Info

Craig Peterson's Tech Talk

ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know. www.CraigPeterson.com
RSS Feed
2018
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
April
March
February
January


2015
November
October
September
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
Oct 17, 2018

The holidays are fast approaching, should you give android or Apple products for gifts? 

Craig is on with Ken and Matt on WGAN discussing how should the government be coming down on things like data loss versus vulnerabilities if you have software that could be breached.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Breach, Bug, Hack. When Does A Business Have A Responsibility To Inform Its Customers?
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/17/2018

Android vs iPhone For Gifts - How Much Security Do You Need - Breach vs Theft - Who Has Liability

Craig Peterson: 0:00 Good morning Craig Peterson here this morning with Ken and Matt we talked about well two different things first of all and these are different things too because you know oftentimes between all of those radio shows online there's some overlap but no overlap this morning so with Ken and Matt I got into some of the security stuff that we should be concerned about. Ken's gonna be getting a new Apple Watch for Christmas, he said a little earlier on his show. So if you're giving a gift this year, should you be giving Apple Android what's out there? What are the considerations? And then from a legal perspective, this is a different topic, but how should the government be coming down on things like data loss versus vulnerabilities if you have software that could be breached?

Unknown 1:00
Do you have an obligation to tell people that their data might have been breached? Even though there's no evidence that data was actually stolen? It's an interesting question. And it's a kind of a question for the ages. So we get into that as well. This morning. Matt brought that up. So here we go. We Craig Peterson on with Ken and Matt 738 is the time and man is Craig Peterson. He's our tech guru. He joins us every Wednesday at this time to tell us about what is going on in the world of technology around the world. Greg, How are you this morning?

Unknown 1:34
I am doing well. Yeah, what is going on crazy, crazy, crazy

Unknown 1:43
horse faces out there. Just saying.

Unknown 1:46
So I'm

Unknown 1:49
Mr. Peterson. Is it equitable that we can be is everybody going to eventually someday be at no matter what we do? Well, I I kind of say.

Unknown 2:00
So and it's interesting know you're talking about getting the new Apple Watch for for Christmas and and a lot of people of course over the holidays for various celebrations are going to be getting all kinds of new gizmos and gadgets and I cannot emphasize enough and I know Matt you're going to disagree with me on hits at least to some degree but I cannot emphasize enough the importance of trying to keep your information secure all of the data secure and when it comes to devices and security there is no question Apple is it it's where it's at and Google Android it's all well and good but it is not secure not anywhere near as close to Apple's iOS well if that's the case should not beating myself a blackberry I mean

Unknown 2:56
you could go to a feature phone they I think they help

Unknown 3:00
Right. If you really want security, you don't put your data anywhere, right. But you don't put your cursor and it'll, it'll be secure and become the unabomber in the woods somewhere. Just kind of unplug from society. That's my that's my option. That's your

Unknown 3:18
way. Yeah, that's what he did. It was.

Unknown 3:23
It was. Yeah, I was. I was somewhere. Yeah, it was a shack in the woods,

Unknown 3:28
wind and rain. And but that's no way to live. Is it right? It's just, you know, you can't survive today without technology. Which leads us to what Ken was just kind of inferring here, which is that you have to set up everything all of your financial accounts, all of your equipment as though you're going to be hacked because you may have already had your information stolen and then taking a look at what happened here with the experience that was

Unknown 4:00
Very long ago, Facebook, hundreds of thousands of people apparently lost all of their personal information from this Facebook breach from what we're learning here just this week. So it's really good practice, especially if you're a small business person. But you know, heck, if you're a retiree, you've got money and accounts, you've got money, hopefully, and investment accounts of 401k or savings account. So types of accounts, that information is being stolen all the time. We went into a restaurant chain just last week, they asked us to come in and have a look. And they're using Android tablets for all of their orders, right, and to process credit cards, and they've got a whole system set up and it's quote, cloud-based, unquote, point of sale system for restaurants. And so we go in we have a quick look at it. The Android tablets are

Unknown 5:00
are completely wide open. They're in developer mode. They, they have all kinds of different software on there, including the ability to go out on the internet and visit the Facebook page, which apparently when we did a little investigation, some of the servers and even some of the management we're killing and there are cases, known cases by the hundreds or someone who is malicious, puts a little scraper on that machine. And now every credit card fits one. Yeah, it's going up to the cloud. Yeah, it's being processed. Yeah, it's it's secure when it gets to the cloud. But every credit card swipe done, that Android point of sale system was being captured by a little app that was installed on an Android device and all that interaction was stolen. We had locally here where I live in my town a restaurant that was shut down because the police

Unknown 6:00
arrested the manager that a small restaurant right here my hometown, the rest of the manager because that's exactly what they were doing. They were grabbing all of the credit cards they were reusing them, people were seeing charges and to wanna and other places. So we've, we've got to consider that we are under attack. The FBI just last week came up or two weeks ago, I think it was come out with a new announcement saying managed services providers are now becoming the number one target for thieves. So your IT company is the target are they secure this this whole thing, just some simple common sense stuff is going to save you a lot of time. Never ever use Android. Don't use Windows if you can avoid it, which means unfortunately, use Apple I don't own any apples to help Okay, I was on animals born

Unknown 7:00
For three years on their advisory board for three years, maximum term, okay, I'll tell you that but I did it because I wanted to help them improve their products, but

Unknown 7:11
consider that as a business person as a retiree as just a regular homebody. You've got to look at everything from a security standpoint. Because even though Experian can survive a hack, 60% of businesses are going to go out of business. If they're hacked, and you and I have that money stolen, the odds are will never ever get it back. So obviously, I've got my soapbox under me, or is it a stump today, but this is a huge deal. I can I see it all the time, people's lives destroyed.

Unknown 7:47
Speaking of hacks, of course, we're talking to Craig Peterson, our tech guru Craig when something happens in a company which is what we've seen happen over and over again, whether it's like you know, one of the credit agencies being hacked or you see the day

Unknown 8:00
app get hacked or somebody has a bug somewhere or something happens with a company or tech organization of some kind. What exactly are the rules for telling people about that? I mean, can can realistically, you know, if Facebook got hacked, like it just did, and like if 50 million users had their their, their accounts compromised in some fashion can ever keep that under wraps. Should they ever keep it under wraps? Or what duty do they have to tell us about this kind of thing? Yeah, that's a really good question. Because it's, it's our information, right? It's our lives and you know, what, what do they happen tell us when do they have to tell it to us is really kind of the question and it varies from state to state. And there are some federal laws about it, but there is a big difference between having for instance of vulnerability in your software and having had your systems breached right, so you

Unknown 9:00
Usually the line is, hey, if you know you were breached, you have a duty to report it. And in some cases, you have to report it within 72 hours. Well, Matt, how many businesses know they've been breached? The average time to figure out you've been breached to six months right now. Okay. It's absolutely huge, huge, huge. We had Google Plus Google. Just shut down. Google Plus, you guys. Did either of you ever use Google? I was actually an early adopter plus. No idea what it didn't believe it or not. Yeah, yeah. Well, the thinking back then was, hey, listen, Google's going to do social network it's going to be fake, fake. Fake. Right? And so you tried to do it yeah, I gotta do it. But I started using it early and then I you know, as as the participation in it kind of declines, so did mine But yeah, it's still existed for years afterwards, even though nobody used it. Yeah, it did it and I also was one of the earlier chapters I thought while but just

Unknown 10:00
going to take off is just because it was Google, right? And there was no real engagement there. And my friends weren't really there. So I kind of dropped it. But to your point, man, Google Plus is now get shut down. Because they had a problem with what's called an API, which is what programmers use. This is an application program interface to time to Google Plus. So you could use a developer to develop some software for your Android phone, and you go into that app on your phone, Mac, and you, you now are posting stuff into Google Plus account. Well, that was found out that API was found out to be extremely vulnerable. Now, there were only about 400 people who actually taught a license from Google and might have used the API very few people actually used it. So in that case, we're talking about a half a million users

Unknown 11:00
By the way, Matt back how many people have registered apparently with Google Plus 500,000 people? So you're right. There was like, no engagement, but 500,000 people's data that could have been compromised because of that API. But should that be reported? Should you be told, hey, listen, your data might have been stolen by someone. But we're not sure. So fence the line. That's that's the difficult part. But with technology, the law the rules or regulations always like behind technology and where it's at, and we've got to decide when this is a really big question. When should businesses be reporting Do you report a vulnerability you report an an absolute breach? Do you have a responsibility to be able to tell which consumers what data was stolen? It's it's going to be well before we figure this all out.

Unknown 12:00
Google's case they didn't bother to tell a soul. It was about six months ago when they figured this out. And they, you know, they closed up the whole of six months ago. And now they're shutting the whole thing down. Should they have told us should they have told regulators and Google's attorneys are saying, No, no, no, we didn't need to tell anyone, because we're not certain that there was a breach. We don't know that someone use this extremely vulnerable API to still everybody's information. I don't know, right. I really don't know if the laws that wrap around unauthorized access to user information to personally identifiable information access versus they've actually got it some of them are unclear and the lawyers are certainly coming down on the side of Hey, we don't have to tell nobody unless we know personal data was actually lost.

Unknown 12:56
Our tech guru Craig Peterson joins us every week on Wednesday at 730 and you can go to his website but peterson.com get all the information you don't have to wait till Wednesday just go anytime you want thanks for joining us Craig will talk to you next week

Unknown 13:11
all right Take care guys next

Unknown 13:15
we

Unknown 13:23
I wish I had noticed can make in that squeak sound I would have made a little bit of fun at him and he now take care we'll be back this weekend with my normal radio show as heard on the air am and FM stations carried by I heart Take care. Bye bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 16, 2018

Craig is on with Jim Polito on WTAG as the discuss how a fake video could start a war as well as what you need to do before and after you lose your phone.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

 

Everything You Should Do Before—And After—You Lose Your Phone


DEEPFAKES 2.0: Computers Can Already Create Convincing, Fake Videos Of Anyone
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/16/2018

Could Fake Video Start A War - What To Do About Lost Phones

Craig Peterson: [00:00:00] Hey, good morning, everybody. This is a little late. Sorry yesterday. I had an injury with Jim Polito as I do most Tuesday mornings and we talked about a couple of things. First of all, what are the implications of these newer pieces of software some of them are absolutely free that allow you to manipulate video and manipulated to a degree that you could make a video showing people doing things that they never did and have it be very convincing so I really great, very interesting topic with Jim this yesterday morning. And then we also went into one other topic kind of quickly and that's all about your phone and what to do before and after your phone is stolen. So some really good tips today for everybody whether you're in business or retired, or just a regular old home. Bobby's Oh, you

Unknown 1:00
Here we go with Mr. Polito. Here's the guy who made things like I Heart Radio possible. While because of the internet, he actually wrote code that is still in use today. And I'm talking about our good friend Craig Peterson. Who I just I think I just hung up on guys. I I I really think I just hung up on Craig Peterson. I mean, how do I do that? When you put an idiot in charge? That's what you get. Right, buddy?

Unknown 1:35
You know it. I really have to feel sorry for you. And for so many other people, because it has just gotten way too complicated.

Unknown 1:46
Too bad. It's not complicated. Actually. Smart people like you have made it easier for us user-friendly as they say. And now I just hit the wrong button. And that's all that's all it takes. Greg. That's all well hey, listen.

Unknown 2:00
We've got a lot of stuff to discuss today. And don't forget, folks at the end of this segment, Craig's going to give you a number. If you text my name, you'll get all this information plus more standard data and text rates apply. Craig, I want to talk about this because it is something that scares me in this day and age. I think it's cool. But in terms of fake news, politics,

Unknown 2:24
terrorism,

Unknown 2:27
the deep fakes 2.0 a computer that can already create condensing fake videos of anyone I've heard glenn beck talk about this. And while it is really cool, I mean, in the wrong hands, it could be deadly and I mean that as well. You could take video you could make a video of President Trump burning the Quran and then distribute it.

Unknown 3:00
What kind of an impact would that have around the world? And that's what this computer can do. So why don't we talk about it?

Unknown 3:08
And then and then dropping people into, shall we say, adult material and videos? Explain to us what this is about.

Unknown 3:18
If you think back a little bit, Jim, can you remember Lord of the Rings? Of course. Oh, yeah. Moving. Yeah. Oh, sorry if I read those great popular books when I was in college, but did you ever see behind the scenes that guy that played oh man document for the name of the character the meal or what did he call himself precious? You know, I'm Oh, yeah, yeah, yeah.

Unknown 3:45
Yeah, I know. I know. You're talking about the place. Yes. Yeah, exactly. Yeah, we're gonna get about a million text. I know. I know we will. But if you saw behind the scenes, there was an actual actor.

Unknown 4:00
Who ate that part made all of the movements and actually of course that the boys and they have those golf balls all over him when they were filming them. Did you see that? Yeah I know that because I was just at the Shriners and they use that same technology you know the suit with the little white golf balls all over it and then you the person moves in that suit and then a computer can analyze that movement or in the case of what they do in movies, then you can have an animated character moving just like a human because you have mapped that human at the Shriners, they use it to help kids with mobility issues and with constructing artificial limbs and things like that. But yeah, so you take something like that. Sure. Ya know, that's something I think we can kind of relate to that yesteryears technology

Unknown 5:00
Nowadays, right? And it's you know, it took them 10s of millions of dollars to to just do that one movie with that, that character moving around in the movie, right and you know it's continually getting better you know there's more animation actors are very concerned that within the next 10 certainly 20 years most of them will be gone. Alec Baldwin won't have a job anymore. It's it's, it's all going to change is going to change in a very big way. Because now there are programs factors deep in some apps that are available that do this type of analysis that used to require those little golf balls on the suits. In other words, they can pick out a face or for instance, you've got a smartphone. Yeah, and you've taken pictures of people. Have you noticed now how there's a little square around people's faces automatically on your smartphone where it is

Unknown 6:00
recognizes that there's a faith there, and then it focuses on that face. That's the type of tech we're talking about. that's available today. It recognizes faces. And it can also recognize movement of faces. The again think of the new Apple iPhone 10 and the ability to use it John Locke the phone. So with these new app, they are able to have very convincing for almost no money, very convincing videos that allow you now to do exactly what you've been talking about this morning on the show, you know, you could put Elizabeth Warren's face on a tribal pile participants and you would not really be able to tell them unless you got right down into it that it wasn't really Elizabeth Warren that had the Indian blooded

Unknown 6:55
yeah and and it'll match the skin tones it'll match the facial expression.

Unknown 7:00
it'll match the body movement and the facial expressions jam that's the magic that's the hardest part of all of this and it's available now you can you can do all of that stuff you can have it done on some of these websites out there like fiber and pay a couple hundred bucks and now you have a convincing video that's going to you know it's not going to convince the guys in the FBI crime lab but it is going to convince the people on you know the six o'clock news yeah and not just the six o'clock news so I could use it against a political enemy but like I said you could use it in an international incident you know remember but Ghazi Hillary claimed it was a video record she was lying but you actually could make a video and you could stir up unrest and a country you could start a war anything it's gonna happen Jim you're right with

Unknown 8:00
Why, you know, it could happen today. This is the type of thing to think about how World War One started, right? We all had alliances all of these countries. Yeah, one lower ranking guy was shot and all of a sudden we are engaged in a world or and you could have convincing videos of the beheading, that didn't even harping right with people involved that weren't anywhere near the site. So today it's people's faces being plopped onto porn actors. And isn't that funny? Yeah, but it's it's a scary bit of technology. And today for you know, $50,000 you could very easily have a video made that's going to convince all but the absolute best tech people in the world that's $50,000 down from what was millions just a few years ago.

Unknown 9:00
Yeah, we're talking with Craig Peterson, our tech talk guru and we'll tell you where you can get all this information at the end.

Unknown 9:11
This is something I wanted to discuss, because it does happen to people frequently losing your phone, and you've got a little tip here on everything you should do before and after you lose your phone. And it happens to all of us.

Unknown 9:31
Yeah,

Unknown 9:33
absolutely true. I've got the article up on my website, but there are about 10 different steps things you need to do before and then after great article up on wired.com. But here's the bottom line you in this day and age you have to assume a couple of things. First of all, you have to assume that you are going to be hacked. Okay.

Unknown 10:00
So when you set up those financial accounts, when you're trying to get your retirement accounts in order, assume that you're going to be hacked or the to have been hacked when you're setting them up. So yeah, same thing with your password your phone, assume that you're going to lose it. So make sure you've got a really great little passcode on that phone. a four digit passcodes. Not enough anymore. Yeah, I use the cloud. It should passcode. Maybe I'm a little paranoid. I don't know. You know, you're you're in the business, you know? Yes, absolutely. And managed services providers, which is what my company does. The FBI just came out and said, We are the number one target because we have access to our clients, competitors, right. Right. So I get to you that I can get to all of your clients. Exactly right. So they're going after me now my business so on our phone we not we have these 12 digit passcodes because

Unknown 11:00
There might be client information on them. Everything on the phone is encrypted. And then on top of had we have everything inside of encrypted falls on our phones and on our computers, and that's something by the way, if you have any personally identifiable information about clients or other thing and you're an accountant or your lawyer or you know, the list goes on and on, you have to have a higher standard or security. So make sure if your phone is going to be lost, and it will be right eventually it's going to be stolen or alive. They can't get into it. And if they do get into it, make sure none of that information is useful at all to the to the bad guy and make sure you have backups. I do not accept my phone to the cloud. I back it up encrypted backup to my local machine so that I have it and I can restore at will and if you have an iPhone make sure you turn on

Unknown 12:00
Find My iPhone, right? Because that lets you remotely wipe your iPhone. And that's frankly, that's a really good thing. Here's the bad guy who has your iPhone sitting there looking at it and all of a sudden it comes up with the Apple logo because it's been completely wipe. There's no way for them to recover it and there's no way for them to use your iPhone without your iCloud password. So it's useless to them. So there's a few real I think, really good tips here. It's going to be lost. Make sure it's secure, and make sure the data on it secure. same trick for your laptop. Yeah, make sure that it's that way. All right, Craig. That was very, very helpful. Very, very helpful. So folks, if you want to get this kind of stuff and you want more and you don't want to be bothered, though, and be tried to be sold something or you don't want to worry about getting hacked is very simple all that you do.

Unknown 13:00
Text My name to this number

Unknown 13:03
855-385-5563. That's 855-385-5553. That's right. Standard data and text rates will apply. But you're gonna love all of the information that you get. Craig, that was a great segment with you really appreciate it. We'll talk to you next week. Hey, thanks, Jim. Bye bye. When we return

Unknown 14:00

Hey, by the way, next week, I'm going to be running webinars on Monday, Tuesday, Wednesday, open to the general public. I have a closed one for FBI Infragard on Thursday. But Monday, Tuesday, Wednesday, we're going to be going through that really kind of an assessment here. Where's your business hat? What's your security standards? What should you be doing? So we have all of that up on my website just go to http://craigpeterson.com. You can register at the home page. Take care. Have a great day. And we will be probably putting out two of these today because I already was on the stations up in Maine with Ken and Matt. So we'll probably be talking to you very shortly. Take care.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 15, 2018

Elections are coming up but security is still a mess.

Craig talks with Jack Heath today about election security and online scams on WGIR.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Election Security Is A Mess, And The Cleanup Won't Arrive Until 2021

---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/15/2018

Security And Online Scams

Craig Peterson0:00 Hey, good morning, everybody. This morning I was on with Jack Heath who's now covering most of New England states. It's, it's kind of cool, but I was on with him. We were talking about security and safety and what we need to do. There's a lot of scams going on. Many of them are aimed, frankly, at our more senior population, and they are doing just a ton of harm. So we talked a little bit about that. I was surprised at how much jack new and kiss I guess he's been briefed right, paying attention. Good, jack. So here we go this morning with Jackie and talking a little bit about security. What you can do right now with the scammers, especially the guys are coming in on your phones. I gave him an app that I use that I think is very useful. In fact, everybody that I've told about that's installed it has absolutely loved it. So here we go with Jack. 

Unknown 0:53
right now. The Tech Talk update go on the author. Let's find Craig. Peterson on his show Tech Talk. And of course, Craig Peterson, with on on Peterson.com. Craig joins us now on the listener lines. Good morning Craig.

Unknown 1:05
Hey, good morning Jack. What a busy week again, that like there's news to talk about. Well, you know, I guess you heard Kate Martel with the hill. Same it's kind of quiet

Unknown 1:15
except for the Trump President Trump interview with 60 minutes kind of quiet. But anyway, Craig, what's going on?

Unknown 1:21
Well, we got a lot of things here on the tech side, that's for sure. You mentioned elections coming up. There's a great article that I put up on my website that came from CNET talking about how election security is an absolute mess in some states frankly it's a disaster we've got a pretty good setup here in New Hampshire we've got some good checks and balances some auditing going on but Illinois for instance is saying that they don't have any federal funds Republic clean up their election system so I think we may be looking at at least until

Unknown 1:58
we may be looking at some contested election over whether or not something was hacked or people's votes were actually cast properly

Unknown 2:08
alright tomorrow I want to mention to the to its credit union weekend tomorrow we're gonna have a special focus on credit unions and we're going to be also going to be moderating a lunch and and conquered as they talk about things like scams and New Hampshire, elderly financial abuse is really prevalent in terms of some of our aging folks who are victimized too often with these financial online scams. Craig you know, you can't, you know, it seems like this is the one I love, you know, you get a number, it's a new hampshire number. So, you think it's, you know, you're going to answer yourself and it says something, you know, that they're trying to call you to extend your warranty and your car or you know, something about your, you know, here's a chance to do this for more credit, or here's a chance to settle college debt or call this number if you want to, you know, make money on that. I mean, it's just unbelievable. The number of scams, they really are scams out there.

Unknown 3:00
Oh, and there are a lot and they are hitting the elderly but they're hitting everybody to i gotta tell everyone who's listening about an app that you might want to check out for your smartphone I was getting dozens of calls every day and what they're scammers are doing is they're just randomly picking up phone numbers that are similar to yours so it'll be like say your numbers six old 3566 something you'll get a call from 603566 something they'll be impersonating one of these local phone numbers and they'll do everything you were just talking about so have a look at this app there's a free version of paid versions called Hiya, H-I-Y-A, Hiya, H-I-Y-A and what that does jack is that has a whole database behind it have about 300,000 known scam phone numbers she's it is done what's the app for me it's called Hiya, H-I-Y-A. Hiya, H-I-Y-A. And it's a phenomenal tool because it does block a lot of these scams and as you said there everything and they sound so legitimate I wanted to so well how do you spell that age what age I y and the other ones India Yankee alpha okay the other one I will ask you because we did get a listener to ask you about this there's an ad that's on I think it's for Experian to find out until you've seen the ad when you're watching the game some is your social security number on the dark web you can go on to do you recommend that are not well yeah there's a couple of things you can do but the here's the bottom line jack in this day and age thanks experience a huge gave the bad guys all of our social security numbers. So the odds are in this day and age that your information has been compromised, it is on the dark what should you do? It has been well there's nothing you can do to get it down. You need to make sure you change your password and we have to make an assumption jack I've got a great article about this right now up there. You have to set up all of your financial accounts like you're going to be half man that you have been hacked. The That's the truth. I agree. And we're gonna have more on this at this credit union event tomorrow and conquer. But Craig The other thing is, many people know the bank or the credit card carrier that they they have the thing that you're the expert, not me. But don't fall to this one. If you get an email and it looks like it's from your bank or credit card

Unknown 5:29
company don't assume it is because they can make these emails look like it's from that and then they want you to verify some account information and ask you a question. If you made discharge over the weekend. That's a scam as well. If you're not sure call on the back of the card or your back. Call them and ask if they are reaching out to you. So you can't even trust an email these days. It seems all right. No, thank you. We gotta run online. Jack. Don't click on anything in an email. Don't open that you Craig. Great. Peterson and we come back some businesses

Unknown 5:57
Hey guys. As always, thanks for listening. We're going to have a little bit more to about our webinars. Keep an eye on your email boxes. And we've got another one coming up. Are you interested in backups? Right? What's the number one thing you can do in order to protect yourself? Your company from ransomware. And that's backups. But do you know who has the best backup? What's reliable? What's not reliable? Do you cast these things right. So step by step, what would you like to know about backups we're going to put together a master class on that one as well. Just check it out. Send me an email me@craigpeterson.com. Love to hear from you. Take care. be back tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 12, 2018

New Cyber Security Rules going into effect for the Federal Agencies next week.

Financial Accounts are going to be Hacked.  It is time to set up all your financial accounts like you are going to be hacked. 

Infant Social Security Numbers are worth the most on the Dark Web -- this is because they are unused for 10-15 years during which time someone can use their identity. 

DOD Weapon System cybersecurity and how the DOD, just isn't grappling with the scale of these vulnerabilities.

Do you know what data you have?  If you don't know what or where the sensitive data is then how do you know what you need to protect. That is why it is important to have a Cyber Liability Assessment done.

The Importance of Changing and Managing Passwords can't be stressed enough.

Have you guys heard about Deep fakes?  This is quite terrifying what the future of AI and fake news may bring.

Where was Microsoft's QA department? Can you believe Microsoft released an update that deletes your documents folder?  They have pulled the Windows 10 update now.

Have you rented an Airbnb lately? Apparently some Airbnb Hidden cameras in your Airbnb rental

Did you hear what students are willing to exchange for free coffee? Wow!  It is downright dangerous for them.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit -CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/13/2018

The Importance of Cyber Liability Assessments, Changing and Managing Passwords, Deep Fakes, Microsoft pulled the Windows 10 update, Digital IDs, Hidden cameras in your Airbnb rental, The danger of no Cash options at Coffee Shops

Craig Peterson: 0:00 Hey, Good Morning, everybody. Glad to have you here. We've had a very busy week. This week, we managed to do our three webinar series. Hopefully, you had a chance to attend. This as part of our master class, for small businesses, about security and the types of security things you need to be doing and paying attention to, kind of being careful of. So, if you didn't get it, we will be having other little series as time goes on. And, you know, I keep trying to do this, maybe one a week, maybe less, maybe more. But you know, time will tell. So, keep an eye out, we'll be doing more. We had a lot of great feedback. We've started doing some of these cyber liability assessments. Again, these are free things we're doing for listeners of the show, and people who attended the webinar. So, that we can tell them where they're starting. Isn't that the biggest problem? How can you get to where you want to go, if you have no idea where you're at, right. So, that's the whole idea behind this cyber liability assessment. And those are underway, we just did one for one lady that was really quite a shocking, at least to her I'm sure, a listener to the radio show, where there was well over a million dollars in liability if the data got out. So, we're thinking maybe one of the things we should do in the very near future is put together a little special report on how to keep that data safe. Especially, with the new regulations that are starting to go into place now. That is kind of following the whole GDPR thing over in Europe. So, that you know, the protection if you will, of your personal information. California already has them in place, they're moving over to the federal side. And it looks like the Department of Homeland Security is going to be adopting those some going into effect next week. In fact, federal agencies are special, and want to be compliant already, but, apparently, about 50% of them is all that really is ready to comply. So, we will be talking about this as time goes on. Probably put together a little master class on some of that stuff. What you have to do in order to comply with these new regulations. We've already been doing some stuff for GDPR for those businesses that are trying to do stuff, internationally. So, today we are going to talk about some of the articles up on my website. We do curation every week in fact, it's me going through a lot of articles hundreds of them every week, really we kind of skim through try and find the best. Some of the best this week that you'll find up on the site, everything you should do before and after you lose your phone. I had a conversation this week with a gentleman who just two weeks ago got ransomware in his computer and ended up taking it into the local Geek Squad over at BestBuy trying to get them to fix a few things up. Hopefully, that's all going to work out for him, but it really brought to mind that I've got to put together a little masterclass and special report on this very topic. How do you prepare yourself for the inevitable? And, that is one of our articles for today, let's see if we can find that there's so much stuff here. Election security is a mess. Microsoft pulled the Windows 10 update, the October update. and we'll talk about that and why really bad news, frankly there. Digital IDs extra harmful here way worse than you might suppose. Finding hidden cameras in your Airbnb rental. No cash at this cafe - What students are doing in order to get free coffee?

3:48 Terrifying future. Deep fakes. Have you have you guys seen this article? It's up on my website. Deep fakes 2.0, the terrifying future of AI and fake news.

3:59 Weapon System cybersecurity, The DOD, just isn't grappling with the scale of their vulnerabilities. The breach that killed Google Plus, wasn't a breach at all. I want to talk about this today. We'll get into it a little bit of detail. But, what's a breach? What's a vulnerability and what's in between? At what point do they have to report. Right now they have to report when they have a breach of personal information. Well, how about

4:25 if they don't know if they've been breached? If they found and closed some sort of a

4:29 vulnerability. As I was just talking about. You'll see this up on my website, as well. And this is how to set up your financial accounts like you are going to be hacked. Because you will be hacked, right. Isn't that kind of the bottom line? Isn't that what we've been finding. It's it's bad news, but it's the news, right. It's a real thing, frankly.

4:54 So let's get into this now. Your financial accounts and what to do about it.

