know that the Russians are busy doing that right now, and are the Chinese, et cetera, et cetera. So, he thought that just having this VPN would make his life simpler, would make it easier, he wouldn't have to worry about having his bank account information stolen, for his business, right. Imagine one day finding out your payroll checks bounced, because someone had emptied your bank account, right. Can you imagine that? Has that happened to you before? It happened to me once. It was my bank account. Man, this would have been back in the 80’s, it my business bank account. All of a sudden, checks started bouncing. It's a terrible, terrible, feeling. And, he didn't want that. He has a lot of employees and I'm sure you can relate to that too. 

[00:02:45] Well, looking at all of this, and looking at the problem, looking at the guarantees, he was saying, hey, listen, is this going to work for me? Is my data going to be safe? If I use this VPN, that's being sold by this company. And, I had to tell him ultimately, No, because there are there's a few problems here. One is, that a VPN is only going to take the data from your computer. Let's say you're running a VPN, on your computer, So, it only can take the data from your computer to their VPN exit point, in an encrypted manner. So, they've got a server, let's say, they have a cloud server, right. Whatever, that means. And, their server is sitting, physically, let's say it's in Kansas City Missouri, just for the heck of it. So, here's what would happen. You're sitting on the beach, here in New Hampshire, or Florida, wherever you are. You're sitting on the beach and you're enjoying the day. You can just feel the rays of the sun coming down, and you're a little worried about getting that sunburn, right. You're watching the kids, you’re just enjoying the day and you've got to get on to your computer, because you just got a little note from somebody at work.

[00:04:05] So, you open up your laptop, and you connect to the VPN. In this case, he's talking about a third-party VPN. We'll talk about business ones, probably some other day, so he connects to this vendor X Y Z, the data from his computer goes to, in this case, were saying Kansas City, Missouri. That data is now safe. Well relatively, depends on the encryption they're using, etc.. But, let's say for all intents and purposes that data is safe. So, that data is hauled to Kansas City Missouri. But, it can it be encrypted forever. Facebook can’t understand what you're saying. Your mail server needs to know, what it is you're trying to do. The e-mail you're reading, what you're trying to send, right. All of these systems have to know. So, once it hits the server in Kansas City, Missouri, it is no longer encrypted. So, all you're doing with that type of a VPN, with one of these public access VPNs is that you pay a little bit and for some of them, they are free. All you're getting is data being safe from the beach, over to Kansas City, Missouri. Now, what some of these VPN companies, do and think about this one for a second, is they monitor your data and your Web sites to know where you're going. Some of them even go so far, as to insert their own advertisement portfolio into the web pages you're going to. So, he was asking me is my data safe right? Have you ever had that question? Have you thought about that?

[00:05:49] Is my data safe? When is it safe? Where's it safe? Well, in this case, we're talking about data is reasonably safe until it gets to that X Y Z VPN vendor in Kansas City, Missouri, because now there's this one exit point. So, think about that, if you're a black hat, when you're out there, and you're trying to break in. Do you want to go after just a regular little business? Or are you going to focus in on maybe one of these VPN providers, compromising their systems. And, now you’d have access to all of the data from 100 million people or 100 million sessions that people are creating and using through X Y Z VPN company. You see what's happening here now. And once the data is over on the other side and it's in the clear, their ISP could be monitoring it. They could have problems with the DNS, sending you to the wrong place, where it adds up to darn quickly. So, the question he asked me, my answer was, no right. What do you think the answer would be? Yeah, it's a little safer. What I said, Right. Craig you're always hedging your bets right. How many times have you said that? Obviously, data is a little safer because, from the time it left the computer on the beach, as you're sitting there, until the time it got to Kansas City. Missouri, it was safe, but you may well, have a very bad company that's doing nasty things with your data. 

[00:07:23] Once, it hits the other side of the VPN, and then on top of it their systems might be compromised, and now your data is not safe, that way either. So, remember all of this. Keep this in mind, here, when it comes to keeping your data safe, a VPN can be an adjunct, but be very careful about who you use. And some other day, if you're interested, let me know, and we'll do this, we can talk about your own private VPN. One doesn't make sense, and this is what I do for my business, and also for my clients businesses. So, have a great day, enjoy the weather. I am going to be sitting back enjoying it. It is that perfect. There's no humidity. It's in the 70’s, which is the way I like it. The sun is out, and you probably know I am little kind of a gentleman farmer here too. I’m going to enjoy some of our animals, while I'm here and as always have a Great Day. Make sure you visit me online at Craig Peterson dot com and we'll be back tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 23, 2018

Do you use or collect Bitcoin?  Today we discuss some of the many problems that go along with all these Cryptocurrencies and Blockchain technology, and why it is a good idea to steer clear of them.

Facebook is sharing your data and your friend's data.  What Apple is doing to prevent this.

Are you still using XP? There are companies who are.  They have embeded systems that run XP.  So what can they do.  Craig tells you how he handles it for his clients.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/23/2018

Cryptocurrency Downfall, Apple Closing a Loophole, Windows XP -What to do if you still need it

Craig Peterson:[00:00:00] Hello Everybody, Good Morning, Craig Peterson here. Today we've got two major topics, I'm sure are going to interest you. If you or anyone you know has been buying and are using things like bitcoin, we’ve got a lot of news that we'll be talking about today. Also, we are going to be talking about a couple of major security issues here. Why the military can't quit, Windows XP and should you. If the military's not doing it, well they have a plan. We'll talk about that and what Apple is doing to help make sure that the problem that just happened with Facebook and their developers doesn't happen on the Apple platform. I think they're going to do a very good job of that. So welcome, and here we go. 

[00:00:50] So, we're going to start by talking about blockchain technologies. Now, these are the technologies that are used to make things, like bitcoin, work. The whole idea behind block change technologies is that you have well, to kind of think of it like, a regular ledger that you might have an accounting. You've probably heard of double entry accounting, where things are balanced, right, they're balanced back and forth between, you know, the receivables and payables. But even more, it gets right down into; this money showed up in the bank account, that completely negates this invoice. Therefore, we know everything's balance right, and you know if you want to know more code talk to an accountant right. Well, those types of ledgers can be copied. They can be shared. We've seen them in movies before, where they're used by bad guys to try and cheat people out of money. Let's, put it that way. 

[00:01:45] And that's a problem. But, when we're talking about bitcoin and blockchain here's how it works. How do you know a transaction is valid? How do you know someone has some of this money that's out there? Well, they do it through a system of ledgers, and there are a lot of ledgers. In fact, when it comes to blockchain technology, the idea is that every one that uses a blockchain technology at all, anybody has a copy of all the ledgers. Now you don't know who the people are, necessarily, all you have is a wallet number. So, you know I'm sending money from here to there, and then all of that information is then distributed and shared with everybody else on the blockchain. So, it's cool technology; banks are starting to use it now, where they are doing with the overnight lending they're sending money back and forth. And they need a way to verify that transactions occurred and who got the money and the overnight rate was it at etc. So, that later on, they can go back and get down to it and figure out all of the details. Well, when you're talking about a ledger like this, where everybody's copy of the ledger needs to agree. That's impossible. Some people are going to have a machine that's offline, some people's hard disks are going to crash, and they are going to lose their ledger. So, you can never have 100 percent of these ledgers agree with each other. So, how does it work. 

[00:03:26] Well, the idea here is that 50 percent plus one of the ledgers have to agree. And, that's pretty good when you think about a bitcoin, for instance, you're talking about having thousands. Ten of hundreds, of thousands, of ledgers that are out there and they all have to agree. Now, there is a problem with this, in a few different ways. One is the amount of time it takes, but we're not going to get into that, for the ledgers to become insane. And, even to distribute the data, well, that 50-plus-one-person percent is a problem because theoretically, you could have an attack where someone can somehow modify half of the ledgers that are out there. Well, guess what, here it turns out that this very well-known attack vector has been used. Look at the mono coin, Bitcoin Gold, and Cass Virge, and light coin cash. All of those have had, what's kind of the crypto equivalent of, a bank heist. It's interesting because there's another article that I have in front of me and we put up on the website, that looks at this and see, that in the last six months, there has been one-point-one-billion dollars worth of cryptocurrency stolen, oh think, about that for a minute. What was thought to be the strength or one of the major strengths to these cryptocurrencies, which is that you have to have all these ledgers, and the ledgers have to be pretty much in agreement? And all of that information can be hacked. Now, how is it getting hacked? You know are we talking about people breaking into hundred-thousand-million-plus machines, to manipulate those ledgers, and move that currency, that cryptocurrency, into the black hats bank account. 

[00:05:32] No, actually we're not, and it's kind of smart the way these guys are doing it, here. There's an article I put out from NYU computer science researcher, Joseph Bonneau, and he released research last year where he went through and came up with estimates of how much money it would cost to execute these type of attacks on the top. Blockchain that is out there right now by simply renting power, rather than buying all the equipment and he concluded that these types of attacks were likely to increase. Of course, as we're talking about right now, it turns out he was right. Here is a quote directly from him when he was talking to Koine desk, he said “generally the community thought this was a distant threat. I thought it was much less distant and I've been trying to warn of the risk even. I didn't think it would start happening this soon.” So, there is there is a huge problem. You know, I have never been a proponent of these cryptocurrencies, for a lot of reasons, or one of them is the fact that they're not secure enough, and this has now been proven many times this year with at least a half a dozen different cryptocurrencies, OK. So, it's pretty bad. There's also another problem. 

[00:06:56] You can't prevent someone from spending the same piece of data five or even a thousand times, at once, without trusting the third party to do all the dirty work. So, you've got miners who are the people who are using the machines that are running the blockchain software looking for these highly complex mathematical numbers. So, they are consuming electricity, making sure no one's getting money's stolen, and this article is interesting if you are or have been thinking about getting into it at all, have a look. Have a look at the report that came out in this case. These guys in this one case, they were able to amass more than half of the network's power. We're talking about computing power here. The Bitcoin Gold attacker was able to double spend to very expensive transactions, sent to an exchange. So, it goes on, and Cass explains Amol, how even small coins are at risk. This is huge, it's really, really, huge and it's called a 51 percent attack, although it's 50 percent plus one, and we've got to be careful of it. I have another one that's up there, right now, on my website called Healthcare Info security. It is the place that I grabbed this from, and it's showing again, evidence is continuing to mount, the cryptocurrencies seeking criminals are no longer bent, solely on boosting bitcoin or demanding rent, demanding ransomware, but in actually stealing it, directly by being able to get in showing in here from carbon black. The top 10 currencies that are out there right now, of course, this is not surprising to anyone, but bitcoins number one, the 3M RIPL bitcoin cash-like coin, etc. goes on and on. Now Carbon Black says it's found at least one-point-one-billion in cryptocurrency related thefts since December 2017, and right now when we're talking here, June 2018. So, the crypto thieves are black hats are leveraging malware phishing attacks, fake advertising campaigns, and they're just repurposing old tricks. People are falling for all kinds of cheap attack tools, you can get them from anywhere, from a buck to a thousand dollars. It goes on, Krypto Jack and attacks are continuing.

[00:09:29] So, we've got a couple more here on the bitcoin stuff before we get into what Apple's doing to try and stop developers from sharing their data and also about Windows XP. Believe it or not, it is still in use today, and XP came out a very long time ago now. Bitcoins, price now, I mentioned this on the show about a year ago. I think we were talking about bitcoin and how there was a lot of fishy stuff going on when it was launched, and it looks like a couple of guys were involved, and they were able to get bitcoin up to 1000 dollars per coin very quickly, and it appears insider trading may have been happening. We talked about some of the rumors that were out there, and now we have a little bit more of a solid piece here. This is from the New York Times dated March 30. 

[00:10:27] And of course putting this all together today, because we are in a mode of talking about bitcoin, today we're going to kind of cover that thoroughly. So, this article was saying that a concentrated campaign of price manipulation may have accounted for at least half of the increase in the price of bitcoin, and other cryptocurrencies last year. Now, this is according to a paper released at the end of March. It's an academic; he has a history of spotting fraud in the financial markets his name is John Gryffen, finance professor over at the University of Texas. Isn't that interesting, here. So, the price the value was driven up artificially and remained artificial because once you get started, that way it just keeps going. Now, it was being manipulated, it looks like, by at least partially backed Livity at Phoenix, it's largest and one of the least regulated exchanges, in the industry register, in the Caribbean offices, in Asia, and it was subpoenaed by American regulators shortly after article started to appear. Talking about, but halted the digital flow of tokens, in and out of the exchange what was going on. Why were these tremendous price increases happening, last year, and, this paper indicates that manipulation played a large part, in those price increases? So, it's a very, very, big deal. 

[00:11:59] Yet, another reason to stay out of this, if you need another reason. 

[00:12:06] To tell your friends, your family, or yourself not to get involved with this. Bitcoin is selling off this year, and they're concerned that this decline. Could cause a lot of damage in the financial markets. So, Bitcoin is now, nearly a third, of its record high that was reached just six months ago. It's dropped by almost two thirds. Isn't that just crazy? So, they're worried that bitcoins, the bursting bubble could spill over into the equity market. Here's a quote from Matt Maylee. He's a strategist over at Miller Tabak, yeah. Miller Tabak, there are things to be concerned about regarding the stock market here with emerging markets and other issues, but I don't think bitcoin is going to be one of them. And he understands the fear or the steep rise and fall in bitcoin prices; it's very reminiscent of the 1990s dot-com bust, he said. But the difference now is everybody's investment wealth. It's a very, big deal. Everybody is talking about both of those things when they're in the bubbles. So, it's looking here, if you look at that article again, we have all of these up on the website, and this particular graph is from CNBC, but it's showing the correlation, between what happened with our tech bubble and what's happening with bitcoin. So, keep an eye out for that. This could be a very, very, bad thing. 

[00:13:43] Now, we all have heard about Cambridge Analytica and what they did with the Facebook data. They were getting information about friends of friends they were using it, they were manipulating it and, of course, before that eight years, well ten years ago now, the Obama campaign got the information on every Facebook user, worldwide, and of course, there are particularly interested in the United States. 

[00:14:08] So, we have a history now of abuse of your Facebook data, here, that stored in social media. So, Apple's been concerned. You know, they are probably one of the number one companies, out there, when it comes to trying to make sure you retain your privacy, right. So, Apple came out with new rules just last week for the developers. The idea is, to limit how developers use information about the iPhone owners friends and other contacts. So, there was a bit of a loophole, the lead app makers store shared data, without people's consent. That loophole is being closed. Now some of the apps that you might use, I use like a contact duplicate merger and things those should still work, but they have to keep the data on your iPhone. This whole practice of trying to get information about your contacts has been used for years. When you sign up for Facebook what does it ask for? Hey, is it OK if I help you find your friends on Facebook LinkedIn did the same thing, and now that Microsoft is running it, it is done even more.

[00:15:18] Right. Double time here. So, this isn't new, but Apple's new strategy is new. Apple has, of course, the world's, well one of them right, the world's most popular smartphone operating system, Android is more popular. But sharing data, as in a friend's data, without consent is what got Facebook into trouble. They announced all of this at their developer's conference, a little bit earlier this year. Contact List abuse is what it's been called, and it's a huge ecosystem and this will make a very, very, big deal. Interesting article. Want to get into more detail, if you are a developer if you have an Apple iOS app, and a lot of businesses do, make sure you double track this. As far as businesses going with developing their apps, I have got to mention something here, and this is a little self-serving. OK, I'll say that up front. But we are, my company is the only one that can sell this particular software, and right now, anyways, and that's why it's self-serving. Apple and Cisco got together to try and solve a major, major, problem. 