5:05 Now, you might want to spend a little time looking at this article up on my website. In the past week. And I'm talking about right now, October 2018. We have more reports about hacks. So, the big companies. Now the small companies, as I explained in the master classes this week, those free master classes. The small companies, we don't hear about, because who cares, right. But bottom line, it's a big deal. Well, in the past week alone, we've seen Experian, Facebook, and Google, have all had hacks. Now Google's case and we'll talk about this a little bit more, here but it's kind of interesting because the hack happened seven months ago. And, that brings up some other privacy problems, but now you know there have been thousands of hacks over the last 12 months. It just continually going on. I mentioned a guy who was on my masterclass this week who was hacked. Who got ransomware. It's it's just absolutely crazy about how that all happens. So, I went through the anatomy of a hack and the Anatomy of an attack, just because what you got was a virus, for instance, and that infected your computer and spread to other computers, doesn't mean it wasn't a hack. A hack is kind of a broader term we're starting to use. We're using the term hack because of doxxing. Now doxxing made the news again this week and the reason doxxing hit the news again this week had to do with a couple, apparently here, of Senate staffers, Democrats Senate staffers who were getting the personal information the home phone numbers, etc. of congressmen who were voting for President Trump's nomination to the Supreme Court Brett Kavanaugh. They were posting home phone number cell numbers addresses, everything information about the senator's spouses about their kids. The just crazy stuff they were doing. By the way, yes indeed, they got arrested for all of that. But doxxing isn't just reserved for democratic senate staffers. Doxxing is also used by the bad guys to find out information about you, about your family, so that they can then use that to manipulate you into doing something they want you to do. And that, as it turns out, has been a $12 billion dollar business over the last 24 months, according to the FBI. That is huge, huge money.

7:45 So, we know that hacking occurs. We know that we are getting targeted. Every week I help companies and even individuals who have been hacked and help them understand what's going on, what to do about it. But, I much prefer this and in case you're wondering, listening on the radio, I am doing this also online. If you go to my website, you can watch the video of me here on the air. But, at Craig Peterson dot com, of course. But this, why not set everything up in advance as though that cloud service, that vendor, that customer, is going to be hacked. Because the odds are, with thousands of breaches that they could be. This is based on an article from Shira Frankel over the New York Times, and she goes through it as well. This particular article I put up is from life hacker that sometimes has some excellent stuff. And this is one of those cases, starts with the obvious stuff. I had I think it was about 70 people this week, Text me asking for my password special report. Because we had this Facebook hack this week. I spent some time going through that during this week's master class, I may try and post that up on my website. And I'll let you know if that ends up going up. On how to tell if your Facebook account was hacked this last week or if it has been cloned or if there's something else fishy going on with your Facebook account. So, we covered that in this week's master class. But, if you really want to protect yourself, obviously change your passwords, and make sure you're using a good Password Manager, pulling it all together. And if you did not get a copy of my special report on passwords. Where I go through everything about how to create them, how to choose a really good Password Manager for yourself for your business and how to use that. If you didn't get that make sure you text me, just send me your name and email at 855-385-5553 you can just text me right there. 855-385-5553. So, number one, use a great day password use something like last pass or one password, we use one password really great for businesses the last pass has some great features as well. But I like one password with the integration to DUO, you know two-factor authentication. So number two, make sure you check your credit report, look up your banking statements, maybe tie all of your accounts together or something like mint dot com. So, you can kind of keep track over all of this. And we had Mint's CEO on the show some time ago. You're going to want to freeze your credit too. Your kids, you know, nowadays they are issuing social security numbers, when the child is born, the government wants to track them from day one. You know, back in the day we applied for them. When we got our first job, right. Now you're born you get a social security number. One of the most valuable social security numbers out there is social security numbers of infants. Why infants? You might ask, why? Why would anybody care about an infant social security number? Well, the answer is actually rather straightforward. That infant is not going to notice, the social security number has been stolen for what, 10-20 years. So, they have that period of time to misuse and abuse that so security number, maybe the name, the date of birth, all of that sort of stuff, but the date of birth, they can manipulate, right. They're just going to lie about it. And now they have a way to work in the US and bank accounts and get it all of this stuff. So, one of the things they're advising is not only checked your kid's credit report but make sure you put a freeze on their accounts, as well, at the three main credit bureaus. Now, I mentioned what was this about a few weeks ago that freezes are about to be free, thanks to a bill, President Trump signed a number of months back. Those should be in place already, and double check with the credit agencies, but they should not be charging you for freezes or, un-freezes anymore, which is actually a really good thing because Equifax didn't seem to care, right, that they lost all of our personal information. And then kind of the last thing is two-factor authentication, if all you can do is two-factor authentication with your phone, getting a text message. Okay, I get it. I understand. It's complicated to do it with other devices. We have physical Yubikeys. We also have the one password that we can use and use that to do validation with one time passwords, using one password. So all of that again, up on my website.

12:50 This next one that brings up some interesting questions. And this is about a breach that killed Google Plus. Now, you might remember Google Plus when everyone was worried, you don't know it's going to take over from Facebook, because Google Plus is a social network and well, Google's behind it, right? So why would it not take over? Well, very few people ended up using Google Plus. And it turns out there was a major problem with the security on Google Plus. Now, this is where the interesting question comes in.

13:23 They had an API on Google Plus that could theoretically be used to access the personal information of as many as about a half a million users of Google Plus, actual hits. That's probably the total number of users of Google Plus, there just weren't very many of them. I had an account, but I never really used it. It never got traction,

13:44 right? They really never did.

13:47 So, this vulnerability would allow people to get in and get all this private information. But, there were only 432 people who ever registered to use the API on Google Plus. How's that for a slap in the face for Google? You know, Come on, guys, obviously, people just aren't using your platform. So why keep it up? Well, about seven months ago, they found this vulnerability and they fixed it, in March of this year. Now, did you notice, they didn't tell anybody? This vulnerability was never reported. Because the Google lawyers apparently looked at this. And this is a great article, from the Verge, that I put up on my website. But they apparently looked at it and said, The law requires us to report data thefts, data breaches. In this case, we don't know if anyone used this API, this programming interface. We don't know if anybody used it to steal personal information. Therefore, we're not going to tell anybody about it. We're just going to close the hole and not bother mentioning it. The Wall Street Journal found out about this when it got its hands on some memos. And that's what got this particular ball rolling. So Unknown 15:14 what here? Where's the

15:16 disconnect? What do you call something like this? Is it a bug? Is it a breach? Is it a vulnerability, the laws that are in place right now, and California has one of the strictest ones, none of them address this type of a problem? So, companies are kind of confused over, What they have to tell regulators? What they have to tell their customers? Because, Would you like to know that your data might have been lost? Unknown 15:47 You know a company doesn't really want to tell you your data might have been

15:50 lost. Because, if your data might have been lost, you're not going to be very happy with them. You know, we're looking at statistics right now, that says, 60 plus percent, in some cases, as much as 80% of people do not want to do any business at all with a company that had a data breach. So, if you're a small business, and you're not sure if you had a data breach, because small businesses, how often do you have loggers in place, that track things like potential data breaches? potential data losses? Right? Small businesses don't usually have those now, we've helped a lot of small businesses put those systems in place because they're required to by law. So, depending on what business you're in, you may or may not be mandated to have those systems in place. But, you probably don't know if you were breached. And if you were breached, and you found out which, by the way, on average, is six months if you found out six months later, and could you tell them what was lost or what might have been lost. So, businesses are just keeping silent about all of this, understandably, right, because most people will not do business with you again if you lost their data.

17:05 So, that makes all you know, a lot of sense, I think you probably feel the same way as

17:09 I do. I wouldn't want to be doing business with somebody that lost my personal private information. So, when we're talking about this, as the Project Zero guys over at Google, they're looking for zero-day attacks. We've got white hat bug hunters, who are out there looking to build the reputation. What, you know, Facebook just fell from grace, just a few weeks ago, 50 million-plus accounts were hacked, they were exposed. Look at what happened last week with, Did my account get hacked? I got this weird message. It said I should forward this and a friend did not accept my friend request, you know what's going on right

17:55 Industry is still trying to figure it out. It's yet another example of how we just I don't have the laws to keep up with

18:03 the technology, nowadays,

18:05 right? I guess that shouldn't be a surprise to anybody.

18:09 I've got to bring this one up. We've got a lot of weapons systems that are being developed, nowadays. I was reading some interesting stuff about World War Two technology and what was being done by the Germans and the Russians and others. And, you know, and it was very mechanical, right? The torpedoes back in the day had wires they ran all the way back to the submarine.

18:33 Interesting stuff. Today, wow, the Department of Defense now is trying to protect everything. We have some Department of Defense sub-subcontractors, as clients trying to help them out these huge reports they have to do. The training they have to do? Physical security, as well as computer security. So they're trying to tighten it up, but if you look at something like this and I'm holding up to the camera just a quick picture showing one particular weapon. And all of the computers are on board we're talking about something that's really a computer, right? It's not a missile it's a flying computer on a, you know, on a flight platform, frankly. In operational testing the DOD has routinely found, what they're calling mission-critical cyber vulnerabilities, in these systems that were under development, absolutely huge. Great article from gao.gov. They found that using simple tools, simple techniques that the whole - Are you familiar with the Red Team, Blue Team thing - Where you have a competing cyber team, someone's trying to defend the network while another team is trying to break into the network? The military does this all the time. We do this with private businesses, where it's intended external scan is kinda like a penetration test, but you, you're actively trying to defend, actively trying to hack, so that you can see how effective both tools are and you can't defend properly if you don't know a hack right isn't that kind of the bottom line, here. So they were doing it and they found that most of the time the bad guys quote unquote could get into these different and pass these defenses in these defense systems without even being detected. Now that's a very bad thing so the DOD has recently taken some steps are trying to improve the weapon system cybersecurity. They've got new policies, new guidelines, out there to incorporate cybersecurity. We found that some of our clients are there just manufacturers of widgets, basic widgets, things like wires or you know modules that might go into one of these DOD systems. Even down to that level where there's there's nothing active. There's no computer systems active at all. So even at the level of a wire, the cables and connectors the DOD is now going to those people and saying, hey listen you need to up your security, here are the new standards, and they have to meet these new NIST standards and others. A very big deal, very scary deal frankly. And we've we've got to pay attention to these systems and now we know why. The GAO the General Accounting Office has found that the DOD systems are severely lacking in security. Which is scary when you consider that we have potential adversaries, such as China or Russia or even North Korea, in Iran Who all are are very good at hacking all know how to get into systems and it couldn't be very bad frankly. Could end up being very bad.

21:57 next article

21:58 real quick you're going to want to go online and have a look at this. This articles from Wired and I have it up on my website as well, at least a link to it, at Craig Peterson dot com, but everything you should do before and after you lose your phone. It's really great. It goes through the features that you can use, from remote tracking, exactly how to do it. Where the settings are, protecting your lock screens, backing up data, face ID, passcodes, thumbprint readers, their preemptive measures, and what to do, contacting your carrier. Very good advice. Something that you probably should have a look at out there.

22:42 This is terrifying,

22:46 frankly. And, this is the future.

22:53 Now, we know about AI,

22:55 right? Artificial intelligence, machine learning, which is kind of the precursor to artificial and machine learning is kind of where we're at now. There's no real artificial intelligence by the strictest of definitions, but

23:09 it's coming

23:10 In this article is about something called Deep fakes. Have you heard about this before you've heard about the fake news, right? So what's a deep fake, a deep fake, as it turns out, is a video in this case that looks like it's someone doing something else. And these deep fakes were discovered over on Reddit, which is a bulletin board, some really interesting stuff. But, what they had done is they had taken some porn video and had a computer, analyze it, and had taken some video of Emma Watson and had the computer analyze that. And, of course, when it comes to celebrity, there are lots of videos, you've got all of the facial tics, the way they express themselves away, they move. The computers are analyzing their gate, you know, as they're walking, their vocal patterns, etc, etc. And these deep fakes, now have gotten so good that they've been able to take Emma Watson's face and stick it on another body and create a whole new video. One that never existed before. So, Emma Watson never did any of this. Remember, Watson was not videotaped performing any of these acts. Obviously, somebody was, today, but it looks like it was her. Absolutely amazing. Now, I went on to Reddit. These have been taken down, its against Reddit policies to have that type of stuff up online. But deep fakes, are only the first step in a chain of technology that's coming our way, and coming our way fast. We can now do all kinds of stuff. Think of Gollum for instance, from Lord of the Rings. There was an actor that was moving, did you see that any of the behind the scenes stuff on this, he was moving, he had these kinds of balls all over him, so the computer could track his movements, and it did very coarse movements. If he'd move his arms, the computer can move his arms and you saw the computer animation with this kind of turned him into a stick figure so that they could make Golem move basically the same way. And then they went in afterwards. And then they tried to do the face, make the face just write a move just right, don't have to do any of that today. Today, you can just take a video, just a regular video. And from that regular video, put it on top of another regular video. Within its expected here. And this is an article from Daily Dot. And it's quite fascinating. But it's expected that within the next 10 years, this sort of thing will be extremely easy to you to do.

26:03 It's this article goes on for about eight pages. But this technology will end up being used for producing clones. You'll be able to use these in when with a psychiatrist where you got issues with your mom or your dad or someone else they can in a virtual world, today eventually, maybe not even a virtual world but today they can bring that person in and have you chat with them. That you know barely, right 10 years from now. It will be pretty, darn good. And 20 years from now it may be indistinguishable from reality. Just like you're talking right now with some of these chatbots, online. Where it's just you typing back and forth without really a computer the other end. In the near future it's going to be like you're on Skype with someone but then the person at the other end isn't a person. It's a computer, a computer program. So there's a few more we did not get to today. I hope check them out online. What students are doing to pay their tab. Hidden cameras at Airbnb rentals. Digital IDs, very scary things. Do not install Windows 10 updates, before you have a good backup. They are, Windows 10 updates I've been deleting all your documents. And not fun and election security is an absolute mess. But we can't get today so visit me online Craig Peterson dot com. Make sure you sign up for my next master class. Sign up for my email list just Craig Peterson dot com slash subscribe. Love to see you there. We'll keep you up to date. Every week we send out these articles to everybody that is a subscriber. Craig Peterson dot com slash subscribe or text me anytime. Any question. 855 385 5553. Have a great week. We'll be back next week and in fact we will be podcasting on Monday again. Take care bye-bye.

 ---

Related articles:

Face It! You’re Going To Be Hacked, So Set Up Your Financial Accounts Like You're Going To Be Hacked 

Breach, Bug, Hack. When Does A Business Have A Responsibility To Inform Its Customers?

Weapon Systems Cybersecurity: Looks Like Our Weapons Are Easy To Hack

Election Security Is A Mess, And The Cleanup Won't Arrive Until 2021

Millennials Will Give Away Their Personal Information In Exchange For A Cup Of Coffee

DEEPFAKES 2.0: Computers Can Already Create Convincing, Fake Videos Of Anyone

Everything You Should Do Before—And After—You Lose Your Phone

Use Airbnb? How To Find Hidden Cameras In Your Airbnb Rental

Microsoft Update Has Been Deleting Documents

Digital Ids Are More Dangerous Than You Think
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 10, 2018

China is at it again - The Peoples Liberation Army is using our hardware to hack into the government and our businesses.

Testing the Presidential Alert System and why it that test is important.

What do you think about Youtube replacing textbooks?  Well it is happening in many schools.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The Big Hack: How China Used A Tiny Chip To Infiltrate Major U.S. Companies

Why Didn’t I Get an Emergency Presidential Alert Text?

YouTube Is Replacing Textbooks In Classrooms Across America

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/10/2018

China Hack, Youtube replacing Textbooks in schools, iWatch4 and Presidential Alerts

Craig Peterson: 0:00 Hey, Good morning. Craig Peterson, here. We've talked about a couple of different things this morning including Ken went in to check out that new Apple Watch. So, if you have older eyes, you're going to want to hear what he had to say about it. But, today we talked about the Presidential alert system. Did you get one of those alerts this week? A YouTube study that came out from Pearson Education, this is absolutely going to affect your kids. And this, China hack - did they hack our hardware? Who's at risk? What's really going on here? Its smaller than a grain of rice. It's just amazing what's happening what's going on out there today. Also, the third webinar today of our little webinar series, its the last one. It's for Small businesses on cybersecurity and we're offering one free cyber security, cyber liability, actually, sigh liability assessment. One free for small companies. So go to Craig Peterson dot com sign up for the webinar. Webinar attendees will get one free assessment. This is something that normally cost hundreds of dollars and thousands if you're doing it across the company. We've had a lot of great feedback from people on this who learned a lot of things. I appreciate everybody who's there so check it out Craig Peterson dot com and here we go with this morning Phil and Ken because Matt is out, well on vacation

1:36 I wonder if this theme song is nominated the rock and roll Hall of Fame. I wonder if Craig Peterson is a nominee for the rock and roll hall of fame. I suspect not. Craig, nothing personal. Maybe the Technology Hall of Fame? Certainly. I would agree with that. Hello. Unknown 1:51 How are you? Great job. I don't know if we have those. You know, the jocks end up working for the geek. But the geeks just never manage to get their own hall of fame.

2:01 Yes, that's true. They are prejudiced against geeks

2:06 The geeks and running in the world, what are you talking about?

2:08 So, I have to tell you, Craig, my wife is not a big fan of Donald Trump. And when she got this Presidential Text, she literally screamed. She really thought that the President was texting her directly, and then thought that was gonna be followed up with another text or a Twitter from him about something because of they

2:27 don't we, it's not

2:28 Don't we run the risk of the president being able to just kind of send something out to everybody, whether we like it or not? Or is that not a risk at all?

2:38 Wouldn't that be something?

2:43 Was it sounds like xo, xo or anything on the end? Or?

2:46 No, I doubt it.

2:50 Yeah, well, we've, you know, we have an Emergency Alert System. And if you're living down in the coast right now, there's probably hurricane sirens going off to warn everybody. And you might have seen before weather alerts that come into our phones right, here, If there's a heavy storm, flooding expected, etc. And so typically these things are run by the state. Do you remember? A lot of this was early on, I think in President Trump's presidency, or maybe it was under President Obama, that in Hawaii, all of the air raid sirens started going off because there was an imminent inbound missile that was going to hit Hawaii. Do you remember that one? Yeah, yeah. And, you know, so those things are typically run by the state. In the case of Hawaii, of course, it was it was a false alarm. But, this what you had last week was not President Trump reaching out to all of the women in the country

3:48 What it was was an emergency presidential text alert. The same types of messages that you've been getting from the state, historically now, the Feds can do. And this is the third time they've run a test it's been a little while since I tested it last time not everybody got these alerts and the idea is if there is something imminent, something urgent that happening and everybody needs to know about it that's how the messages going to get out because most people have a cell phone all of the major carriers are participating in this. and you know Ken we remember his kids learning "duck and cover" right, because of the Soviet threat at the time, when we were in school. This is kind of the modern-day version of this Now, they are calling this a presidential alert. It really is a federal alert but yeah not everybody got it which is kind of interesting and that's the reason they're testing it. In order to make sure that everyone does get it. So, that the in the event that there is some form of a national emergency and everyone needs to be notified right away they'll be able to to use it. So tell your wife, Don't worry about it he's probably she's probably not going to get another personal message from the president. We're talking with Craig Peterson our tech guru that man over there is Ken Auchulter

5:14 Yeah, you like the godfather of the WGAN morning news I'm, I guess I'm the guest today Filling in. Craig let me follow up on that for just real briefly because there's other things I, I'm curious to get your opinion on. My understanding is that not everyone got that presidential alert text, I, I'm I'm one of them. Maybe it's because

5:36 I didn't care at all about you. Sometimes, it's about someone else. Well, frankly, it was only the important people Unknown 5:48 Not everyone got that. In fact I was on a phone call, when it came in. Because I forgot that it was coming right or I would have waited and my phone call was completely interrupted and the alert came through. And then it was reconnected after a few seconds. And then the guy in the other end of the phone cut the presidential alert. So, I know it leads to people that got it. But yeah, there are still some number of people that didn't get it. And they were on various carriers. So, some Verizon people got it some didn't to some T- Mobile got it from didn't. I'm not sure of all of the details as to why some got it and some didn't. Other than some glitches in the system, which is why they felt they had to test it again.

6:34 Let's go to a different place. I'm really eager to get your opinion and analysis of this story that came out about an Unknown 6:42 tiny chip in China

6:45 equipment that's now infiltrating US Companies. Yes, please. Tell us. Give us give us to tell us what's happening. Craig? Well, this is there. Wow. Intrigue, okay. I don't even know where to start with this one. This is fascinating because of a story came out in Bloomberg last week. And Bloomberg was saying that major US corporations, and they named specifically Amazon, and they also named Apple. That US corporations had been infiltrated by the People's Liberation Army, at least their equipment had been. The Bloomberg story when it is some detail about it. And we've had over the weekend now, absolute denials from Amazon and Apple about this. Now, this is let's talk about the accusation. And then in fact, this week, there have been more confirmations that have happened. Apparently, China has this little teeny tiny chip that may be about the size of a grain of rice. And the allegation is that the Chinese military has been embedding these chips into computer circuit boards, into the motherboards of certain computers made by a server manufacturer, that that I've used for years called Supermicro, they make some really good stuff. They are a Taiwanese company like guy that owns it's based out in the San Francisco Bay Area. And they've been around for very long time. And apparently what this chip does is when the computer when the server boots up, it basically just opens up the phone line to China and gives them complete control over the computer. Now, the Bloomberg story said that Amazon figured this out, and started removing these pieces of equipment from the network's. Same things true with Apple, they figured it out, as well. Although, as I said, both companies have denied it. And this week, we have a company that says they have a examined these systems. And yes, indeed, there are spy chips on all of these devices, including devices that are used by the military and the federal government, including things like cameras, video cameras, and others. So, this is really kind of interesting, at least from my standpoint, because you know, I love the security stuff and figuring it all out and helping businesses with it. But we're talking about potential infiltration by the Chinese military of the CIA, as well as divisions, major divisions of the military, and maybe even some of our major corporations that are handling all of our data. And I frankly, I wouldn't put it past the Chinese to do something like that. We have

9:57 been talking to Craig Peterson, our Tech Guru who joins us, every Wednesday at 738

10:04 YouTube. I watch you to all the time, you know, I'm a, I don't know if you know, this big pickleball player and I, I go to YouTube all the time to learn, how to play pickle a ball. So if I can learn pick up all by YouTube. Can't our students learn their lessons in school by YouTube?

10:22 It's an interesting question. And my grandfather plays Pickleball, by the way, Ken Unknown 10:28 say that ages me doesn't it? Yeah,

10:30 yeah, there. There you go.

10:34 Yeah, YouTube, it's an interesting thing. Because there is basically everything you want out on YouTube, the quality of what you're going to learn is always a little bit questionable. But we're seeing more and more, online learning going on. You know, my wife and I, we homeschooled all of our kids. And you have eight children? Yeah, you have eight children. Oh, my

10:58 god, you're a saint

11:00 today, we homeschooled them all the way up to college. Then there was no YouTube, right? There wasn't any of this stuff. And it was a different world. You know, we use Texas Tech and some other things to help with the curriculum. Well, now we're finding that YouTube is replacing the textbooks and lectures in a lot of the schools, nationwide. And some studies have been done looking at the different generations of students and have found that millennials prefer to learn from textbooks, 60% of them, but it's switched now the next generation, which is called Generation Z, is preferring to learn from YouTube, about 60% of them. So Ken you have something in common with Gen Z. There you go. Yeah. So, and we're talking about Gen Z, we're still talking about the young kids, right, early high school all the way up through through college, frankly. But this, is going to be happening more and more, hopefully, they're vetting it properly. But, it really brings in an interesting question about our future and the future of our universities and our schools, high schools. There's a lot of lot of kids here in Maine that are living in very rural areas that are using online curriculum. There is some incredible stuff out there from every major university. So, I think that's a good move I think its overall a good move, let me put it that way. The study that was done by Pearson Education I had some good and interesting numbers in it I've got it up on my website as well as these other articles. But this is the trend of the future, guys Unknown 12:50 All right, our tech guru joins us every Wednesday 738. By the way, Craig, I saw the iWatch four I went to the Apple Store to look at it. Yeah, It really looks impressive and I don't even wear a watch but I yeah I think I think it's on my Christmas list now

13:06 Can you see it? Can you read it well enough?

13:07 You know, I believe it or not I look at the 40 and the 44, watches the 44 just looked too big on my wrist because I've got, you know, I'm small, I'm five feet five. So, I looked at the forty and you know frankly, yeah wasn't that hard to read. I mean it's not it's not the same as my iPhone Xs max, which I love by the way I love by the way, but I love the right just the iPhone particular with cellular service now, you don't have your iPhone I think it's really been a quantum leap forward Unknown 13:41 Yeah, nice. Nice good recommendation there yep. From Ken Auchulter also there you go.

13:46 Thank you next week.

13:48 Bye.

13:51 Don't forget register early register often Craig Peterson dot com you'll get into today's webinar and we do have a replay that's going to be up for a few days if you missed this it's so important for small businesses. Small businesses, you are the target. Small-medium businesses, because you just can't afford the people that frankly you need in order to keep your system safe. And, you also have a lot more at risk a look at the list. There are dozens of things that you have that are your business assets that if they were unavailable to you or stolen would be just a horrific thing. So, make sure you register and maybe you can get into the next series that I put on probably coming up in a few months. Craig Peterson dot com. Have a great day. Take care guys. Bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 9, 2018

50 million Facebook accounts were compromised, was your account one of them? Find out more as Craig and Jim discussed the recent Facebook hack as well as some great advice on how to create the perfect and secure password.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The Best Password Advice Right Now

 

PHISHING WARNING: One In Every One Hundred Emails Is Now A Hacking Attempt

50 million Facebook accounts were compromised. Was yours?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/09/2018

Facebook Hack Clone Messages - Have You Been Hacked

Craig Peterson: [00:00:00] Hi everybody. Craig Peterson here I have some feedback from yesterday's podcast about the the whole Facebook the hack the cloning, everything I went into a lot of detail on that are right here walk you through how to verify if your accounts been hacked how to check if your accounts and cloned what were these messages that you got from messenger and then while you're in there change your password so I got some password advice as well all of that and more this is probably one of the more important segments for you to listen to. I think you'll find it very, very helpful to help make sure all of your stuff

Unknown 0:40
is safe. So here we go with Jim

Unknown 0:43
if there was ever a moment when we need Craig Peterson This is it. I can't take getting any more of these messages on Facebook joining us now. The man the myth, the legend Craig Peterson. Good morning, sir.

Unknown 1:00
Good morning, Jim.

Unknown 1:02
Yeah, so I'm getting these messages. Okay. Over and over again. It's they're all the same. Hi, I actually got another friend request from you, which I ignored. So you may want to check your account, hold your finger on the message until the forward button appears. Then he hit forward and all the people you want to forward to. I had to do the the people individually. Please do not accept a new friendship from me at this time. What is this? What is this? Am I hacked? Or are they hacked or people just sending around the same stupid message?

Unknown 1:40
That's a really good question while he asked them know, here, here's what's going on. Facebook did just have a really big hack. And you know, we know Zuckerberg was part of that at least 50 million users. Right? We talked a bit about that last week. Yeah, yeah. And people are consuming what's going on here now was I one of the 50 million people that was hack there's another problem that's been floating around Facebook lately and that is people have been cloning account someone. Someone will create another gym Polito account and we'll put your happy smiling face on it and some other things and and basically pretend they are you. So what's going on here? So it's a kind of an impersonation thing was I have, etc? Well, the Azar No, you weren't half However, you can check to see if you were hacked. And the easiest way, Jim, if you're on the Facebook page, and anybody listening the one double check right now Go Go to the Facebook page. Okay, and Jim Polito show.

Unknown 2:52
Yeah, I got to so can I go to gym? Pulido first.

Unknown 2:57
Yeah, you're gonna want to check each one of your okay. Not not just Jim. So in the top right hand corner of the computer of the screen there. Now that you're logged into, there's a little menu icon? Yep, I got it. Okay. So click on that. And if you're on a phone, by the way, you're going to select Settings, because you're not going to have that little menu icon. Ok. So now you can click on security. Yep. And then underneath security, you're going to see something that says where you're logged in where you are logged. Yes. And wait. And wait,

Unknown 3:35
hold on.

Unknown 3:37
You see, messenger. Wait a minute. You know what? I'm on my I'm on my desktop. And when I click on the little the upside down arrow doesn't give me security says activity log news feed pro settings. settings. And then go to security. Yeah.

Unknown 4:00
username. Contact that account temper

Unknown 4:04
snack. Giving me security. Oh, security and login. Sorry. Yeah, yeah, I'm holding up everybody here. Like, everybody's like, Jim, for god sakes. can see Danny in there. Okay, go ahead.

Unknown 4:17
For now where you're logged in. This is the important one day if you have to go to this later on today, just whomever you want to get in the settings and security and then we're locked in. Because that will show you if someone else's logged into your account, which means you have an in house

Unknown 4:38
don't freak out. If you see yourself logged in from a different town does not mean that it's it's that you've been hacked, necessarily, hey, so our internet addresses, which is how Facebook's figuring out where we are. Our internet addresses aren't like a street address. So your internet service provider and Facebook take an educated guess as to where you were last year. So if if you're her in the Forrester and it's showing you as lost in in Boston, I might be a little bit worried or in Springfield might be a little worried about if it's a neighboring town. Yeah, I wouldn't want to worry about it too much. Now, what you can do is you can tell Facebook there to log off all logins all of your accounts. So if you log off everybody, then you're going to have to log back in again. So that that's the safe thing to do. And during the half last week, that's what Facebook fit for you. Okay, they lost you off of all of these other machines. All In fact, every machine that was out there, yeah, so we're talking about two different thing. Well, three different six. Really. Okay, so that's how to check its use in half. Now, obviously, while you're in security, make sure you change your password, you know, you should be using two factor identification sometimes called to essays or to fit

Unknown 6:09
the you know, so that's going to get a code from your phone, which is reasonable thing to do. If you're a business, you might want to get fancier. But turn that on. So right now, while you're in there, change your password, turn on your two factor authentication, have them send you a text when you're trying to log in. And you can also turn on alerts but unrecognized locket. Okay. So that's Hack number two is clone. So the next thing you're going to want to do is go up to the search bar. Yeah. And you're going to search for your name.