[00:16:35] The problem is if you’re a business, how do you keep your data safe when it leaves the office? 

[00:16:45] So, if you have sales people they need access to your data. Don't you think if you have somebody, who has some financial information, they need access to your data? Not all of them, but some of them do. So, how do you control that? Well the way most companies have dealt with it is, they buy some software, and that software runs on that iOS device or that Android device and all of the company data stays within that one. App. One app. So, if you want to use company email, you are using that app to send and receive email. You cannot use any other app; if you want to get into your customer management system, you have to use that app. If you want to get financial data, you have to use that app. If you want to get at your files, you have to use that app, right. So, you're stuck in this one app, and people have hated that for a very, very, long time for good reason. However, the main reason they had to do that was there was no way to have a check and balance on the apps and what they were doing on the phone. 

[00:17:56] Now, with iOS, you can remotely manage, and we do remotely manage iOS devices for businesses. You can, too. There's even free mobile device management MTM. There's free mobile device management software out there that you can use, depending on who you are and what hardware you have and what vendor relationships you have. So, look into that. But, all that lets you do is control what apps can be installed. It doesn't control the flow of data, between the apps, including the flow of data between your apps and what's happening with your business data. All right, So, I said this was self-serving because we've got a got a solution with Cisco and Apple that's been developed and works great that allows us to control all of the flow of data. Think about the military type system. Think about the Orange Book in the old days, right. How have you compartmentalized the data? And how you don't have your private home server for Clinton e-mail dot com, right on. Now, we found out Comey did it too when he was investigating the Clinton e-mail scandal, where he was using Google Mail. It doesn't and does it. 

[00:19:10] It's nutty. So, that became a problem and more of a problem. It just goes on and on. So, with this, you can control everything. And, I think you have to I think we've got to start controlling the apps which don't know what the developers are doing. But you might have a look for this out there. It is available for iOS. It is not generally available right now. We're the only ones in the world that can sell it. I guess that means, we're just kind of cool. But, I guess the other side of that is, isn't it kind of cool that you have a guy, here, that is tied in that tightly, with the security market. 

[00:19:50] In fact, I've got to go as soon I get off the air, here because I'm doing an interview, that we're going to be airing, because I'm running webinars for the FBI. Infragard program, which is the infrastructure guard, if you will, for the businesses that have a critical infrastructure. So, I'm doing that right after this. We're talking about the dark web. In fact, that's who it will be. I'll be doing that interview here shortly. You can join InfraGard if you are involved in critical infrastructure. You can find them online InfraGard dot Org. There are chapters in, I think, every state. 

[00:20:32] Well, you know Windows XP should not be used, right, don't even have to repeat that. But the military still is using it. It's using it in our ships even though the British navy just launched a nuclear submarine a brand-new build from scratch running Windows XP. Now, why do they do that? Well, the bottom line is Windows XP is a known, well-known commodity, very well, known. So, they know where the bugs are for the most part. Microsoft is still supporting it for them at an incredibly high cost, here. But what that means is that the military computers running XP are stuck with legacy hardware. They're stuck with legacy software that runs on it. So, we've got to be careful about this. The rest of the government operations are moving to Windows 10. I think we've got all of our clients on to Windows 10 now that are using Windows, and we're keeping them up to date, obviously, with the patches and we do that all automatically. And we have people that hop on when there are problems, which there are, this week. I'm not getting to it on the radio, but check out my Web site Craig Peterson dot com because there are a bunch of Windows 10 updates and they are not all working. So, I've gotten instructions on how to install them which machines are having problems. 

[00:21:59] What that means for you and what you should do. So, check that out on my Web site, again, Windows 10 update problems this week. So, they are working on trying to get rid of it; they've got Windows XP 2003 other legacy Microsoft products that are out there and the problems just continue to pile up. Now one of the things we have done for companies that are running XP, and you might look at this as well, is we take that Windows XP machine we put it into a virtualized environment, and then we put special firewalls around it with full intrusion detection and prevention. So, you can do that as well, if you're a business and you're stuck with Windows XP. We're doing that for manufacturers, as well, where their hardware, their manufacturing hardware, is running Windows XP. So, we put it in a box, if you will, with all kinds of protection around that. So, keep an eye out, and that's what's happening. Make sure you join my mailing list, so you get my weekly e-mails. They come out on Saturday morning, and we have some special reports. Those people who signed up for my insider club here, there is a membership site. 

[00:23:13] It is closed but we've got some more special reports, we'll be sending them to you along with information on retrieving them. And that's something that we've offered for free. We shut down that Facebook group by the way because we just won't get in the activity. I think people are just used to me telling me what's going on and what should happen right as opposed to the interactive back and forth. 

[00:23:36] Although we had some interactivity, and we still have it, multiple times a week, usually it's via text. If you want to text me, if you want to sign up, if you have any questions, just text me directly 8 5 5 3 8 5 55 53, 8 5 5 3 8 5 55 53 and I'll let you about  any major alerts or other problems that come up, until then, have a great week and we'll see you online. You've been listening to Craig Peterson. 

---

Related articles:

Critical Patches Issued for Microsoft Products – HIGH THREAT


Microsoft Confirms New Windows 10 Cumulative Update KB4284835 Issue


More Reports of Windows 10 Cumulative Update KB4284835 Failing to Install

Unbreakable smart lock devastated to discover screwdrivers exist

 

Cryptocurrency Theft: $1.1 Billion Stolen in Last 6 Months
Blockchain’s Once-Feared 51% Attack Is Now Becoming Regular

Bitcoin’s Price Was Artificially Inflated, Fueling Skyrocketing Value, Researchers Say

Apple Tries to Stop Developers From Sharing Data on Users’ Friends

Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Information Disclosure

The big picture: We’re getting closer to AI doctors

 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 23, 2018

Today a short discussion on what is wrong with the internet.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/21/2018

What's Wrong With the Internet

Craig Peterson:[00:00:00] Hi, everybody, Craig Peterson, here. And today I want to talk about really what's wrong with the Internet. I think this is kind of crucial. It's critical really. When you get to it, you're going to agree with me. OK, so let's stick around because here we go. Do you know what the basic foundation of what's wrong on the Internet is, smart people and stupid people, get equal airtime? Think about that for a minute now. Well, you remember we had a policy that was in place under the Federal Communications Commission that required equal airtime for opposing views. So, let's say that you have an opinion about something, let's say you have an opinion that no one should live in the middle of an active volcano. OK, so well done, sir was something that I think is pretty darn obvious. Don't live in an active volcano. So, if I were to say that, on the air, and this so-called Fairness Doctrine was in place, what would happen? Well, they'd say, well you have to have an opposing view. So, they would find some idiot that believed living in an active volcano was just fine, right. Those people are out there; they're always out there, you'll see them out there. And, that's the biggest problem with the Fairness Doctrine. But, we're not talking about radio right now, we're not talking about trying to get Rush Limbaugh off the air, what we're trying about right now is what we're trying to understand, the Internet. Now, there's smart people and stupid people and just because you have degrees doesn't mean you're a smart person, right.

[00:01:47] Can we can we agree on that? There's lots of different types of IQ, if you will, Right. So, you've got the intellectual quota, you've got the ability to be able to analyze data in and pull it all together. Spatial, social right, there's all kinds of different types of smartness of these quotients that we can come up with. So, stupid people are the people who will argue against something that's just true. And, I don't know why? Many times, I think they're just arguing for the sake of argument. They don't want to be with anybody. They're like me, they're a bit of a rebel, right. Or maybe there are a lot of rebels, and here's the problem. On the Internet, stupid people tend to shout louder and shout longer than people who have wisdom and judgment. Ignorance generally prevails, and we see that all of the time. Look at what's happening. we've got antiphon out there. These people that are saying, hey listen, we're anti-fascist, and yet the tactics they're using are fascist, right. Am I wrong there, right. I'm sure to hear from somebody, right. Somebody is some stupid person. NSA, oh no they're not, you know beating someone because they are trying to exercise a free first amendment, free speech rights. That's not fascist. Well, what is a fascist thing? Well, get right down to it, it might be a little bit too cynical for you.

[00:03:23] OK, how about this one. Do you remember this e-mail? When you forward this e-mail to friends, Microsoft can and will track it, if you are a windows user, for a two- week time-period for every person that you forward this e-mail to, Microsoft will pay you 245 dollars. For every person that you send it to, that forwards that ad on, Microsoft will pay you 243 dollars, and for every third person that receives it, you'll be paid 241 dollars within two weeks. Microsoft will contact you, for your address, and then send you a check. I thought this was a scam myself. But, two weeks after receiving this e-mail, do you guys remember that one? Do you remember, that e-mail? OK, did any of your friends fall for it? I know, I got it because, why? Because some friend of mine forwarded it to me. How about the one that's more recent? From Facebook and Zuckerberg. Hey, if you like this, you know what? Zuckerberg is going to track it. Facebook is going to track it, and you are going to get paid money. All right, it goes way back cobbled chain letters, you remember those things, Right. So, let's not, for everybody, the stupid will always be with us. OK, Stupid stupidity is not a function of capability. Frankly, I think it's a choice, OK. So, what's the point here? Well, the point is stupidity is cheap and plentiful with stupidity. Your opinions appear to be endlessly open, right. It's crazy. Wisdom is scarce and expensive and usually involved, with upfront commitments, upfront studying, and upfront research. 

[00:05:09] And, when I look at my business, I look at the security business that I'm in, I see stupidity, everywhere absolutely everywhere. I want to tell you a quick story here about a guy that I worked with in Chicago; his name was Miroslav. It was at least 20 years ago 30 years ago. Maybe, he and his family had emigrated from the full former Soviet Union. He knew what it was like. In fact, I had been up in Canada, and I bought a copy of Pravda. You remember that? That's the Russian, the Soviet, the communist, kind of like, Time magazine. And I brought it back, because I thought it was hilarious, because of the way they were portraying the United States, and how everyone in the U.S. was drunk, and they were on street corners, and everybody was homeless, and what a terrible thing capitalism was. So, I showed it to him, and he says I got to take this home, I'll bring it back tomorrow. So, he took it home, and his wife saw it and tore it to shreds. So, remember he promised to bring it back tomorrow. And about a week later, I sent him a slob where's my copy of Pravda, and he says my wife destroyed it and he said I'll get you another one. He never did. By the way, I never got my Pravda back, but he described how he used to have to stand in lines for bread in the Soviet Union.

[00:06:40] Yes that's what you had to do. The shelves were barren.

[00:06:44] I don't know if you've seen the Americans, on TV, but they do a reasonable job of showing what it was like. You can get as many boots as you want. They had so many boots, one style, and only a couple of sizes right. That was the only thing the government, the Soviet government was good at making, back in the day. But he'd stand in the bread line, and he'd have, like no choices. He had his family had to get the bread that was on the shelf, that was it. Right nowadays, you get to decide, do we want to go to Panera, and we can get this bread or that bread. Or, do you want to go to a pan and get some bread from them at the supermarket? And, you know. I’m at my local supermarket; the bread aisle is huge. There are at least a thousand different loaves of bread and different types of bread. So, in the Soviet Union, they had virtually no choice. So, these people would come over to America, and they'd go to a supermarket, and they wouldn't believe what they saw, because there were so many choices. It was everywhere, and that's the joy of true capitalism. It was everywhere. Now OK, I'll argue. Right. We don't have true capitalism in the U.S. anymore which is true. But Kim married to the Soviet Union. It was just incredible. You and I would think, oh wow, that's just a miracle isn't that the coolest thing ever. I love that. But the effect on some of these people that came from the Soviet Union cleared, including Miroslav, you could see it in him. It was overpowering.

[00:08:24] He was amazed, at how much better things were over here.

[00:08:30] Now that conversation happened more than oh 20-30 years ago now, but I still remember what he looked like, and you know what surprised me the most, that he said was that some people came over from the former Soviet Union. Their choices were so dramatic; they couldn't take it, they could not take it, they could not make the decisions. So, the one way that they would return, he told me about people, that returned to the Soviet Union. Well, of course, at that point it had pretty much collapsed because this was right after the collapse, of the Soviet Union, it wasn't very many years after, during the Reagan administration. But you know, we're talking about a thousand times more many more choices, and they were just overwhelmed, they couldn't deal with that. So, they went back. Well, today we have a similar problem. If you go on Google and you look for security, you're going to see you know, anti-virus, anti-malware. How do I get my training and security, that's required by law? How do I get it for my employees? You are going to be overwhelmed. There's not a thousand choices you will get million-page hits, when you do your search online.

[00:09:47] And, you know what, a lot of those people frankly, and then this is scary if you ask me, but a lot of those people, are stupid people

[00:09:57] Their saying, oh this software is the best, I've used it for years.

[00:10:01] There's no problems with the software, and they are completely ignorant of the subject matter.

[00:10:09] You know, in this day and age, we have a continual problem with what are called zero-day attacks. We've never seen them before. We have the president of Symantec, who pretty much got fired because he said that their antivirus software was useless. And yet how many people can you find out there that are peddling Symantec software, right. It's huge; you're saying, hey it's a mess just a mess. These are the stupid people, OK. Kalisz people's not going to help them get a faster internet connection; it is not going to help, a 60-inch widescreen monitor isn't going to help. Being motivated is not going to help. The number one skill you need is discernment, and that's the skill nobody talks about. How do you know, who knows what they're talking about? You have to discern, and that's the problem with the Internet today 

[00:11:08] How can you judge me, from somebody else that has a thousand posts that are all wrong 

[00:11:15] Right, where I've been on the internet since 1983 and doing security for major corporations down through small guys, right. How can you tell the difference? How can you discern? And, I want you to think about it too, from your business standpoint, if you are a business owner, how do you distinguish your business from the other guys that are online? The other guys that are shouting louder and longer than you are shouting, a little bit of food for thought. I appreciate you subscribing. Please make sure you take a second and give this podcast a rating on iTunes. Craig Peterson dot com slash iTunes. Let me know, what you think. Hopefully, I’ve earned five stars from you. You have a great day, and we'll be back with more tomorrow. We'll see. what tomorrow brings us, there's always something. Thanks again, Craig Petersen. Out.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 20, 2018

 

Have you gotten an ad from an attorney while visiting your local chiropractor?  Listen in as Ken, Matt and I discuss what I am calling twenty-first-century ambulance chasing and what it means to you.

Did you hear about the new military branch, the Space Force? Matt, Ken and I discuss that and the Space Mining of Asteroids and what it means for our economy.

Have you ever used one of those DNA collection companies, the ones that tell you where you came from?  If so, you'll be interested to hear Ken, Matt and I discuss the hack that happened to My Heritage and what hacks like this means to the future

Find out more on CraigPeterson.com

---

Related Articles:

Digital Ambulance Chasers? Law Firms Send Ads To Patients’ Phones Inside ERs

New asteroid gold rush ‘could earn everyone on Earth £75 billion’

US: Crypto Could Pose a Problem for Candidates Seeking Security Clearances

Why a DNA data breach is much worse than a credit card leak
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/20/2018

Ambulance Chasing Attorneys Using Geo-Fencing, Space Mining and DNA Data Breaches

Craig Peterson:[00:00:00] Hey everybody, Good Morning. Craig Peterson here. Of course, you might not be listening to this in the morning. I get it, but Good Morning. Such a nice expression, isn't it. I'm glad you're joining me today. And, of course, we're going to be getting into Ken and Matt. Now we went into a little more depth than usual with them because they had some good questions. But we talked about geo-fencing and how lawyers are starting to use that, to direct ads to you. Yes, indeed the ambulance chaser goes 21st century. We'll talk about the Space Force and space mining and how in 2022 NASA's going to start a trend that frankly could destroy the entire world economy. And, a breach of one of these DNA services. This one was bad enough. But what could happen here in the future. All of that and more of course with Ken and Matt and Craig Peterson. Stick around. Here it goes. I really enjoyed it this morning. Hope you do too. Let me know Craig Peterson dot com slash iTunes. Make sure you leave rating. Hopefully I've earned a five-star rating from you and also a comment, Craig Peterson dot com slash iTunes. Here we go.