Unknown 6:42
Yeah, so just put in me.

Unknown 6:44
Yeah, they'll put in me or Jim Polito. I put in Jim played all fibers

Unknown 6:50
Yeah.

Unknown 6:52
And now search to see if there's any other pages that come back claiming to be you now there might be another GIMP Leto in the billion accounts. Yeah.

Unknown 7:02
Yeah. Cuz he got Jim Polito. You know, when they could ask you. If you I think it was for email or whatever, you know, you want Jim Polito and I didn't put it in quick enough. So I ended up with Jimmy Polito

Unknown 7:17
oh yeah yeah I thought Craig Peterson back in the day and then I didn't really pay attention to it and somebody stole it from me that's not good anyways yeah so if there is another gym Toledo pretending to be huge. Yeah, when you get on that page, you can click again on the menu button. And you can say reports this page Yeah. Now Facebook is telling us that they have right now have basically a 24 hour guarantee if you report somebody as cloning your page and other words for tending there. You they've taken content from your page, maybe your picture et cetera, and they put it up on a different page. If you reported clone, then Facebook says within 24 hours, they will investigate and reboot the page. Okay, then. so helpful. We're talking to Craig Peterson, our tech talk guru, just about this whole Facebook thing.

Unknown 8:14
So okay, that's good. That's too easy ways. And you know what, I passed the test. And because Danny told me where our corporate login is. And that's on my, on my desktop. I'm logged into the corporate. And then the last time my mobile was logged in, it was logged in, in my town. So I'm good. I mean, I'm good. And there's no other Hey, come on. When they when they made me they broke the mold. Craig, you know that

Unknown 8:49
too. So that's good folks are Craig Peterson, our tech talk guru getting us up to speed. This is the kind of stuff and at the end of the segment, when I give you when you gives you a number, you should text My name to it. And it will help you to get all this kind of information during the week. And no, he doesn't try to sell you anything.

Unknown 9:10
One more thing on this data production, which goes back to your original question. Hi, I actually got another friend request from you like these messages that we've been getting. Yeah, and I got them as well. And I got them. In fact, I got one from a mutual friend of ours, this is a whole, okay, this is this does not mean you were hacked. This does not mean that the sender's account was hacked in the, you know, the generic sense of the word. So the thing to do with these is just ignore them. Okay. It's just like you receive a spam, email of phishing attempts, etc. Just ignore these types of messages and emails. And I'm going to be talking more about those on the webinar today, because I'm doing those three free trial webinars on small business security. If you haven't signed up, make sure you go to http://craigpeterson.com, there's a sign up right on the homepage. But according to the FBI, Jim, you look at this message. Okay. Yeah, and it's not a hoax. And a lot of people recognize the grammars kind of poor and wait a minute, this looks weird. But according to the FBI, $14 billion has been stolen from small businesses because of this type of thing. And I mean dollars from bank accounts, not $14 billion worth of loss work, $14 billion stolen from businesses in the last two years. So when you get a message like this one that came in over the weekend, primarily on Sunday from Facebook, or you get a message like this in the email, do not respond to it. Do not click on it early, if it's from your CEO, okay? Or somebody else telling you to make some sort of final manful transaction don't do it. Okay. Simple enough.

Unknown 11:05
Alright, so you'll get all that information folks at the end of this segment. And you'll be able to

Unknown 11:12
get that webinar Now, before I let you go. The important thing passwords, passwords that are to protect you from hacking, what are they and how do you do it?

Unknown 11:25
Well, good timing, because, of course, as we just said passwords on Facebook. Um, here's the trick. For years and years, the advice has been Make sure you use our complicated password and you change it every 90 days, like uppercase, lowercase numbers, who have special characters and all this other stuff, right? That's what you're supposed to have done. However, not and by the way, that's still what the HIPAA standards say. And that's still what others standards is saying. So the federal government has not caught up to the National Institute of Standards and Technology. Two years ago, they came up with this bottom line us a few words strung together, so have a phrase three or four words that don't normally go together as a good way to do it. So pick four, right kind of random ish, we're use those as your password six dash or number or something in between them. That is the most secure password that studies out right now shows us the old advice of you know, forcing people to change their password using random letters and everything else. those standards have now been proven to make passwords left the cure know it's used for work together. You're going to string together like I hard Jim, Danny, have, you know, Craig? Any new password, right?

Unknown 12:54
Yeah. And. And then that is overriding decades of old advice. It's simple, it's easy to remember, which is important. And it's almost impossible for computers again, because there are so many characters involved. Just you just think of that one particular string, it's got to be 2030 characters. Wow. So that's the best kind of password. That's the best. That makes sense. That makes that makes a lot of sense. words that don't go together the hyphen, stuff like that those symbols, and how often should you change that password though?

Unknown 13:35
Danny said, How often should you change that password?

Unknown 13:38
Oh, well, the beauty is, it's such a good password, and you don't have to write it down that you can get away with that password for a very long time. We're talking about a year, two years, even three years, as long as you don't use it on any other system. Okay. Now, this is this is general password advice, right? Yeah, you're right. One of my FBI compatriots are different,

Unknown 14:03
right. But for the normal

Unknown 14:04
for the average person. Yeah, yeah, exactly. Home user. That's the best possible advice that I think you'd get anywhere. Wow, this was a great session. Craig. Craig Peterson, our tech talk guru, everybody. Okay. So what you do if you want to get this kind of information on a regular basis and warnings on a regular basis and you but you don't want somebody to try to sell you something or pester you He won't do. It just checks to my name, Jim to this number.

Unknown 14:40
855-385-5553. That's 855-385-5553.

Unkown 14:45

standard data and text rates apply and you'll get all this great information. Craig, I want to thank you so much for your help. Today was invaluable.

Unknown 14:55
Hey, thanks, Jim. Take care. Take care

Unknown 14:58
when we return a final word.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 8, 2018

Facebook accounts are being spoofed.  

Find out more as Craig talks with Jack Heath on WGIR.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 


---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/8/2018

Fake Facebook Accounts -- "I have been hacked"

Craig Peterson0:00 Good morning. Craig Peterson, here. This morning I talked a little bit about this whole Facebook hack over the weekend. Did you get an email from your friends, telling you that "oh, my their Facebook account had been compromised"? I got a couple of those, or something and message asking in just kind of odd English, asking you to forward something along or like something. Well, that's what I talked about this morning with Mr. Jack Heath. Also, a quick reminder tomorrow. Tuesday is day two of our mini-webinar series, so make sure you tune in for that as well Craig Peterson.com sign up right there in the homepage. So, here we go with jack Unknown 0:46 Welcome back to our show. Craig Peterson, a little bit later on this morning. and Craig I believe it's Craig right Justin, Craig, Good morning. How Unknown

0:55 Craig, How are you, sir.

0:57 doing great

0:59 and let me ask you about this. Up over the weekend, Justin I was just talking about this number of people I noticed people that have contact with the show "saying that it was not them" sending a friend request from Facebook with instructions that they have been hacked. Was there a little bit of hacking over the weekend for Facebook? Cuz I saw about three or four different people post that today.

1:19 Yeah, I saw that as well this weekend. I started digging into a little bit, and a lot of people are concerned because of the big hack that happened just about two weeks ago where 15 million Facebook accounts were hacked due to just incredible incompetence on the part of some of these people over at Facebook. It was a very very sophisticated hack, but still, they should have known better. These messages that you've been seeing, and they pretty much peaked yesterday, on Sunday are something that you can ignore. These accounts have not been hacked. There were all of these messages going out that you might have gotten asking people to click on things and talk to about accounts being cloned. If you are worried about your Facebook account being clone the easiest way to tell if it's happened is just search for yourself on Facebook. If you see another account in your name, that maybe has your photo, it is a fake account. If you see that, there's a little button that you can click on that other account and report it as fake. Facebook has stepped up their enforcement actions, and they say that within 24 hours they will delete it, but very few of these accounts were cloned. This appears to be related to the hack of Facebook that happened recently, and just like some of the business email compromise emails that you're getting. The best thing to do is to don't click on anything. You just ignore it and move on. You're probably just fine. Yeah, it is so hard to keep track of all this. Then and then half of the time, I don't know about if this just happens, but once in a while, it'll change your username and your password just from time to time, to mix it up. Half the time, half the time though this problem is, we

3:09 think we remember things, half the time when you go to do, it says you got to put in your current password, people you can't remember, right.

3:15 Craig. sure my password should be something different than 1234. That's Not a password, Yeah, you should follow the advice of the Democrat Party and use password as the password

3:29 on that right now. Oh crap. funny one. Craig does these. He's had his Wheaties, this morning. On Monday morning. Columbus Day.

3:37 Yeah, the best advice for passwords, nowadays. This changed a couple of years ago. Although, Congress has not updated the HIPAA regulations or others. But the best passwords, nowadays, are phrases using a few words strung together that's much better than a random password we found that these passwords that businesses have been enforcing where their password to be letters and numbers and special characters. These have become less secure, because of how people handle them. So, the best advice, Justin and Jack and everybody listening, is stringing together three or four random words with a dash or number between the words. Use that as a password and please use different passwords on every website. Use a password manager too. Yes, send me an email if you want more info on passwords I wrote up a special report about that.  All right, great stuff on business on great business Appreciate it. On Craig Peterson, dot com Thank you, Craig. As well and by this 

4:40 The first episode of our webinars, a little mini-series is up. We've got this masterclass going on, and we covered the Anatomy of an Attack. I think I'm going to end up having to add one more thing to this because there were a lot of questions. So, we may end up with two or maybe three more little webinars as part of our masterclass. I am not selling a thing this is all about giving stuff away. So make sure you sign up Craig Peterson dot com. I want to help 100 small businesses by the end of the year minimum. Okay. And, a lot of them have already signed up. I have the resources for it, and I want to help you this is true. I want to help. So, make sure you sign up at Craig Peterson dot com Take care. Have a great day. We'll be back again tomorrow as well as with a webinar tomorrow.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 6, 2018

The Chinese are at it again!  Now they have been caught implanting spy chips in the server motherboards they have been manufacturing. Listen in while I explain why this is a big deal and why it proves the point that President Trump is making about the Chinese. 

Why isn't anyone adopting the NIST Password Standards?  I will explain why they are easier to use and more secure. 

Why are schools using Youtube for Teaching?  Listen in and I will explain the thinking behind this and why it is a bad idea.

Airlines are continually under attack.  This week another one is breached.  Listen in as I discuss why they are targets and how they can stop it.

They tried something new for Alerting the Public Nationwide.  The Presidential Alert System -- There were some issues.  Did you get a text at 2:18 on Tuesday?

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.comoard

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/06/2018

China implants spy chips in popular server motherboards. Password Advice. Textbooks are so old school, Now its Youtube in Classrooms. Airline Hacks. Presidential Emergency Alerts. 

Craig Peterson: Hey, welcome of course you're listening to Craig Peterson. I am live on the radio every Saturday morning on some of these Northeast I Heart Radio Stations. So, I'm glad you're joining me. Hopefully, you join me every week. If you want to get a notification about the show, make sure you send me a text. I'll make sure to send you one when we go live every week, or if there is a big emergency. And, unfortunately, there have been a lot of emergencies, lately. Did Did you get one of those texts this week? Yeah, we'll talk about that, as well. These new presidential alarms. Well, text me 855-385-5553 with any questions, we'll try and get to them in the show, or I'll respond to you directly. Usually, within a couple of days, we can, I am usually busy doing some other things. So, it's hard to say, Well, today we are going to be covering a bunch of subjects. We have eight different subjects, you'll see them in this morning's email of my show notes to you. We've got YouTube replacing textbooks in classrooms. What do you think about that, huh? What you do with passwords. Turns out that the old advice is bad advice. And, there have been a couple of updates and we'll talk about, as well. A huge warning about our emails out there, something you might not be familiar with and I think you should, frankly. A bit of a an analysis here for the British Airways hack. If you're bigger business, you might fall for this same ploy, I got to tell you about this one, as well. Man, we're not going to get to all of this today. But, China, they've done some amazing things. Right now, there's some accusations about some of the stuff that they have done in order to spy on some of America's best corporate citizens. We've got new phishing scams, voice phishing scams, they're more clever than ever. And, the Fed here looks like for the first time may have broken into an iPhone x, well they got into it anyways, and will tell you about how that all worked, as well. Stick around, because here we go.

I guess this first article should not be a big surprise to most people. If you're familiar with the online world, in the least, you've heard of YouTube. I remember interviewing the founder, a young kid, of YouTube years ago. Well, it's become very big. Of course, now it's owned by Google, and it's replaced a lot of online, not not always, excuse me, as replace a lot of TV viewing. We have a lot of people who go online now in classrooms across the country, even. And, maybe even around the world. But, the classrooms are using YouTube. Now, remember when I was a kid and we would watch filmstrips, right now, it may be the occasional movie, they'd bring a projector and I was the guy that always set it up, because that was kind of cool. And, then we got these reel to reel recording machines. It was just really kind of cool. It used video tape. And so you'd string that tape between the reels and do all of that. It was really neat. And you edited it, just like we used to edit the audio where we take a razor blade to the tape and cut it up and tape it back together. We made our own videotapes. Yeah, that was just so cool. Later years of school for that one. But, now YouTube is where it's at. We're not watching those films in the classroom, filmstrips, boy, it has is changed. They are using YouTube. And the Generation Z has grown up with YouTube. Now, you might ask who's he was? Well, you know, the millennials, and then you had Generation X. And then Generation Y, and generations. Y name Y's name that became millennials. So, Y is millennials and now of course after y comes z. These are students that are the ages of 14 to 23, right now. So, they are getting into college, maybe even getting out of college and into high school. And, they're finding that Generation Z students preferred to learn from YouTube, versus books. Millennials like to learn a little bit more from textbooks and Generation Z it's down. So, it used to be 60% of millennials. Well, in fact, it still is preferred textbooks now, Generation Z, 60% of them prefer YouTube online. Now is not something, YouTube launched in 2005. So, most of these Gen Z kids grew up with it. 85% of teenagers say they use you to more than any other social platform. That's kind of interesting to. I don't know, there's anything terribly scary about this certainly a shift, I think it might be a shift in the right direction. Since now, you can get so much great information online on YouTube. You know why why not use it, frankly,

if you're a business, you probably have a server, a file server, we were helping them in fact, just this week as small accountancy firm, they have a few accountants, they have a Microsoft server in the middle of all of this, and they have all of their accountants data on that server, right. And they're trying to keep it safe. So, what did they do to keep it safe, they went ahead and they put VMware, which is really quite advanced for most small companies. But, it's a phenomenal tool if you use it, right. Of course, they weren't using it quite right. But they, they had an encrypted desk. So, the thinking was, wow, you know, we, when we boot our machine, even though it's in the VM infrastructure, we still have to give it the key in order for to boots, therefore, all of our data is safe. And, of course, we went in, and we did an analysis for them risk analysis, and we told them, okay, well, here's what we found, you're keeping your windows up to date, they're using Windows 10, and they have the professional versions, and they have auto updates turned on, which everybody should do. But none of your other applications were kept up to date. So, there are tons of potential security holes, there. And just encrypting the hard disk is not going to protect the data on it. Unless your server stolen, physically stolen,


What are the likelihood of that happening, right? It could happen, but it's not very likely. So, how do the bad guys get into these machines? And we discussed that a little bit with him. And there are a lot of routes in. Well, this route in just came out on Thursday morning, Bloomberg was reporting this. And that's kind of the amazing part. But, wow, wow, wow, wow. Chinese spies have reached almost 30 US companies here, including the big guys Amazon Apple, and it could be a lot more than 30. And, what they've done is they've compromised the technology supply chain. So, for instance, when we go into a place, right, we're going to a business we're trying to help the business and how do we help them? What's the best way to help the business out? Well, first off, we do a risk analysis, try and figure out if the data was lost, what would the risk be? What would their exposure be? And what do they need to protect, here ultimately, in order to keep their business safe? I think that makes sense. So, you go through this whole process, then you figure out, Okay, what are our priorities? What do we actually have to keep safe? And then how do we keep all of that safe. So, those servers are made by a few different companies, one of the biggest companies out there has been having some serious problems, for a while. And ,we've used their servers for a long time the company's name is Supermicro. And, it was founded by a Taiwanese guy, it's based in the US, out in California, they do all of their designs out there. They make these machines that are used for servers around the world. It can be a Windows Server could be a Unix server, it could be doing almost anything, for almost any company. But what appears to have happened here, and we're still waiting to hear confirmations from various companies. But, this is as Bloomberg is reporting it. They're saying back in 2015, Amazon began quietly evaluating a company called elemental technologies as a potential acquisition. They're trying to help with an expansion of a streaming video service. It's now called amazon prime video. So, elemental made software for compressing these massive video files, like the movies and TV shows that are part of amazon prime video. And getting them for different ready for different devices, and that's called transcoding. Well, it was kind of interesting, when they started doing the research, they found a course they done the work for the Olympic Games, which is pretty impressive, making sure all of that goes around. They've done stuff for the International Space Station. They had drone footage for the CIA that have been funneled over there. So, it's kind of cool. And it turned out of course, because of the drone footage elemental had some national security contracts. Well, it was really interesting, not going to go into a lot of details here. But Supermicro computer. A company we've used for years, apparently, had been infiltrated. At least one of their suppliers had been. Nesting on some of these servers motherboards that Amazon examined apparently was a tiny microchip. Not much bigger than grain of rice. And it was not part of the boards original design. Apparently they hid it inside the PC board itself, the printed circuit board right inside it, it's just nuts. These elemental servers can be found inside the Department of defense network, CIA drone operations, onboard networks, for Navy ships and elemental was one of hundreds of companies that use these Supermicro computers. So, they had a top secret probe, that still open apparently after more than three years. But, it determined that the chips allowed the attackers, to create a stealth doorway into any network that included any of these altered machines. Absolutely phenomenal here. So, an interesting article, you'll find it up on my website, along with all of the articles for today, of course, Craig Peterson.com , make sure you visit me online. Be glad to see you, there. But this is scary, because we have now, bad guys altering the guts of the computers. Oh, by the way, who were the bad guys, kind of looks like it was the People's Liberation Army. And not only did they find the chip, they found what the chip did, how it embedded itself. And in fact, it was sending traffic out, that the companies, in this case, Amazon and Apple, just weren't expecting to go out. So, both companies apparently have had a little program in place, quietly replacing all the SuperMicro Machines, but are denying in fact that they have them at least so far. We'll see where that ends up at.


Well, let's move on to the best password advice. This is one of the top questions people have asked me, we have a special report dive prepared on passwords. And if you want a copy of it, and you want to know how to properly generate and maintain your passwords, I've got some emails, you have some of the top password programs out there password managers and things, you can just go ahead and text me let me know my direct text number, its toll free 855-385-5553. Of course, you might have text rates or data rates that you might have to pay, but I'm not going to charge ya, 855-385-5553 and just ask for my password special report. Be glad to send it to you.


But a few years back, and NIST which is the National Institute of Standards and technologies, they submitted some, digital identity guidelines. In other words, these are the guys in the government that come up with the password advice. And they had some new recommended password policies that were frankly running parties, contrary to decades of previous advice out there. And then that's shall they said, instead of having these long, complex, frequently changing passwords, you should do something different, because they found that if you have long and complex and frequently changing passwords, companies were at greater risk, because it increases the odds that people will reuse those hard to remember passwords and multiple unrelated security domains. Okay, so the compromise of one domain or one machine can more easily lead to another. So, what's NIST saying now? Well, they've got more than two decades of compromises, backing them up, they've captured logged on credentials, logged on credentials, as well. Otherwise unrelated security documents and domains. They've cruised the dark web out there to find out what's going on. It's almost impossible to count the number of compromise that have happened. But it's easy enough to look at the passwords. And here's what their guidelines are, keep them easily remembered, use multiple words. Most of our passwords nowadays are three or four words randomly chosen, and some combination with some special characters in there as well. But none of the major computer security regulations or guidelines, including HIPAA, SOX, PCI, NERC and CIS are recommending the newer password policy advice, after years now, since NIST came out with this new advice. So, should you obey the HIPAA policies if your small medical practice or the NIST guidelines, I think you'd be on pretty good footing, but you might want to talk to your lawyer frankly. But I think you'd be on pretty good footing if what you decided to do was follow the NIST guidelines, it's going to be easier for your employees. They are going to have better passwords and you are guaranteed to have better security.

Alright, well, back in the "Can they unlock them or not category" we're going to talk about the feds and an iPhone x. Well, this is a huge problem, frankly, for well, bad guys. And it might be a bad problem for yo, too if you are trying to keep your information safe. Because, ultimately, if the Feds can get that information, maybe the bad guys can, as well. And that's obviously something you don't want to have happen. So, an iPhone x is different than many of these other phones that we've had in the past in that it has the ability to use your face, right? So, you just hold it up and it recognizes your face and then unlocks. Well, we know that some courts have upheld that they can force you to give your fingerprints, right that you have to give your fingerprints they are taken anyways, when you go ahead and you are arrested, right when you're in jail, or maybe not quite in jail. But in the police station. Well, how about your face? Do you have the right to keep your face private to keep it I don't know, safe, whatever you might want to call it that kind of the bottom line question here. What can you do in order to keep your iPhone 10 locked or locked, I should say? Well, there's another investigation that Forbes had come up with here recently about a child abuse case. And Forbes, was was able to uncover the first known case in which law enforcement used Apple face ID facial recognition to open a suspects iPhone. That by the way, is by any police agency anywhere in the world. They did a bunch of research to try and figure out, Are the police doing this? Can they force you to? This happened in August, it was an FBI search of a 28-year-olds home in Columbus, Ohio. And that month, he was also charged with receiving and possessing child pornography. So, they went in with a search warrant, and this federal investigator told him to put his face in front of the phone, which he did. And that allowed the agent to pick through his online chats, his photos, whatever else he deemed worthy of investigation. So, this is a pretty significant moment here. Where we're talking about whether law enforcement can or should, be able to force you, frankly, to be able to unlock your phone to unlock your device.


We'll see we'll see what happened. We still have two companies that are saying that they can unlock all iPhones, including the iPhone 10.
It's a device, here that costs 15 to $30,000, that they can buy in order to break into iPhones. see GreyKey and the other Yeah, the other one Cellebrite. So, now facekeys been used for the same purpose, We'll see what happens using a person's face as evidence or to obtain evidence is normally considered lawful. How about when it's used to unlock something? We'll keep an eye on this for you will let you know what ends up happening, as we go forward. And of course, as the case progresses.


This week, and it was something interesting happened has never happened before. Because it's never existed before. I was on a phone conversation. And right in the middle of that conversation, my phone came up with an alert. Did you get that alert? This is part of the Federal Emergency Management Agency, and they put a whole new service in play. And, it's called FEMA's new wireless Emergency Alert System. Some people didn't want to get the message. But they got it any way. Steve was on a phone call at the time. And while he's on the phone call, of course, what ends up happening, this alert goes off. And the guy on the other end of the line also had the alert go off. So, that's a bit of an issue, right? Having that alert go off in the middle of a phone call. So, not only did the alert go off, but in on top of it all, it cut off the phone conversation now didn't hang up. But the audio from that phone conversation stopped for about two seconds, while he was on that phone call. Well, some people got it. And there wasn't a warning that went out before. I don't know if you heard that they were going to do this. I certainly did. But four staffers at Wired magazine, who published an article about this, did not get the alert at all. And they were all on major carriers. I was on T-Mobile at the time. Verizon and T Mobile both had users that did not receive that alert. So, this is a whole new tech, we've never really had this before. Brand new phones insome cases didn't get the message, others did. And that's why you run a test. I just like, remember in Hawaii last year, before President Trump was able to stop North Korea from sending all of these missiles over Hawaii

In Hawaii last year, they accidentally sent out an alert. In fact, they I think they even sound at all of the sirens, air raid sirens and everything else. Well, you don't know if it's going to work unless you try it. So they tried it. And, the whole idea is to improve the warning delivery. So, if there is something major about to happen, you just might get an alert, you should also be getting them if you're in an area that may have a flash flood warning or some severe storm activity. I've gotten them before, that's controlled, in most cases, by the state's themselves. So, the state's decide what they want to send out. What they're not going to send out. And, this case is the only one I know of where the feds have tried to send something out. And they can, by the way, they can send these things to just individual localities. So, there's a tornado that hit as it's moving, they can send out warnings, tornado, you probably know it's it's on your doorstep. But that's usually done by the states. And who knows what the feds can use it for. So, you may have gotten that this week. You may not have gotten it, this week. But I think it's kind of cool. It's a good use of our cell phones for emergency presidential alerts.


So next up, we've got a phishing warning. Now we've talked about phishing. This is the pH fishing. And this is a very big problem. And it's it's huge, and the hugeness of it I think will become pretty apparent to you here shortly.


But this is where an email comes in, and it looks legit. Now as part of my webinar series I'm doing right now. And in fact, you can even watch the replays. Still, if you're interested, just let me know I'm doing free webinars for small businesses, telling them some of the secrets here behind small business cybersecurity, things that need to be aware of, and things I can do to fix the problem ultimately. So, it's continuing on this week, we'll have a couple more sessions. So you can just email me at Craig Peterson dot com here if your interested, But part of what we covered was the anatomy of an attack. And when we're talking about this type of attack, you know, most people, this is different. Most people think of, oh, there's a hacker and they're sitting there and they're trying different passwords, and they're trying software that's cracking their way into our organization. No. In most cases, that's not how an attack happens. And we're talking about a huge attack vector. The FBI says that $12 billion dollars has been stolen from businesses using this type of an attack. That's, that's a huge deal. I'm very, very big deal. It's not theoretical either. So, the Department of Justice just published some documents, and it's showing how email played a key role in the 2014 Sony Pictures breach, remember that one. Remember the hack of the DNC, the Democratic National Committee, where they said the Russians hacked them. It wasn't hack, either. It was this type of email phishing that was happening. And it only takes one of these malicious phishing attacks, to destroy a small business. And about 50% of small businesses find that if, if that small businesses hacked if they lose their customers data that in about half of the cases their customers don't want to do business with them anymore. So, that's a pretty, pretty big deal. So, researchers are out there, here's a stat that's going to surprise you, over a half a billion emails were examined by researchers over at Fire Eye they're looking at emails that were sent just the first six months of this year, isn't that amazing? A half a billion emails they have access to. And they found that 1% one in 100 emails
were out right malicious. Now, we're not talking about regular spam, where someone's trying to get you to buy this special pump, that's going to help you out right, we're talking about malicious, nasty email. The whole goal of these things was compromising a user or network. And when you get rid of the spam from that pool, so in other words, when you consider all of the messages that weren't spam, only one third of emails were considered clean. So, two thirds of non-spam emails, were malicious in nature. So, we're talking about a huge problem, a problem that can absolutely kill your business. And, that this isn't just true for businesses, right? This is true for individuals in their homes and everything else because you get email too, not just businesses, 10% of these are blocked, typically. 90% of them don't involve malware in the initial attack. And with my training I'm doing this week I'm showing you how exactly it happened. I walk through a woman who is doing exactly that. And she is not using malware, she is not using viruses, she's not using ransomware to get her nastiness into the businesses networks. So we walked through I'll show you exactly how it happens. Be careful this is a brand new article it's on from ZD net and it's up on my website as are all of the articles today, that we're talking about. Quick hit here before we run out of time today. Voice fishing is becoming even more prevalent than ever has before. Its easy to forget that we have got scam artists out there, but they're using your your voicemail. To fool you up, here's a sample of female voice explaining the credit union, to block phony looking charges in Ohio made to his debit ATM card. And, then she read him the last four digits of the card. It he pulled out this card from the wallet it was the correct last four digits. So she he told the lady need to replacement card immediately because he was going to travel out of state without missing a beat. The caller said he could keep us card and the credit union would simply block any future charges, that weren't made in either Oregon or California. Okay, so this struck that guy's a little off and a little research happened. So, be careful of phone calls. You never know. They may or may not be legit


Hackers, here they got into British Airways defenses and they got behind the doors. They disclosed British Airways, a little bit about what happened. But, we're talking about a data breach impacting information from roughly 400,000 bookings that were made just 400,000 over the course of about month. Three weeks, actually, it's crazy. So, names, addresses, email, sensitive information, pay card details, it looks like even some passport information was all compromised. Why? Well, because they had a problem on their website. This page that was compromised, hadn't been modified since December 2012. So, we're to the wise of your business person. And if you have a website and you are not maintaining it properly, or applying patches to it, making sure its using the latest, greatest code, you could have your information stolen. And, like British Airways, and so many other businesses lose customers. Because remember what I said the latest stat 47% of people will not do business with any business that has had a compromise. So that's frankly, I think that's a big deal. There's a lesson to be learned there for all of us. So thanks for joining us today. Again, if you want some more information, make sure you sign up for my webinar. It's you're going to be coming in in the middle because this is a webinar series but you'll find it right on my homepage at Craig Peterson dot com, this is free, no credit card for registration, right. I'm not I'm not stealing your money from you. But I can going through explaining this stuff and how it applies to small business. Because small businesses, they are the backbone of our economy. They are the job creators in this country. We need to make sure they're protected. And frankly, they are amongst the least protected of everyone out there. Well, with the exception of homes and in most cases homes, then you might benefit from this, as well. But we're really talking about small businesses, I really hope that somebody's going to come up with a great solution for homes. But still, the costs are too high. I'm unable to get them down for small businesses. But as far as homes go there, they're still not in the right price range. But at least all of this wonderful code and software that's been available for the fortune 500 companies for all these years, is now available through small businesses or for small businesses I should say through us. So, anyways, this is all free. I'm trying to help, you're going to learn a lot. You can take the replays of the previous sessions, if you'd like to, and you can ask some questions, you can get on as we have a couple more sessions this week. I'll be holding more webinars as time goes on. But Craig Peterson dot com register right there. I'm not a spammer. I'm not going to sell your information. Anyways, have a have a great week and we'll chat again next week. Bye-bye.

 ---

Related articles:

Feds Force Suspect To Unlock An Apple iPhone X With Their Face

The Big Hack: How China Used A Tiny Chip To Infiltrate Major U.S. Companies

Why Didn’t I Get an Emergency Presidential Alert Text?

PHISHING WARNING: One In Every One Hundred Emails Is Now A Hacking Attempt

YouTube Is Replacing Textbooks In Classrooms Across America

How Hackers Slipped By British Airways' Defenses

Voice Phishing Scams Are Getting More Clever

The Best Password Advice Right Now

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Oct 3, 2018

5G is almost here. Craig talks with Ken Altshuler and Matt Gagnon about how everyone is getting ready for it, about Cyber Security Awareness month, and how interesting the new Apple Watch 4's new features are.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

 

5G Cellular Data Service Is Almost Here — Here’s How Everyone’s Getting Ready
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/03/2018

FCC Chairman Ajit Pai - 5G Cell Rollout - October Cyber Security Awareness - Small Business Security

Craig Peterson: [00:00:00] Hey, good morning everybody. I had a good chat this morning with our friends up in Maine. It's kind of cool they do this I think what about once a quarter least every six months, they have breakfast. It's kind of a politics and eggs type thing. So Ken and Matt were out of that. But we still had our little conversations we talked a bit about Ken's, new desire for the Apple Watch for a little bit about Facebook. And we talked also about Ajit Pai who is, of course, the new chairman of the FCC. He's been there for about a year or so now and he came to Maine and talked. So we talked about the new 5G rollout some of the things Ajit had said at a small conference that they host it up there and I talked also about this really important cybersecurity thing I have going on for small businesses. So we talked about all of that we've got it all put together and it's it's all here and if you have not registered for this, I do have replays available for the next week. So you can send me an email or text me and let me know that you're interested. I'll be glad to follow up with you just to me@craigpeterson.com or you can text me at 855-385-5553 Hey Have a great day and I will be back for my live radio show I Heart Radio show of this weekend.

Matt Gagnon 1:35
We are here live at the Portland Regional Chamber of Commerce's eggs and also some.

Ken Altshuler 1:41
A lot of people here today.

Matt 1:41
There are. We're here at the Holiday Inn by the Bay and yeah, there's filtering in but they did slow down which means that the program is probably beginning soon. So...

Ken 1:49
Did you notice every gubernatorial candidate came over to our tables?

Matt 1:53
They did. I got a handshake from Janet and everything.

Ken 1:54
Yes. Yeah. And Shawn was very friendly, and Karen didn't really chat with us.

Matt 2:01
I got a wave, as he walked by.

Ken 2:02
Queen's wave. And we got high five from Kerry. exclamation points.

Matt 2:08
Side five. High five. Well, anyway, let's go back to Craig Peterson, our tech guru who joins us as.

Ken 2:11
Well we can't go back if we haven't gone to him yet.

Matt 2:13
Good point. Let's go to Craig.

Craig 2:15
Well you're with me last week, right?

Matt 2:17
Yes. There you go. Thank you, Craig. Absolutely. We're back. Back to you, sir.

Ken 2:22
Craig, I was gonna ask you about the Facebook hack. But I must tell you. I've been I've been reading about the iWatch 4 and this one looks spectacular. I think I'm gonna buy one.

Craig 2:36
Yeah. Yeah, a lot of people are really excited about this, iWatch. iWatch 4 is kind of a first watch that maybe Apple is going to have a bigger hit with, you know, when we're comparing all four models, right? The iWatch e or the Apple Watch 1. It is not really an iWatch Ken. They call it an Apple Watch. But it's, it's the most popular because there's no big wins in two or three. But four is absolutely phenomenal to watch. And I played with one last, no, two nights ago. And I really liked it. I, you know, I'm thinking about buying one as well. But I have the same problem you do. I have a hard time seeing small things. So it's, yeah,

Ken 3:21
And we were able to, I had a friend who has who actually has the iWatch 4 now. And it looked like it was a little big one you can actually see some of the stuff on it.

Craig 3:30
It it is and you can increase the font sizes and you can have to scroll. You can do a lot of stuff with it to make it a little better for those of us that have presbyopia you know that have the problem seeing things up close as we age. So I think they've got a winner on their hands. There's no doubt about that.

Ken 3:49
So let's let's get to some serious stuff though.

Craig 3:52
Yeah, exactly.

Ken 3:56
Facebook.

Craig 3:56
The whole thing about the Facebook hack is really interesting because this month is Cyber Security Awareness Month. So we've got to thank the Zuck for bringing this to all to our attention. They get out there because Zuckerberg's account was hacked. As we're a minimum of 50 million other people's Facebook accounts. Now I'm saying a mil, a minimum of 50 million. Because at this point, we don't have full disclosure from Facebook, they're still trying to figure everything out. It's a real problem. very sophisticated hack, I have to say whoever did this really knew what they were doing. Because they had to use three different bugs in Facebook systems and use them against each other in order to get into these accounts. So this may well have been a nation state actor. In other words, China or Russia, China has been very busy lately in attacking us, our infrastructure, our computers, etc. So may well have been China could be some other countries. Who knows Iran and North Korea, they both have big cyber attack facilities as part of the military is out there. But if you were hacked, you're going to have to kind of wait a little while to find out because we don't know exactly what might have been stolen. And it's going to be on a by person basis if anything was stolen. But if you had to log into your Facebook again this week than that probably means your account was one of the ones that was compromised because the attack use these tokens that Facebook what's on your computer to know it's your computer so they don't have to log in every time. So kind of a big deal.

And I've got to mention too, because it's Cyber Security Awareness Month. And because the FBI, his newest statistics that came out about a month ago are saying that about $12 billion has been stolen from business, $12 billion cash stolen from business over the last 24 months. And since most small and medium businesses just cannot afford to have the technology help that they need when it comes to the cybersecurity I'm doing a couple of free webinars here, actually a series of three, one starting this afternoon. So absolutely free. There is going to be a ton of great information, I'm going to go into a little bit more depth and everything. Obviously, I'm not going to try and turn it into a cybersecurity expert. You got a business to run, right. That's part of the reason that you're having troubles with your cyber security, you have a real life but the bad guys are coming after you more and more and more so this afternoon at 4pm. I'm going to be doing the first in a series of three webinars for small and medium businesses to help you with awareness help you know what to do help you know how to fix these problems. So if you want to attend hand, it's absolutely free. No credit card nothing. Okay. This is information packed. Just either send me an email just me@craigpeterson.com. me@craigpeterson.com. Send me an email, let me know you'd be interested in attending. I'll send you the link and stuff or you can text me so obviously if you're driving, you're going to have to call back to this station and ask Danny for the phone number okay to text. But you can also text me at 855-385-5553. Believe me, this is a great service. Everyone's been telling me I did one of these last summer and I'm probably going to do some more this fall. But just text me 855-385-5563. We're going to be talking about the security problems that small businesses have. Here's Zuckerberg got hacked, right? Mark Zuckerberg accounts on hack Facebook got hacked they can afford with billions in the bank. They can afford to have the security people cover everything up, take care of everything. You as a small business person. And then this is happening every day when you lose your data. When you're busy. When that data is disclosed and your reputation is hard that enough is enough to destroy your business. So you've got to make sure you understand security that it's being taken care of properly. We'll talk a little bit about outsourcing it to local it firms, etc. What kind of questions should you ask them will cover all of this stuff over the next three webinars which are over the course of a week but send me an email just me@craigpeterson.com. I'll sign me up this is it could not be more important.

Matt 8:51
We're ralking to Craig Peterson, our tech guru who's joining us as he always does at this time every Wednesday to go over some tech topics. Craig, I'm going to name drop. Please don't please don't hold it against me. But Ajit Pai who is the chairman of the FCC joined the Maine Areas Policy Center my organization for a big lunch and talk a few weeks ago. And when he did I had a chance to talk to them a little bit. And he told me all about 5G. He kept talking about 5G deployment. 5G here how we're going to get it here. How are we going to do it here? What it's going to mean for you know, the country in general, and how we use the internet and all that kind of stuff. So 5G is a topic of conversation to say the least. And it is something that we all have an eye on for the future. Is it is it quote unquote, here yet? I mean, do we have 5G? Should we look forward to this very soon?

Craig 9:39
Yeah, yeah, it's interesting, because 5G is not going to start out as 5G, basically, they adopted a standard, it was accepted last December for a new 5G standard, which is basically just an enhanced 4G or LTE that we're used to right now. It's going to roll out, it's going to roll out pretty quickly, it's already rolled out to some kind of some test markets to see how it's all working. But it's going to be absolutely phenomenal. This is a fifth generation of cell networking, it's going to provide a lot more data bandwidth at a much lower price. So this is going to be something that's going to kind of hit the cable companies who have been providing us with internet and, and also the phone companies. Because in depending on where you are, if you're out in the middle of the woods, this isn't going to help you much. But if you're near an area that has a lot of people in it, they're going to be installing a ton more cell sites or the little micro sites, there will be a probably four or five of these micro sites for every cell tower. It's going to be less obvious, it's not going to make this guideline look worse. And it's going to allow all of our devices to have incredible network conductivity.

Matt 11:04
And not to interrupt you, Craig, but from what I understand about this is what you when you're talking about the deployment of these things, instead of these giants cell towers, it's essentially something the size of like a pizza box that's going to be able to provide this connectivity, right. I mean, so that by itself, you know, it helps deployed in more places, because that way, you don't have the same resistance to it with this giant tower, you know, that you used to have to put up you know, now you just have something that nobody even barely even notices, which might help clear up some of those dead spots. And also with faster.

Craig 11:33
Yeah, it doesn't looks like trees, right?

Matt 11:36
Yeah. Big trees.

Ken 11:38
They're very attractive. Like Christmas trees.

Craig 11:40
Yeah, yeah, you're right. Those are the micro sites and the micro sites they need a lot of them and small businesses that own buildings are going to have the opportunity to host one of these little pizza boxes basically these micro site they will be everywhere. They aren't going to spread very quickly which is nice as well it's not going to be ugly and you're not gonna believe the tougher because everything you know our cars need this in order to coordinate for the autonomous vehicles out there the new clothes like Levi's came out with a new Levi's jacket that has built right into it sensors and they can be network connected. You know your coat is network connected but you talked about this 4G phone.

Ken 12:29
You mean the coat's talked, your Levi's coat's talk to other Levi's coats?

Craig 12:35
Yeah exactly. That's what it is. And the Levi's coat can control your other devices right from a sensor on your wrist in the coat. Okay, so everything is about to change. We've got Apple working on these Google Glasses type things. Of course Google is as well. Other companies are you'll be able to be walking around have alerts pop right up, you'll see them like a heads up display. And and for all of this, we needed bandwidth. And that's what 5G's going to provide. That's why we've got sprint and T Mobile are trying to get together they're trying to do a merger waiting for all of the regulatory approvals in order to compete in the 5G marketplace. But everything changes and and Matt, anything else that just said, because that guy is really on top of it.

Matt 13:29
I said a lot of things. I was one of the more interested ones I thought, you know, we talked an awful lot about net neutrality, which I know we've gone over the program more than once
and sort of what we've seen you covered that a couple weeks ago, I thought about the change in the sort of internet speeds and our ranking internationally and how it's starting to lead to some investment in that kind of thing. But you know, generally speaking, things like that. Yeah, he was he was definitely a good talk. It's very interesting.

Craig 13:52
Yeah, yeah, good guy. So everybody, don't forget today. I'll give it out again right now phone number to be able to attend this series of free webinars. It's informational, no credit card needed. It's all about how to secure your small business, how to find someone to help take care of your small business security and it's all going to be via webinar and you can find out more just email me@craigpeterson.com.

Ken 14:23
Our tech guru Craig Peterson joins us every Wednesdays at 7:38 this not being an exception. Craig, thanks for joining us. I may go look the iWatch this weekend. So I'll give you an update next week.

Craig 14:33
Oh cool, thanks Ken.

Ken 14:36
Talk to you later.

Matt 14:37
Alright, so we're gonna take a quick break here. We'll come back.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Oct 2, 2018

This morning, Craig talks with Jim Polito about the latest Facebook hack. Was your account compromised? Find out more about this new hack and how to remove yourself from people search sites and erase your online presence.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

How To Remove Yourself From People Search Sites And Erase Your Online Presence

50 million Facebook accounts were compromised. Was yours?

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 10/02/2018

What Data Are Websites Keeping - How Do You Scrub Yourself From The Internet

Craig Peterson: [00:00:00] Hey, good morning, everybody. I'm putting the final polishing touches here on today's webinar. I've got this series going in case you haven't heard this week, three absolutely free webinars, no credit card required. Nothing all about security for your business. So I'm trying to raise awareness. It is Cyber Security Awareness Month. And hopefully, we'll have a lot of people learn a lot of things from this. This is not a big sales job. We've got three webinars. I do have an offer at the end. But there is a ton of important information. And people that have attended these webinars in the past have said some really great stuff about it. So this morning I was on with Jim Polito, we talked a little bit about the Facebook hack. But we also went into quite a bit more detail about something that I think affects us all in this is our information, where's it stored online? What are they doing with it, and how can we opt out so all of that and more right here with Jim Polito if you want to attend the webinars you gotta let me know and let me know right away. Just email me@craigpeterson.com. That's probably the easiest way to do it. me@craigpeterson.com.

Unknown 1:23
The man with all the answers. I'm talking about. Our good friend at Tech Talk guru Craig Peterson. Good morning, sir.

Unknown 1:32
Good morning, Jim.

Unknown 1:34
So much to talk about today. I want to get through all of it. Let's start with Facebook.

Unknown 1:40
Be afraid. Be very afraid. Right?

Unknown 1:45
Yeah, you know, here's Facebook and company that we all we trust.

Unknown 1:50
Yeah,

Unknown 1:53
yeah, you know, we talked about Facebook before now the monetary and everything and spiking as well. Facebook investigation is still ongoing. In case you haven't heard of. They were hacked. Least 50 million people. There's doubts now. But it was a few as 15 million people's accounts were hacked, including Mark Zuckerberg himself,

Unknown 2:15
his own his own account.

Unknown 2:19
Whoo. To find a now

Unknown 2:24
we've got a Canadian Thanksgiving coming up. So gotta get the A's out there.

Unknown 2:30
Okay.

Unknown 2:31
Hey, okay. Boy.

Unknown 2:34
The world was watching TV the other day, and it was claiming to be Canadian. And he had no Canadian accent at all he didn't face. So rewrite

Unknown 2:46
that story instead of sorry, how did he say? What did he say? You know, when somebody said, What time is it? It's a boot. Nine o'clock. Did he say that?

Unknown 2:56
You know? Yeah. No, he didn't. He said. Schedule instead of schedule. Schedule. Yeah.

Unknown 3:04
All kinds of things. You know, what's going on with didn't see process in place of process.

Unknown 3:11
Yeah, exactly. He actually said, we're making progress.

Unknown 3:16
It was the thing he didn't get a single thing.

Unknown 3:19
Canadians. Now we can't have it. It's it's all part of this new rework of NAFTA. Too many fake ad. And so Facebook. What? What's going on?

Unknown 3:30
Yeah, well, this was a very sophisticated hack. And I'm not gonna go into the details because it's like crazy sophisticated, the, to some Oh, off to tokenize basically cookies and, and how to fake out the website. And they had to use three different bugs that Facebook ad in order to make this hack work. And Facebook did catch it hard to tell exactly how long it went on. They still haven't decided to all of the details, at least announce all the details yet. But if your account was hacked on Facebook, the there is a sign there is a way to tell. Okay, that is what they were using for the hack was the automatic login, right? You go to a lot of sites, and they recognize you based on the machine you're coming from. Right. And they'll just walk you right in. Right. Obviously, bad idea for your bank. Yeah, and various other places

Unknown 4:30
that don't do that.

Unknown 4:32
Yeah, exactly. That type of an automatic login is what was used. So Facebook went ahead and expired those tokens on all of them accounts that they think we're half and that means you would have had to have we logged into Facebook this week. And that's where the tell you were hacked. it it's it's hard to say what they got from Facebook. Yeah, we'll know more over the next week or two and more information comes out.

Unknown 5:01
Alright, so what should I do right now, Craig,

Unknown 5:07
if you use the same login name or password on Facebook, if you use that same one on any other account, it's time to change your passwords again. Because what they'll what they'll do is they'll use the information they gathered in order to hack you another something else that's happening right now. And this is called a business email compromise. And what they're doing is they're mining data about people. Now, the FBI just came out with some new stats about two weeks ago and said that over the last 24 months, over the last two years, the bad guys have stolen more than cloud billion dollars out of business bank account.

Unknown 5:54
That's that's what you told us about that email before too.

Unknown 5:58
Yeah, exactly. So what you can worry about with a Facebook hack here is the bad guys are going to try and trust you, they're going to send you an email, it may appear to be from your boss, or someone else, you know, it might be from a friend or using this also for various types of extortion. So you may get a phone call or text or something else that looks like it's from your friends saying that they've been taken hostage, right, and that you have to pay or maybe they're in a hospital, they need some money, wire graduate. All of these tricks are part of that $12 billion, it's stolen. And you should be careful because Facebook now are the bad guys. Now how your information from Facebook about who your friends are. Remember, you uploaded your contacts to Facebook. Many people did this.

Unknown 6:53
Yeah. And now the bad guys may have access to it. We just we don't really know yet. And it's going vary from account to account as to what information they might have taken. But it's a big math and will keep up to date. All right, password change. And speaking of keeping you up. Today, we're talking with Greg Peterson, a tech talk growth the end of the segment, I'm going to give you a well, he's going to give you a phone number, you text My name to it. And he will keep you updated on all of this stuff. And he won't sell your name. He won't give it away, won't try to sell you something. And so you might want to consider doing that standard data in text rates apply. All right, let's get on to this other thing, which I really took advantage of as a reporter. These people search sites and a lot of them are free. You don't have to pay I go in there. I put in Craig Peterson or Robert Peterson. And there he is. I get a lot of information. Where is he lived? How old is he? I can sometimes get phone numbers. Other things. How do I you know, I liked it as a reporter. But now as private person, how do I protect myself from these sites?

Unknown 8:05
Yeah, they are used by a lot of people. Again, it goes back to what I was talking about a second ago with the whole problem with business email compromise, you gotta be gotta be super careful about this. But how do you protect yourself, the easiest way is you go to Google and you do a search for yourself, and find where your information is out there. So that you can ask for to be removed. Okay, I've got a great article up in it. It's from ZTE. NET on how to do this on my website. But bottom line, Google is your friend. If you're in the EU, you have the so called right to be forgotten, and citizens can request the removable Movil any information from Google as well as other Google own products and many other sites. But you and I, you just can't do that sort of thing. So you really want to do you want to do privacy check up on Google. Okay, that's your first step. And Google has just searched as Google for privacy checkup. And it'll go, it'll open a page for you, it'll tell you about what information they have about you, it'll allow you to remove a lot of it as well. They've also got a security checkup and others. So that's the simple way to do it. There's more complex and will constantly ways to do it as well. And by the way, this article goes on for pages and pages. Yeah, but there, there are services that you can pay to remove you from pretty much everything. Now, the NSA isn't going to remove your data, like they're going to keep all of your phone records and everything else they've gathered. But basically, pretty much every site out there will remove you except for the credit reporting agencies, you know, it's like Equifax will keep talking about No,

Unknown 9:59
no, I know that was awful. But I can understand that one. Now. Who's are they reputable. These folks who are going to do it, Craig, if I go to them and pay them because I can understand out there are some people, maybe a woman, maybe a man who is being stalked by someone and they want they don't want it to continue, or are they they don't want information out there about them, I can understand that. So they go and they want to pay for this service. But how do you know they're reputable?

Unknown 10:32
Yeah, that's, that's always a bit of an issue. Let me give you one or two right now that might want to look at, okay, one of them is called account killer.com. Okay. And this goes through every site there, they have little buttons right on their homepage, at account killer calm that you can click on the button. And it will give you instructions on how to get rid of your data that site so very good that it's very helpful site for you, again, you're going to have to do it yourself. There's another one out there as well. That's called the seat me d s EA t as in remove my seats, my hair dc ac.me, okay. And they have some services that you can use. So this is kind of on the other side of that allow you to now just let them help take care of it. They have a kind of a cool tool@dc.me that allows you to just sign in with your Google account or with your Microsoft account. And DC me will tell you all of the associated websites that you signed up for. Because, you know, you go to a site you see right there, sign in with your Facebook account, you click one button or your Google account or your LinkedIn account or any of these solid find them with some other account. And now you're information is associated with even more and more and more places. And, and with this with this business, email compromise, you just got to do it. You've got to clean this up. Yeah, I got it. I got it. Okay. Now that makes sense. So

Unknown 12:14
I Greg and I think you're the same. I mean, in terms of, we want our stuff to be spread out there on social media and things because, you know, that's how we earn our living, you know, in terms of getting publicity and advertisement, but I can see people wanting that done and wanting that check. Okay, so folks, here's what you do you text My name to this number

Unknown 12:44
855-385-5553. That's 855-385-5553 Okay. Standard data and text rates apply you will get actually

Unknown 12:58
pretty close to the same thing that Craig Peterson sends me every week when we have our conversation and more and when there's a big problem. You'll hear about it from Craig and you'll hear about what to do and he will not try to sell you anything or sell your name. Craig Awesome job. Let's hear it for truth amongst Canadians we want to make we want verification that if you identify as Canadian that you actually are Canadian correct.

Unknown 13:32
You need to be able to be Canadian at the very least yeah I got one more quick thing Jim Oh sure. For for business people out there. There are a lot of people in business who had just like we talked about today with how do I get rid of my stuff online a lot of people in business wants to know how to protect themselves what are the attacks that are going on so Wednesday tomorrow afternoon I'm having again this is a free webinar where I'm not selling you anything this is this is to get you up to speed okay so I'm going to have three of them because it's Cybersecurity Awareness month this month so business people can join up I'll send you the link to the webinar and we will teach you what you need to know this is going to be about three hours maybe a little bit more over the course of the next week and we're going to bring you up to speed all free all information it's kind of like the stuff we talked me right here on the air Jim you and I we go into more details more of the business side of it I'll tell you what the FBI is doing right now what they're reporting so that you understand it and and to do that to get on it just text me a webinar or whatever in fact I'll send out a text later today to anyone that signed up what's you know okay

Unknown 14:54
Crawley for the small businesses are getting nailed we don't want

Unknown 15:00
we don't want that. By the way. That is the bread and butter of the support of the show. So we don't want that to happen. Greg, thank you very much. We'll talk to you next week.

Unknown 15:10
All right. Thanks. Take care. Jim. You too.

Unknown 15:12
Bye. Bye. All right. A final word when we return something that no veteran should ever have to do. You're listening to the Jim Polito Show. Your safe space.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

 

Sep 28, 2018

What happens when companies are breached?  Listen in as I discuss the effect of a breach on their customer base.

Walmart is going to use blockchain to help to secure our the food they sell customers.

Why are we seeing such an upswing in Spear phishing? Tune in and I will explain it in more why it is now more dangerous than ever before.

Sale of Information on the Dark Web is increasing.  Today I will talk about why we are seeing more activity and higher prices being demanded.

It is coming, 5G is a huge leap.  I will discuss how this technology is going to change how we access the internet.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/29/2018

Breached companies lose customers. Spear phishing more dangerous than ever. Dark web pricing trends. 5G is going to change everything.

Craig Peterson: [00:00:01] Hey, WELCOME. WELCOME. Craig Peterson, here, joining you as I try to every Saturday morning. Thanks for joining us today. Hey, we've got a lot, as usual, to talk about in a short time to talk about it. We are going without commercial breaks, again. We have so much to cover and I got to thank, of course, I Heart Radio for airing this show on their stations and it's kind of fun. I was just adding it up. You know, I'm almost at my 1000 weekly episode. That is a lot, hence, a lot of airtime some of those shows were three hours some even four hours long. I used to do an interview format show. Now, it tends to be just me talking about some of the stuff that really matters to everybody out there in the news. So thanks to Iheartradio for airing the show again. Now moving on to, wow, close to 20 years I guess. Really weekly radio appearances by yours truly and of course, then a lot of television over the years, as well. I also want a quick shout out thanks to everybody that responded to my survey. You should have gotten an e-mail last week on Saturday. Maybe you opened it up during the week and then a reminder on Wednesday, please just take about two minutes, that is all it takes.

[00:01:23] Click on the link, right in there. I really do want your opinion. I'd like to know what it is you'd like to hear about here. I'm also doing another master class. Remember, last year it was in June, I did a three-seminar class that went on for about eight hours. It was on securing your computer, no charge for anybody involved. We're going to do some more teaching, but I really want to know what you guys want. What do you want to hear about what you want to learn about? The only way to let me know is to tell me, so if you haven't filled out that survey please do. If you don't have a link to that survey, just go ahead and send me a quick note. Just me at Craig Peterson dot com or you can text me as well at 8 5 5 3 8 5 fifty-five fifty-three. If there is any question, that you would have about security, that you'd like me to have a masterclass about. All at no charge text me at 8 5 5 3 8 5 55 53. Anybody, that answers the questions you are guaranteed a free seat in that class. And of course, I have courses as well for my clients that are out there.

[00:02:32] And who knows, maybe it makes sense for you to become a client, but for most people who are listening, you're probably too small, you're probably not too concerned about your business assets. You know you're not worried about somebody breaking in and stealing things or losing your client information. But for everybody else, there maybe there's some stuff we can do. OK, so big stuff today. We've got 5G coming out we're going to talk about what the carriers are doing how they're all getting prepared for this new technology. It's going to completely change the way we access the Internet and the way our devices access that, as well. We've got an interesting statistic that came out of the Black Hat Defcon conferences, just about six weeks ago, that I hadn't noticed before. We'll be going into that. If you're a consumer you're probably affected by this, as well, right. We had our data that was stolen from Equifax. Equifax is still in business we don't have the option of not doing business with them right. Well, technically we are. Once again the product right Equifax is still in business still doing great and we are still messed up. Those tickles in your throat when that happens. But, we're still in big trouble right because our information is out there. They're not issuing new social security numbers but they are issuing new credit card numbers and new bank account numbers.

[00:04:02] Right. But, Equifax is still out there they're still kicking around. Well, businesses that people don't have to do business with, have a different story. Even though Equifax is still in business. This is this is incredible here. Other businesses that don't have 48 percent of consumers avoiding services after a business has a data breach that is absolutely huge. Nearly all organizations that have been hit with a security incident report a long-term negative impact on both revenue and consumer trust. That is absolutely amazing. Consumers are getting frankly asking for a higher and higher standard for where they store their data and the how all of their data is protected while it's there in storage. And in this digital age you know you've got to right, you've got to be very careful about your data where it is and what they're doing with it. 80 percent of consumers are reporting is very important or crucial. Their personally identifiable information is protected online. 86 percent say a high level of data protection is a priority in choosing online services. That's from a technology and Frost and Sullivan So you know very reputable company there about half of the organizations report involvement a publicly disclosed data breach of those nearly all say they have experienced a long-term negative impact related to client trust and or revenue. So, it's absolutely huge you've got to pay attention.

[00:05:40] You have to be safe. This goes back to my survey I found that the majority of people that have so far answered the survey said the things that matter to them are protected. Protecting their data, protecting their bank accounts, their company bank accounts. By the way, It's come in is number one in the survey. Your own company's bank account. Number two is the customer's information. So, those are the top two in my survey. And I thought that was really kind of interesting, that's what people are trying to protect out there. So, it's very important or crucial, if you're a business you just can't afford to lose the consumer's trust because you will eventually go out of business. In fact, the statistics are still terrible. Customers are, excuse me, our customers but businesses that have been breached are likely to go out of business very, very quickly. So, that leads us to kind of our next story, actually does do this. but spear-fishing here you know about Russian attempts to meddle in the election while wow spearfishing has really become quite the science. Now, in case you don't know what it is. Fishing -  ph I sh ing - phishing is where the bad guys go out there looking to try and find data, try and find information, and then use it against a company or an individual. And that is exactly what it looks like.

[00:07:04] That is what happened to the Democrats last time around that all of these e-mails were disclosed because of the phishing attack, where you basically get an e-mail back in the day it was you know terrible language or wasn't worded properly and it was purporting to be from your bank or career I.T. people. Well, it turns out, that even though Podesta who last year had a password that was password. Oh my gosh, and lost all of the Democrats e-mails its' just kind of crazy. And by the way, the Russians weren't just going after the Democrats they were going after the Republicans and they're not just going after political parties, they're going after everybody out there, and they are using spearfishing. These are e-mails that have had hyperlinks embedded in them to go to a fake Web site and we just had news that was about a month ago you remember this reported quickly on this. But Microsoft blocked six fake Web sites that Microsoft thought were probably going to be used by Russians in order to meddle with our election. Now, we've got news coming out that the Chinese are also in the process of trying to meddle with our election, which of course, is a very bad thing as well. So, in this case, they send an e-mail. It looks legitimate enough and it has in it an embedded link, people clicked on the link.