[00:01:19] Ken and Matt and we have with us, as usual, Craig Peterson, our tech guru, who joins us at 738 every week. Craig, Good morning. 

[00:01:27] Hey good morning. Doing well. How are the eggs.

[00:01:30] I know how the politics going? Actually, got to tell you the eggs are pretty good. That's not bad. Yeah. The issues are a little suspect, but the eggs are good, so you know and what you don't have. 

[00:01:41] Yeah you know, Craig, my day job, I'm an attorney and so I was wondering if there's any way I can get more business other than chasing the ambulances behind them. So, where I how can get in the ambulance itself.

[00:01:56] I love it. What a segue here. How did you know that? Yeah, this is really kind of an interesting article here, and problem. If you have a smartphone you have a device that can be tracked right. We all know that if you have a dumb phone that device can be tracked as can a cell phone of any sort. But the tracking technology that's in cell phones is just astounding because they've got this GPS and the GPS allows you to find out where you are within a meter or two. Kind of depends but that's a lot of resolution. Now our devices have a facility, whether it's in Android, or it's a new iPhone or an IOS device have a facility that's called geo-fencing and Geo-fencing is where you set up an area a geography as you will and you define a kind of a virtual fence around that area. So, one of the uses for that's really nice. And parents love that is that you can set up a GPS fence for your kid’s school. You can have a geo-fence for your kid’s after-school activity, and you can have a different one for the House, and maybe yet another geo-fence for their best friend's house, and then when they are moving between all of these different places when they're going places. The smartphone that they have, is sending information, by the way, doesn't have to be a smartphone you can get little watch-type devices 

[00:03:32] That is what we did for a granddaughter. Those also have a geo-fencing capability and she can make emergency calls to family members, which is really kind of cool. But, what can happen with the geofencer's, is when the kid arrives at school you're notified, when they arrive at home, or the friend's house, wherever you set up the geo-fences. Well, attorneys Ken I think might be smarter than we've given them credit for, as they should, The patients in Philadelphia now are going to start to notice something a little different. Some of the advertisers in this particular case, attorneys have set up geo-fences around clinics. We're talking about emergency rooms, chiropractor's offices, and even pain clinics. So, all of these places have been defined with geo-fences and what's going to start happening, in Philadelphia, is if you show up at one of these places you are going to start seeing ads from attorneys. So, you kind of mentioned the ambulance chaser, Ken, and that's exactly what we're talking about here right now we've got personal injury law firms are going to be using these medical clinics to target people. And then by the way it's not just like its popping up on your phone.

[00:04:55] Hey, have you been injured? It's going to come up as your normal ads stream. So, if you're on there on Facebook, or you're cruising the Web, you're going to start seeing these things, and they don't stop just because you've left the area. They, in fact, will continue for as many, as much, as a few weeks. Now, this is interesting because there was a case about this, down in Mass, and Maura Healey is kind of upset about it. In a direct quote from her saying “that private medical information should not be exploited in this way.” So, she's concerned and prosecutors down in Mass reached a deal last year with an advertising firm that was sending ads from a Christian pregnancy counseling and adoption agency to people who entered a Planned Parenthood clinics. So, the people would cross this digital fence and they'd start getting advertisements that said things like, “You have choices” and “Click here for pregnancy help.” So, she came up with this deal. They agreed to it, the state called it. The Commonwealth called it a little bit unfair and deceptive and it resulted in the banishment of digital advertising. Digital advertising firm from Massachusetts. So, this is a problem. It's going to continue to get worse as more the technology advances. Yes, Ken, you don't actually have to run after the ambulance’s anymore. 

[00:06:28] Oh that's good news. All right. So, I would love that way too. You have the benefit. 

[00:06:36] We're talking to Craig Peterson, our tech guru, who joins us at this time every Wednesday for a look on technology. 

[00:06:42] So Craig, when I join the new United States Space force, yeah, this is because I'm signing up as soon as I'm able to, probably spending a lot of time in space and if I were to, I don't know, encounter an asteroid, would I suddenly become a billionaire.

[00:06:59] Wow, that's a great one. Well, first of all I think you're too tall Matt. I think there are limits on that. So, you might not be able to do it, but yeah, the next big gold rush is, in fact, in space and we've already got a number of companies.

[00:07:20] There's a couple of dozen that I know of that are busy trying to get into space. So, why do you want to get up there, I think maybe Matt your, or your, question really revolves around. Does President Trump have an ulterior motive to this new space force? Right. Am I reading this right? 

[00:07:39] Well I mean, is he looking to make his next few billion.

[00:07:43] Yeah exactly. Maybe that's what's happening, I had not even thought of that. So, here's what's happening right now. We have these asteroids in space and you know that we've sent some satellites while some rockets by right with Rover type devices on them they've landed on asteroids have done a little bit of mining to try and figure out what they are. Well, there are all kinds of precious metals that are fairly easy to mine on asteroids. Boy, there has been a lot of science fiction written about this stuff over the years, but one of the major things that they're looking to mine from space rocks is gold. So, the world's first trillionaire. This is an interesting article came out of the U.K. and you'll see this up on my website. But the world's first trillionaire is not going to come from cryptocurrency or some other clever new APP. It looks like they might become rich from asteroid mining and that's what's really kind of interesting. Goldman Sachs is looking at this. They're saying that's what's really going to happen. And NASA's estimating the total value of asteroids, that are easily reachable from Earth, could be up to 700 quintillion dollars. So, that would mean about a hundred billion dollars for every person on earth. OK. Obviously, that's not going to happen, right. Because if you have an influx of gold, gold is going to become less valuable. The same thing is true for all of these, you know, the valuable commodities that might be out there and those asteroids. So, what we have to look at here as the winner is going to be the first one to get up there, to be able to economically grab those asteroids bring back those minerals, and start selling them. Because once it becomes cheap, the price is going to go down.

[00:09:46] Look at oil, the price of oil, of course, has been a cartel for a long time over in the Middle East where they kind of control the price of oil. But, once we started fracking and it was less expensive for us to get the oil, and the extra oil the extra gas the price per barrel plummeted, it went way down, because now there was more oil. So, when there's more gold or there's other planetary resources that are just floating around out there. So, the whole value's going to drop. So, if you've been investing in gold and they start mining it, it's not going to be worth what it used to be worth. But this predicted mineral wealth is just so vast, it could destroy our world’s economy. So, that's a very, very, big deal. We've got NASA back, in 2022, is going to be launching a new mission. They’re going to a metal-rich asteroid that's estimated to be worth, this one asteroid, about twelve thousand quadrillion dollars. That one asteroid. So, boy oh boy. Talking about an economic collapse that just you could make some big bucks up there in space. But ultimately, this could really change everything here on Earth and might even drive up the value of these crypto-currencies. 

[00:11:14] I'd like to see Matt go to space. Sometimes, I'm sure you would it might improve our chemistry, yeah exactly that. 

[00:11:19] We are with Craig Peterson, our tech guru, who joins us on Wednesdays at 730. So, we've heard a lot about hacking and credit card hacking. DNA is kind of a definition My Heritage had some hackers breached their accounts and didn't give me DNA. But is that us. I mean, is that a serious breach something that we should be worried about.

[00:11:43] Yeah, well in this case right now with My Heritage it was passwords usernames and they were basically encrypted. So, not a whole lot of trouble there but it brings up the concern about our DNA being stolen getting our DNA data back for ransom, in fact, that's already happened once, which is just absolutely amazing. 

[00:12:08] We had one Indiana hospital that paid 55 Grand to hackers so that they would not release that, so, it was being held ransom. So, we've got to be very careful here. 

[00:12:18] The data could be sold, on the down low, and could be monetized to  insurance companies could end up out on the web and you could in the future apply for a job that you're denied, not realizing that the company denied you because the deep dark data somewhere in the corporate system knew about your DNA and knew about your proclivity for heavy drinking or maybe some disease. And so, they didn't hire you. This is scary. This is a longer term, we don't have it happening yet, but we're freely giving our DNA, everywhere. Guess what. Those passwords that My Heritage lost, you can change your passwords. You cannot change your DNA. And in the future, this could be a very big deal.

[00:13:06] All right, Craig Peterson, our tech guru, who joins us every Wednesday at this time to give us an eye on the world of technology. Thanks so much for joining us Craig, we really appreciate it. We'll talk again next week.

[00:13:15] Hey gentlemen take care. Bye-Bye.Thanks.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 19, 2018

Apple iPhone are now going to be harder to break into.  Craig and Jim discuss a new change to Apple security that will disable the feature that companys like Cellebrite and Greyshift were exploiting making it harder for anyone to break-in to your iPhone.

Find out more on CraigPeterson.com

Related Articles:

---

Apple Is Testing a Feature That Could Kill Police iPhone Unlockers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/019/2018

Police iPhone unlockers are going to be blocked

Craig Peterson:[00:00:00] Hey, Good Morning everybody. Craig Peterson here. I had a rather long discussion this morning, actually, I guess more of a lecture, I need to stop doing that a lot. Jim Polito and on these other morning show drive hosts kind of say their own thing. But I had a discussion this morning with the Jim about Apple. I don't know if you know it or not, but I found something in the latest beta release of Apple's iOS. And in fact, in the prior one that's going to have a huge impact on law enforcement frankly and on businesses. In fact, there's a bit of a surprise here for most people. So, stick around here we go. We've got about oh say eight minutes with Jim starting right now. Here he is. 

[00:00:52] Our good friend Craig Peterson the tech talk guru and at the end of this segment we're going to tell you how you can get more from Craig without getting annoyed. But joining us now, Apple is testing a new feature 

[00:01:06] that could kill police iPhone unlocker's. What's an iPhone unlocker or what did the police use for that. Well Craig Peterson. We'll explain. Good morning sir. What is an iPhone. Police iPhone unlocker. 

[00:01:24] Well bottom line that is the form of smartphones we have some security built into them. And we like that we want that because what that means is we have some privacy as far back as the Clinton administration the federal government was trying to put some technology, some backdoors into the encrypted phones that were available to them and they were trying to do that, so they could listen in on any conversation that they could get their hands on. Today, it's not just the conversation. You know we tax people. Look at look at what's happening right now with the FBI with Strzok and Page and those types of messages can be recovered because they are kept by the phone companies. Right. So, the FBI and the local police department they'd love to get their hands on your communications device, because you're probably using something other than texting. So, for instance I use iMessage on an iPhone and that's not encrypted end to end Jim. And what that means is no one can intercept it. Well they could potentially intercept. But it's almost impossible to decrypt. So, it just makes it so expensive and difficult to decrypt that message that that they don't bother. 

[00:02:51] Now when you're talking about criminal cases like what happened in San Bernardino with the murders in the office. Right. They wanted to get their hands not only on the iPhone, but on the data in the iPhone. They wanted to see is anybody else out there colluding with these people. And what that might mean is there might be some other people that should be investigated, maybe arrested and maybe they can stop another crime. So, when you lock your iPhone, when your iPhone requires you to give it a thumbprint or passcode or look at your face. Now you are given access to that iPhone and the police have limited ability to get into your iPhone to see what might be on there. Right. There is there is a company that has some tech, Jim in them and that's called an iPhone on Walker. The companies like Cellabrite are Greyshift. They make devices that they can hook an iPhone up to and unlock it as though you had either given your fingerprint or your passcode or your face to unlock it so they can unlock it right. That's about 

[00:04:11] Son OF A GUN. 

[00:04:12] Yeah it cost about fifteen hundred bucks is what these places charge to unlock an iPhone. You have to, frequently, a police department will ship the iPhone over to Israel where this company is located. And then the company will go ahead and pull everything off of the iPhone and encrypt it and send it back to the police department. But what what's happening right now is interesting Jim because the way they unlock the iPhone is they fog in the software. It's like a loophole right think of a loophole with the law and there's a lot of discussion about that. Now in the news with the loophole of the of the illegal immigrants coming up here to the U.S. bring in a young child and getting you know preferential treatment because of that. So, think of it as sort of a loophole that there are bugs in the iPhone that allow them to get in but there's also some features. So, for instance your iPhone, let's say your iPhone isn't working quite right, You get to the appointment for the genius bar, you're go in. 

[00:05:21] Yeah. I hate that name.

[00:05:25] And you talk to the geniuses behind the Genius Bar and they'll plug your iPhone in. And there are special facilities on that iPhone connector that allow them to get into your iPhone to reset it to do some fishing around to see what's going on with your iPhone. And so, what's happening is these companies like, Cellebrite and Greyshift, they've been using that diagnostic port on your iPhone to break into apps and yeah that's where the problem's been coming from. And so what Apple has started doing here and has been in the beta releases is they are basically going to close that door and they're going to make it so that if the iPhone has not been unlocked within the last hour that port will not come on it'll be unusable.

[00:06:23] That's good. That's pretty good. 

[00:06:26] Yeah. So, the question is you know bottom line do you want to head right. How far should the police be able to go with a warrant. But there's one other angle to this that most people haven't talked about. That's a little surprising and that is how about you are an employer and you are providing an iPhones or iPads to your employees and you know you're talking about a thousand dollar device, plus the company information that might be on that device because businesses also use the iPhone unlockers and unlocker companies so, that they can now front employee leaves and just you know scramble their passcode and takes off and refuses to give it to them. So, they can then take, that phone they can ship it to one of these companies and get it on lock get all of that data off that and get the iPhone back, so they can reuse it. So, this fix that Apple is going to be making to the iPhone or at least they're planning on releasing this soon. That fix will break the law enforcement access to the data on the iPhone. It'll break employer access to data on the iPhone and iPad. 

[00:07:41] And the IOS device. Yeah. And I I don't know do you go back to just good old regular policing. How would you capture Strzok and Page those two FBI employees? How would you catch them, if they had been using something like Signal, which is designed to communicate securely there's no records kept of it and the messages just disappear. And if you can't get into their devices how do you make that work. So, this is going to be a big problem for law enforcement coming forward. And I've talked to FBI special agents a little bit about this and they're concerned as well. And it's not just that it makes their job easier it makes their job possible because Apple is doing such a good job with his security on the phones. And we're just talking about iPhone's, because of the Android devices most of them can be broken into easily, frankly mainly because people just aren't updating their Android devices it's just too difficult to do so huge, huge, discussions all this when this software comes out in a few weeks. 

[00:08:55] All right so we know this. There's more information on this, and this is just an example of the stuff that you get from Craig Peterson for free. There's no obligation he doesn't try to sell you anything. He doesn't hack you and he provides this information. He sends me a weekly breakdown of all the big tech stories. So, if you want to get one you can get it. There's no gimmick here is just free. 

[00:09:24] You text my name Jim to this number 8 5 5 3 8 5 55 63 that's 8 5 5 3 8 5 55 53 with any question that you might have or just Jim I'll keep you up to date and you'll get this information, standard data and tax rates apply, of course. 

[00:09:46] But it's a great service to have and if there's ever a big international hack or some information that you need right away he sends it to you and he sends it to you without all the hype. Craig, thank you so much, buddy we'll talk to you next week. 

[00:10:01] Hey thanks Jim. Take care. 

[00:10:03] Already Bye Bye, everybody.