[00:08:34] Now, it will take you to a Web site that usually looks legitimate. So, the e-mail might be pretending that it's some you know, PayPal or whatever, it might be some bank etc.. And it's not, frankly just about a month ago the Israeli Defense Forces IDF reported a social media phishing campaign that it was attributing to Hamas. So, they were trying to get the IDF troops to download malware, again, using fake Social media profiles on Facebook, Instagram, WhatsApp. What's more Facebook and Twitter have both blocked profiles linked to Iranian Russians and Chinese operatives used to try and spread misinformation. But, it really is helping to reveal a critical weakness of these influence campaigns because they're using overlapping profiles on multiple platforms. So if a social media company notices something then they can go ahead and talk the other social media companies and basically take out these bad guys all at once. I think it's really good. The whole concept of walled gardens and trying to keep things separate just doesn't fit in with this thing. Also, one of the things people complained about is that you can go to a Web site and it looks like it's the right Web site. We ought to mention that. But have you noticed the certificate you know a lot of people have been trained that if it has that locked in the corner by the R-AL they've been trained that OK well that means it's safe?

[00:10:09] I mean it's a secure server. Now, I can't emphasize this enough. A secure server is not a secure server. In other words just because it says that this is a secure server certificate and this has been validated it doesn't make it so. Two things that I want I want to make really clear, everyone needs to remember one it does not mean that the data on the server is secure. It has nothing to do with that, whatsoever. So your data might be secure in transit, but once it gets to the other side, it's not the not the right guy. The other thing that it does not mean anymore is that it really is the entity you're looking for. So, if you're trying to go to I'm just picking on PayPal. Here PayPal has a really good track record of being secure so, I'm just using them as an example one might know. So if you go to a Web site and it looks like it's PayPal and it was up in the corner they're up by you are the little lock indicating OK's to a secure server and if you click on that lock, it'll tell you the details about the security certificate. Those can be faked and they are being faked. In fact, the research that has been done recently shown that these sites that are being used maliciously to spread false information.

[00:11:30] Those sites are in fact being used with valid secure certificates, SSL certificates. So, just because there's a certificate does not mean that it's safe. OK. Everybody needs to remember that. So, it's a big deal. They are meddling with the election already. I heard a rumor, I should look this up but I think it was West Virginia, but apparently, some state is now allowing you to vote via your smartphone, which is absolutely idiotic at least as far as I'm concerned. Why? It's just almost impossible to secure that sort of stuff, so be very careful out there. OK, so let's talk about removing yourself. What information do these social media and other sites have about you? We already know Equifax has way too much about these other guys. Well, we had a couple of guys I think it was about a half a dozen that went out online and they did a little bit of searching online for their own data. And they found a bunch of very interesting things out there of some very very interesting things. Well, bottom line Google is your friend when it comes to finding your information online. Because even though Google does not index the dark web, they do a very good job of indexing the rest of the web.

[00:13:00] So, they wanted to know whatever information is out there. And what does it mean? And they found a lot of information about them, as you might expect, but then they decided let's take this to the next step and you'll see this article online. It was published ZDnet. There is a ton of great information. We definitely don't have enough time to get into all of it, today. But, they decided hey what happened in this day of GDPR are which is the European data privacy law. And, in the U.S. We have some privacy laws, nowhere near as strict as what they have over in Europe. But, in this day of so-called data privacy how much privacy do we have? What can we find out? You're supposed to be able to request from these companies, information about you. What do you have on me, out there? And of course, that's a very good thing to know, right. You'd want to know what businesses might be keeping about to, et cetera, et cetera. I know, I do and I have asked before. So, that's what these guys did. They went online and they started to poke around a lot and in some cases, they tried to request the removal of their data, and it was interesting because they got various types of responses from some people and some businesses out there.

[00:14:19] Google has their privacy checkup, which obviously you should pay some attention to go online to a privacy checkup. There are services online like delete me. There's a paid subscription service and it goes ahead and tries to get your data removed from online. Some of these Web sites, have what would amount to hundreds and hundreds of pages of information, about you. Some of the data brokers the data miners are really going crazy and some of them claim to have over 100000 data points on every adult in the United States. Think about that one. So, it's a scary world. If you're concerned about this. I'd love to know. But check this out, it's on my website at Craig Peterson dot com. And, if this is something you'd like me to cover in a masterclass, let me know as well and just put the subject of master class to send e-mail to me at Craig Peterson dot com, or you can text me at 8 5 5 3 8 5 55 53 and I will be more than glad to talk about and give a little class about that and a couple of other things we have up our sleeves. Next stop, here we're going to talk about 5G and a new use for blockchain. This is going to be surprising, I think, to a lot of people.

[00:15:40] Now, you probably heard of block trading. And most people when they think of blockchain they're thinking about bitcoin or some of these other cryptocurrencies that are out there. The whole idea behind block chain is to have a ledger. 

[00:15:55] And, you know remember we've seen Ledgers for years, if you ever watch A Christmas Carol you saw Legers being used in the accounting office, right. Who owes who money, back and forth and ledgers can be changed. And that's been a problem over the years. How do you know your bank's Ledger is correct? Good accounting practices use double entry ledgers to help correct and catch mistakes, but how about the malicious things that can happen and that do happen that are out there. Well, it gets to be a real problem and that's what blockchain kind of things hoped to solve. And I say kind of, because they haven't really solved it ,and I've been extremely disappointed in the massive adoption of the blockchain technology because the idea behind blockchain is if we have a thousand people all maintaining the same ledger and we assume that they're pretty much all valid maybe there's a few people trying to mess around but if there's a thousand Legers or 100000 Legers then we know that everything's legitimate right because it's all signed and it hasn't been messed with. And we can always validate based on looking at other ledgers that are out there. While, that whole concept behind block chain is being used now, by a few different companies, in order to do some kind of fancy things. First of all, some banks are already using it for literally their ledgers, right. There are bank ledgers and they are tracking the bank's ledgers and transactions between banks.

[00:17:30] So, it's already been used for interbank transfers interbank loans. You know the whole overnight rate and everything you've heard about before. Well, this is a big surprise to me. But Wal-Mart is about to jump into this block chain business and apparently by January 31, 2019, Wal-Mart has set a deadline for all of their direct suppliers to use blockchain technology to track food. Yes, indeed that head of lettuce that spinach that you buy over at Wal-Mart is going to be tracked with blockchain. And the idea behind all of this is that that they want to be able to trace the food, berries, mangoes, baby food, you know about the scare we had when it might have been a decade ago about spinach, and some of the nasty stuff in the spinach baby food. Remember, the scare with glass in some of the baby food bottles. Chicken with you when you're talking about salmonella or other types of diseases the same thing is true with beef. Wouldn't it be nice to be able to trace that food all the way back from the truck it was on, the box manufacturer that made the box that the chicken was shipped in with a plastic wrap that was inside that all the way back to the supplier or what day?

[00:18:56] Who handled it, everything. While IBM food trust has been working on blockchain technology to do just that, track all of the food. Very, very cool and it gives a much more complete view of the entire food system than what is currently available from anybody. And it is certainly stronger than the basic federal regulations are currently requiring. So, this is a really good pinpointing the source of the food contamination. It is almost certain, I can't see how it would not improve public safety. It's going to save lives because we can more quickly track down what other food might have been contaminated, where did it go, who might have sold it, where might it be sitting. The head of food safety over at Wal-Mart. Frankie Anice is saying that it's ultimately going to save money for retailers and farmers who have been swept into overly broad product recalls, in the past, and I've seen that before too. Because it's like OK, everything that came out of this plant is now recalled and you're talking, sometimes millions of eggs or millions of pounds of different types of foods. And it's a real problem. We had millions of bags and heads of romaine lettuce that was thrown out due to interruption of E. coli. Earlier this year 36 different states, so that one particular E. coli outbreak caused 210 people to get sick and five to die.

[00:20:30] And that's according to the CDC. So, very, very big deal this food trust blockchain is going to be a big deal, as well. And it's going to help promote food safety. I like it. I like that kind of transparency that that depth of view into our food supply. I think that's really important. OK, we've got some pricing trends coming up here. What's it worth? To steal your information and try and sell it on the dark web. Yeah, the pricing has changed. And I got to say the pricing has not changed for the better here. But for cybercriminals, the whole dark web is growing more profitable every day. And for those people that signed up for my Dark Web report, you know you've been getting them every month. And I got to say something about this too for the first time I think in about a year we did not have any of our listeners here who signed up for that free monthly dark web scan. None, of them, showed up in any of the reports this month. So, that's a very very big deal. First time ever we didn't have any new shows, obviously old stuff is out there but no new stuff so good for you. That means you guys are listening and paying attention. I really appreciate that. And I want to go by the way a quick shout out to a couple of new clients here, too.

[00:21:52] Tom and Jared as well. We ended up doing scans for them looking for information that if it was breached would be a bad thing. Right. Personally identifiable information, as well as stuff that would violate various state and federal requirements. So quick shout out to both of them and their companies. But in this case, the dark web is growing more profitable every day. And this is particularly true for stolen credit card data. Prices have gone up over the last three years as much as 83 percent. Isn't that amazing. For the US, Canadian, United Kingdom, an Australian credit cards, that is by the way. So Armors Threat Resistance Unit says, stolen credit card data is of great value to the cybercriminals because of the number of ways they can use it to commit fraud. So, they do everything from what you've heard before purchasing high-end merchandise for resale, for money laundering, and funding other illicit activities. Remember I told you about the lecture I attended in talking with the Secret Service officer about what they're finding and how can bad guys move money around because as a rule, they can't. All right what are you going to do? They don't trust each other etcetera, etcetera. The whole problem. The conundrum, the prisoner conundrum, but a different show for that one. So, anyhow the values going up, the prices going up that means we've got to start being very careful.

[00:23:26] There's also an increased Dark Market for cloned ATM cards, passports, prescriptions, and even prescription labels, all of them have increased in performance or in they've all increased in importance over the last three years. OK, we are finally making it to five G we've talked a little bit about 5G in the past it is coming. It's going to have a massive impact on almost every facet of how we use the technology we're talking about faster speeds, lower latency, which means the turnaround time and also in cost, so there'll be huge new frontiers for us. You know right now some cars have Wi-Fi hotspots in them. It's going to become the norm because it's going to be so cheap, so fast, so available. There are already clothes, we talked about Levis with their jean jacket that had built into it sensors so that you could control it just by swiping your arm on the sleeve of the jacket. Well, think of all with 5g you could build right into that code all kinds of sensors that are monitoring everything right your heart rate your not just the rate but your cardiac monitor, video screens, you know you name it you go jogging in the morning and you're concerned about getting mugged because you're going through New York's main parks or wherever it might be you know your clothes could be streaming a video feed 24/7. 

[00:25:03] And the cost on that will be minimal, absolutely minimal. Or if you hit a panic button it'll automatically upload the last half hour of video and sound or whatever from a 360-degree radius around you. This is absolutely phenomenal, what's going to happen. It's going to open up everything and then think about the self-driving cars that are coming. Right now they have to have a lot of very expensive sensors on them but if they could all communicate all share that data push that data back you know you to the blockchain stuff earlier with Wal-Mart and what they're going to do to keep your food safe. Well, think about what could happen now of all of the cars all of the sensors and everything everywhere. We're sending all of this data to a central database where it is validated and put together. And now the cars have an up to the second. Up to the second. It's just I'm just shaking my head it's amazing here. But up to the second information about road conditions everywhere out there. So, this is really going to be huge. This is really the fifth generation of cellular network that's why it is called 5G. This is, you know we've got 4G LTE right now and I'm going to give you the real basics.

[00:26:23] I got a great article that I got from the verge that's up to my website at Craig Peterson dot com. But, five Gs is a set of standards, of course, it's been adopted internationally as well in the U.S. but they're able to move forward because in December last year 2017. They agreed on the basic standalone standards. They have other standards as well. It's a much more complex network. They have to have a lot more cell towers if you will, but they can be tiny. So, in an area that might have only had a couple of towers before eventually here, there could be dozens of towers, just everywhere. It's just going to be amazing. Everything's about to change. Remember, how fast LTE was when it came out. While that's what's going to happen again that's going to be fast, fast, fast. All of the major carriers are working on it. We've got What T-Mobile and Sprint are trying to get together so they can build one really big and strong 5G network. We'll see how that all goes. But, everything's about to change when 5G comes out. And you know we are about to change, give it a couple of years. All right again if you have any comments if there's anything you'd like me to cover in a master class make sure you e-mail me right now. Just me at Craig Peterson dot com.

[00:27:44] Craig Peterson dot com or text me with any comments, questions concerns, or topics for a masterclass to 8 5 5 3 8 5 55 53. I'm looking forward to helping you out. However, I can whatever questions you have. Take care and have a great week. Bye-bye.

 ---

Related articles:

Facebook Violates Apple’s Data-Gathering Rules, Pulls VPN From App Store

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Google Reportedly Bought Your Banking Data In Secret, And That's Not Even The Bad News

Idle Android Devices Send Data To Google Nearly 10 Times More Often Than Ios Devices Do To Apple, Research Finds

The Home of The Future Is A Security Challenge

Your Digital 'Purchases' Are Not Really Yours

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 28, 2018

 

Is it time to upgrade? Apple's new products - iWatch 4 and new iPhones.

Do you share your streaming passwords?  Listen in and you will hear about who is sharing theirs, and what might happen because of it.

Who owns the content on your digital device?  Turns out -- not you.  Listen in and I will explain why.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Facebook Violates Apple’s Data-Gathering Rules, Pulls VPN From App Store

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Your Digital 'Purchases' Are Not Really Yours

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/27/2018

New Apple Products and Mis-Use of Digital Streaming Products 

Craig Peterson: [00:00:00] Hi everybody. Craig Peterson, here. I was on the radio on Maine this morning. And you wouldn't believe this commercial, I should have recorded it, but it was a commercial for you to reserve your tickets for Maine's Polar Express. A Train service that runs through the frozen night White North. So, if you're from the south, or someplace warm in the world, it's time to kind of freak out because Maine's going to get socked over the winter. Maybe that's why they have Saco in Maine. Right. They got socked, anyhow. And for those from Maine, Hey welcome. Glad to have you aboard this morning with Ken and Matt. We talked about a few different things. In fact, we had a little banter back and forth about some of the Apple gadgets that just came out, and Ken, of course, he loves Apple. So, we talked with him about what he's doing there. We also talked about a couple articles in the news this week which of course millennials streaming sharing their digital purchases, and whether or not they really are yours. And we covered that a little bit more depth yesterday. So, if you're interested in that listen to yesterday's podcast, but you know millennials sharing streaming is a real problem and the younger kids the millennials are even worse. And Facebook's VPN bottom line, just don't use it, OK. I wish there is a great alternative to Facebook, I just haven't found it yet. So, here we go and thanks for listening. Thanks to those people who did go ahead and respond.

[00:01:33] We had quite a few more responses to that little survey that I put up. So, here we go with Ken and Matt. 

[00:01:40] He's back again. Ladies and Gentlemen Craig Peterson, our tech guru. He joins us at this time every Wednesday, to give us an eye on the world of technology. Craig, how are you, sir? 

[00:01:50] Hey, Good morning, gentlemen. 

[00:01:52] Doing pretty well one of my daughters and her husband flew in from Europe. She's living in Oslo, now. And, we had Thanksgiving, on Sunday. So, that was really kind of fun for the first time we smoked a turkey in the smoker. So, it was a great weekend. It was nice to see, almost everybody was here. Another daughter in Kentucky and granddaughter, but they didn't make it. 

[00:02:16] We're not sure if you're aware of this Craig, but Thanksgiving is in November.

[00:02:19] Smoking Turkey is not legal, I don't think. Safer than doing it in a deep fryer.

[00:02:27] For years these accidents. Yeah, she can't make it back until after the first of the year. So, we're going we're having we had it on Sunday and the next month we're going to celebrate Canadian Thanksgiving which is in October and then we're going to celebrate you. Do you have to apologize at the dinner table?

[00:02:42] Can't have too much turkey!

[00:02:45] Exactly.

[00:02:46] I love that Matt too. Yeah, well I'm sorry but we have to say sorry but did you eat potatoes, Soe-rry. You've got to say it right. 

[00:02:54] I have to tell you the big news, because I know we've been waiting for this. I have ordered my iPhone 10 s Max. Yeah. Just buy that other iPhone. I try. I'm on the monthly thing that you upgrade once a year. So, yes so I did order it. It's going to be next week.

[00:03:16] It's going to be bigger than my face, but it's you know a lot of people were looking forward to.

[00:03:24] There were lines. But you know frankly, Matt for normal mortals or normal humans. The iPhone 8 versus most of the iPhone 10s. Now, of course, they killed the 10, straight 10, but the 8 is just playing good enough. I don't know how well Apple's going to do with this. You know I think they were smart to have that program that Ken signed up for. Where,

[00:03:48] I would not have bought it, otherwise. Yeah. You understand that every time something new comes out you, have to buy it do you not understand that.

[00:03:56] Well yeah. And whoever has the newest toys wins.

[00:04:01] That's right. Exactly. And I actually am I'm not. I don't use my iPhone with one hand.. I mean I know one of the complaints about the 10 Max is that you can't use it with one hand. I always hold it in one hand and use my finger to do things with it, so to me who is blind and deaf and old and cranky. I have to have a bigger screen, exactly right. I can't see anything. 

[00:04:26] So, I have people calling it like the 10 SMax, no smack. 

[00:04:34] Oh that's funny. I've heard that. Oh yeah. OK.

[00:04:38] I'm not running out to buy one, because they're the only big winner on that phone, frankly, is that it's got amazing graphics if you're doing 3-D or virtual reality. Which clearly he is doing that all the time. I got it because it's bigger, by the way, also is the new iPhone.

[00:04:56] Watch, because I didn't get the iPhone watch, because my eyesight is so bad. So, that's on watch. What do you think about the new watches, it is better? 

[00:05:04] Yeah yeah yeah. It's the iPhone, of course, it's the iwatch 4. And, this is the kind of a big announcement, frankly, from Apple. Its better and bigger than all the other stuff and it's become very, very popular. But, what's interesting about the new watch is that it has now a single wire electrocardiogram built into it. In other words, it can watch your heart rate your rhythms even then read the rhythms. It actually approved by the FDA. So, it really kind of a big deal. People are concerned about the watch and the fact that it can read your heart rate and rhythms and watch for maybe potential damage to your heart. Because now are we going to have more and more people going to their doctor. You know the problem we've already seen in medicine is Dr. Google you know Dr. Google, right?

[00:06:03] Yeah, I know talking about can be his problem. 

[00:06:07] Well, that's where you go online and you search through your symptoms and you find that you're about to die. 

[00:06:12] Yes. Right. Happens daily to my wife. Yes. 

[00:06:15] Yeah. So, thats Dr. Google and so many people using it. So, now people were kind of worried, well with this new watch, which by the way is phenomenal, because it has a built in cell modem and has basically everything available on it. It's just amazing and they changed the bezel to make it a little bit bigger, Ken so maybe you can finally see it. You know scroll one letter at a time on it. But, this new watch is now trying to cause some more problems for doctors, because all of a sudden someone's going to say oh no, oh no, I missed a heartbeat earlier today which happens a lot. Particularly, if you're under stress and for some people and they're laying down on their left side or their back. So the Vegas nerve gets stimulated, that slows the heart down causes, you know, a Bradicardiac rhythm, a slow rhythm etc. Can you tell I was a paramedic for 10 years? But yeah, So that's a big problem, potentially. We'll see how it goes. But yeah the watch 4, is by far the best watch, before this one came out, by the way, the Apple Watch one was still for sale, and it was probably Apple's biggest seller. In fact, it was Apple's biggest seller, because the two and the three just didn't do much for people. But the four, Ken thats real deal. That's all you got to get now. 

[00:07:35] Yeah, I mean Christmas is, right around the corner.

[00:07:38] I'll be good for them. I'm going to send it out to my kids. Do lawyers celebrate Christmas? Oh, the kids.

[00:07:46] I celebrate anything and everything that gets me presents.

[00:07:54] All right Craig Peterson, our tech guru is joining us now, as he always does on Wednesday at this time. Craig, I had an employee tell me a little story, whereby he managed to convince a friend of his in college to give him his NHL hockey streaming password. So that he could watch hockey games and he, kind of just like, never stopped using it and he's he's like 6 years later still able to watch the games because the kid who he got it from still has that password and still logs in and can still use it to watch the games. This is, of course, done by people with HBO Go, Amazon prime, Netflix and so on and so forth, right. Where you're taking passwords and essentially sharing them between people. It tends to typically be something that young people do particularly. Is this a thing? 

[00:08:41] Yeah. Well, you nailed it. It's a huge thing, right. And there is a great article talking about it that just came out. It was on CNBC. 35 percent of millennials, according to this little study that was done, are sharing their passwords to streaming services. That's a lot. And, when you look at it us old guys and gals, here, the baby boomers 13 percent of us shared. So basically millennials are showing them three times as much and they're kind of worried because, of course, now they're losing on potential revenue. Now you could argue that maybe these people would not be watching Netflix, they would not pay for a Netflix account if they didn't have one for free. But, there's just one really cool little note in here, and I don't know maybe this should be part of divorce proceedings or something, I don't know. In this particular case, a young lady, a guy came over to her apartment one night. They had dated, this was kind of the first date and they wanted to watch this movie that just came out on Netflix and she didn't have Netflix so they came over and she had a smart TV. Either you guys have these smart TVs?

[00:09:53] I do, actually, yes I have a 65 inch Samsung Smart TV, that I bought about a couple years ago. Maybe, but I don't know I'm not smart enough to figure it out. 

[00:10:01] Smart TV, Dumb user. The TV is smarter than the user. Yes. 

[00:10:06] Yeah, I have an Apple TV and I really like it.  I think it's great. But at any rate, he went ahead and he put his username and password into her smart TV because it had built into it Netflix and Hulu and all these others. And now years later, and it's still encoded in her TV and she's still using it. And that's kind of the norm. I know one of my kids has done that with our account. And, so every once in a while, we change the user's password. Use your password on it. But it's it's really huge. People 21 and younger are sharing passwords at a rate of almost 50 percent. So, keep an eye on that. Obviously, they're going to have to do something about it. Maybe cause, you know charging more or something but it is a really, really big problem. Bottom line. Then the other digital problem, I don't know if you guys heard about this when I  have a Kindle, I've had an Amazon Kindle for years. Do you remember when the book 1984 from George Orwell was pulled off of people's Kindles to remember that you bought it and I bought the book and then all of a sudden, one day you go into your Kindle, and the book has been deleted automatically by Amazon?

[00:11:33] You don't remember that story? And I actually miss that one. Craig, Yeah.

[00:11:36] Ok. That was a few years back in 1984. Could you get more poetic. At any rate. The problem we're seeing right now is that people are starting to find out that when you QUOTE buy a movie or buy that book END QUOTE. Whether it's on Amazon or Apple or Google, wherever it might be you're buying it, your not actually owning that silly thing in your digital purchases in this day and age it just plain are not yours, and they are the owners of the intellectual property, here. Those owners are now deciding, after you've paid for it. They want to change the terms. And if you read the fine print, when you sign up with any of these services you'll find out that you actually don't really own it. And they have the right to change the terms at any time for any reason without notice. So, more recently some of the terms of change, here for Apple and Apple didn't do this. It was the owners of the movies that did it and people's movies all of a sudden, disappeared. So, if you want to be able to resell it later, make sure you buy the DVD you can resell that. You can resell a book, but you cannot resell your Kindle e-book and you cannot resell your download, you're not title but your video streaming services copy and you can't resell it because you don't own it, and you might not even be able to have access to it in the future. 

[00:13:12] We are talking to Craig Peterson, our tech guru. He joins us. He's at 730 on Wednesday. Facebook and Apple are they having a certain conflict, Craig.

[00:13:20] Craig, Yeah. Apple just pulled Facebook's VPN software off of their store. You can no longer get it. Facebook purchases a VPN company some years ago, and Apple's really good about trying to protect their users privacy. So, what was happening is Facebook had this VPN, people use VPN, you know in order to stay safe. It turns out that Facebook's VPN that was available for free was gathering every little bit of information it could on you it was spying on everything you were doing on the VPN. Apple's new App guidelines absolutely prohibit the collection of any customer data. So, because of Apple's increase here in security and privacy, they pulled Facebook's VPN from the site. And in fact, Apple went so far as to remove apps and share location data with third parties, et cetera, et cetera. I don't know what Facebook's going to do. And as always remember of course when it comes to Facebook and many of these companies it's not free. You are not the customer, You are the product. And this is just proof again, that Facebook's doing everything it can to find out anything about you don't use their VPN. That's been my mantra for the last five-plus years.

[00:14:47] All right Craig Peterson, our tech guru joins us for some tech updates every Wednesday at this time. Appreciate it, Craig. Thanks so much. We'll talk to you again next week. Hey gentlemen, take care. You. All right let's take a quick break we'll come back.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Sep 25, 2018

Have you ever bought a book for your Amazon Kindle and have it disappear after some time? Well, it turns out we don't really own our digital purchases. 

Craig joins Jim Polito today as they discuss more about this deception as well as how millennials are causing millions of dollars of losses by sharing their streaming password, on the Jim Polito Show.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Millennials Are Sharing Streaming Passwords, Costing Companies Millions In Revenue

Your Digital 'Purchases' Are Not Really Yours

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/25/2018

You Don't Own Digital Products And They're Taking Them Away - Millenials Stealing Streaming Services

Craig Peterson: [00:00:00] Hey good morning. Craig Peterson here this morning I talked to Jim Polito about a couple of topics I think you'll be interested in. One is the iTunes Store and article that came out of CNBC and I think this is really kind of interesting. Sara Salinas, S-A-L-I-N-A-S, came up with this article. But millennials sharing streaming passwords. This is a real big problem. It's going to change things for everybody really kind of kind of in a major way, I'm sure because of millions of dollars at risk here and being lost and your digital quote purchases. Are they really what they appear to be? Guess what? They aren't purchases, right. So we talked a little bit about that and my experience of George Orwell's 1984 where you guys are out. Did you ever buy that book on Amazon Kindle and then have it deleted from your Kindle device while it's happening more and more and it's not just Amazon that it's at risk. I also want to say a quick thanks and shout out to all of the people who responded to my survey if you haven't already just take a minute this is going to be so beneficial for you because I have a new masterclass I'm going to be doing. And we're starting in about two weeks I think and I want your opinion what should I be teaching what's going to be real value to you? This is a free class. Okay, so we've got I don't know somewhere 100 plus call or calls responses I think so far 150 people I think click through to the survey so if you haven't done it yet, please do it. Just take it this won't take you two minutes literally not two minutes. Double check if you are a subscriber to my email. Look at my email from Saturday it just comes from me at Craig peterson.com if you are an SMS subscriber check your text messages I sent out on Saturday. And Oh, and by the way, I'd be interested to know when you receive the message as well. Some people are complaining they don't get my texts until like mid-afternoon on Saturday. And I send them out right at the start of the show to remind people about the show. So I don't know it's all crazy. Anyhow, let me know. Go there. Check out your email, check out your SMS. If you are not subscribed already. Make sure you subscribe. Craig Peterson comm slash subscribe. That's how I get all of my articles out to people. All of this stuff that I'm finding online. And I go through hundreds of articles narrowed down to about a half a dozen important tech and security articles for the week. So if you're not on the list, make sure you get on the list. And now here's Jim

Unknown 2:53
He is the man with all the answers. He's our good friend. And he is the Tech Talk guru I'm talking about Craig Peterson. Good morning, sir.

Unknown 3:03
Are you good morning, Craig,

Unknown 3:06
what is this waning moments? So I go to the iTunes and

Unknown 3:10
download a song and own it, let's say Free Bird by Leonard Skinner. And I go to the checkout. And what's the

Unknown 3:23
what's the deal? You mean? I'm paying for something, I don't own it. What are we? What is it? What is this, I'm renting it.

Unknown 3:30
This is a bit of a surprise for people. But we've known about this for a while. For instance, I've had an Amazon Kindle for many, many years. And, and that's the electronic device from Amazon that allows you to read books electronically carry hundreds of them with you. And I love it. I every night before I go to sleep. I have my little Kindle. I don't know if you remember this one or not. But a few years back there's this book written by this Orwell character. And I bought it called 1984. And it was a great book. And I read it and many other people bought it as well from the Amazon store for their Kindle. And then one morning, they got up and the book was gone. It has been deleted from their Amazon Kindle or years

Unknown 4:23
in 1984 to Come on, guys. Really? That's the guys to lead to. Right. Yeah. So a lot of people asked about trying to figure out what's going on. Now we've got a new problem that people are noticing. Actually guys, it's the same problem with the iTunes Store. It's happened with other online stores. And that is that you can't buy anything anymore. You know, if you went and you bought a physical copy 1984 from a store, the courts have ruled that you can take that book and you can burn it. You can do anything you want with it. Almost right. You can sell it to someone else, right? Yeah, the same things true. If you bought a VHS tape or a DVD, there's aftermarket stores still for records if you're still like playing the old records. Yeah. Well, as it turns out, these electronic devices I have a little bit of a change in them know, you remember the change from records to CDs? Yes, I knew all live through that. Yep. Yeah, it was bold enough for that. And, and I remember at the time I was really upset because it costs to the guys that made manufactured and sold the albums you know, those big old black records it cost of about a buck apiece to make those and, and get them out to the store. Okay. And then along came CDs. And a constant of about three cents. Yeah. And, and remember, they were more expensive. A CD was more

Unknown 6:04
expensive. Yeah,

Unknown 6:05
it was like, what was that five to 10 bucks for a record and media like 15 to 30? Yeah, it was crazy. So I was really, really upset. Well, they, they had problems, right, because people wanted to buy the CDs because they sounded better ended up replacing your whole catalog by, you know, you're like, Oh, I want it on CD now. Yeah, it was just convenient. It didn't scratch. It didn't pop, you didn't get clicks, right? All of those wonderful things. So that's what people did. We all upgraded. Well, the music industry in the book industry kind of looked at all of us and said, ointment, and now people are starting to make copies of CDs. And so they got very upset because they were making copies of CDs, you know, these CDs that cost them we, you know, at least 10 times less than it costs them for the old stuff to make. So they were making a lot more money. Well, fast forward to about 1015 years ago, when Steve Jobs came out with the Apple Music Store. He was forcing them just forcing them Jim to sell their songs for 99 cents,

Unknown 7:16
which is a great price point, right? You don't think twice Yeah,

Unknown 7:20
well, 99 cents for a song. It's great.

Unknown 7:23
Yeah, so the guys and gals decided they would play some games with licensing know to hit that 99 cent mark and they did something similar with Amazon and that is you do not own any of this stuff. all you are doing is you're buying a license to use it so even though it costs for instance my main topic 1984 from Georgia Well, I bought on my Amazon Kindle cost less than a penny to distribute. And yet Have you noticed you Kindle books cost almost as much as a hard copy book. Yeah. which caused them again, more than $1 to print and ship right away. So it cost them a lot less but you now not only are our pain dramatically more incrementally, but you don't even own it anymore. I can't believe that

Unknown 8:22
that so so it's basically like what Microsoft does now with software like you used to buy Microsoft software and then you get re updates then they come out with a later version now you pay a yearly fee to use that Microsoft software on your computer. Well have you seen Microsoft now for Windows seven now this is their older operating system windows man eight and seven are the three primary ones right now they're Microsoft has changed it to a monthly rental you if you want updates, you have to pay them every month. So if you buy a movie via airplay movie at this isn't just an iTunes thing but if you buy a movie online you cannot resell it you cannot resell your Kindle book if you bought it because you didn't buy it to pay your bought a license to use it.

Unknown 9:16
And and they have every right and this is what happened recently with some of the Apple made all the products out on what do you call these things, right movies and things right. If you have so called bothered to own it, and the license or decides they don't want to they don't like it anymore. They don't like the fact that Apple sold it to for 99 cents, they really thought they should have gotten a buck 30. So they're going to change the terms of the license, which they can do after the fact according to the fine print because they reserve the right to change, suspend, remove, disable, or impose access restrictions or limits on any external services. And anytime without notice. or liability to you.

Unknown 10:00
That books that movie that song that whatever can be deleted from your device perfectly legally. And they are already doing it. Amazon's already done it. Google's already done it. This is a massive change most people just aren't aware of. We're talking with our good friend Craig Peterson tech guru who we learned an awful lot from and you can learn more from him. At the end of this segment. I'll give you a number you can text my name to and get this information at a whole bunch more standard data in text rates apply.

Unknown 10:32
I want to ask you about this one. Now

Unknown 10:36
the millennials are sharing streaming passwords. And that is costing companies millions in revenue. So I've got Netflix and I give a bunch of people that password the login and the password. Netflix is just getting one monthly fee for me. But say five different people who don't live with me are watching off of that. That's what's happening. Right.

Unknown 11:02
Yeah, it's an interesting change because you again, most people, you and I, the older generation, the non millennials were used to having to pay for stuff right if you went to a movie about a VHS tape or a Betamax. You know, you paid for those things. But these younger kids grew up. We're pretty much everything was available for free on the internet. And, you know, there is a lot of free stuff on the internet. But most of it just isn't worth anybody's time of day. And it isn't right. You know, is it just me so

Unknown 11:40
there is and more and more moving to streaming services. You know, you might have Netflix or Hulu, there's many others out there. I have Apple Music For instance, I have amazon music so I can listen to music anytime. It's really kind of cool. I frankly, who buys anymore. In fact, the apples talking about putting off their iTunes Music Store because for $15 a month 15 one five, your whole family can listen to streaming music, no matter where they are any songs anywhere. It's just a phenomenal deal. So Apple says, Hey, listen, we're not making the money we used to off of our music store. We might well shut it down. But these millennials that are out there, and it's primarily millennials, but not all 100%. They've been sharing their access for a very long time. And when you've got more and more competition, like I mentioned, Netflix has video mimic their own movies on TV shows Hulu, Amazon doing the same thing the rolling out new studios, they're having a little bit of a problem. So study was just done. It said about the 35% of millennials are sharing passwords for streaming services. So 35% of millennials, 19% of Gen actors table

Unknown 13:02
just raised his hand

Unknown 13:08
and 13% of baby boomers three times as many Millennials are doing it we're talking about hundreds of millions of dollars of potential revenue that they aren't booking they're trying to figure out how to deal with this and this problem is just getting worse Jim it's a fundamental problem frankly with a mentality that people have there is there's one person in this story that came on CNBC even reported on this that was saying hey, you know, I'm using the Netflix account of a guy I went on a date with one came by my house and he put his Netflix into my CV

Unknown 13:53
and he kept it for now apparently has been going on for years she has kept at her TV on TV. It's now her right she's listen, if she gets married legally, she asked to delete that. That's cheating. That's that's TT like having to return the ring afterwards. I think it is the same thing. Craig Peterson is our tech guru and he's got more of this great stuff for you. And it's free and there's no obligation he's not going to try to sell you anything he doesn't sell your name all you have to do is text My name to this number 

Unknown 14:33
855-385-5553. That's 855-385-5553.

Unknown 14:36

standard data and text rates apply. The great thing about being on that list is that when there's a major hack or there's something going on he'll send you a message but he won't send you spam Craig great segment Always a pleasure to talk with you see you next week. Hey thanks Jim. Bye bye bye bye all right when we return

Unknown 14:58
as always everybody thank thanks for listening and do take a couple of minutes and answer that little survey again it was in your email it was in my text messages on Saturday just look them up it won't take you two minutes and it's going to be absolutely beneficial because it's going to help me understand what you guys want to learn because this is a free masterclass I'm offering to you now my courses I charge for but my classes my master classes are absolutely free. And the only way you can get into one of these classes for free is by answering the question, okay, and there's only three or four I can't remember questions on there. So it's simple, it's easy. It gets you free admission to the master class. So make sure you do it anyways. Blah Blah. Thanks. Have a great day and we'll be back tomorrow.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 24, 2018

Facebook is in trouble again, this time with Apple, having another app pulled off from the App Store.

Find out more as Craig talks with Scott Spradling on WGIR.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles 

Facebook Violates Apple’s Data-Gathering Rules, Pulls VPN From App Store
---

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/24/2018

Facebook Had Another App Pulled From The Apple Store

Craig Peterson[00:00:00] Hey, everybody. Good morning. I had kind of a fun weekend this weekend. I had one of my daughters and her husband fly in from Europe where they're living. And we had a very early Thanksgiving even for Canadians, right, which comes up in late October. But it was fun. It was great. A bit of a family reunion. I always loved those things. Well, it looks like Jackie the might have been out doing the family reunion thing as well, because this morning. sitting in for him was Scott Spradling. And of course, we had Justin in as well. And we talked a little bit about Facebook. They just had another app pulled from the Apple App Store. And we talked about why we're carrying it through the morning this morning. And this segment could be just can't we all just get along

Unknown 0:51
it. We're going to do a little tech talk here. I'd like to welcome our guest, Craig Peterson. Craig, thank you so much for joining us. And let's get started right away here where it says like Facebook and Apple aren't getting along too terribly well. Some

Unknown 1:03
violation of data gathering rules by Facebook. What's happening? Hey, good morning, guys. Yeah, Facebook's been in trouble. Recently. As you'll recall, of course, they men managed to get themselves in front of Congress, which seems to be happening more and more with people. But they got in front of Congress because they were taking our data and doing things that maybe they should have been doing. We know about the investigations in the Facebook and the Russians trying to influence the election. But what you're referring to right now Scott is really kind of interesting because Facebook has violated some new rules Apple has started enforcing lately though, yes, trouble once again, these rules have to do with something known as a VPN. Now I'm putting together a masterclass for people. In fact, if you check your email for me over the weekend and text as well, I'm asking people, what do they want to learn? What do they need to know that help their business out? And the number one answer is VPN. Now, these are virtual private networks. They're designed typically to stop other people from listening in to what you're doing. Okay, so Scott, for instance, you go to a normal website on your computer, and let's say you're using Comcast or maybe it's Verizon or someone else, they know where you're going online, but they don't have access to the data that you have. And that's important if you're doing banking or business transaction, your other things because think about it, if you ever sat in the coffee shop and use a VPN or maybe use their wireless, right, definitely, yeah, all the time. Yeah, everybody does, right? It's pre-internet, right over the Wi-Fi, why wouldn't you use it, but most people aren't aware that some of these coffees off wireless Wi-Fi hotspots and the same things true for even some little bit fancier business type networks can be monitored and are being monitored. So this your business person, the safest thing to do is use one of these virtual private networks. So even though you're taking their hospitality, you're using their basic internet access, they can't monitor anything you're doing, they cannot steal your information. All attorney turned on Facebook's got Facebook bought a VPN company called on on on Apple protect, you'll see it in the store on Apple, or when a vo and Facebook's been offering that as a VPN for people so that you can safely use Facebook because there's a lot of information you put up there. You probably don't want people poking in. And maybe you have private pages and things that the photos happen all the time. Well, Facebook, a VPN has been spying on people, which is the exact opposite of what you want a VPN to do. So it's been tracking everything you do online. They're using that data. They're selling it to their advertisers and Apple because they are concerned about your privacy actually, remove the Facebook VPN software from the App Store because Facebook is spying on you,

Unknown 4:31
Craig at this point, should we assume Facebook is spying on us all the time? If I if I talk about let's say like a Twix bar in my phone is nearby. And when I open up Instagram, which is owned by Facebook, suddenly I have an advertisement for Twix. It's amazing. Should we assume Facebook's always spying on us?

Unknown 4:47
Well, Justin, I think you can assume that almost everybody is there were even accusations. You might remember over the last year that some of these apps were using the microphone in your device to listen in on you. It just having a device with you. When you walk into a store tells a retailer like that what Walmart or you name it, it tells a retailer you've been here before and your phone was being used to track you as you walk through the store. Now Apple has blocked that as well. That type of tracking. But you know, bottom line, Justin, you're right. When you are using something for free. Guess what? It's not really free wouldn't when you're using Facebook. Again. People remember Facebook, you are not the customer Facebook. You're not paying them a dime. You are Facebook's product. So anything you're doing Facebook users to monetize. You are the product here.

Unknown 5:48
Craig Peterson. A very important lesson here in tech talk this morning, Craig, thank you so much for joining us. And this morning. And even though we've probably amped up everyone's paranoia, this is a really important warning for folks the true I understand. That's right, it is correct. Thanks so much and have a great day.

Unknown 6:03
Take care guys. All right. Thank you.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 19, 2018

Freezing credit is a cumbersome process The good news is it now free to freeze or unfreeze your credit report.

Find out more as Craig talks with Ken and Matt this Wednesday morning about Equifax, the new iPhone XS Max, and top security tips from DEFCON.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Black Hat And Defcon Cybersecurity Experts Share Tips On How To Protect Yourself 

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/19/2018

iPhone XS Max - Now Free To Freeze Your Credit - Top Security Tips From Defcon

Craig Peterson: [00:00:00] Hey everybody. Good morning, I wanted to give a shout out to everybody listening to these podcasts. And, you know, I, I used to podcast a lot. I've been pretty good about it for the last couple of years, but there were probably three, maybe even five years when I wasn't podcasting I started doing this decade ago, excuse me, maybe what, 1520 years ago, a long time before they even podcast started putting them up online. And then I started podcasting and I got listed with Apple and 20 million plus downloads but because I stopped for a while I just I lost a lot of listeners but I really appreciate all you guys and gals who are listening and for sharing the podcast if you know somebody who might benefit from these podcasts in my like it might like a more mature look at technology not this stuff that kids are doing online but from somebody who's been in the tech business now for many many decades I'd love it if you'd share the easiest way to share this podcast just tell people to go to http://craigpeterson.com/iTunes and you'll find that will redirect you right to Apple's website. http://craigpeterson.com/iTunes and have them sign up because that's the that's the best way for me to keep track of who is online least how many and gives them a little bit of ratings as well and if you haven't rated this podcast yet please do that and you can do that easily. Again just go to http://craigpeterson.com/iTunes and rate the podcast so far we've got only a handful of reviews which is fine but they're all five stars so I'd like that and hopefully you give me a five star review as well. So please do take the time share this podcast with friends and family and business people who may be as I said want to understand tech a little more what's important particularly in the security around my spend a lot of stuff time in that space because that's what I do for a living and you know there are no commercials in this right this is commercial free it always has been I've been approached by people to take money for this and then shirt them I'd really rather have this be a free podcast but you know it's an effort of love it always has been my radio shows the same thing I don't get paid for any of this I'm just trying to get the information out I'm trying to help people and for those people who think that maybe they'd like a little bit extra help and want to hire me great I'd be glad to do some consulting work for you. Normally we start out with an RIR which is a risk intelligence report so you know what your risks are and then help you put together a plan to take care of those risks as time goes forward so I think that might be useful for you if it is let me know and it's simple to find me just me@craigpeterson.com. Me@craigpeterson.com and you will be all set. Just a quick email over there. That is a monitored email account. Alright, so this morning I was on in Maine, three different stations up there. We talked about the new Apple iPhone a little bit and what that means to all of us, frankly, the new freeze law for your credit report starting Friday, big deal and I'm so glad that they did this and that President Trump signed that bill. I think this is going to be a really good thing from a security standpoint. And then a little bit about black hat and DEFCON, cyber security the tips from the experts what should you do to help keep everything safe so here we go with Ken and Matt and by the way for those that have already shared this podcast I just want to say thanks. Thanks for spending the time thanks for your faith in me and thanks for sharing it and for being a listener even you know it it's great and you can always send me an email me@craigpeterson.com. I'd love to hear from you. What did you get from the podcasts What did you like about it how has it helped you or your business that's always helpful because we can share those with other people who are like you who are like us who can then hopefully find us and start listening as well hopefully will benefit their lives to here we go

Unknown 4:28
okay time to go back to Craig Peterson our tech guru. He joins us as he always does on Wednesdays at this time. Craig How are you this morning?

Unknown 4:36
doing really well It almost sounds like I'm boring every Wednesday you know where's the variety here you want to do Thursday next week and not have to be Wednesday it works once

Unknown 4:47
you will be here but

Unknown 4:51
by the way, this whole male thing I gotta I gotta chime in on this mayo and ketchup and all this other stuff me up. Hey up is what its gonna make. Mayo. Yeah. Yeah, I was in Belgium. And the first time ever they had something I think they called it Superman sauce I think is what it was. And they put it on their hamburgers over there. And it's mayo and Sriracha. Yes,

Unknown 5:19
yes, they have $1 bottles you can give them the grocery store.

Unknown 5:22
You know I got that we got some because we saw it there it is quite good. We had actually made it ourselves, which is very difficult to find. You know the Hellman's in the garage and put it together but it it it is fantastic you know i

Unknown 5:39  
i use it anytime I have sushi and I and I used to mix it myself but it was either be too spicy or not spicy enough and I keep having to add and then they now have it in a bottle I have two bottles in my refrigerator right now

Unknown 5:51
I don't remember what it's called that mixed up it's

Unknown 5:54
it's right next to each other

Unknown 5:57
I think they call it remember you know

Unknown 5:59
I look when I at home and I'll try and remember look into yeah it's

Unknown 6:02
not for me oh but yeah it is really good so people who are wondering you know cuz Ken's often crazy. It's not crazy crazy like a fox up this

Unknown 6:15
crazy like a fox? Craig so the iPhone XS Max

Unknown 6:23
your new phone? Wow.

Unknown 6:25
You know I've been seeing some reviews on it. And it's really big. I mean, it's now they set when I look at that a toadstool was that necessary?

Unknown 6:38
It seems to me if you're blind as a bat, like I am. And you have short, stubby fingers like I do that that's really a good thing to get. Although a lot of people want to be able to touch things. One hand it you know, while holding it. Oh, and you don't really do that folks are just

Unknown 6:55
one of my sons roses as well. And he thought he didn't want the big chunk of he's, you know, he's 22. So he knows pretty much everything and it's a big phones were absolutely stupid. And he can tax one handed. And so he ended up getting the eight. What does he get? Yeah, you got the eight plus, which is of course a bigger phone. And he absolutely loves it. Because he can use it with one hand. And Apple has actually made a whole bunch of studies and they work to them so that it is usable with one hand even even the keyboard on it. You know the on screen keyboard is designed for that just as

Unknown 7:37
an aside cricket you don't you find it interesting how our tastes constantly change about this kind of stuff. I remember, you know, of course, when cellphones first became a thing, they rather large because they sort of had to be heavy. Yeah, like the old Nokia phones. They were pretty they were bricks, basically. Right, right. And then over time, progressively, we got smaller and smaller, we made flip phones so that they could fit into your little pocket. And then you got you know, I remember at one point, I had the smallest flip phone like every was like the size of my fingernail, right? It was like just such a small phone. And then over time, people like, boy, those small phones are stupid. I really don't like those small phones. I want something with a bigger screen. I've got to get something that's larger. And so then the screens grew in size, grew in size grew in size. And now they're Of course, my Galaxy Note is the size of a iPad, basically. And now kids these days are saying those stupid old people with their big phones. Oh, you know, I wanna I want a smaller phone. So I can text with one hand. It's just on kind of constantly changes what our

Unknown 8:29
tastes are these days. I can't believe these good. Yeah, pretty much, Matt. It's interesting. Because we do change. Right. And, and tastes do change. But I think a lot of it has to do with what we're using the phones for, you know, when when they came out. I had the Motorola flip phone as well. I had a few different models of my love them. They're so small, but we only use it as a phone right, right now now, which are for most people for more than half of the world that have actually access to some sort of a computing device. The phone is it, right? That's it. composing stuff, they're doing video editing, they're using it as their cameras, the only camera they have, and the it's a different world map. It's not just a taste of change. It's the way we're using the tech is changing and and it's going to change more as we go forward. We've already got Have you seen that gives a phone that is again, it's a smartphone. And it's a roll up. It's almost like what it's a roll up like a girl? Yeah, yeah, I'm thinking of a fruit roll up. That's almost perfect, right? So that's fine. It's kind of a very thick pen. And you roll out the display because the display is just kind of like paper. I

Unknown 9:52
don't even know how you do

Unknown 9:55
mean, how do you use it? I mean,

Unknown 9:58
how does a phone you have a battery in a row.

Unknown 10:02
Okay, well, thank you. it like that. Think of it as as to DSL stacked on top of each other to see cells making stacked on top of each other, right. So that's the size of the core of your phone. So you'd have these two D sells seashells. Excellent. Closer see sitting or three c cell stack up. So there's sitting stacked up on your desk. So now you pull the display out of the GS stack of seashells. So you pull it out towards the right for instance. And now you have a display that you're looking at. And it projects a keyboard on to whatever surface it's on. So if it's on the table, now there's a keyboard projected with a laser on to your desktop, and it monitors your fingers, it's reading your fingers and where they are as you're typing. So now any surface becomes a keyboard and this devices with you anywhere you go. And if you want to have a look at it while you're on the road that you pull it out and do pull out the display. Now right now the display is not touch sensitive. But that's kind of the sinking of where the next step is these this device already exists and and then we've got the stuff that's going to tie into your brains. We've got a couple of major companies now including Apple working on a heads up display basically think of Google Glass and Apple is doing some major things with that as well. They're kind of changing that around so that it's now you're competing device so it's monitoring your eyes What you're looking at so you are seeing your display in front of you and what to look at and the way you blink controls the computer so I think Matt we're going from two Magus phones like this x x x x max to again, it's going to be teeny tiny. Just something that's almost tight right into your brain. Which I don't know if that's good or not fun. It's not a science fiction about that one out there.

Unknown 12:08
Craig Peterson our tech guru join us, Wednesdays at 730. So let's have some serious stuff that you know, we certainly were talking about credit reports and access to credit reports whether we could freeze them and freeze them. Is that policy gonna change? Greg?

Unknown 12:21
Yeah, that's, I think, a really good question and problem and it will, you know, we could go into this for a long time. But of course, Equifax happened about a year ago. And we know there are dozens of people not in jail because the Equifax hack

Unknown 12:36
well. Excellent people should probably shouldn't be in jail that aren't. And all of these people 145 million people's information was stolen and Equifax basically got away with it. But not only did they kind of get away with it, a few people lost their jobs, no question. But there's estimates out there that Equifax made $50 million off of the breach itself. So you might wonder how, how did that happen? Right, bottom line? Well, because Equifax and everybody charges you to freeze your credit, and unfreeze your credit in most states. Now, some states had regulations saying you can't do that. But and every three months you had to rephrase it. So they were making five to 10 bucks every time every quarter from you. If you wanted to freeze your credit, so that your credit wasn't used as part of that fast from Equifax and you had to pay five to 10 bucks again to unfreeze it, if you wanted to apply for new credit card or buy a car or something. It was absolutely crazy. So as part part of the act of President Trump signed in May, with the economic growth regulatory relief and Consumer Protection Act, the feds now starting September 21. So in other words, Friday, consumers can now freeze and unfreeze your credit without paying any fee all. So that is a fantastic thing. The recommendations from all of the security experts out there is basically keep your credit frozen. And that means that if, if a bad guy has your information, and you know, frankly, between us guys, the bad guys probably have your information, okay, if they have it, they cannot go and buy a car, buy a house, etc. Using your credit, they can still become get arrested and claim to be you. So the next time you get pulled over by the cops, you get a felony stop. But that will stop them from using your credit, which is a very good thing.

Unknown 14:44
We're talking to Craig Peterson, our tech guru who joins us at this time every Wednesday to go over the world of technology. Craig, I have one last question for you. before we let you go. You of course have seen in the news you know some of these cybersecurity experts, some black hat folks and one giving tips on to people for exactly how to protect themselves, make sure that they don't do anything stupid online. What are these tips what should people do?

Unknown 15:10
Oh, this goes on and on. I've got a great article. In fact, if you want to text me, I will send you that article. Anybody who's listening just text me say send the article if you want to me at 855-385-5563. So this text 855-385-5553 but there are there's a great article that I was able to find online as picking up on website is from CNET and black cat was the big conference we just had black hat and DEF CON out in Vegas these are the white hat and frankly the black hat guys getting together with government people as well so there are there's probably two dozen different security experts all with their top tips online. But when it comes to business and and you can get those you can find those again, online at my websites easiest place probably. But bottom line if your business the number one tip is make sure you've got good backups and make sure you test those backups and other words, don't just assume that because you signed up for backup service, it's still working, trying restore files from time to time to make sure that that backup is working for you. Of course that's not going to protect you from the lawsuits if you lose your customers information or they'll find which can amount to 200 bucks for credit card your business has taken over the last couple of years. So in many cases it can be huge fines but the very basics for everybody and small business backup backup off and test the silly thing make sure really is working

Unknown 16:54
Tech talk guru joining us as he does every Wednesday at 738 as boring as I may be will try and change it once in a while to join us. We'll talk to you next week.

Unknown 17:04
Take care bye bye.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 18, 2018

In the wake of the Equifax data breach one year ago, an estimated 145 million consumers’ personal information was stolen from the credit agency. Craig talks with Jim Polito in depth about the Equifax hack and the changes that will take effect this week.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/18/2018

Deep Look At New Law Concerning Equifax - New Hacking Tools

Craig Peterson: [00:00:00] Hi guys. Craig Peterson here this morning with Jim Polito I talked about two things one I wouldn't do a bit of depth here on the whole Equifax hack and the changes that go into effect this week. That's right. New laws in place signed by President Trump a couple of months back. And this is a real game changer. So all of the pain people went through. It's going to be a little easier here in the future. And then I also just took a couple of minutes and explained a whole new piece that ran somewhere out there and how the bad guys are using it. And in fact a whole new category of business in the bad guys' field. So there's lots going on and here we go with Jim.

[00:00:53] This is the man with all the answers the guy we turn to all the time.

[00:00:58] Is it a national I.T. professionals day. He's far above and I.T. professional but you know he was at one time. Joining us now the man the sheriff of the Internet Craig Peterson.

[00:01:12] Good morning sir. Good morning. Yes I am. You are t. 

[00:01:19] Hey you helped us out when we had that whole Equifax data breach and you have done a lot of people for free. By the way for free on your own time which impacted about 145 million customers that personal information was stolen from this credit agency. So the advice was Hey get out there freeze your credit you get paid to do it but freeze your credit. Now you're saying that it may be soon that you don't have to pay that transaction fee for each of the three agencies that it will be free.

[00:01:58] Here's what happened and of course a lot of people were very upset with what happened then and understandably so.

[00:02:04] Equifax I still can't believe that they're still in business and they are they have a license to print money. The three credit firms have a license to print money. You and I should have gotten in on that.

[00:02:19] Well they didn't lose my license right there. That's right. It's just it's the implication is if you screw up it's over. Right. Pull your license. Yeah. They've got it. They smuggled in the printing press the same way they put it. That's exactly what they're doing. And you know Jim I did it for 100 listeners. OK.

[00:02:44] I monitored the credit stuff in the dark web for a while and I'm probably next month going to start doing something going to offer it for small businesses as well to see if your small business information is out there OK. But I did it for a couple of hundred listeners absolutely free. And some reports. And part of the report that I put together were OK if you were hacked with Equifax would say most people were frankly or if something new shows up on the dark web. Here's what you should do and it involves a whole bunch of different things you have to do because frankly if they hacked your information nobody cares right.

[00:03:29] You can't call up. You know I work with the FBI. Yes yes. And the FBI is there you know it's come on. You're one of how many.

[00:03:41] 145 million consumers. Is the right

[00:03:48] Word. Trying to a while anyway. So yeah. So they don't really care but if someone had stolen your information and then you're dead then you have to talk to the police department. You had to go the next step and the course now file that report with all of your you know credit card companies that maybe the information was used to steal money from the credit card people had the cars that were purchased using their name and their credit for they had to prove now that they never bought that new car that goes on and on.

[00:04:25] Right.

[00:04:25] At a minimum if your information is stolen and the bad guys use that word talk to them Jim I'm a nightmare because what I just talked about you have to call the bank right or you still do. Right.

[00:04:38] This stuff is still happening. Right. And when you have to call a bank during working hours right because that's when they're open. Right.

[00:04:48] When do you have to reach out to all of these different agencies the police department everything. Yeah the police and the banks are there 24/7. But there are fraud bureaus are the people who are handling this thing are only there nine to. When you do your homework.

[00:05:06] Most people work 9:00 to 5:00.

[00:05:09] So we're talking about on average if your data is stolen and someone then tries to impersonate you. We're talking an average of three hundred hours of your time writing letters chasing down documentation sending it off to all of these different credit agencies places where your name was used in order to try and get your good name back.

[00:05:36] And those are 300 hours out of a working here. That's two thousand hours right your normal working here is 24 hours. Right.

[00:05:44] So we're talking about you know what is it about 20 percent of your year. You can't work because you are running around trying to take care of all of this stuff.

[00:05:56] So on top of all of that what you have to do is in most states here you have to pay a fee of between five and ten dollars on top of all of that to freeze your credit.

[00:06:11] Yeah.

[00:06:12] So now it's it's just it's a nightmare when it happens to people and that's why I spent so much time and my staff. I had five people working full time on all of this dark web stuff for our listeners here.

[00:06:25] That was great period of three weeks OK. It was just crazy. Now that and so what that means is if you want to free the credit it's five to ten bucks for every one of those three agencies on top right now if you want to use your credit you have to pay another five or 10 bucks to get your credit unfrozen to get it right. So here's what's happened now. The president Trump has signed a bill that was part of the economic growth regulatory relief and Consumer Protection Act. So just starting on the 21st. So that's very sweet. Yep the law now that President Trump signed abolishes those fees. So all of those fees associated with freezing and freezing your credit which by the way that even if you freeze your credit it's only good for maximum three months. So all of those fees are gone. And that's a really good thing because the aquifer.

[00:07:30] Yeah. After the Equifax hack Jim about 20 percent now of consumers got a freeze. But most of those phrases ended up expiring. So this is a great thing. I wish Equifax wasn't in business. I wish you didn't have to deal with me.

[00:07:46] And you know I'm not calling for regulation here by any stretch but how the heck are these people not sitting in jail somewhere. Yeah we're responsible for something as simple as not doing enough data to third party software in other words they updated you update your Windows machine. OK. That's all well and good. And you got to do that. But on top of your Windows machine you have your Chrome browser you have Firefox to house whatever other tools and they didn't know

[00:08:21] What it was.

[00:08:22] Ok. And they're still walking around. Oh yeah couple of people lost their jobs.

[00:08:27] That's about all of that.

[00:08:30] And it cost Americans millions. In fact there are some people who are critical of this saying hey listen look at the money Equifax made because they quote lost unquote 145 million consumers personal information and then they charge five to ten bucks every time someone wanted to freeze and freeze. We're talking about them or tentatively here having made at least 50 million dollars of their script.

[00:08:57] We're talking with Craig Peterson. At the end of the segment. We're going to give you a number and if you text my name you'll get this information plus a lot of other information standard data and text rates apply. Quickly before we go I do want to talk about this new ransomware that has arrived and Ransomware is that you know comes in and says hey your computer is locked and we'll unlock it. We can fix the virus if you pay us. So there's a new one out there.