[00:10:05] Well that's it for today. Hopefully you're going to have a great day and a lot to remember there. Don't forget to sign up if you haven't already to get my weekly show notes. I got some really cool stuff coming so keep an ear out for that too. Take care. Thanks again. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 18, 2018

This morning Craig and Jack had a very short discussion about the Tesla Car that caught fire and the safety of litium batteries.

----

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/19/2018

Tesla Car Fire and Lithium Ion Battery Safety

Transcript:

[00:00:00] Hi guys. Craig Peterson here, this morning I talked a little bit about the Tesla, the guest who was on the radio before me didn't quite get it right. I guess what else is new, right. Not understanding some of the technology, and there's one thing I forgot to mention that I will add to the end of this recording. So here we go with Jack Heath.

[00:00:26] Great Transition To Craig Peterson our tech talk guy his show airs on the weekends Tech Talk with Craig Peterson. You know I thought of you, because you and I have talked a little about a good light Ford f 150 and all the people that talk about gas and oil and all that stuff is the problem. These batteries tell you and how they're discarded probably are bigger, bigger, threat to the environment than gas and oil. 

[00:00:49] Good morning. You're absolutely right about that when we're talking about the Tesla, we're talking about a car that relies entirely on batteries. It is using batteries that, frankly, are not only dangerous when they catch on fire, but if you're in a car accident. Do you remember the issues that we've seen in phones, as well as these cars, is that those particular batteries, they tend to have a lot of power stored in them, so they can deliver the power very quickly, and that means they're going to heat up a lot, which is a real problem, frankly. When you mention like the F 150 Ford, compared to something like a Prius even the Prius is only good for about a hundred thousand miles before they recommend you replace the batteries that are in there. 

[00:01:39] The Tesla has the same sort of a problem and creating these batteries is very, very, dangerous. 

[00:01:46] There are all kinds of chemical processes, so you're right. When you're talking about what is greener, today anyways, the greenest cars out there, are the cars or trucks that will last 200- 300 thousand miles and that burns gas and they tend to also be the safest still. Remember, I spent 10 years in an emergency medical services responding to the scene of one of these vehicles, can be very dangerous for the occupants and the rescuers, especially if you have to cut into the car.

[00:02:23] Interesting. Great stuff. Craig Peterson, check him out. Craig Peterson with an O.N. on Peterson dot com. Thanks Craig. 

[00:02:30] Ok, so here's the part I did not mention, and that's what happens when they try and cram me in to a very short segment this morning. That's one of the shortest I've been on, it was only about a two-minute hit on the radio. Just because there's a bunch of stations, Jack doesn't mean I shouldn't get more time, anyways. Here's what I didn't mention, and we were talking about Tesla. We're talking about the safety of the vehicles and in reality, the crash tests have shown the Tesla to be one of the safest cars out there. In fact, it even broke some of the testing equipment they had to change the nature of the test so that they could really kind of score Tesla at all, frankly. So, it's not that Tesla's aren't safe because they are, frankly, they tend to be very safe. We were talking specifically about the batteries, and the safety of the batteries. Now, you might remember if you listen to my radio show on the weekends or maybe on the podcast, you might remember that the guy that invented the lithium ion batteries out of the University of Texas. He's, what is he now in his late in the 70’s, I think, he might even be in his 80’s. He's come up with a new type of battery, a lithium glass battery that can be charged, like that. You know a matter of a couple of minutes, and that does not have these discharge problems that the lithium ion batteries have, and that frankly is where all of these problems are stemming from, is the rapid discharge. Then things heat up they catch on fire and then you've got a lithium fire which could be just totally, totally, nasty. 

[00:04:08] So, hopefully that technology progression progresses along, and of course I'll keep everybody up to date on that as well. And we've got a few other things brewing that we're going to be announcing, fairly soon, so keep an eye out some more insider stuff. We're almost done with that site. We have some people we've given away free insider memberships to. And that gives them access to some of the special reports and some of the other things that we are doing here on the radio show. And then we're putting together some, basically a kind of a threat matrix, right. Some threat and analysis when it comes to security, for people who are in business. People in business who are responsible for the security, and even a little bit of training, which is now required by law and regulation. Depending on the industry you're in, you may have a huge requirement. If you’re in a normal business, you realize you actually do have a requirement for security training for your people. So, we're going to be doing some of that as well. So, keep an eye out for that, and have a great day we'll be back with you tomorrow. Bye-Bye.

 

---

Related Articles:

Tesla goes up in Flames in California

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at: 

www.twitter.com/craigpeterson 

For questions, call or text:

855-385-5553

 

Jun 16, 2018

 Problems with Mac OS if you're a Mac user. Craig explains an eleven-year-long vulnerability and why it has not been fixed.

DNA data breaches.  Craig discusses why it is such a big deal and why we have to be worried about it.

Cryptocurrency is in the news again.  Craig tells you why this blows his mind.

Police can unlock iPhones. (Well they brute force attack it -- so if you have a 15 number password it will take them over 200 years)

Hey, you heard the police can unlock iPhone's right. Well looks like there's a new feature that might stop them.

Also, ambulance chasers they've been around a long time. Well, we're going to talk about a new type a digital ambulance chasers.

Do you drive a BMW car? They've been found to have more than a dozen security flaws.

Craig is putting up a new membership site (Yes, it is free you just have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/16/2018

Apple Macintosh 11-year-old security hole and Apple could kill police iPhone unlockers.

Craig Peterson:[00:00:00] Hi everybody.

[00:00:01] Craig Peterson here. Of course we're going to be talking about technology its impact on us what we'll be talking about security. We've got some great information here including some problems with Mac OS if you're a Mac user. This is an 11 year long vulnerability that just hasn't been fixed yet. We're going to talk about DNA data breaches I don't know if you've heard of these before but it's becoming a big thing and it's something we need to think about. We've got a cryptocurrency story this week that just blows my mind. Hey you heard the police can unlock iPhone's right. Well looks like there's a new feature that might stop that an ambulance chasers they've been around a long time. Well we're going to talk about a new type a digital ambulance chasers and BMW cars. They've been found to have more than a dozen security flaws. 

[00:00:54] You know there's probably a lot more. Don't worry. Here we go. You're listening to Craig Peterson on the air now for going on 20 years. We've got tens of millions of podcasts downloads and hopefully we'll be able to give you a couple of things today that not only educate you, but I think you'll find surprising. So here we go. 

[00:01:17] Well first off, we're going to talk about this hack. This is a problem that is only in Mac OS. Now we talk a lot about problems that only exist in the Windows world of course. The Android world which has been a real cesspool when it comes to security breaches and the main reason for that as we've discussed before is that people are not updating their Android devices and many times that's because you just can't update the android device, right. You buy them because they're cheap. And even if there expensive there are thousands of variations of Android because of the device drivers they're all using different components and sometimes the exact same model phone from the exact same manufacturer will have different versions of hardware in them or even completely different hardware. So, it's really difficult for these companies that are manufacturing the phones and the carriers that are further modifying the phones to keep everything up to date. Think about that, if you're Google, and you are making an operating system and you’re selling it and you’re getting blamed for all of these Android problems and in reality, the problem is there are a bunch of people putting their fingers into your code messing around with it in order to make it compatible for their customers right. So, think about that for a sec you’ve got the android device so you are shipping it now to some door operating systems are you shipping now to some device maker that’s going to take your operating system and put it on their device well the devices all vary in the CPU in the speed that think about the displays they’re all different. 

[00:03:01] The way you touch them to interact is actually different. Those are all different device drivers. You also have, of course, the cellular data modem that might be in there to get data you’ve got the Wi-Fi chipsets. There’s a whole ton of pieces and they’re all buying them from more or less the same manufacturers depending on what it is but they’re having to modify it. So now your Google operating system your Android is being modified by the device manufacturer who now is going to ship it off to your carrier. So you have a contract with who with Verizon with T-Mobile, Sprint whoever it might be. So, they’re going to want to get their fingers into it too. They’ll do a few little things they might be using specific band frequencies, for instance, for your internet. And in fact, that’s true for Wi-Fi as well because depending on where you are in the world there are different frequencies sets different bands for the Wi-Fi.

[00:03:57] So now you’ve got the manufacturer, who has modified it, you've now got the ISP or the phone provider the carrier who's modifying that device and shipping it out. Many times, You'll also find that the people who make the component hardware for the device will also be modifying that device before they ship it out. So, the list kind of goes on and on. The people who have the fingers in it. So, now your Google, you found a security problem. Now what are you going to do about that security problem. How are you going to get your code out there, while you're going to make effects or patch and you're going to send it to the device manufacturer. Now the device manufacturer says you know we haven't sold that phone and years. OK. So, we've got other things we have to do. We have our people now working on the next release of the next greatest phone. So, they're not going to make an update for your phone. And the same thing with the component manufacturers they're not going to have an update for some old chip that they manufactured years ago. And even if it's a fairly recent chip and they do provide an update, it's got to go back to the manufacturer who now has to integrate it and then distribute the changes, right. And then it has to go back to the carrier who sold you the device who no longer has a relationship with you potentially right you might switch carriers. How are they going to get their changes in how they're going to get out to you? So, it's very, very, difficult in some cases. Google can send out patches directly to you. You can get them. You know you've got to Google Play store and you can get various types of updates and stuff from there directly from Google. But it's a real, big problem and that's one of the biggest problems we have right now in security. Certainly, the biggest problem in mobile security now. Apple has been known to be rather safe and secure because it was designed that way from the start. 

[00:05:55] Remember the whole Internet thing started in government and in academia and the big guy out there in academia who had a lot of operating system technology was AT&T and they had something called Unix and Unix was designed to be able to run on all of the different hardware AT&T had and that's a lot different hardware. Think about the big old phone companies. They had old machines new machines they had machines that were huge main data processors they had other machines that were teeny tiny sitting right by a Pole pack then couldn't really put one of them on a pole very easily, but you know you could it happened.

[00:06:35] And so they had this operating system called Unix that worked really well. While UC Berkeley University of California Berkeley took some of those concepts, licensed some of that software the version 7 Unix, back in the day, and they ran with it and they started adding in more ability to have networking. Now think about this for a minute, in your school system our university system. You also have the same types of problems AT&T has had plus a few more because you also have a lot of pieces of equipment that you have to make and modify maintain

[00:07:13] Run different software on and at the same time. Now you have a new problem which is you have all these students that want to hack in and change their grades, right and do all of the stuff you might not want them to do. 

[00:07:26] So, it becomes a little bit of a problem. So, guess what. AT&T and UC Berkeley particularly Berkeley they built in a lot of security. They designed the Internet, basically. And because of that Internet implementation let's put it that way they didn't really design it, but they certainly implemented it but because of that implementation and its security you now had an operating system called Unix back in the day that was very secure it was ready to go. And then you had a Torval, come along and he went there and made his own Unix lookalike and called it Linux and it doesn't have all of the same safety features. But it has much of the same thinking that was there in the original Unix’s of the world. So, fast forward to Apple, Apple had its operating system that was frankly kind of a toy it ran on some of the Mac’s number of those little boxy ones way back when. But it wasn't a great operating system and it wasn't something that could really build on to a lot of good things with it had its advantages. I can already hear you. Here come the text messages right. You know already here you're talking about it but in reality, they needed something a lot better.

[00:08:42] And so that's what they did. They took Unix.

[00:08:45] In fact it looks like what they did is it took free BSD looking down on the kernel and they were able to put their windowing interface on top of it. And you know there's times actually to a couple of other companies. Steve Jobs had some involvement with but. We're trying to make this simple right. This is not a history of Apple computers. What I'm trying to explain why they are more secure than Windows and so they took all of this wonderful code that was designed to be secure. They put a window in interface on it and out they go. They had a very good very productive operating system. Well one of the things that they did to make it more secure and they added on was that the applications became signed applications. So, a developer would sign an application and you knew now that the developer had basically approved it said it was good and Apple would sign them so that you knew. Yes, indeed this was reviewed by Apple and it was something you should pay attention to. You don't have to worry about any more of the machine automatically just accept the software, and if there are problems of course the machine will pop up a little warning saying well the software is not signed I don't recognize it and unless you change some settings it will not lead to install that software. While there is a bit of a problem here because Apple, remember they changed their processors. Now they're using Intel processors. They may actually be switching processors again within the next year or two, but they changed to Intel processors from the power PC stuff and I love PowerPC stuff. 

[00:10:26] It was really, really, good but they changed their processors, so they had to have these universal wineries so developers and Apple themselves or write software that would run on the Old Power PC architecture or it would run on the new Intel architecture. How could it do that? Well, that actually kept both binary as both programs in one program. So, the operating system would start to run the program it would launch a program it would look at it and say Oh, okay I'm a PowerPC I am going around the PowerPC code or Intel so I'm going around the Intel code and that makes sense to you. It was actually a great little idea and it worked really well. The problem that has surfaced now is that for the last 11 years since they put this whole thing in place we've had a we've had a real problem and that problem is that Apple apparently was only checking the very first binary for a signature. Isn't that a problem. It sounds like a problem to you. So, all a hacker had to do was put in a binary into you know into this little package and that binary just had to contain the one signed piece of code. That's all it needed was one signed piece of code and off it went to and the rest of the code could actually be nasty, nasty, nasty, so keep an eye out. Don't install software that is that you don't you don't know where exactly where it came from because it could end up biting you and in a very big way the signature check bypasses. These are these are very big deal so watch out for that 

[00:12:16] This next one is very controversial frankly. What should you be able to do, if you were the police or the FBI, should you be able to monitor someone's private communications. Well we know the Constitution lets us be safe right to keep our private papers and other things. And I think that all makes a whole lot of sense. But when we're talking about the digital world should the government have a back door. Now this debate has raged on for a very, very, long time. I mean crazy, long time. Certainly, my entire career in computers and technology with encryption. So, the police right now have a way to unlock iPhones and not all of the police departments have this. But there's some technology that they can license, and they can buy a little box, they can ship an iPhone overseas and for as little as 15 hundred bucks they can get the contents of the iPhone. And I can see absolutely see how on in some cases on occasion they could catch criminals that way they could stop something really nasty like a terrorist attack right. And you can probably see the same sorts of things. Well, this is an interesting problem because you have civil libertarians on one side saying no they should not have access to them. 

[00:13:46] But, they kind of do, and the way they have access to your iPhone right now is because of a bug, if you will, Right. A loophole, maybe is a better word, and it’s in the iPhone hardware and software that all iPhone’s have. Basically, it’s a USB connector on them, and that connector, when connected up, can be used to start a diagnostic session with the phone. That’s what they use at the Genius Bar, in order to work on your phone to fix it, Right. They use that little port whether it's the old 30-pin or whether it's the brand-new connectors or the new ones apparently next year are going to be USB-C based. So, they use that in order to get into your phone and check it out and fix things. Well there is a problem here. There is a company called Grayshift, and you know they've been out there. They have a product called Greykey and there is an Israeli firm called Cellebrite. They've been using that port on your iPhone in order to break into the iPhone. Now back in the day it was pretty easy to break into nowadays it's really nowhere near as easy. So, what are they going to do.

[00:15:04] Well, Apple in its iOS beta releases since 11.3 has had a little feature that's built into it and that feature is that when you connected to a USB accessory the phone has to have been unlocked within the last 60 minutes. So, if you go into the Apple store for instance and they want to run some diagnostics they can't just take over your phone anymore. You now have to log into your phone and once you're on your phone then they can plug into that port right now, it doesn't have to be unlocked at the time you give it to, them but it will have to have been unlocked within the last hour. Now that means that this is probably going to break GrayShift's products that are being used by police departments, worldwide, in order to hack into your iPhone. You know is that a bad thing or is that a good thing. You know I work on security and I've worked with the FBI on hacking and I run the FBI’s webinars to keep the Infragard people up to date. Right. The Infragard webinars. So, how does this impact them while I think it might impact them in a very, very, big way. This might kill those products, entirely, unless the company comes out with products that are literally there in the police car or are there in the FBI vehicle that allows them to grab the phone from the bad guy and hope for the suspect let's say, and hope that that phone has been unlocked within the last hour and then they're off and running. 

[00:16:51] So, this one-hour timeline a major change from earlier tests where the time limit was a one-week period. 

[00:16:59] But it is significant because Grayshift, had been advising its customers to simply make sure they unlock the iPhone soon after obtaining it. And that's according to some documents that motherboard was reporting on earlier this year. So, it's easy to do within a one- week time limit harder to do with just an hour. This also means to you, that if your phone gets messed up you're not going to have as many options when it comes to having the Apple guys or your tech people go ahead and help fix your phone, Right. So, don't lose that passcode, right. Important safety to remember. As I've been talking I've had some text messages come in. People are wondering here IOS not IOS users but Mac users OK. They're wondering about that 11-year history. 

[00:17:52] So just to make it clear for those who might have missed a little bit of it and I'm going to delve into it just slightly more. Right now.

[00:18:00] There are the vulnerability is primarily at third party software here that we're talking about. There are at least eight security tools that are known to have this vulnerability and it does not affect IOS. This is only your macs and one of the tools that does affect is one that I use, every day is called Little Snitch firewall and it's a great piece of software, but it also gets fooled. So, this universal file is also known as a FAT problem does exist, but it really only exists on the Apple Macintosh computers. And I'm sure it'll be fixed pretty soon. All of these developers now are aware of the problem and they're going to be fixing it, frankly. This next one here. This is kind of, I'm kind of this is this isn't a weird category I guess as a way to put this. We've had ambulance chasers probably since the days of lawyers, right. Since the very first lawyer anyone ever had these guys and gals that are out there looking for people who have been injured and then trying to help protect their rights and help them claim some money against whoever might have wronged them. All right, that makes sense I can see that. Well this is a little different because now you have a smartphone with you when you go online. That smartphone is showing new advertisements right. And your smartphone also has built into it a GPS. So, your smartphone knows where it is. How many of you can figure out where I'm going with all of this. 

[00:19:47] OK, well many people who are in emergency rooms or chiropractor's offices or pain clinics in the Philadelphia area or their area excuse me maybe start noticing their phones. The kind of messages that are directed at you because you're an emergency room or to pain clinic, OK. You're only getting fed the ad because somebody knows that you are in an emergency room. So, it's kind of like an attorney putting a digital kiosk inside of an emergency room when you get on the phone you're going to start seeing ads from Attorneys. So, this is kind of interesting. It's grabbing what's known as a phone I.D. from Wi-Fi cell data or an app using GPS. Yes, and the ads can show up for more than a month and on multiple of your devices, as well. Now the Massachusetts Attorney General, Maura Healey, said here's a quote from her “private medical information should not be exploited in this way especially when it's gathered secretly without a consumer's knowledge without consent as well”. OK so, Healey's office the first one in the country to go after geo-fencing technology that's being used to catch people while they are seeking care. So, this is going to be really kind of interesting, Mass also reached a deal last year with a Massachusetts based digital advertising firm that was sending advertisements from a Christian pregnancy counseling and adoption agency to people who entered Planned Parenthood clinics. So, when patients go to the clinics they cross a digital fence as these GPS fences you've heard of them, I use them all the time myself personally to remind me to pick up stuff when I’m at store and they'll soon get an advertisement such as you have choices click here for pregnancy help. 

[00:21:57] So, interesting now in Mass they're saying that those ads violate their consumer protection laws. Other states probably don't have the same thing. OK, we can go for a real quick roundup here now. Couple of things I want to get to before the show ends. We've all heard about AI or artificial intelligence and what it's going to be doing. Well MIT fed data from Reddit which is an online bulletin board into an artificial intelligence and that this is just kind of nuts. You know if you have ever seen EXMachina, It is a great movie but our robot even very, very, interesting they ended up calling this AI Norman. As Norman Bates. Because all he could think of was murder, OK. It's crazy they fed it those inkblots right. The Raw Shark Texts and it was just, murder, murder, murder. Kind of crazy cryptocurrency trading app, Taylor, says all other funds have been stolen in a cyber attack. If you didn't need yet another reason not to get involved with these cryptocurrencies. And speaking of that Cayman Island startup has just raised four billion dollars without any product. And what were they raising it with. You guessed it this is they have a blockchain platforms called block 1. 

[00:23:32] It doesn't have a product, Live yet. You should see a picture of this guy. I'll have to make sure it's on my website. But, he looks like he's 10 years old that was running this thing. It's not a great time to be investing. In fact, most of the blockchain currencies are really losing a lot of their value. BMW car computer systems have been found to contain at least 14 separate flaws. This is according to a cybersecurity lab out of China. They allowed hackers take at least partial control of the affected vehicles, and BMW is saying, that that does not allow them to control any of the driving systems in the car. So, that's probably good news. And we had a DNA data breach. This is crazy. The DNA testing service, My Heritage revealed that hackers had breached 92 million, of its accounts. Hard to say exactly what they got, But this is bad news because that data is there forever, and it is not like a password that you can change your DNA is your DNA. Have a lot more podcasting make sure you check that out online. You can find it all at Craig Peterson dot com SUBSCRIBE LEAVE A COMMENT Craig Peterson dot com slash iTunes. I've been doing pretty much daily podcasts. Well until next week we'll see you in the online space I'll make sure I send out any alerts if there are known major problems during the week. Take care and I’ll Talk to you, later, Bye, Bye.

---

Related articles:

For almost 11 years, hackers could easily bypass 3rd-party macOS signature checks

No one is updating their Android devices, new data shows

Apple Is Testing a Feature That Could Kill Police iPhone Unlockers

Digital Ambulance Chasers? Law Firms Send Ads To Patients’ Phones Inside ERs

Cryptocurrency trading app Taylor says all funds have been stolen in a cyber attack.

MIT fed an AI data from Reddit, and now it only thinks about murder

A blockchain start-up just raised $4 billion without a live product

BMW cars found to contain more than a dozen flaws

Why a DNA data breach is much worse than a credit card leak

New asteroid gold rush ‘could earn everyone on Earth £75 billion’

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 13, 2018

A larger problem that first thought -- Yes its the Routers.  Craig goes through with Ken and Matt how big this router problem really is, why people are not taking it seriously and why they should, and what to do. 

Maine Elections were held yesterday.  Craig, Ken and Matt discuss technology and voting and hacking. 

USBs are not necessarily safe.  Craig talks with Ken and Matt about the different tactics that are being used to infect your computer. 

Find out more on CraigPeterson.com

Related Articles:

That Russian malware that infected over 500,000 devices is even worse than we thought

IBM bans the use of removable storage by employees

The FBI Router Warning - What To Do

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/13/2018

Routers, Hacking, Electronic Voting, & USB Drives

 

[00:00:00] All things technology, tech guru, Craig Peterson is on right now on the WGAN Morning News With Ken and Matt.

[00:00:17] All right we're back again at 738 on the WGAN Morning News With Ken and Matt, Craig Peterson is with us as usual at 738 on Wednesday and Craig, How are you this morning Hey, Doing good man How are you guys doing great and welcome back from North Korea. 

[00:00:31] Craig was very successful you had. I want to congratulate you on that. And by the way thanks by the way. And while you were there did you have any discussions with Vladimir Putin about malware or what's going on with Malware now.

[00:00:45] This is this is absolutely crazy. First of all, you know President Trump and I had a great time, we had a little bit of a beer summit afterward but they didn't televise that. So, you guys might not be aware of it. But here's the issue we're having right now with the latest information all this is coming from the FBI working with Cisco Talos and the issue is that this whole malware thing on routers is worse than we thought it was initially. In fact, it's a whole lot worse. They're able to not only just basically take over your routers and look for information but they've developed a very powerful platform that they've been using to capture all kinds of banking information personal information. OK so we knew about that. But they can go to the next step. Now if you visit your site and they remove money from your account as you go through a pink site the next time it's capable of actually modifying the bank site's pages to show your correct balance before they stole all the money from you. So, this is going on and on. It's getting worse and worse and we're finding out more as time goes on. Now the thing to do. You know the FBI came out with a statement about rebooting your routers and now, it's gone a little further. 

[00:02:07] And what we really need to make sure happens, if you have some of these lower-end routers that are used in homes and are used in small businesses you need to do factory resets on these things and you need to upgrade the firmware that's in them because the bottom line you could be infected in a power cycle is not necessarily going to clean things up for you. Now if you have a router from for instance your cable company or one of these other providers Internet providers you're probably OK. We're talking about the types of routers that you might get if you go to a local Staples store or Wal-Mart etc. You might have ordered online. And so, people are kind of scrambling trying to figure it out. I'm surprised many people haven't done anything about this because it's a very real threat. We're talking about more than half a million devices that are being compromised. And, it's your personal information that your financial information. I think we have to be very careful of that. And you know that ties in. Also, we were talking about Russians and the hacking and the accusations about Russian collusion ties into yesterday. Of course yesterday we had a primary here in the state and there we were voting and we're using electronic voting machines and I know Matt you and Ken were talking about having a box sitting there that you could shove your ballot, right. 

[00:03:31] You know, yeah I'll take that 1920’s technology. No question, but having our paper ballot is ultimately very important because not just the Russians but many other entities I'd say are trying to get into some of our voting systems. We had an examination of what happened during the last presidential cycle here in 2016. And they found that Connecticut was the only state here in New England that actually had attacks against it that we know about. So being able to fill out a piece of a paper ticket into the machine have that machine count the vote is a very reasonable thing to do because that Matt can be audited you can spot audit and make sure that the counts pretty much match up right. I don't think anything is perfect don't think any person's perfect. But in this day and age where we've got Russia we've got China coming after us. I pick up a new client that had Chinese backdoors in their systems, this is a small military subcontractor. In this day and age, we've got to be cautious so I'm not so sure having that box there is the worst thing that could happen.

[00:04:45] Craig Peterson our tech guru joins us on Wednesdays at this time, just talking about the world of technology.

[00:04:51] Craig, this isn't the stuff you sent us every week, but I had to ask you about this Korean summit happens and of course journalists go to cover it because it is a historic occasion and the press kit for the for the people who went to this thing included a you know it's hot. It's hot in Singapore so they included a little USB fan and this USB fan you know you could plug into your computer and then it would use the electricity inside of it and activate the fan and it keeps it cool. I was sitting there typing away on your you know your journalistic laptop there.

[00:05:23] How stupid, how stupid, are reporters to plug that into their computer 

[00:05:26] I mean seriously, up here at a North Korean summit is a USB thing you can plug into your computer. Go ahead. It's fine. Don't worry about it. 

[00:05:36] Exactly. It is in this day and age it's absolutely crazy. And here's why you are Matt. You know this obviously but when you're plugging something into that USB Port you may just be using the power because you can. You can design things just actually only pull power leads to data leads in the USB connector are used. But if you plug something into your computer there's a very real possibility that something bad could happen. Now it can be anything from there. Our USB drives that are designed to destroy your computer physically, like to getting smoke to come out. OK. Be careful too when you're at an airport for instance or you at a coffee shop and you want to plug in your phone to that USB charger that's sitting there. Because again many of those have been hacked. So, you can plug it in thinking you get a great charge and in fact it is hacking your computer it's downloading malware there are all kinds of things that can be done. So yes, when in Singapore China or certainly North Korea they'll plug anything be into your devices. IBM just announced about two weeks ago that they are banning all removable devices from any of the computers that any of their employees have or use. So that's everything. So, think about that when you are thinking about the dangers of using a USP drive you don't know about. And we just had yet another case, Matt, where you must be drives who were shipped from the manufacturer in China and contained a virus right on them.

[00:07:19] We are don't know Craig Peterson, our tech guru by the way you can get a quick response to a company you want and get all of his great information. You know I always use Firefox and I changed Chrome because I think my daughter told me to and I hate it. I'm not sure I remember exactly why I hated it, but I got rid of it and went back to Firefox. Was there a preference for one over the other one?

[00:07:44] Yeah. Here's the problem that we're facing. It's a bit of a dilemma. First of all, if you're using a Microsoft product Windows product you definitely don't use an explorer anymore. There are a number of browsers that are certainly better, but the features that are present in websites, for instance, are available typically in chrome. Chrome has all these wonderful plugins you can put on it to do different things, in fact, it can be kind of an operating system in another cell. So, a lot of us have moved towards Chrome as fast. It was efficient, but the problem was chrome, of course, is the Google really is tracking pretty much everything. So, there is a little bit of a compromise and we're talking about Chrome there's a browser called Epic's BP. I see an epic version of Chrome that was taken by some guys over in India and had all of the tracking code removed from it. For the normal person, however, Firefox is presenting now a really good option for you so using Firefox first of all they've completely redesigned it. It is designed with security in mind security first design in fact and it is now fasters and chrome is which takes away that excuse and there are again many plugins available for it. So, I've taken to using more and more. I have Firefox in fact even on my iPhone and I have it on my iPad as well. It's a really great option for people. 

[00:09:21] All right Craig Peterson, our tech guru joins us every Wednesday this time to give us an eye on technology. CRAIG, We've, got a lot of election stuffed breakdowns we're going to go now. We will talk again next week sir.

[00:09:31] All right take care guys. By the way, I have a list of the bad routers that are going to be very hackable up on my Web site as well. Craig Peterson dot com and you can go in there you can look at the list. I've got instructions for how to reset and restore to factory restores on the routers etc.. All of that right there on my Web site.

[00:09:52] Awesome Thanks, Craig.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

 

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

 

For questions, call or text:

855-385-5553

Jun 12, 2018

5G is it Dangerous?  Craig and Jim discuss 5G and what it means and the differences in Radiation types.

More Bad News on Routers.  Craig tells Jim that this router problem may be even bigger than originally thought.

Find out more on CraigPeterson.com

Related Articles:

5G Wireless Service Is Coming, And So Are Health Concerns Over The Towers That Support It

That Russian malware that infected over 500,000 devices is even worse than we thought

The FBI Router Warning - What To Do

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/012/2018

5G Dangers? and New Warnings about Routers

Craig Peterson:[00:00:10] He's just out of the G7 summit. Oh my God. Our connection with him dropped. So we'll try to get Craig Peterson back.

[00:00:20] He's up in Ontario right now our good friend our tech guru who we kept waiting so long. Good Morning Craig Peterson. Hey listen. How was the G-7 summit did you? Did you enjoy it? 

[00:00:36] It was pretty good. You know it was it was nice to see Trump relax with Justin. We had a little beer summit afterward.

[00:00:45] Oh that's good. That's good. Listen, I know my good friend Craig Peterson some folks were asking about you this weekend, I was in an appearance and they said why does Craig say Peterson? And I said because that's how he pronounces his last name. I said because he's from Canada, you know, you get it. 

[00:01:05] But India. 

[00:01:07] Hey, you sent me some stuff this week. It's incredible, But I'm not going to be able to get to all of it. And at the end of this segment folks we're going to give you an 800 number and if you text my name Jim to that 800 number you'll get all the information. Plus, you'll be on Craig Peterson's list which is a good thing he won't sell you anything, he won't hack you, but he'll provide you with important information. 

[00:01:33] I know we're getting the 5G right. Ok, we need to get to that in order to have self-driving cars. We need that Wi-Fi technology. You put out some information that this may be hazardous to my health. How is 5G going to hurt people? Because right now we're all running around on 4G. 