[00:09:29] Yeah this is. This is an interesting one because the ransom that's out there right now has been automatically morphine itself. So it changes it's also your standard antivirus software test is not going to catch that. We've now found something new and it's called the path. It just appeared last month for the first time we finally saw this stuff out there. But it has a module in it that allows attackers to customize the attack and how it's attacked. And the encryption key that text doesn't know everything else. Now we have we have a customer Jim and this is just not so. But it's true who has a business as a law firm and the law firm had apparently been losing documents that had to be filed with the court and then all of a sudden it started losing pictures of the owner's family. All of these pictures and stuff got stolen. It looks like what might have happened years that the guy hired hacked or he's not the guy by the bad guy which was in this case probably his ex-wife had hired a they got onto the computers and made some changes let's say to the files deleted things everything else. And apparently, it cost thirty-five dollars to hire this hacker to try and destroy this small law firm. Thirty-five bucks that's what it's going for right now. So and it's really kind of an interesting case. At any rate what we're talking about now is new type of ransomware completely remotely controllable completely customizable. Perfect for hacker as a service. That's a new business out there. Hacking has a service for thirty-five dollars. You as you can have someone hack your former business partner and your wife or maybe some company that you know has some money and you want to get that money out of that bank account 35 bucks is what it's going for.

[00:11:48] You see now this is why Craig Peterson is with us all the time because you get this information and then if you want more information you are more in-depth than you want to be on his list if there's another massive hacker breach or something. It's very simple. All you have to do is text my name Jim to this number.

[00:12:05] 855-385-5553. That's 855-385-5553. 

[00:12:20] Standard data and text rates apply. Craig Peterson will not sell you down the river he will not yield he won't do anything like that. That's the bottom line and he's here every Tuesday. Craig thank you so much for your time buddy.

[00:12:37] Hey thanks, Jim. Take care.

[00:12:38] You too. Craig Peterson, a great resource. OK when we return a final word.

 

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 15, 2018

Chinese tech company caught lying, again.  Listen in as I describe how they misrepresented their product and what the US did about it.

Announcements from Apple.  Yea - I was a bit underwhelmed.  I will discuss why I think that the announcement unveiled just incremental improvements.

Do you use Cloud products in your business?  I will explain why you must not just trust that they all know what they are doing and what you need to do to protect the information they store for you.

Help me, Help you!  I want to know what information you need to increase your security and protect your business.

It's going to be free to Freeze your Credit! I will tell you about the bill President Trump signed to prevent these Credit Reporting Agencies from charging for this service.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/15/2018

New Announcements from Apple. Huawei Lies, Again, Free Credit Freezes. Don't Trust the Cloud to be Secure. 

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. It is time for another session. here Tech Talk with Craig Peterson. You know, I was looking on my Amazon Echo for my radio show and I was able to find it. I found the podcast and then the next day I couldn't, I don't know what's going on out there. But, hey if you are listening to my podcasts, please let me know. Let me know what you think! I'd absolutely love to know because I'm trying to figure out if I'm going to put more time into these radio shows. Maybe, we'll go back to an hour. We'll see how things end up going here on these same stations. But, anyhow, today we are going to talk about a couple of things. First of all a cyber attack. We'll kind of run through the anatomy of a cyber attack. Would your company handle it better, than maybe what happened here? We have a real live company we'll be talking about. We're also going to be talking about Black Hat and DEFCON these are Cybersecurity experts. They've got some great tips on how to protect yourself. Freezing and unfreezing credit. You know that was a huge problem when we had a massive massive breach of all of our personal information over at Equifax. That breach about a year ago now. So, should we be able to do it for free and a whole lot more. By the way, if you are a company and you're using Amazon to do processing or store data. We've got a massive leak to tell you about. Oh, I got to mention Huawei again, because somehow they seem to be making it to the news almost every week. So, here we go. You're listening to Craig Peterson. 

[00:01:44] Ok. So, first up let's talk about Huawei, this is a company that has been hammered and nailed and nailed and hammered and hammered and hailed by the government, recently. In fact, they complained a lot about it, bitterly, for a good reason, I think. Although, you know, if I was in their position I'd complain too. Don't get me wrong. They should have been hammered by the government with what they apparently were doing. The allegations are that while Huawei was actually sharing their data their information with the Chinese People's Liberation Army government officials. So, they were sharing all of this stuff about locations of troops, conversations and e-mails and everything, which is just a terrible thing. And so we, of course, advise people don't use Huawei. That the company, by the way, is spelled H U A W E I. So I've heard it pronounced all kinds of different ways but the correct pronunciation is a WAH WEI. Well. You're going to love this one. They got caught again, Huawei. This time they were caught and this isn't the first time they've been caught doing this. You know, this week Apple, of course, had their big announcement and they announced some new phones with some really, if you ask me, incremental features, nothing terribly exciting, nothing that's going to make me want to run out and buy one of these phones.

[00:03:17] If you are almost a professional gamer using your iPhone, if you're using it for all kinds of video games and maybe virtual reality and enhanced reality and all these different things, well then maybe you want to go and get one. Other than that, I'm not so excited about it. They have introduced, Apple did back and the iPhone 7 days for the plus phones a whole new camera subsystem that included a very, very cool chip that was just dedicated to figuring out pictures and Apple calls it machine learning. And, I think they're overblowing that term. I certainly wouldn't classify it as machine learning and, in fact, they got caught, Apple. I was sitting there watching them, at least, part of the presentation this week and they were just out and out and lying about stuff. Lying. For instance, the new camera allows you to change your depth of field, after you've taken the picture which is a phenomenal feature, in other words, you can change the background and how In Focus are out of focus it is. And they lied about it. They said this is the first camera ever to do this and I'm sitting there saying wait a minute I've got a camera that's four years old. It's called a light field camera. 

[00:04:35] And I've been taking pictures like that for years and years where after the fact I can go in and I can change the depth of field. I can put everything in focus or certain things out of focus. I can even move the focus point around afterwards, which is more than it looks like this new iPhone can do. So, you guys quit your misrepresentation, and they did a couple of other things too that they said they were the first, and they just weren't. I'm starting to wonder about Apple now in so many ways. So anyhow, one of the things that they announced the big deal there was this new lens system that they have on the new iPhone and the new intelligence, machine learning which, again is not machine learning. They're using a very, very fast little chip in order to figure out things like where is a person's face where their eyes are, get rid of the red eye, automatically, let's do all these different things. And that's really cool. I love it. OK, don't get me wrong about that. If you want a phone that has a great camera then, wow. I don't think you're going to go wrong with this new iPhone and the camera that's built into it. Huawei, however, was caught again, using a professional DSLR to take the pictures. And this is kind of cool, because the woman who was in these pictures, the actress who was supposed, you know,  taking candid pictures, her boyfriend was there with his arms stretched out and taking a snap, snap. 

[00:06:13] There you go. And it showed our little box around her face as the cameras recognizing her face and is focusing on it. Well, this actress's social media posts revealed what was really going on. She posted a picture, that showed her sitting there with the other actor. So, the guy has his arm extended with nothing in his hand, right because he's supposed to be holding this Huawei camera, nothing in his hand. She's sitting there next to him posing like she's supposed to be, posing and in front of them, is a guy with a professional camera. The whole idea behind the ad campaign is look at how great our Huawei camera's are and we can't make the background blurred just like Apple, would kind of basically, right. And, in fact, it wasn't. It was a professional camera, he had set the depth of field. You know you adjust the aperture, you make sure the lights right, you do all of that sort of stuff. They were lying, Huawei out and out lying.

[00:07:13] Faking the picture, at least Apple isn't faking the pictures that they're showing us, including they showed us a picture that was on the cover of Time magazine taken with an iPhone, a beautiful picture. They had just done some amazing things. Now this is not the first time while way's been caught faking a smartphone photo I'm sure it will be the last because they did it before and what was the reason that they gave. What did we always say? It wasn't, Yeah, Yeah, Faked it. They're not admit that, right. So, what Huawei says, this Chinese firm, is ah, we were just showing the type of picture you might want to take with the selfies on our Huawei smartphone, Yeah. Yeah, that's it. I'm sure that you weren't trying to convince people that your camera is as good as a three to four thousand dollar DSLR camera body. Yeah, that's not what you doing. Yeah. Well, you know I've been complaining about Equifax and we've been producing a dark Web reports where we go when we do searches and stuff for people's information. And we've been doing that for about six months now. We offered it to people right after the Equifax breach and we're thinking about maybe doing something like that for businesses, which would be really nice, right. Wouldn't it be nice to know if your business data, Has been stolen, right? 

[00:08:48] Wouldn't it. Wouldn't that be nice. I would think it would be nice. So, we may do that in the future. Keep an eye out. We've got a few things going on. And by the way make sure you check your e-mail from this morning because not only are all the articles from today in there, but I'm going to be sending out some e-mails. I really want your feedback. And you know the only way that I know what you want to is, via that feedback you can go way back in my history and I back in the 70s mid 70s was the first time I designed a computer. Actually, it was right around 1972 or three. And I designed and implemented a computer. I made a little computer that would play a simplified game of chess back there in 73 and then I went on to run data centers and be one of the first people on the internet quite literally helping to develop the protocols and implement them for them for a lot of companies. In fact, some of my code I wrote is probably still in use today. I know Apple used to use some of the code I wrote, as did Microsoft, in fact, I helped to develop the Microsoft operating system NT and I wrote to a lot of the audio subsystem and also some of the network subsystem for that. 

[00:10:03] But, I've been very involved in the Internet, since the early 1980s and I've been well known for working with big companies and helping them to do large implementations. Frankly since about the early 90s, My business has all been about the networks that are necessary, the machines, the data centers and even the software necessary to run a big Internet installation. All right. I was well-known for developing Big Yellow. Do you remember that? Remember Superpages? Actually Superpages is still around, although I'm sure they've completely rewritten it by now. So, that's where I've been well-known for. And then more recently since I was attacked in 93 and fell victim to hackers back in 1993 and it's a while ago now, Wow. Twenty five years ago. Since then I've also been known for security because I started studying security very closely. Electronic security physical security up to the point where today I am providing webinars for the FBI Infragard program. So, I'm trying to disseminate this information. Like I've been trying to do on this radio show for a very long time. So I've been known for a lot of things over the years, and it's kind of changed as the marketplace has changed and as people's demands have changed. So, what I'm looking to find out from you guys is what else can I do for you? I've done all of this for big companies.

[00:11:36] I've done it for small firms, as small as you know typically about 20 employees. But I've done it for smaller, as well, right now I'm working with some accounting agencies that just have a handful of employees, including one that's just mainly the accountant and his assistant. But, what can I do for you? You think about all the stuff that you know you're dealing with everyday when it comes to security you can't sleep you lose sleep at night over your business and you're concerned about losing it all. You're worried about what's going to happen if I get Ransomware? And, that's why I've got this great article about ransomware up on my site that came from ZDNet and I think you might want to have a look at that up at Craig Petterson dot com. But, what is it that I can do for you, Next? We talk about things every week. What is it that interests you? What can I do, that's going to help you? Should I put together some mini classes? Some courses? What sort of thing is going to help you when it comes to computers and security. And you know I might even go a little wider than that because I talked for, a few years ago about developing another brand that we get information out on. And I was calling business edge back at the time and the idea behind business Edge was again like my customers demand. Where they wanted to know, how can I use iPad's properly?

[00:13:09] How can I increase the efficiency of my employees? How can I tighten the communications channels with my vendors? with my suppliers? How can I make all of this stuff work. It's a, you know it's a problem, it's a real problem for businesses. So, if that's something that interests you, let me know. You know I've been doing this for a very, very long time and I've been helping a lot of people. Now I want to help the small businesses out there. Small businesses are the ones that are constantly being attacked. Small businesses are the ones that don't have the resources to be able to deal with this. So, if you're involved with a small business, send me an email. Just me at Craig Peterson dot com or you can text me as well straight to my phone 8 5 5 3 8 5 55 53. We'll give those out again a little later. What can I do to help you? What can I help you with on this radio show, that's going to take you to that next level? What's going to help you to be able to sleep at night? What's going to help stop those arguments with your spouse, over the business and all the time you've been putting in? Then heaven forbid you get hacked and your data is stolen and now you're hung out to dry. 

[00:14:25] Right. Because it's out there. What are you going to do about it? What can I do to help you? So, let me know I'm going to be sending out an e-mail with a brief little poll in there. You're not going to take it 20 seconds. But I'm going to list some topics that people who listen to the radio show, people who listen to the podcast, have asked me about. So, that you can just kind of click which one you think might be best and then another question that just kind of a qualification would you prefer a short course that's just straight to the point where you know hey Craig I know you know a ton about this way more than I do, I don't want the background, I just want the steps. What should I do? Is that what you're looking for? Is that what you're looking for on the radio show? Or are you looking for more of course, You know I have to understand this little bit more. I know in my life I've had many times I've hired people and, of course, hundreds. But when I'm hiring those people I've found I've had in the back of my mind I don't know enough really to evaluate this person. I don't know enough about sales that was kind of the first thing and so I learned about sales I really studied up on sales before I could really confidently hire a salesperson because in my estimation I've been I've been screwed before, right where people came in and they sold me a bill of goods and then they didn't deliver. 

[00:15:50] Same thing with marketing. And I have been a student of security. I told you that already now a serious student for over 25 years. So, it's a very, very big deal. And I want to your opinion. Where do you want to fall on that line? And I've had these free webinars before, I'm planning on doing more. In fact it's my 25th anniversary I'm going to do a 25th anniversary series here, coming up probably in October. Twenty five years since I got hacked the first time I mean hacked not just a virus, I mean hacked. So. What? What can I do for you? So, keep an eye out for that. Let me know what you think and what's going to be beneficial to you? That's really, you know the most important thing. and you can always just e-mail me at Craig Peterson dot com. That's of course P E T E R S O N dot com. So, on Peterson dot com or text me if you have your smartphone handy. Just 8 5 5 3 8 5 55. Fifty three. All right. Next up 

[00:17:02] A little rockabilly, I guess you might call that, music. I love this we've had the same bumps now for over a decade here on the radio show. 

[00:17:08] But, oh well. We've got some new ones coming and I'm already using a new one at the beginning of the show. If you were a victim of the Equifax hack, you know what a pain it was. Because this Equifax data breach that was over a year ago required you to start doing more serious credit monitoring. And Equifax themselves wanted to charge you for the credit monitoring. They still do. And they said, Do you remember this if you went to their Web site and said Yeah I want to know if I've been hacked and they say you've been hacked and they said hey we'll give you free credit monitoring. But, in order to get the free credit monitoring from Equifax you had to agree to not sue them. To not be part of a class action suit. 145 million people's personal information was stolen from them and they wanted to charge you to keep an eye out in case somebody out there stole your identity you know stole the money from your bank account, right. Nothing big, right, no big deal, no big deal. Well, credit freezes can be important if you know your data has just been stolen. And that's one of the things that I tell the people that were doing the dark web searches for, right. If there is a change and we'll tell you if there's been a change if there has been a change in your data out there on the dark web. Now's the time to look at a credit freeze, an important thing. So, it's become harder for identity thieves to apply for loans or lines of credit. 

[00:18:44] If you have put in place, a credit freeze. Well now, the Trump administration has put something into effect it's called the Economic Growth regulatory relief and consumer protection act. It does many things, but starting September 21st consumers can freeze and unfreeze their credit without paying a fee. Isn't that amazing. So, this is going to be really, really good. Only about 2 to 3 percent of Americans had a credit freeze in place at the time of the Equifax hack. Now, remember they stole pretty much all of the information about every person of, you know, adult age who had credit, they stole it. But just about everyone in the U.S. you know it's like almost 100 percent of the population of the adult population. And after the theft occurred it was estimated that maybe 10 percent may be as much as 20 percent of American consumers actually put a credit freeze in place. So, removing these financial barriers which cost about five to 10 bucks every time you put a freeze in place or an unfreeze in place it was five to ten bucks maybe now that they have to give it to you for free. Consumers will start doing that. I think it's important. I'm really glad that some of the crazy restrictions that were put in place back in 2008, are being removed as well. Again, I think mobility for consumers is important. Transparency is important. And hopefully we'll end up with more of that, as we go forward. 

[00:20:33] Now this next thing, this is kind of interesting if you're a business person. 

[00:20:41] Now, you know as a business person a lot of services are moving to the cloud and it shocks and amazes me how many times you go into a business and they're using a cloud service they don't realize there's a cloud service, right. So, they've had accounting software from company X forever and now Company X instead of going to a local server you go to a web browser in order to be able to get the data from Company X. Well, that is a cloud service now. Now, Company X is probably not really good at running a data center. So, what is Company X do in most of the cases Company X goes to Amazon. Now, there's other options it might go to Microsoft and Azur there. IBM has called services a lot of different places have called services that are out there and you know that's all well and good but is saving them money really worth it. 

[00:21:42] And here's why. Here's the problem I'm seeing. We go into a business and the first thing we typically do is what we call RI report. This is a risk intelligence report. So, we'll go ahead and we'll scan all of their computers for data that if it were stolen would cause them to get fined or even face criminal prosecution. That's a big deal right. It's a very big deal and now we have different types of risk intelligence reports will do this for HIPAA. We'll do it for accounting. We have them available and we just ran some for GDPR which is the new European standards. So, we have all of these different types of risk intelligence reports because you need to know what data is on your machines that might be at risk. So, we just did one this week for a company and it's an accounting firm. Now we found a few things that you might expect in accounting firms like Bank account information and other things. We found credit card numbers, we found personally identifiable information on their computers but they were using a cloud service and they were saying hey listen no, no, no, wait a minute we're using the cloud service. We don't have a server on site anymore running their database. 

[00:23:05] We don't have a server on site anymore where we're holding on to this client information. It's up in the cloud. It's now the responsibility of that cloud service vendor. Let me straighten out a few things in everybody's mind here. First of all it is not their responsibility, unless you have an explicit agreement with them that passes the liability onto them. And I've got to tell you most people don't have them, if you want a copy of an agreement like that. Let me know, I'd be glad to send you one we have them. But any of your service providers, whether they be a managed services company taking care of your computers or break-fix shop or in this case a cloud service provider, you need to have these business contracts in place that helps make them liable. But that's not where the problem was this week. The problem was we found that their Web browsers were using caches, which is true for almost everybody out there. So, when you go to a Web page have you noticed the second time you go to the Web page it loads that much faster? Have you noticed that with some of these web pages it loads a lot faster and in some web pages it's almost instantaneous. Well, a lot of that is because of the cache your browser cache.

[00:24:32] So, in the browser cache at these businesses who were using cloud services we found personally identifiable information the caches were not being wiped. So, even though they thought they didn't have the data there, it was on their local computers. They did not have the proper agreements in place with their cloud services provider and they got nailed. In fact, just this week a company left terabytes of data exposed on Amazon. They were providing a cloud service and they had no idea what they were doing. They didn't know enough. They had no idea they had terabytes of clients personal information available online. So bottom line be careful, if you have questions if you like a copy of the contract, let me know. Be glad to just send it to you and then you can take it to your attorney and get it all worked out so that all the details are correct and let me know what can I help you with? Send me an email. I've been doing this for years. 

[00:25:39] Decades literally. What should I do? What's your my next product to be? What should I buy next coaching call be on? What are you interested in/ E-mail me at Craig Peterson dot com with any comments, any questions or just text me directly. 8 5 5 3 8 5 55 53. All right. Take care. Have a great week ahead. And we will be talking with you. And next week it's going to be a best of. But you know these shows are all great. What can I say? Take care, bye-bye

 ---

Related articles:

Are You Using A “Cloud Service” For Your Business?

Huawei Has Been Fined $1.2B By The US

Black Hat And Defcon Cybersecurity Experts Share Tips On How To Protect Yourself

It Will Soon Be Free To Freeze (And Unfreeze) Your US Credit Report 

New Ransomware Arrives With A Hidden Feature That Hints At More Sophisticated Attacks To Come

How To Protect Yourself Against A Sim Swap Attack

CYBER-ATTACK! Would Your Firm Handle It Better Than This?
---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 12, 2018

 

Have you had problems with a keyboard on your Mac?  If so, listen in as I discuss with Ken and Matt the design issues that cause it and what Apple is doing about it.

It's Apple Announcement day.  Ken and Matt and I talk about why there is not much innovation!  Just some new incremental improvements.

Did you know that even in this day and age -- Employees are sharing Passwords.  I explain to Matt and Ken why this is a practice that MUST stop.

Craig is putting up a new insider site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/12/2018

Poor Design is causing Mac Keyboard. Apple Announcements. Don't Share Email Passwords. 

Craig Peterson: [00:00:00] Hey, Howdy, Howdy, everybody. Craig Peterson, here. I was on this morning with Ken and Matt and we talked about a couple of different things. We talked about the Segway drift e-skate. Are these things, maybe, finally going to get Segway fully on the map. More about the business email fraud attacks and some of the things that go on there. What you have to watch for in your business when employees, maybe they're sharing their e-mails, maybe they're trying to do a couple of things they shouldn't do. And of course, a couple more things you never get away free with Ken and Matt. But, this morning they were a little bit more talkative, which is good. I tried to make them talk as opposed to just having me lecture them. You know, it's I don't know if you ever been in a studio before when our shows live like this, but if you have a guest like me that you know and you know can handle the whole segment by themselves with no problem oftentimes that's the time when you eat the donut or get the coffee or do more research for your next segment. So, I don't know if I did them a favor or if they're mad at me now, cause I made them respond to me in the middle of the segment, a few times. Anyway. I should mention that if you've had problems with a mac keyboard, one of these Mac Pro keyboards, boy they've been a real problem for a lot of people, and I talk with Ken about that as well, because his mac keyboard, kind of failed on him and he ended up having to leave it at the Apple store for a while. So 

[00:01:31] We talk about that as well. The Apple keyboard and the Apple announcement coming up today. 

[00:01:39] Ok, we're back again. It is 737 on the WGAN morning news, here on a Wednesday morning. Good morning to you. Ken and Matt here, and so is Craig Peterson, our tech guru, who joins us at this time every Wednesday. Craig, how are you this morning? 

[00:01:52] Good morning y'all. 

[00:01:54] Y'all, are you down in Texas you must be down South somewhere. 

[00:01:59] No, Southern Maine in the south y'all. Y'all, all y'all both. Yeah, yeah, yeah. 

[00:02:08] It's a word. I'm from Oklahoma and I know it's word. I never thought y'all was a friend of mine. You know you do. Do I understand that Apple's 'gonna have an announcement today, by the way, are they doing there. We could hear something new from Apple today, by the way.

[00:02:26] Yeah, you heard about that. I did 

[00:02:28] Yeah, there isn't a lot of rumors out there about that there company. Yeah, here's here's what we expect. Apple has been kind of sitting on their hands when it comes to a couple of their products. One of them is their Little Mac Mini, which I use. I use one in my studio. There great little devices, but it really hasn't been updated in years. Their Mac Pro has not been updated since 2013, and I have one those as well. So, we are hoping they're going to start making some announcements about that. Although the Mac Pro looks like it will probably be next year. But on top of that, they are going to have some phone announcements and those are going to be interesting. I'll be on top of that, we can talk about it more next week. But, they are expected to come up with a lower-priced iPhone. Which is going to be good for a lot of people that want an iPhone. Basically, want the reliability and the security, and they are talking about some of the rumors have them using both thumbprint and the face scanner on some of the phones. So it's going to be an interesting day. There's a lot of potential announcements, Apple might come up with. And I think one of the most interesting things is like you remember the iPhone. What was the Six SE?

[00:03:51] Which was the lower price phone that they came up with. 

[00:03:56] And, it didn't do very well in the market, but apparently they're planning on doing something similar with the iPhone 10 having an inexpensive version of it. So, we'll see if that does any good or not. But, yeah that will be coming up, midday today as Apple has all of their fall announcements.

[00:04:15] By the way, I should mention I have a MacbookPro that I just got about a year and a half ago and I had I had a horrible experience. And, I, you know I love Macs. But the key point your keys were falling off right and left, I brought it in and they replaced one and, then I had a guy in the Genius Bar who I happen to know, who said to me you know it's not really publicly known but they're replacing keyboards because they're really defective. So, and I think they had it for 10 days not me not having my computer for ten days. Like going through a heroin withdrawal. But, just like a divorce. Yes, exactly right but it's not. It wasn't really publicly known that these keyboards really defective. Oh yeah. 

[00:05:00] It's called the butterfly keyboard and it has to do with the mechanism and the keyboard. Now, Apple has been telling people that, you know if your keyboard isn't working properly, it's because you got food or something into the keyboard and technically, they're right because anything even two fat keyboards fail. Its frankly, between us, it's a bad design. And Apple has come to recognize that it's a bad design enough that their new MacBook Pro has a keyboard that has one little difference in it which is enough to keep all of the dust and crumbs from food out of the keyboard. So, in other words, they recognized its a problem, they fix the problem, but they are not usually very helpful about replacing your keyboards for free when they fail. So, I tend to think that it really is a design problem. Apple should replace all of them. I suspect eventually may end up replacing all of those keyboards. But there's you know about a year and a half, two years, where you got to be really careful with those keyboards because almost anything will make this silly thing fail, Ken. So, you're not imagining things and your genius friend is not either. 

[00:06:19] It is a real problem is getting reported all over the place we're talking to Craig Peterson our tech guru who joins us at this time every Wednesday to give us an eye on the world of technology. Do people share passwords?

[00:06:34] Yeah. They still do. Who falls for that in this day and age. Are these the same people that have joint Facebook accounts? You know like Tom and You know Jane. 

[00:06:42] Yeah, yeah, exactly. This is silly in this day and age. You'd think you'd know better. But this is true in a lot of small businesses, like Ken and Matt, you guys both have small offices, right.

[00:06:54] Right. And that means you've got a couple of people working there, a few people a handful, and in most cases, everybody knows everybody. 

[00:07:03] What could possibly go wrong? I'm going to be on vacation next week. Here's my password. So, somebody if someone e-mails. You can go ahead and follow up with them. Well, in this day and age, we've got this huge problem of business email compromise and the FBI came up with a new number on this, and they're showing now that we're over. This is crazy. Guys, I hope you sitting down, in the last two years more than 12 billion dollars has been stolen from small businesses. Cash was stolen -- 12 billion of it. It's incredible when you think about it. One of the things companies are doing their people are doing is sharing their e-mail passwords. This just makes it that much easier for the bad guys to get at your money. And here's what they're doing with a business e-mail compromise and we're seeing it all the time we keep getting called into companies saying something weird is going on with my e-mail. So, we come in we have a closer look and we find out, yes, you've been hacked. So, when you're going on vacation, people, do not share your passwords. Which means in advance of people being out for the day or on vacation, If you have an account for, let's say you've got somebody who is responsible for billing, or payroll or sales, or whatever it might be, Do not have a single e-mail account that people send the mail to in other words you don't send mail to Joan in accounting. 

[00:08:46] Ok, you send mail to town team and have accounting set up not as a shared mailbox but have accounting set up. So, Joan has an e-mail box that gets all of the accounting e-mails anything sent to accounting. That way when Joan goes on vacation John can go ahead and get those accounting e-mails delivered to him. Do not share them, take my word for it. We could go to a lot of detail on this. But there are a lot of reasons not to share passwords. You don't know if you are familiar with this Stat here, Matt, but we're talking about a lot of people. One in five employees on average, according to a new survey that just came out, of switch fast, one in five employees are sharing their e-mail passwords with co-workers. That's absolutely huge. When we're talking about small to medium business getting hit with nearly 4000 cyber attacks per day. 

[00:09:49] It's crazy. And, if you're in a couple of businesses, you guys know anybody that's in real estate, of course. Yeah, the number of attacks against real estate offices, small real estate offices, e-mail attacks has increased 1000 percent in the last year. 1000 percent and other categories of small businesses are up 400-500 percent and on average over everyone is up 25 percent. So, Matt, don't let your employees, Ken same things don't share e-mail passwords, get your e-mail set up the right way. Do not use shared e-mail boxes, either because you can't tell who did what? When did it happen? And, the biggest problem is, if you get an email from "quote" the CEO asking to have a vendor paid double check with the CEO. Make a phone call to them. make sure really is the CEO. Make sure she really did want to have that money transferred. Because nowadays it's almost as likely, that it's a scammer doing it, so be careful. Pay attention. It's not just anti-virus anymore, you've got to have just layers upon layers of security and people need to pay a lot more attention than we used to.

[00:11:12] We are talking to Craig Peterson, our Tech guru, who joins us Wednesdays at 730 and on Craig Peterson dot com and get all the information anytime you want. You know I've always wanted a Segway, and I've never gotten one, but it is now a Segway e-skate. So, I can have a hovercraft like Back to the Future. They promised us to have a hovercraft. Never. This is exciting news. 

[00:11:36] Yeah, that was a few years ago was supposed to be out. Yeah, this is kind of cool, because it's our neighbor, of course, to the west in New Hampshire in Manchester New Hampshire. Dean Kamen started the whole Segway thing and boy was that a big P.R. push. But Segway has come up with something that's better, even cheaper now within about a 300 dollar price point. You can get skates. Now, these are not rollerskates, OK. You don't strap these things onto your feet, but you stand on them, they've got nice wide wheels on them. They look like they would be pretty good for maybe a warehouse or someplace that doesn't have a lot of curbs or bumps or anything. But you just stand on these things and basically balance. If you can keep your balance standing on one foot. I would say, this is my opinion if you can stand on one foot and mostly keep your balance you'll do fine on these things. So you just stand on them and lean forward a little bit to go forward and you lean back to go backwards. You can step off of them very easily if you start to lose your balance you step off of one of them and they'll stop going forward. So, it's yet another Segway which is kind of cool. These things will go up to seven and a half miles per hour, which is kind of cool. Kind of scary, all at the same time. But you know kind of bicycle speeds, not race in a bicycle but a nice little place down the road. And they're hoping that these new little what they're calling drift e-skates are going to finally be one of the general popular populous adopts. Because instead of Costing you five grand these costs about 300 and they should be out very soon now. So, we might even see some in some stores by Christmas, this year.