[00:01:54] Yeah, there's a lot of people that are concerned about the radiation that comes from the cell phone and we've known that for a long time there are a couple areas in the country where there's no electromagnetic radiation allowed at all and that's because it is typically used for government testing. But the rest of us were exposed to it from everything from power lines through our cell phones. Now the 5G thing is interesting, because now in order 5G work. They have to put up about as many brandnew towers for the cell phones as they put up over the last 20-30 years. 

[00:02:36] Wow. 

[00:02:37] We're going to more than double the number of cell towers because these signals are going to be carrying much more data. They're going to be at a higher frequency typically. And what that means now is there is going to be even more of this radiation that's going to be coming from these towers. I don't want people to get all worried. Right. There's multiple types of radiation. You obviously you have sunlight that the type of radiation, you have the x-rays which is a different type, and than you have what you get from your cell phone. It's called non-ionizing radiation. This is not the stuff that's known to be harmful. It's thought by most people to not be a real big problem. Well, we're talking about the new 5G technology that's coming our way. There will be a lot more of it than we've ever seen before and we could end up with three to four times as many cell towers as we have right now. And it's going to give us basically broadband type Internet on all of our mobile devices like you were saying for cars et cetera. Yes, you could be driving down the road and not only listening to your iheartradio app but your car could be getting a whole new bunch of software. Download everything right there. Live streaming of all of your videos with the kids in the back. From a business standpoint that means that we'll have even more connected devices. We already have clothes that you can wear that have cell technology built into them Levi's introduced to jacket. All that in fact had Bluetooth and other types of technology in it. So, it's opened up a whole new world of possibilities. A lot of people are worried about the radiation that's going to come with that, although it's not to be harmful. 

[00:04:30] We're talking with our good friend Craig Peterson, and in just a minute we're going to give you a number you can you can text my name to, standard data and tax rates apply and get this information. So, I have seen. I know that. yes there are different types of radiation and as you explained it non-ionizing radiation is what basically what cell phones use, some of the European countries say they have evidence that it causes illness and can increase the risk of cancer. And yet there's just as many studies, Craig that show it doesn't that it has no impact. 

[00:05:10] Yeah, I was a keynote speaker last year at an annual board of directors meeting and I was approached by a lady afterwards who came up and asked, “What do you think about cancers, caused by cell phones? Yeah, And I said, “Well you know I have an advanced class amateur radio license, and so I've been around all kinds of radio waves for a lot of years, high powered ones as well”. And I said, “you know I've watched this fairly closely, but I don't think there's any convincing evidence for this yet and then she said “well, I have brain cancer and it's been attributed to me using cell phones almost all day long and my job.” Yeah, you know my jaw kind of dropped, and my heart went out to her. But yeah, there has been information come out from both sides. I tend to stick with the it's probably not causing any harm to pretty much anyone. There are people that think that the power lines caused all kinds of different types of problems, even the power lines in our houses. 

[00:06:18] Well, I mean people talk about having a digital alarm clock right next to your head on the nightstand and how can have the impact, although I kind of think that's been disproven and there has been a lot of research done about the power lines and everything else in a lot of that has been disproven.

[00:06:39] But the I guess we just haven't had cell phone technology n this type of radio frequency and it being so prevalent. I mean we've always had the radio frequency that's going out right now in AM and FM right now with our voices going through. But this other type and this 5G that you're talking about it's gonna be more prevalent it's going to be stronger. And what difference will it make, and I think I think it's an interesting read. I read it with an open mind. I think it's an interesting read. 

[00:07:16] Yeah it is it's something we need to keep an eye on it out definitely be an eye on that. And I've got one more thing.

[00:07:23] Sure I'll keep an eye on this Cisco Talos has come out with a whole investigation into this Russian the hack our routers in our homes and in our businesses. And you know people we've got to pay attention to this. This is future than we thought.

[00:07:42] It's huge is the word but I know that you said huge-er. It's always good when a really smart person says something like that. Huge.

[00:07:50] Yeah well it said it's the whole Trump era you know. And you know.

[00:07:57] So the but this is really, really, really, big and very, very, bad. So, make sure you reset your modem cell just power like. But put them back to factory default upgrade the software that's on them so that you're getting rid of this because this is way worse than we thought. They're collecting way more information being way more manipulative. Take the money from your bank account and then when you go to your bank site they actually modify the web pages as are in transit to make it look like your balance has not changed.

[00:08:32] Ok. This is true. All that's happening right now. Right.

[00:08:37] Our good friend tech talk guru Craig Peterson.

[00:08:42] If people text my name to this number 8 5 5 3 8 5 55 53 that's 8 5 5 3 8 5 5 5 5 3 you'll receive this information plus everything else you need.

[00:08:58] You'll be on the list. Craig Peterson sends out alerts when big things happen. He won't hack you, he won't send you annoying things, and he's here with us. Every Tuesday at this time Craig enjoy your business trip and always a pleasure to talk with you sir.

[00:09:17] Hey, thanks Jim. Take care. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 11, 2018

The Internet Trends Report.  Craig discusses some of the interesting things that you will discover in reading through this report.  

What's up with Android users doing updates and patches.  Craig tells you about a study that showed 90% of Android users do not update or patch their devices -- 90%  WOW!!

What Browser are you using?  Craig explains why Chrome is probably not your best choice if you are worried about privacy and security he tells you his choice for browsers.

Whats the matter with checking your phone everytime it beeps?  Listen in as Craig talks about a study that indicates that interruptions from our smartphone are affecting our brain chemistry.

Owning cryptocurrency Can affect your employment. Craig explains why the Federal Government is taking a long look at those who own Cryptocurrencies and have a security clearance for their jobs.

Autophagy and intermittent fasting.  Craig discusses a study by Nobel Prize winner Jason Phung and his research and how intermittent fasting has changed Craigs life.

Craig is putting up a new membership site (Yes, it is free you just have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/09/2018

Don't Use Android, Switch Browsers, and Smartphone Intrruptions

Craig Peterson: [00:00:00] Hi everybody, Craig Peterson here, With a fan going on me as it is a little hot today. So, I apologize for some of the background noise and I'm a little clogged up also, just allergic to something. Just this time of year. We're going to be talking today about a couple of things to do with cryptocurrency. We're going to get into addiction and I wanted to get to last week as well as Autophagy thing. This guy Dr. Jason Phung won a Nobel Prize a couple of years ago and I've got to tell you what he found has already changed my life, so I'll tell you about that as far as my health goes. And it was really quite surprising to me. Goodbye Chrome. When you talk about why, we've got at least one guy who is leaving chrome and where he's moving to. Smartphones, they are impacting our brain chemistry. Cannon, Oh my gosh. Remember the Cannon EOS, Well, they stopped making them in 2010 and they just ran out of inventory. So, that's it that's the end of an 80-year history of film cameras for Canon. Wow. And, I want to get to Mary Meeker. She's just amazing. She's got her new internet trends report out. I just printed it up. I printed four pages per sheet. This thing is huge it's hundreds of pages long. Almost 300 or I think little over 300 pages. So, we'll talk about what she's seeing for trends in the Internet and of course a whole lot more stick around. Here we go.

[00:01:49] On the front lines and ahead of the trends in business and consumer technology speaking with the top minds and creators behind the products and ideas that help to drive our everyday lives.

[00:01:59] Dean Kamen is joining us now. He's the inventor of the Segway and the founder of us first Steve Forbes appreciate what you can do with Forbes magazine for all these years. It's one of my first go to places you can't talk right now with the guys and gals. Siri right now by the director of technology we're joined right now by the CEO of E-bates Kevin Johnson on air for more than 15 years. Over 20 million downloads

[00:02:27] This is tech talk with Craig Peterson. 

[00:02:32] All right let's get going. Not a whole lot of time. It's hard trying to squeeze this into half an hour, it has been crazy. OK, so everybody should now have their Log-ins for my membership site everyone who asked who is having problems with this whole router update. This whole FBI thing. If you haven't received it let me know. But we were busy this week making sure we gave free account to the listeners who were having troubles who wanted to know more about the routers what models are affected maybe what they should do. We're going to be putting more of that together over the next week. Expect us to come out with something about. OK so now you can reboot is a router for two weeks now. So, what should you replace it with. And by the way you should have rebooted it twice if you do it once per week which is a minimum recommended by the FBI. So, we're putting together something I'm going to try and do a little probably not a Facebook Live, just so many of you guys just aren't listening aren't on Facebook because of frankly good reasons. So, we're probably going to do webinars or we'll do it similar to the last web before we had and kind of go through what your options are what you should do if your business how you can move away from these cheap home routers you don't want to use them now.

[00:04:03] It's just amazing to me that people are still doing it. So, if you still have questions about this or anything frankly you can always text me 8 5 5 3 8 5 fifty five fifty three to get a hold of me. Well, let's get into Mary Meeker's report. She comes out with this Internet trend report every year and the market pays major attention to her. Kleiner Perkins is the company that she works for. And they've got a lot of very cool data in this it just came out the end of May in fact May 30th. So, she is looking at the trends overall of course growth is continuing but is continuing to slow. Now I'm looking at the stats here comparing smartphone unit shipments Android, iOS, and other and year to year growth. And basically, we have leveled out here with about one and a half billion smartphones a year. Now think about that if you're a business person or even if you're running the local soccer teams Web site you've got to seriously consider what people are watching what they're looking at. And another statistic that's in here is that now more than 50 percent of the Internet users are using these smartphone devices. 

[00:05:23] It's just incredible. So, this year we had 7 percent growth versus 12 percent growth last year and our global Internet users we are now more than 50 per cent saturated. In other words, 50 more than 50 percent of every person worldwide has access to the Internet. Now that's a pretty big number. What that means is from a growth standpoint maintaining growth is going to be difficult, but growth still does remain solid. We've got more innovation more competition frankly, you can find all of this report I got it posted a link to it anyways up on my Web site at CraigPeterson.com, WI-FI adoption online payment. This thing goes on and on. She's done a great job here looking to better experience for consumers and video music. The news feeds it is just amazing. So something you should look at if you are an Internet marketer if you are doing anything Internet frankly so have a look at that. Mary Meeker. OK so let's talk about some of these devices. Let's talk about the Android smart devices because here's some statistics that I thought were probably happening and now it's getting confirmed. Yes indeed. Android devices turned out and this is a great article on cyber scoop by Patrick O'Neill.

[00:06:59] Turns out, no one is updating their Android devices, and what have I said about Android for a long time. One is they are more susceptible to hacking than iOS is for quite a number of reasons. The hardware in Android is not as good as the hardware you're going to find in an iPhone. But in addition to that, the biggest problem people have with Android devices is keeping them up to date, most of the manufacturers and remember we're not just talking about the guys that make the phone. We're talking about the companies that are using the phone and are distributing them that are selling them to end users because each one of these carriers is going to have some changes at least to the software in those devices. So, what it's time for a new update when Google comes out with a new version of Android. It might not ever, ever, be available for your Android device. So, when you go back to the standard recommendation of patch early and patch often. You can do it even if you want to. OK. Duel security just came out with the stats here. They released a study about a week ago that found that 90 per cent, nine zero percent of over 10 million Android devices across the U.S. and Western Europe are running outdated versions of Android, 90 percent. And remember New versions of Android aren't just giving you some new features. They aren't just making things cooler, looking nicer. Right. With all those wonderful new little icons and logos and things. No, they are closing security holes, 90 percent of devices not patched up to date is a significant gap. So, you take my advice if you can afford an iPhone you're wrong because if you can afford an android device you can afford an iPhone.

[00:09:11] Now you don't have to buy the latest, greatest iPhone right. This iPhone 10 that cost a thousand or more dollars depending on what you get on it. You don't have to get that device. All you have to do is get maybe an iPhone 6S. For instance, there are still for sale 6 s plus maybe. Still for sale and now they're cheap. They're about the same price as an Android phone. Many of the carriers if you up your contract with them they will just go ahead and flat out give you one of these older phones and the iPhone's are easy, peasy, to keep up to date. Apple puts out security patches for the iPhone for years. And years. Unlike many of the Android devices and so, the updates you get an android often they're kind of haphazard, if you even get them at all and attackers are taking advantage of this. We've got new malware brand new malware popping up that preys on old Android software and hardware. OK. So, Apple is dolling out patches to the App Store. There just isn't the same thing for Google Play and that's because there isn't just one Android phone. There are more than 1000 models. Compare that to Apple that only has to deal with a few dozen. And you can begin to understand why Apple can keep their software patched up and Google cannot, remember this isn't really Google's problem. This is really a problem of the carriers and the phone manufacturers not taking the Google updates and being able to get them out to you. 

[00:11:00] OK, now Duo also found that computers are often left behind and Wes's operating systems 74 percent of Macs and 85 percent of Chrome OS machines are not running the latest software. And that's a travesty. Now it's not so bad necessarily with Apple because even if you're not running the latest operating system they provide security patches for the last couple of operating systems, OK, so it's not too, too, bad. But when we’re talking about Google's chromos it's a bit of a problem. It's really weird too when you look at the ChromeOS from Google which is on these inexpensive typically inexpensive laptops. These machines auto update on every restart. So, it's really weird but chromos is widely hair hailed frankly as one of the most secure really computing environments out there today. So, some of these stats may not tell the whole story but again if you can make sure you ditch your Android device and ditch it quick and get yourself an iPhone or an iPad. Don't worry about the latest model. You don't need it to stay up to date. You need something recent. If you can afford an iPhone 7 or 8 or 10 go for it. But if all you can afford is that six that are still supported I would I would not get anything older than a 6S which is kind of Apple does this half and half right. They do a six and then come out sometime later with a success then they'll do just the seven then the seven-S OK, so try and get the second half of the six that's S series whether it be the big one or the small one. 

[00:12:54] All right so let's talk about Chrome Google Chrome. You know I've been on Google earlier for Android now and again remember it's not so much Google it's the people that are using the Android software that are making the phones that are selling you the phones etcetera. Right. So, we're not going to just completely blame Google for this one. 

[00:13:16] So or not I'm not trying to be nasty about it but here is the bottom line. We know Google has been really big over the years on monitoring everything that we have to say right. You know that it's pretty straightforward. I think pretty much everybody knows that. Right. I'm not crazy here. Google's business is keeping an eye on you and your business right. OK so we're on the same page here. If you are using google chrome and heck I use Google Chrome right. A lot of people do because there are great plugins for it works well. It's relatively fast. Well you know I don't. Are you sick of hearing about data privacy, now. But listen here, in the U.S. there's very little you can do about these big businesses keeping tabs on you. The big business is watching where you're going online what you're buying what you're interested in right. So, they can bring up this ad or that ad. This is a real problem. So how much information do you want to give Google. I was just looking today, at my information that Google holds. You can go in you can customize it you can say I don't want to track where I'm going. Where all my searches are, but there's a lot of options and I advise you to do that you should go in. You should customize your security settings. But the bottom line is they are going to record stuff whether you want them to or not. Now if you live in California you have some options, if you live in Europe you have some options, because of the laws that are there. 

[00:15:08] The rest of us have to look at this seriously and try and figure out what the right way to go is. We've got Cambridge Analytica the personal data of more than 50 million Americans are in their hand. The Obama campaign the personal information of over 1 billion people in their hands. We've watched companies shut down their European branches because of Europe's data privacy regulations. We've seen companies block Europeans from even gaining access to their Web sites. And when you look at the number of breaches that have happened over the last few years it's just going to make your head spin. So, what can you do. Well we've talked about a couple of things before. Duck Duck Go. That's my default search engine. And you just go to my Web site. CraigPeterson.com you can look it up right there. There's a search function right on there. But Duck Duck Go, doesn't keep any information on you. We have the founder of Epic. On our show here. Couple of years back and that's a browser epic browser dot com and it doesn't keep any information on you. But it is based on the Google Code. But they've gone in and they've removed some of those functions. Google has been there to track you. So, what should be the default browser for you. And it's a question only you can answer. You know I use Chrome for some things I use safari on my Mac for other things use Firefox frequently on my devices as well including on my smartphone. 

[00:16:56] I use Firefox, but Chrome has 60 percent of the browser market and Firefox has about 10. Now Firefox has a whole new version of their browser out there now. It is designed to be fast and it's designed to be secure from a. I'm not going to let people steal your information standpoint right. So basically. You want to ditch the browser that supporting a company that uses the data it's gathered about you to sell advertisements right as well as allowing companies to track your movements online. Because just how much privacy do you really think Google is going to give you. Now Firefox's parent company that's Mozilla. It's a nonprofit. They, in fact, I would say they're a little how what's the right word there. They're kind of crazy about some of the security and whether or not they should use this version of open source software open source software or not use it. Right. But they're saying over at Mozilla that the Firefox browser the new one is designed with privacy and convenience. In fact, they say right on the site that Firefox proves that privacy and convenience don't have to be mutually exclusive. And you know I agree, about that with them frankly. So, I agree that you shouldn't be sharing all of this data. I agree you shouldn't be using Chrome, in many cases right. I love having a fast browser and out of the box. Firefox has privacy turned on with Google Chrome you have to go in you have to know what you're doing and you have to configure it. 

[00:18:53] So, let's just leave it at that. OK. They've got this do not track tag that's available in Firefox now. Not every site is going to honor that. But they really are trying to get privacy and get it out to you. The end user. OK so let's move on to the next. We don't have much time here. We only have about five minutes left. I want to remind you that if you're still questioning your router and what you should be doing, I am going to be doing a webinar for you. So, you have to keep an eye out if you want to know about that. If you have any questions about your router it particularly if your business and you wonder if there is an alternative that isn't going to break the bank reach out to me I'm putting this stuff together it takes a little while. Hopefully within the next week I'll have that out and available and we'll be able to chat in the online space in a live webinar. Answer your questions. But until then you can just text me 8 5 5 3 8 5 fifty-five fifty-three we'll get you the information we've been for people that qualify that are trying to figure out what to do but haven't been able to will even send you. We'll create and send you your own log-in to my membership site for free so that you can get all of that information. So, we'll do that for you. 

[00:20:26] But you got to reach out 8 5 5 3 8 5 55 53. 

[00:20:31] Interesting study that came out and it was talking about constant interruptions from alerts and messages on your smartphone. And what's been interesting about this is they've been going further than just how long does it take you to get back into that train of thought. Have you noticed that when you get interrupted by anyone or anything it can take quite a while to get back to the original train of thought. I know with me when on trying to figure out something and I am sitting there working in particular. I'm trying to program or I'm trying to write something I have the stream of consciousness and someone interrupts me. I've lost a minimum of ten minutes sometimes more than half an hour to try and get back into that flow again interrupting me. To me is extremely painful. I just really hate it. So, when I saw this study I thought wow now this is interesting. Very, very, interesting. This is from CBS local affiliates an affiliate down in Philadelphia but they're talking about this whole thing Dr. Scott B. He's a psychologist over at Cleveland Clinic. He says there's this phenomenon they call switch cost that when there's an interruption we switch away from the task that we were at and then we have to come on back. We think it interrupts our efficiency with our brains by 40 percent. He says our nose is always getting off the grindstone. Then we have to reorient. Ourselves. And they're saying that when you do get that interrupt people get little surges of stress hormone, cortisol, which we've heard of before it causes the heart rate to jump. 

[00:22:14] Some people get sweaty hands and muscles can get tight. So, bottom line they're advising. Put that phone away. Right. If you're getting the interruptions I have mine on silent-mode most of the time I don't even know it's going off right. I check, I poll every once in a while when I need a little bit of a break. I check and see are there any messages any phone calls I have to return. So, he goes on to say initially when you start trying to stay away from technology or confine it you'll be a little uncomfortable. You'll have that fear of missing out or a little anxiety that something is getting past you. But with practice he says your brain can get used to it. So, break the habit. You don't have to carry that phone around with you all of the time. You don't have to be constantly checking. There are some symptoms to this. If you wake up in the morning the first thing you do is get on your phone. You've got a problem. If the last thing you do at night before you go to sleep is check your phone. You've got a problem. It really interesting article you find up on my Web site. And there have been many other articles that are similar to that. 

[00:23:25] You have to disconnect. Read a book even watch a little bit of TV. I promise I talk about Krypto we've only got about a minute left. We had two different things one if you have a security clearance, you might want to listen to this, because at this point they're saying that owning a cryptocurrency could cause you a problem if you're trying to get a security clearance and I can see why. Absolutely see why. And man, I wish we had time to do this. Maybe we should do kind of a whole show on this, but this guy won the Nobel Prize back and I think it was 2016. Dr. Jason Phung and he was talking about Autophagy where cells repair themselves in your body. Know what stops them from repairing themselves. Eating. So, what's interesting is if you know me you know I've been doing intermittent fasting. So, what Basically what he found and won a Nobel Prize for is if you do intermittent fasting you will be healthier. Really interesting article you'll find it at Craig Peterson dot com. There's a ton of information I've read five books on this so far just fascinating and personally I can say it works. Have any questions. Text me 8 5 5 3 8 5 55 53. Make sure we answer you and visit me online as well. Craig Peterson dot com have a great weekend. We'll be talking again soon. Bye-Bye.

---

Related articles:

That Russian malware that infected over 500,000 devices is even worse than we thought

US: Crypto Could Pose a Problem for Candidates Seeking Security Clearances

The FBI calls Chinese spies in the US a ‘whole of society threat’ — here’s how to protect yourself

HIPAA Security Rule Requires Physical Security of Equipment

IBM bans the use of removable storage by employees

5G Wireless Service Is Coming, And So Are Health Concerns Over The Towers That Support It

No one is updating their Android devices, new data shows

Bye, Chrome: Why I’m switching to Firefox and you should too

Constant Interruptions From Smartphone Can Impact Brain Chemistry, Scientists Say

Canon shutters 80-year history of film cameras

How to renew your body: Fasting and autophagy

 

Here’s Mary Meeker’s essential 2018 Internet Trends report

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 11, 2018

Your Identity is getting Stolen.  Jack and I discuss the rise of ID Theft,  and what Governor Chris Sununu did in regard Credit Freezes for NH Citizens.

When you get down to it, the problem is with the use of our Social Security Numbers.

Technology is working on a solution using Blockchain Technology but it is not there yet.

----

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/11/2018

Identity Theft, NH Law and Social Security Numbers

Transcript:

Craig Peterson:[00:00:00] Craig Peterson here, New Hampshire just passed a law, in fact, the governor signed it on Friday that provides you with the ability to get a free credit freeze if you are the subject of a data breach. Now this is interesting in fact the way it's set up it's actually the first in the nation and no one else has a law quite like this not going to have to dig into this little more New Hampshire kind of snuck that passed me without me knowing but that's what we talked about this morning with Jack Heath. The bottom line is your identity is getting stolen, and there's not a lot you can do about it. We get into social security numbers and what's the new technology that might stop all of this mess. You know there are things you can do to stop malware. But how about if the data is stolen and you have no control over it. It wasn't malware on your computer but it was some other company some big company or the government, in many cases. MAN OH MAN Here we go Jack.

[00:01:09] Joining us on the Autofair listener line for a tech talk update is Craig Peterson. His show airs on Saturdays on I Heart news talk stations. Craig Good morning. 

[00:01:18] Hey Good morning Jack. This whole thing about this bill that was passed and signed into law by John Sununu is really interesting. You know some of the specifics behind identity theft, but it's a really big deal. 

[00:01:32] Yep, you just you just gave his father credit for signing the bill. The governor is Chris Sununu 

[00:01:36] Yeah, yeah, Chris and his father would take the credit. 

[00:01:41] Sorry wrong Governor Sununu. 

[00:01:44] Tell us what you think about it. Tell us what your opinion of it is.

[00:01:48] Well, I haven't seen the bill and I'm sorry I've fallen down on that I wouldn't have looked that up and read the actual wording of the bill but when we're looking at identity theft, it is a huge deal. And it happened to me just a couple of weeks ago.

[00:02:04] You know we have this big Equifax breach last year which is a very big deal right. And I was part of that breach that happened Equifax. So, I started monitoring my credit report and monitoring the dark web and certainly out on the dark web. My information was there, yeah thanks Equifax and whomever else. But what happened, was, I got an alert on my credit saying my credit score has changed. So, I went online and I started to poke around a little bit and looked at my credit score and my credit report. Because I had signed up for a service where you pay a small amount monthly and it tells you when your credit report changes and lets you have a quick look at it. And, it doesn't bring your credit score down for doing it. Lo and behold there is a credit card that I do not have and that it had something like a 400 dollar balance on it.

[00:03:04] It was 60 days past to so I immediately knew. Wait a minute.

[00:03:11] I didn't open this credit card. That's not my balance right. And it was hurting my credit. And that's how I found out about it. 

[00:03:20] It’s a very simple easy way to tell all of that, but you often won’t get notified.

[00:03:26] No, well I wasn't notified, other than I have a credit report being in place, right.  Having a credit monitoring service is something everybody should do, anyway. But, yeah nobody told me. Hey, listen did you open this X Y Z credit card. Right. That just didn't happen. And when you get right down to the bottom of all of this, Jack, the big problem is our social security numbers right. They were guaranteed that they will never be used for anything other than Social Security. But now our Social Security number is used for everything from our taxes all the way through getting health insurance right. It's just this universal number.

[00:04:09] We don't have a good solution for what could replace this whole security number for with.

[00:04:16] There was an Eastern European country that tried something new. They tried to use some blockchain technology. There was another attempt where they had a card that was one of these smartcards kind like your credit card. If you look on it now it's got that little chip in it. And that little chip has an encrypted handshake it can do with the bank. And that helps to tell them it's really you. So, they came up with the special chip they put it on a card that uses a universal identity. And this is just last year. It wasn't two months before that whole system was hacked. So, you know bottom line here it's one thing to be able to know and hopefully recover your credit. In my case that was pretty simple because it was just a credit card. Someone wasn't pretending they were me. In the worst case, what happens is people use other people's identities when they have been arrested for a crime. And then, you're driving down the road, Jack, and you get pulled over and it's a felony stop and the police have you laying out in the middle of the road. They've got their guns drawn because you supposedly committed a crime right and you didn't. And, now you have to prove it wasn't you. Usually, you can do that without a lot of trouble. But, you're still the subject of a felony arrest. This whole thing is really, really, crazy and I think this move towards in NH to help to you know will help seniors and younger people both of those groups are the ones most likely to suffer the most.

[00:05:57] But, to make it so that you can start that road to recovery afterward, is a good thing. I think it will be years before we finally have a solution. Getting rid of a social security number moving toward something that's more secure by using some of these technologies are looking good but it is not there yet. 

[00:06:18] All right Craig, the other thing if you want to make a lot of boatload of money and I don't know the answer, real quickly. But the other thing is most people cannot remember, they might remember the last four numbers their social but, they can’t remember all these other names and passwords. Trust me they cannot. And someone's going to figure out something to do with that. Anyway, thank you, Craig.

[00:06:34] Hey you're welcome. There is a free report on Passwords and Password security available on my Web site. 

[00:06:38] Cool. I'll check it out.

---

Related Articles:

NH Governors Press Release on Senate Bill 303

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at: 

www.twitter.com/craigpeterson 

For questions, call or text:

855-385-5553

 

Jun 8, 2018

Today a short discussion on training brought to mind by a visit to Lake Placid Olympic downhill ski jumping training center.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/08/2018

The Importance of Training

Craig Peterson[00:00:01] Hi, Craig Peterson here. I don't know if you've seen my Facebook feed you might want to check it out. I'm up at the Olympic Training Center in Lake Placid and it's really kind of cool. This is where they do the training for the Winter Olympic ski jump competitions. And, of course, when I'm recording, it's summertime well, early summer. And you might wonder how they do it. I got some really cool video that I posted up on Facebook of them doing some training of the younger kids who are Olympic hopefuls. Of course, the team isn't assembled yet. They're not doing the training here, but these kids are certainly hopeful in their own teams and they're moving their way up there's a progression. It's really cool, to see and how they do it in the summer time which is they're using basically the same hills and some of the small hills covered with some kind of plastic type of surface on the top and then they ski jump into a pool. They’ve got some special devices in place to help make sure that they don't hit the water really hard to kind of break the surface tension. It's fun to see and it's fun to watch. So, you might want to check it out. Over on my Facebook page. The thing that comes to mind is something that again the FBI has been talking about and I've been talking about for years on my radio show when it comes to training the number one thing that most people and businesses just aren't paying attention to, when it comes to right down to security. 

: [00:01:30] These kids in the summertime doing winter ski jumps. They've got everything right. They've got their winter ski boots on. They've got the winter skis going down these hills that are typically used in the winter and they're recreating the conditions just like it would be if they were here in the wintertime except of course for the problems of being no snow right. So, they're doing the best they can. How much time are we taking, with our employees, when it comes to conducting training on the security front, keeping the black hats out and making sure that our employees are really getting white hat training. So that they know what the bad guys are going to do. So, they know how to derail it when the bad guys are trying to attack, because we're talking about a multibillion dollar industry where they're coming after us and sometimes they're just pretending they're good guys right there pretending they're wearing white hats and they get us to do things maybe we shouldn't do and our employees to do things that they shouldn't do either and we end up losing a whole lot of money because of it. And I don't know if you noticed in the news, I'll have to talk a little bit more about this, but you know that router hack that we talked about the one the Russians have been involved in. It turns out according to Cisco talos that Cisco is determined here that it was a lot worse than we originally thought. 

: [00:02:55] I mean a lot worse, they were breaking SSL encryption and using man in the middle attack techniques. As part of that, they were also faking Bank sites. So, you'd go to your bank they get your account information your log in, eccetera. They would take money out of that account and then guess what. When you went to the bank legitimately to try and see how your balance was right they would change the bank's page so that when you checked your balance everything looks normal. Right. And because it's all going through Russia just going through your local VPN. Believe it or not, one that you did not install but they installed for you. And now when you are looking at the bank balances, actually adjusting it in real time as you go on the site, you have no idea that they've actually stolen that money from you and transferred it out of your account. So, even looking at the bank balance online doesn't guarantee that they didn't get it from you. So, check it out. Go online you'll see a whole lot more information about it. The training's really important and I think you'll have a lot of fun if you have a look at those videos I posted of the kids doing their training at the Olympic facilities in Lake Placid New York. Take care and We'll talk again, tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 8, 2018

Today a short review of a study by NTT and what they found about businesses and security -- it's really, disheartening.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/07/2018

The Importance of Security

Craig Peterson: [00:00:00] Hi guys, I'm out by Lake George, still here in upstate New York, enjoying the week. I saw some statistics just came up from NTT and that's going to be the subject of my little lantern today because it's very concerning to me. NTT you probably know these guys they are the Japanese AT&T. And, I think the whole name is Nippon Telegraph and Telegram, in English, anyway. 

: [00:00:28] But they did a survey of businesses and they found that the majority of businesses that were surveyed, and of course they take that, and they push it out to all businesses, but the majority of businesses surveyed said that they would rather pay ransomware than try and prevent the ransomware from getting on their systems in the first place. They'd rather not bother with the security they might need to keep the criminals out and just pay the criminals afterward. There are so many things wrong with that thinking. But let's start with the simplest, which is that if you’re talking about having your systems hacked, remember, you’re going to be out of business. You're hoping that just paying that ransom, which may be as little as five thousand dollars, is enough to get all of your data back. 

: [00:01:21] If you get back in business. Yeah, I got to tell you here what the FBI has said. Hold on a sec, let’s let the truck pass, the joys of doing this live, right. 

: [00:01:35] But according to the FBI statistics, and remember I'm tied tightly with the FBI and they're Infragard programs. So, I get their stats, and they're saying that the majority of businesses never get their data back, ever, even if they pay the ransoms.

: [00:01:53] Then to top it off, you're out of business at least during the time while you're waiting for your data to be recovered. Now, your data may not ever be recovered, as is often the case the majority of the time. Your data is not recovered or maybe just parts of it are returned. These guys are out to get you. And they're out to get you a lot of different ways and it will cost more than that five thousand dollars you spend on security. And in reality, you should be spending somewhere around three to five percent of your budget on security, because it is that important. Certain events will force you out of business. You know you've got to spend that money. You're not going to get your data back. This is this is not something that's worth risking. 

: [00:02:42] And I was just talking about cancer in fact with someone, a little bit about really this is almost like cancer treatments, right. It's like how many people do self-exams for cancer. And some people do. 

: [00:02:58] And those people that do those self-exams are the ones that end up surviving. Why? Because they caught it early and that's the whole idea here, you got to catch the bad guys early, you got to stop them from doing more harm, and stop them from destroying your companies, anyhow. Disappointing news from today from NTT and that survey make sure that you are staying up to date with the technology doing all of your updates. Having a good intrusion protection system, defense system, as well as prevention and keep that business of yours safe, heck, you've put enough money into it and into your career, right. Either way, you don't want to lose it all. Craig Peterson here, and we'll chat again tomorrow. 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 6, 2018

Today a warning about USB Drives and their use and how the Bad Guys including State Actors are using them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/06/2018

The Dangers of using USB Drives

Craig Peterson: [00:00:00] Hi guys, Craig Peterson here again. I've got a couple of warnings about USB drives, that little small stick drives thumb that we all have. And we use, and it was interesting - I was thinking back right of all of the different ways we used to move data around. Of course way back when it was punched tape and computer tape, I used that a lot. I used it before that punch cards. When I was programming and putting stuff together for computers. I basically used it all the eight in hard sector floppy disks all the way down to the little ones. DVD drive CD-ROM drives. And of course today we are sharing stuff over the network. We've got to us be drives that we're using to carry things around on and sometimes we just copy it to our phone and send it back and forth, that it's really changed over the years. But there is a problem and the problem is that USB drives are now being misused, they're being infected. I've got a report here a warning out from our friends over at the FBI and they're talking about the vulnerability, it's a "cakbot" is what it's called marionette. Now, this is a piece of malware that has been coming on thumb drives come in straight out of China and apparently it might be targeted at one of them is a financial services corporation that they got this some drive infected with this malware variant that's designed to steal bank information banking information. We also have had warnings before as I was thinking about this about us be charging station these public charging stations you see them everywhere now right they are on airplanes you can plug in USP devices you can plug them in at the local coffee shops on and on.

: [00:02:02] And what's been happening is people have been taking those little charging stations plugs a kind of pop off the front and put a little piece of hardware in there. So, it's not just a dumb charging station actually fairly smart. And then the public USB charging stations are then used to install viruses and hack the devices that you plug into the charging stations. Now if you've ever tried to route a phone a smartphone like for instance an iPhone you know that the only way you really been able to route them in the past has been to plug them in to a USB port and then run some software and it uses some of the diagnostic features of the device in order to be able to get into it. And you can root your phone while reading your phone, of course, is getting around the operating systems controls right. So, if you have access to the U.S. port on a smart device whether it's a computer or a smartphone you can potentially, not necessarily but potentially you can get into that device and take control of it. So, this is just kind of a general warning for everybody don't play around with us. Be poured. And if you do get a thumb drive if you buy these things and I do these all the time we use them for installing computers for our customers. Use them for configuring firewalls and moving stuff around. And the thing you have to remember, make sure you format it.

: [00:03:38] Now how do you format a thumb drive. Most people do it on their computer. But once you've put it into the computer, isn't that computer now infected. All right to think about that one for a minute. So, there are devices that you can get. All they do is the format. And these pieces of malware that might be on them don't affect it at all. So, if you're responsible for the security or at least for those of you that are responsible for security in a large organization, make sure you get one of these USB thumb drive bulk erasers. The rest of us use a machine, that's probably not susceptible. Maybe take an old laptop to install Linux on it and use Linux to reformat those thumb drives. The next best thing would be a Mac, and then the worst thing would be a Windows computer because those are the number one targets and frequently they're the ones with the most vulnerabilities. And then you can get all the way as far as what IBM just did in the last month. And they have now banned removable devices in their entirety for their employees to use. So, if you work for IBM you cannot only not use a thumb drive. You can't use one of those detachable USB drives either that so many people use for backing up their systems and moving data around till a couple of warnings about your US drives you might not have thought about it but just because it's so-called freshly formatted and came from the manufacturer in China, doesn't mean it's safe.

: [00:05:08] Always reformat those drives and if you're concerned about security another thing you might want to do, is not only disable those thumb drive port those USB ports on the devices for your computers in the company but you might want to get some epoxy and put the epoxy right there in the ports. So, no one can plug anything in because it's a great place for people to steal data from you. And it's also a great place to introduce malware. Think about what happened with Iran with their nuclear program. We brought their nuclear program to its knees, while we admitted it. Afterward, we worked with of course Israel on this. But, we got onto their computers infected them destroyed their centrifuges because someone found a USB drive that probably Israel had placed at a coffee shop near the nuclear site and they found they saw USB drive. They brought it back and they plugged it into a computer that was not internet connected sitting there controlling the centrifuges and we were able to completely destroy the centrifuges. So, it's a dangerous thing. Be careful with thumb drives. Have a great day and we'll be back of course with another thought here, as I am kind of doing a little bit of vacationing and working here working holiday all at once so as things come up. I've been trying to put out a real quick little podcast. Thanks for listening. Make sure you share it and make sure you go to iTunes and give me a rating. Craig Peterson dot com slash iTunes and leave a comment. I appreciate it. Thanks. Take care. Bye-bye.

 

---

 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Jun 6, 2018

There is an issue with Routers - FBI worldwide alert.  Craig discusses the problems with these routers and what you have to do.

Are you addicted to Cryptocurrencies? Craig talks with Ken and Matt about what some Dr.'s are saying and also gives a warning about Cryptocurrencies and your security clearances.  

Don't use Cruise Control if you drive a Chrysler or Fiat.  Craig speaks with Ken and Matt about two issues related to cars.  Both can be deadly.

Pink Color Jobs?  Craig explains to Matt and Ken what these jobs are and why they have this name.

Do you love knowing what technology is coming in the next year?  Craig tells Ken and Matt about Mary Meekers Internet Trend Report and how and where you can access the information.  She is the standard bearer of "what is coming in tech." 

Find out more on CraigPeterson.com

Related Articles:

The FBI Router Warning - What To Do

Hospital launches rehab clinic to treat cryptocurrency addiction

Fiat Chrysler warns 4.8M Jeep, Dodge, Chrysler and Ram owners to not use cruise control

How Social Media Became a Pink Collar Job

 

Here’s Mary Meeker’s essential 2018 Internet Trends report

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 06/06/2018

Chrysler Recall, FBI Router warning, Cryptocurrency issues, Pink Collar Jobs

Craig Peterson: [00:00:00] Hey, good morning, everybody. Craig Peterson here this morning with Ken and Matt. I spent a little time and we talked about of course the FBI warning about our routers and when a little detail. But you guys know about that right. Then we also talked about the Fiat Chrysler warning about 5 million of their vehicles being very, very, dangerous. And social media and how it's now a pink-collar job. Isn't that new. And we talked about Mary Meeker and her latest report the 300 slide internet trends report and what that's all about. And if you are investing in bitcoin or any of these other cryptocurrencies and you have to maintain a security clearance, we've got a big warning for you. So here we go. Have a great day. I'm enjoying myself. I am out in the Adirondacks here doing a little bit of vacationing and meetings of course with friends. That's the way it always goes. 

: [00:00:59] So Here we go with Ken and Matt.  Welcome back again its 738 on the WGAN Morning News and it is Wednesday which means it's time for Craig Peterson, our tech guru. He joins us at this time every Wednesday.

: [00:01:11] Sir, are you this morning doing, I am well, I'm out in Lake George, at Americade, doing some motorcycle riding yesterday it was a little rainy, but it should be nice the rest of the week. 

: [00:01:24] Excellent. Yeah. My wife last asked me if we had a router and I didn't know the answer. 

: [00:01:32] So, there's an issue with routers Yeah this is the same one that we've been talking about the last couple of weeks. The FBI has come out now and given a worldwide alert and we've got to be really careful with this because the problem is that the routers that we're using for our homes, and unfortunately many small businesses are using these home routers as well. Those routers are compromised, many of them with a whole bunch of Russian software, that is taking your data and is sending it all the way out or actually to Russia. Today in Russia they are looking at it for bank account information, credit card information, personal information. So, you've got to replace these things. I've had a lot of our listeners have reached out to me on my text number. I gave out a couple of weeks ago. I mentioned the ORBI, you might remember you can get that right now. Best Buy has the best price on it. That's ORBI. You can get it on Amazon. And one of our listeners was concerned because looking at the reviews on Amazon there were a lot of complaints about the ORBI that come up right at the top of the reviews. However, the ORBI device is a great little router and if you look at it the reviews chronologically it's fantastic.

: [00:02:54] They had a problem about a year and a half ago with some other firmware that's been pretty much fixed now so the ORBI is what I'm recommending people to replace their home routers. Now, if you have a router from your Internet service provider they are taking care of this problem. If you bought an aftermarket router that's when the problems start coming up and that's when you really should look at replacing it was something new. That’s because there's probably not new firmware to fix this problem. It's absolutely huge. It's devastating. We still haven't really begun to see the fallout from this. But make sure you reboot your router at least weekly for now, and go ahead and replace it. And I'm going to be sending more information to people and explaining things, but have a good look at that ORBI router and it will make a difference for you. Big difference. It's a scary world.

: [00:03:52] Speaking of scary worlds, is it possible to be addicted to getting cryptocurrencies. Should I be afraid of, you know, buying them going forward?

: [00:04:04] Yes, it is. It's interesting because I've got a couple articles on that this week in my newsletter. But the problem that we're finding is that people are getting kind of a gambler's addiction to buying cryptocurrencies and it's becoming such a problem that we're starting to see not only doctors talking about it but it could end up being something that gets into the AMA standards as well. Cryptocurrency addiction. The other thing that is happening right now with cryptocurrencies is that we've got a problem with background checks and security. You know, if you have a clearance from the federal government, you have an FBI background check, that is required for working, for instance, down at the shipyard and you bought cryptocurrencies. They're saying now that that could be a big mark against you when it's time to get a background check to renew your security clearance. And the reason why is they're saying that with cryptocurrencies they are so frequently used by the black hats, by the bad guys, the criminals, that they may take that cryptocurrency that you have and count it against you thinking that you may be doing illicit things online. That’s because you can use a cryptocurrency to buy drugs, not just marijuana but all the hard stuff, like fentanyl and other things. you can use that cryptocurrency for all kinds of illicit transactions. So are cryptocurrencies back in the news this week and one of the big warnings is the federal government has not made a standard yet but a lot of people within the review board are saying cryptocurrencies are a big mark against you if you have to have a security clearance. 

: [00:05:58] Craig Peterson is our tech guru he joins us every Wednesday at 738. Craig, I use cruise control all the time, now I don't have I don't have a fiat. I have a Honda Ridgeline, so, I am kind of safe but, I mean can things go bad with cruise control? Let‘s talk about your Honda for a second. 

: [00:06:27] These newer cars including the Honda, In fact, I had to send a thing to my mom about the Honda and how these keys that you don't have to put into the ignition. Right. You just keep them with you. Right. A lot of people tend to leave them in the car or when they lock the car in the garage. And what the problem that we're seeing now is that people are dying because of that. And here's why. Can get them a little key flaw that you have for your Honda. And this isn't just a Honda problem. But if you take it with you even into the house it can be close enough to the car that the car sinks. OK can't hear or see is nearby. And if you forgot to shut off the engine which is you know you look at our generation we've been turning off the key for how many decades right. And now you have to hit that button to shut it off. So, they forget the shut off the engine and that engine keeps running. And what's been happening is people getting been getting brain damage and even dying from the carbon monoxide to creep in from the garage into the house because the car's still running, and we don't know about it. So, a real word of warning here to all of our listeners. This is picking on Honda, I am just picking on Ken. So, because of that problem we'd be very, very, careful especially it's been hitting the older population. Now back to the original thing you're mad about the cruise controls guys. Matt and Kim here's what's going on. 

: [00:08:03] The Chrysler Corporation you remember last fall I think it was October or so we were talking about a problem with Chrysler's and how the software in that car could be manipulated so that someone could remotely drive the car and drive it into the ditch. Do you remember that? It was in the news. Yeah, Well now the latest is that there is a bug and Chrysler Fiat. They are warning people that have their cars double checked your model number and I have a list of them up on my Web site that are known to be effective. I should say but be careful because some other cars can in certain situations and it has already happened people. If you have the cruise control on it will not disengage. You can get a break. You can hit the cruise control off button and the cruise control will stay on. So if you're going down the pike at 70 miles an hour that engines going to keep trying to go down the pike at 70 miles an hour. Now if it happens to you, thing to do is STAND on had brakes, because the brakes are designed to overpower the engine and that engine still going to be going, going, like crazy. Get over to the side of the road. After to coming to a full stop and then put the car in park. OK. So Important safety tip for Chrysler Fiat owners out there, cruise control on some of the vehicles can in certain conditions decide it is not going to shut off.

: [00:09:40] So contact your dealer they'll have a fix available for you they can let you know if your car is affected or you can do some searches online. The joys of technology you guys. We are talking about Cruise control. Not even autonomous vehicles. I'm just so concerned about the future frankly.

: [00:10:01] We're talking to Craig Peters on our tech guru who joins us at this time every Wednesday. CRAIG My final question for you what exactly is a pink-collar job and why is social media one of them. 

: [00:10:13] Yeah that's an interesting thing right because we know all the jobs that women tend to move towards and men tend to move towards other jobs. It's turned out that social media for businesses is a job that has been attracting almost exclusively women. And it's a decent job you can do look from home depending on the job position of course. But it's been called the pink-collar job because when it comes to social media it's really been a woman's world. And I've got to mention one more thing if you want to know where the Internet is only Mary Meeker every year puts out her slides. She is brilliant. If you are an investor you've got to check her she's got her 2018 Internet trend report out. And, of course she does mention a little bit about pink-collar in there. But she talks about everything it's almost 300 pages of slides. It's incredible amount of data very dense. But it's everything from people buying online what kinds of devices they're using. We reach saturation e-commerce versus brick and mortar. Hey, it's your business. Check it out. I've got it up on my Web site as well. This is her 2018 internet trends report and it is really the standard bearer when it comes to trying to figure out what's coming our way online.  

: [00:11:42] All right, Craig Peterson our tech guru joins us at this time every Wednesday. Appreciate you joining us sir. We will talk to you again next week. 

: [00:11:49] A gentleman. Take care. 

: [00:11:50] Thank you very much sir. All right.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

 

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

 

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

 

For questions, call or text:

855-385-5553

1 2 3 4 5 6 7 Next » 19