[00:13:29] Wow. All right Craig Peterson, our tech guru who joins us at this time every Wednesday. Appreciate it, Craig. We're going to talk to you again next week.

[00:13:37] Gentlemen, take care. Bye-bye. Thanks. 

[00:13:40] Now his plan on making September here my nugget month is going to be releasing these little nugget videos that were very to the point nice and short talking about some of the main things that you should be doing and being aware of as a business person. But, I have had so many new clients that I just haven't had the time to do them. So I've been taking care of my clients I guess that's why I have to put the priority right. The people that are already paying me and everybody else we'll get to it. OK. I just haven't had the time. I have to apologize. But keep an eye out. I still plan on getting those nuggets going here within the next week. So, take care. And we will be back on Saturday, with my regularly scheduled Saturday radio show. 

[00:14:27] Take care. Have a great day and the rest of the week.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 11, 2018

Did you know that business losses have passed 10 billion dollars due to business email compromise? Find out more about this as well as why you should not be sharing your email password as Craig discusses this with Jim Polito.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers

Business Email Fraud Attacks Jump 25%
---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/11/2018

The Increase In Business Email Compromise Passed 10 Billion Dollars - Why Not Share Passwords

Craig Peterson: [00:00:00] Hi, Craig Peterson, here. It's a bit of a sombre day today, of course. You know, you might put two and two together, here, and realize I'm recording this on 9/11, and I remember this well it was also Tuesday when the hijackers hit. It's a sad day of remembrance, of all of that, and of course at 8:46 this morning, 8:46:40 is when the first event, along with that long line of events, that morning took place. Where the flight I think it was Flight 11 took off from Boston Logan. So, my heart and thoughts go out to everybody, who lost anyone or knew someone who lost anyone on that day. So, we'll leave it at that. This morning, Jim Polito, and I talked about a couple of different things I talked more about business email compromise. The statistics, what's happening, how big this really is. Believe me, it's really, really big. We've got one industry where we're talking about a one thousand percent increase, in the number of attacks. And the FBI upped their numbers. It's now over a ten billion dollar industry. The actual money stolen from businesses, so it's a bad thing. So, we talked about that and we talked very briefly as while about sharing passwords but what are some ramifications, there. So, here we go with Jim Polito on this rather sombre morning. He is our favorite guy.

[00:01:45] He really is, Cause he gets us out of jams all the time and he gets you out of jams too when it comes to this digital age. I'm talking about our tech guru, Craig Peterson who joins us a little early today. Craig, thanks for being flexible. Hey, ditto. All right. So, I want to talk about the e-mail again. E-mail passwords, but I want to start with something quite frightening you've let me know about. Business e-mail fraud attacks are up 25 percent. What's that all about? 

[00:02:20] Yeah, isn't that huge. We've known for a while that there are problems here. And the biggest parts of this problem, at least as far as I'm concerned, is that businesses and this is according to the FBI, have now over the last two years lost some 12 billion dollars, because of this. Now, you know there's a lot of ways to lose money right. You wake up in the morning and you see the stock markets down, its bad, right. You could lose money because of all of bad investments. As a business person, you can lose money because you invest in a new way of doing something, and it just doesn't work for you. In this case, what we're talking about is a type of fraud where they get you to do something, and they do it via e-mail. So, here's what it is you open an e-mail and you see in there that the boss wants to pay a vendor. Well, you know that happens every day, right. You get directives from your boss telling you to do something, right or don't do something, probably. And so it happens all of the time. In this case what they're doing is they do a little bit of research on your business, and then send an e-mail into the business. It looks as if the boss and you now take action on that because the boss told you to pay this vendor. 

[00:03:51] Well, what we're finding now, and what businesses have found out, including in most cases, especially smaller businesses is it isn't the boss and billions of dollars over 10 billion now have been transferred by the employees to the bad guys. And these attacks are up about twenty-five percent, right now. Now there is one industry that's even worse than that, Jim. You probably can't guess that it has something to do with you know Leasing something one of the biggest expenditures of money we make. Of course, number one is our house right. Well, number two in the car, the car, the car the fraud in the business of car dealers where they're going after car dealers. Now, with these e-mail fraud attacks is up over one thousand percent, in the last six months. It's absolutely huge. Absolutely. It's crazy here. Now, we're seeing some industries where it's up 400 percent in the last quarter. So, this is a huge, huge, huge they're engineering these e-mails. They're spoofing e-mail addresses. We get calls from businesses every week, almost every day, now where they're saying something weird happening with our e-mail. And you know that they're not sure what up but one has to have a look at it which we do. Right. 

[00:05:28] And Danny we lose. All

[00:05:39] Right. You know that. 

[00:05:55] Craig. We've got Craig, Craig, I don't know, I don't know.

[00:05:59] I don't know, Danny if he can hear me. But, can you make a reconnection with him? Something happened with that connection there. But what Craig's talking about is business e-mails, protecting businesses from having to protect themselves. But also this fraud that's going on and protecting yourself and leasing a car and things like that. And again, the car is your second greatest expense, after your house. Well, where are the bad guys gonna to go? The bad guys are going to go, where the money is, and the money is first in going after homes, you know taking out a second mortgage on your home without your knowledge or credit cards, too. So, Craig -  is Craig is back with us? I believe, Danny, we got him. 

[00:06:56] Down now. OK. 

[00:07:00] He's also going to be talking about your e-mail password sharing your e-mail password. All right, Craig, I'm sorry we lost you there. Toward the end, it started to drop off. 

[00:07:14] Sorry, about that. No problem. Now you blame, blame the tech blame the tech, people. 

[00:07:21] Yeah, exactly, right. This is a huge deal. We're talking about e-mails here. You know you've got be careful to make sure that your employees, your fellow employees your boss know that the simplest way to avoid this is if you get an e-mail that's a little suspicious. Like, I don't recognize that vendor and why should we be paying them? Pick up the phone, call the boss and say, Hey, I just wanted to make sure that this was legit or you know wasn't legit. And, in that case, FBI warning about this all over the place, we've been talking about it on the FBI infragard webinars. It is just rolling, like crazy because it's working. 

[00:08:09] Yeah, they're making money, I said while we lost you. If they're making money you know what I mean if there's money to be had there that's where the bad guys are going to go.

[00:08:20] Exactly right. 

[00:08:22] We're talking with Craig Peterson, our tech talk guru, at the end of this segment. We are going to give you a number that you can text my name to, standard data and text rates apply. And you'll get all this information, plus weekly updates. And if there's ever a crisis, a hack you'll have the information from Craig and what to do. Craig, don't share your e-mail password. I think that's obvious, but apparently, a lot of folks do it.

[00:08:53] Or Yeah you have your passwords on a post-it note stuck on your screen. No, No. Exactly. Well and that's because, well in your case, it's something like P A S S W O R D. You follow John Podesta's lead and make your password, password with a zero. Yeah pretty tricky, Yeah. Yeah, well one in five employees are sharing their passwords with co-workers. So, looking at it is an easy way, if they're out of the office that co-workers can check their e-mails for them. There are all kinds of liability problems with this. Don't do it. Don't share your password. You could be the subject of a criminal investigation if you share your password with another employee and let's say they leave the company or they're fired from the company. You don't remember that you shared your password with them and they now use your account to hack into company computers or to do other things, nefariously. What happens all the time. And, then to top it off if your username and password get stolen from another Website because you and your fellow employee knows it and they use it elsewhere. You could be liable.

[00:10:08] Yeah, yeah. See that's the part. Like all of you know, it's because I was careless with it. But, now if anything happens with it it's going to be my fault. It is your fault. 

[00:10:18] And nowadays we're talking about criminal prosecutions, Jim, yeah. Where they are going after you. So, don't share your password if you're in business. And let's say you have people working in the payables or receivables or whatever, sales. Set up a mail reflector. So, everybody gets that email. Be careful don't use shared e-mail accounts. There just all kinds of problems that you can't track down who did what when, and if they do it in sales you also have the problem of salesmen trying to leave the company with your customer list and going to a competitor. So, you know just to make sure that doesn't happen do not allow employees to share them and make sure you have certain types of reflectors, so that you can shut off their access, as soon as they leave the business. 

[00:11:10] Craig Peterson, you heard it there. He's he's got it all. He's got a lot of other stuff to talk about and share with you. And you can get it all for free, no obligation. He's not going to pester you, he's not going to sell your cell phone number so what you do is text my name to this number.

[00:11:28] 8 5 5 3 8 5 5 5 53 that's eight five five three eight five fifty five fifty three. 

[00:11:37] That's right. Standard data and text rates apply. You'll get this information and more, from our friend Craig Peterson you will also receive updates or alerts when something big is going on and he'll give you instructions on what you need to do to protect yourself. And, Craig I appreciate you coming in a little bit early for us. We appreciate the time and we can't wait to talk to you next week. 

[00:12:04] Thank you. Take care. Craig Peterson. everybody. Oh by the way. 

[00:12:10] After a while we.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 8, 2018

 

Do you or your Employees share passwords?  If so, STOP immediately and change them, now.  This week I will explain why.

Segway has some new fun Technology and I will discuss it today.

Business Email Compromise is on the Rise.  I will tell you why and how the hackers are going after small businesses.

People are still not patching their routers.  Also a new Router vulnerability this time against routers used worldwide by ISPs.  I will explain who, how and what you can do about it.  

Craig will be release some video securiy nuggets during the month of September.  Watch for them.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/08/2018

Don't Share Passwords. Privacy is not Absolute. BEC the new hacker scam to beware of. Mikrotik ISP routers have been hacked.

Craig Peterson: [00:00:00] Hey, Good Morning, everybody. Craig Peterson here and we've got a lot to cover today as usual. I don't  if you've been getting some of my e-mails. Hopefully, you do, if you're not subscribed go to Craig Peterson dot com slash subscribe. We keep all kinds of great information there and we send out alerts about Hacks and about some of the latest things including I am now producing a whole bunch of what I'm calling nuggets. These are pieces of information short videos that I think are going to make a big difference in your life particularly in your business. So, keep an eye out for those wonderful nuggets. Those are videos I'm kind of releasing all over the place including on my Web site. Today we're going to talk about something that really concerns me and this is about the Five I's. If you haven't heard about them they are affecting your life in potentially a very big way in the future. Segway has some real cool new devices out. We're going to talk about the latest one that they have and I don't know if I'd buy this, but there are some other ones I might buy but, 

[00:01:06] this is really cool. If you are an employer or an employee you're not alone, if you share your e-mail password with co-workers. By the way, it's a dangerous thing to do. Hackers are trying to scam you again, and this is all about the e-mail scams business e-mail compromises that the FBI has been warning about, and, of course, that's a very, very big deal too. Unpatched router's Yeah, yeah, a huge proxy army spying on networks and it turns out it's not just your home routers anymore that they have control over. No, no, no. The bad guys have control over some of the routers that your Internet service provider may have provided to you. So, all of that and more stick around. Here we go. Well, the Five I's are countries that cooperate together. And they've been cooperating for a long time. In fact, some of this has come up as part of this so-called Russian investigation that's been going on, because apparently the British were being used to spy on President Trump and feed information back to the Department of Justice, the FBI, and maybe even the Hillary Clinton campaign. 

[00:02:34] Well, what are the five I's and what are they doing. Bottom line, we're talking about the U.S., the U.K., Canada, Australia, and New Zealand. These five countries that cooperate on spying on each other's citizens. Now, that's a very, very, big deal of course. Some of these countries also spy on their own citizens, as well. We're finding out more as the in-depth analysis is being done of the Mueller probe. But, the whole idea here is, if I'm in the United States and I have somebody who is a citizen of the U.S. that I suspect might be a bad guy, they might be bringing drugs in, they might be part of a terrorist network. I can't do a whole lot. Unless they call outside of the country, or they call into the country from outside. Once the communications leave the borders in the United States it's no longer considered. well kind of like privileged, right. They cannot just willy-nilly grab that data, grab your voice, et cetera. But, another country can and that's what's been happening. So, for instance in the case of these so-called Russian collusion operations, the U.K. apparently was spying on, wire tapping some of President Trumps communications, and some of his campaign workers communications as well. So, it's a very, very, big deal because they are gathering all of this.

[00:04:09] They are gathering stuff that, even they admit is illegal. You remember the story I talked about here just a few weeks ago, where the National Security Agency went ahead and deleted three years worth of telephone intercept data because they weren't sure if some of it was legally obtained or not. So, it's frankly a very, very big deal and it's a scary thing. Well, they came out with a statement after they met, and they just met, and that you know that part is a little concerning to what they're doing but they are spying worldwide, and they're very concerned because they cannot decrypt a lot of the communications. Now, they can intercept them obviously. That's why the Five I's exist so they can spy on each other's citizens, which is a problem right there, right. So, they can spy on each other citizens. But, here's where the big problems come in, and for them they can certainly intercept communications that are encrypted, but they cannot do much with them. In fact, they can't do anything with some of them. So, they met, and they came up with a statement. Now, this is really interesting. Here's a statement on privacy or part of it, privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute. The increasing gap between the ability of law enforcement to lawfully access data and their ability to acquire, and use the content of that data is a pressing international concern.

[00:05:48] Each of the Five Eyes jurisdictions will consider how to best implement the principles of this statement, including with voluntary cooperation of industry partners. Any response be it legislative or otherwise will adhere to requirements for proper authorization and oversight. Now we've had this debate before. You might remember, if you're old enough, during the Clinton administration, they were trying to force these clipper chips down everybody's throat, they are oh so safe, it's all so wonderful. And, it turned out that in fact there were back doors in them. So, the government could listen in. So, this is something we'll keep an eye on. We're going to watch see what happens. There are veiled threats to businesses in there, saying, hey basically if you don't comply, with you know, law enforcement, if they want to gain access to something, then bad things going to happen to you. It's really scary. But, next up let's talk about something kind of fun. OK, let's move into the fun category now. I know the guy who who started this company, right here in Manchester, New Hampshire. The company is called Segway. I've met him a few times, I've interviewed him a couple of times, and been very involved with U.S. First which I think is an absolutely fantastic program for kids to learn and get inspired. 

[00:07:15] It really is. In fact, that's kind of their whole thing now is inspiring kids. So, it's a really good thing. Remember, there was all of this hype about the Segway. How it's going to change the world? And, we certainly have seen Segway's around. I went on a tour over in France, in Lyon, in southern France and it was really very cool because we were on Segways we could go very quickly, when we needed to, or wanted to. And, then we could kind of stop and talk and look around at everything. I loved it. I want to go on more Segway tours, now. If you haven't done one, you should try it because it's it's very easy and it's rather intuitive. I think you might well enjoy it. Well, they have come up with a few different models over the Segway. You have some now that just kind of fit between your legs so you're not even standing, fully. They have one with kind of a seat, I've seen before. I think that's not actually a Segway. Now, they have roller skates. I guess they're calling them e-skates. The drift, is what they're calling them now drift w-one it's going to be available in stores sometime soon. 

[00:08:37] But these skates use the same self balancing technology as Segway's other better known products. So, shifting your body weight controls acceleration and deceleration. Now, if you've worn roller skates before or roller blades you know you strap them on your feet and sometimes you get out of control and you fall. And, I've taken a couple of big spills on those as well and I had protection on at the time, but you fall. That's because you're feet are strapped and you can't do much about it. If you lose your balance, et cetera. Well, these E-skates you just stand on. So you are standing on one on each foot. So they are independent they are individual. I saw some video of somebody using these, which is really kind of cool, because you can step off of it very easily. Much like you can with a regular Segway. Just step off the skate if you're starting to lose your balance you can take one foot off and put it on the ground. But, it is really, really neat. So, they can only tilt forward and backwards just that single access. So, there's no risk at all of rolling your ankles, like there are for roller blades etc. And, it's really kind of cool. 

[00:09:53] The attendants who were at this show, that just happened, where they were shown, over in Berlin, the IFA, that show. It's a really cool show, but we'll get into that right now. But, the really cool thing about these roller skates is the attendants were able to just say. Just get on it and do what comes naturally. Because, they really have got the right sensors in these skates now too to detect what you're trying to do. So, much like a regular Segway you kind of lean forward a little bit to go forward. You, can go backwards on these things if you lean back a little bit and apparently it just takes a few minutes to get relaxed in control which is about what it took me to get used to the Segway over there in France. My 80 year old father's even gone, for the very first time, on a Segway tour. This was in southern Utah. He went down very, very pretty area and perfect again for a Segway tour because you just zoom around and enjoy the sights as you're going. But, he didn't have too many problems I guess he fell off once said 80 years old, that's not bad. But he really enjoyed it absolutely would do it again. I don't know if I want to try these little, little E-skates again. Keep an eye out for them. The called the drift Segway drift. But, I can tell you I probably would try them. They're only going to be a few hundred bucks, apparently, versus the thousands for the big Segways. But, it should be kind of fun. All right, a few of you are sharing passwords. You're not alone.

[00:11:39] Now, we we know a lot of people over the years that are sharing passwords, and obviously that's a problem, right. And you know sharing your password with your computer is one thing, and it's it's bad. OK, it's pretty bad. But sharing your password with someone for your e-mail account, it looks like it's even badder than than just sharing your basic password. Now, for your computer and here's why, people don't choose great passwords for their e-mail accounts. And, a lot of times that workers will kind of share and say OK here listen while I'm gone here's my password. Get on check because I'm expecting this from a client, or that from a vendor, et cetera. And so people share their passwords, and you hope there's no real ramification certainly nothing as bad as missing an order, or missing the delivery problem, right. Doesn't that make sense to you? 

[00:12:41] Well, there are ways to have group and shared accounts. We do this. I've got to tell you every time we've gone into a business to clean up after there's been a hack and wow it's really bad. 100 percent of the time they've been sharing passwords, 100 percent of the time. And, one of the ways that these bad guys get in is, let's say there's a problem with a hack on a big company, and they're able to steal usernames and passwords. Guess what they now have, they have a username and password that they know worked at this company that just stole it from, right. So Yahoo, for instance, because we know they lost more than a billion accounts information. So, let's just say Yahoo for the lack of another example, right now. But Yahoo has usernames passwords are stolen, or some other small Web site out there that you're using. Most people are using the exact same password for their accounts on every site. So, they use the same username which is often their business e-mail, unless it's obviously just a straight up personal thing that might have a personal e-mail, but most people just have the two e-mails. 

[00:14:11] So, they their business e-mail is shared now with another person along with a password for that account. 

[00:14:21] So, now that other person gets in and starts using it. Now, remember that that password has been compromised in this scenario so, somebody else out there, a bad guy knows it. So, now someone internal to your company knows it and maybe even multiple people, now know it. And, what's been turning out is that there have been a number of kind of vengeance hacks where someone who knows someone else's password gets into the network, after the fact. So, make sure companies use set up group mails when it comes to your accounts receivable, accounts payable, any sort of customer transactions use a group mailbox, use of forwarder, there's lots of ways to do it. We do it all of the time for customers. So, make sure that happens. Don't allow employees to share passwords. If you're an employee insist that the manager set up a group password or group account, I should say, a group email account. Set up some sort of group e-mail account so, you're not held liable. So, your username and password are not used to hack the company at a later point in time, by one of your former fellow employees or potentially even worse. By the way, this survey found that three out of five small businesses that suffered a breach are likely to go out of business within six months. 

[00:15:52] Ok, that's a pretty standard statistic, I've seen. Usually, it's around 50 percent. In this case, they're showing 60 percent. So, you do not want to have a breach. There's all kinds of stats, and if you want to go to my Web site Craig Peterson dot com, you'll see it right there. Now, here's our next our article here. It's another scam that's been very successful for the hackers. Now, cyber criminals have been out there since the days of computers, really. You know initially, initially, initially probably not so many, but there have been over the years, a whole lot of these bad guys. While they're now turning more and more of their efforts to business email compromise scams, as well as, telephone scams, and they're using these to steal funds that are causing billions of dollars in fraud losses over the past few years according to statistics from the FBI. And, I get reports from the FBI almost every day, certainly every week, about new variations of these e-mails scams. Now, the scammers are typically targeting employees with access to company finances, payroll data, and other personally identifiable information. So, this particular report looked at 3000 randomly selected business e-mail compromise attacks. 

[00:17:25] Now, it said type of spam, spam e-mail. Obviously it's been called spear phishing before, and now it's called a business email compromise, because they're doing some amazing things here. They're trying to trick the e-mail recipients into doing a wire transfer to a bank owned by the attacker in half of the cases. Isn't that amazing? So, once the money's out of your bank account because you're just wired it, bam it's in the attackers account within 90 seconds. And, if they own the bank, they are not going to cooperate with any sort of investigation. So, some other types of attacks include getting recipients to click on a malicious link, that's 40 percent of the time, and those malicious links are then used to install spyware on your computer, or to verify that you are who they think you are. They also use them to establish rapport with the victim, and stealing personal identifiable information, that makes up the last 13 percent here. So, very simple e-mails. So, a subject like vendor payment. Hey, Joe, are you around? I need to send a wire transfer ASAP to a vendor from Jane. 

[00:18:44] Now, they're going to find who the CEO is or a high level executive. In this case that company had a high level executive a CEO, COO named Jane. So, they figured that out. How do they figure that out? Well, they probably just went to the company's Web page. Go to my company's Web page Mainstream dot net there you will not find any information about any of the officers, who they are. and then Hey Joe, obviously, they know who Joe is and they can find that also probably on the company's Web page, right under officers. It's crazy what people put up there. And the other easy way to find it is just to go to LinkedIn. You can scan around you can find tons of stuff about businesses, small businesses and otherwise. So, about 60 percent of these business e-mail attacks do not involve a malicious link. So, it's just a plain text e-mail attempting to trick them into performing a wire transfer, or some other sensitive information. It's really scary. So, here's the people there are attacking, right. Forty-three-percent of the time they are impersonating, the CEO or founder and they are attacking the CFOs, finance, H.R. people, C-level executives, CEOs and others across the companies, is about half. So, why would they go after H.R. person? We'll so they can get the W-2 information so they now have Social Security numbers, names, addresses.

[00:20:20] Think of everything H.R. has. So, here's what you should do to keep company safe. All of this is up on my Web site, by the way, Craig Peterson dot com. Prohibit wire transfers from going out without an in-person conversation or phone call. That means contact the CEO, right if Jane sent you that e-mail you've got Jane's number, call her. I don't care if she's on vacation, in fact, that's often when they will target someone they see on Facebook. Hey, Jane's going on vacation she's going to be in Bermuda's, she's going to be on her ship, She's not going to be able to have communications. And that's when they go after it. Take caution with e-mails from the CEO. All right. Because they're the most likely ones to be impersonated. So, if they make a request that seems a little unusual pick up the phone and call them. Obviously, if you are responsible for training in a company, make sure that you've got a training program in place, deploying an e-mail protection system that stops these type of spear phishing attacks, Cyber fraud attacks. So, it goes on and on. Very good, Very interesting and there's a lot of information about this. If you go to Craig Peterson dot com slash security, you might be overwhelmed. 

[00:21:34] But, that's what our golden nuggets are all about. I'm producing now throughout the month of September. These nugget nuggets of information about how to stay safe. And we're going to lead all of that up to an offer that I'm going to have in October. So, we'll talk about that as well to help you completely clean up all of these problems, but keep an eye out for my nuggets. You'll be seeing them on Craig Peterson dot com in fact, to put it up a little Coming soon thing on the site. So, next stop you'd think we were past this point. Now unpatched Routers. OK. We've got multiple malware campaigns right now, and they're spreading the hacks of gear from a company called microtik. Now this is probably not a name you're familiar, if you're a business person hopefully you're using current Cisco gear, not old stuff. Hopefully, it's patched and kept up to date, as well. Right. If you're a regular old home user you might be familiar with companies like D-link or Netgear, neither of which I use in my home, because of all of the problems they've had over the years. You definitely should not be using those in your business. Well, microtik posted a software update for a vulnerability that was found earlier this year. 

[00:23:11] But, researchers have found themselves, that more than almost 400,000 of these routers they've identified on the Internet were still vulnerable. People are not applying the patches. Now, here's what's kind of really scary about them. We've got 7500, that we know of, that are being actively spied on by attackers, they are actively forwarding full captures of all to the network traffic to a number of remote servers, OK. Just crazy. Another quarter million, of these hacked routers, have been turned into proxies. So, they are being used to again send the data off to the bad guys. So what data, all of your data. Now, here's the part that is the part that basically explains, why you don't know about these guys. They are providing hardware for Internet services providers, including campus network infrastructure at schools. They provide equipment for outdoor fiber routers, wireless backbones, OK. It goes on and on. Now, these routers are all over the world. Some of the largest concentration are in Brazil and Russia, here. A lot of the ISP's are using Cisco gear, but there's 14,000 they've already identified here in the U.S. So, again can you trust the hardware that you get from your ISP? Probably not, 100 percent. So, what are you going to do about it.? I can tell you what we do. We don't use the hardware that they give us.

[00:24:54] Right. So, they've they've got Modem of some sort or terminal device. We feed that directly into some really good hardware, that we've installed, that we control, that providing high levels of Firewall. So, it's a very big deal. Microtik, keep an eye out, if you are again a business, and this is really important or if you have quite a bit of money that you want to protect. Make sure you get rid of that router at the edge of your network, that's provided by Internet service provider. Get rid of it. Let's go ahead and do something reasonable. Contact a company that knows what they're doing with security firewalls et cetera. And, unfortunately I got to tell you that 99 percent of them, we have not met very many companies, and we deal with them all over the country, here, that really know what they're doing most most of them have no clue, they're just selling a box and pushing it. But, anyhow that's what's going to happen in October. Keep an eye out for my nuggets. Make sure you sign up at Craig Peterson dot com. We'll be all kinds of good security nuggets we're going to be putting out. Have a great week, and we'll be back again, next week with more tech talk with Craig Peterson, see you then.

 ---

Related articles:

You’re Not Alone If Your Share Your Email Password – But There Are Hidden Dangers


Threats To Our Privacy: Tech Industry Told ‘Privacy Is Not Absolute’ And End-To-End Encryption ‘Should Be Rare’


Business Email Fraud Attacks Jump 25%

Unpatched Routers Being Used To Build Vast Proxy Army, Spy On Networks


Segway’s Drift E-Skates Aren’t Nearly As Dangerous As They Look

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 5, 2018

Did you see that the Internet Speeds in the US have doubled?  Yes, it is true -- Listen in as I talk with Ken and Matt about what caused this growth.

Do you own a small business?  If so, you'll be interested in what I have to say to Ken and Matt about the dangers you may be facing.

Been to Dulles lately? They have some new technology in place.  This morning with Ken and Matt I will discuss it and the impacts it will have in the future.

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:


The End Of Net Neutrality Has Doubled Our Internet Speed Ranking!

With The End Of Net-Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

Half Of Small-Businesses Believe They’re Not Cybercrime Targets

New Facial Recognition System Catches First Imposter At US Airport

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/05/2018

Internet Speeds have doubled in the US due to Net Neutrality Repeal. Small Businesses are the targets of Hackers.  Facial Recognition at Airport's first Imposter.  

Craig Peterson: [00:00:00] Hey, Good Morning. Craig Peterson, Here on in Maine. I talked a little bit this morning, again, just like I did yesterday with Jim. I guess this is a big story about the U.S. Internet speed where our ranking has doubled, which is just absolutely amazing just how much faster we've gotten. And, also a little bit about AT&T and their investments into the Internet. This new facial recognition system, catching our first imposter at the airport, and we talk about how many airports it's in place. It's surprising we caught one, Half of all small businesses believe they are not Cybercrime targets, and frankly that's not a good thing. So, that's what we talked about this morning stick around here we go. 

[00:00:49] Well it's that time of the week again, Craig Peterson joins us, once again, to go over what's happening in the world of technology. Craig, how are you this morning? Hey, Good Morning. Doing well.

[00:00:59] So, when I went in and looked at your Web site, Craig Peterson dot com,  my internet speed is just so much better. Is this a result of the end of net neutrality?

[00:01:11] Craig, Yeah well for those who don't remember, of course, net neutrality was an Obama era FCC thing, where they were trying to bring the Internet into the same rules and regulations that have been in place since the 1930s for the telephone companies. And as you know for, jeepers since the early 70s, really, what became the Internet had been pretty much unregulated and had been completely unregulated since 1991. Other than of course the Federal Trade Commission, the FTC, was regulating it and has been regulating it pretty heavily. So, we had net neutrality in place for a while, and there are a lot of people who were out there yelling and screaming that we needed it because we needed fairness, we need equal access. In other words, the kid sitting there with me in front of their computer who is playing video games streaming live all day long. Plus they've got Netflix playing over on the side and maybe they've got music playing as well and this happens and it happens quite frequently. So, they use a lot of bandwidth. They wanted it to be fair. So, he would pay the same price as the grandma who was sitting at home hoping to get an e-mail from the grandkids. You know which is of course totally crazy. And to top it all off we had you know businesses out there who wanted to get some money back from their investments into network infrastructure. So they put it in place in the very first thing that came in front of the FCC net neutrality the very first time and this was terrible.

[00:02:56] That's not a good thing. It was in place because what they were doing is the FCC denied a company that wanted to give away free streaming video because it would be unfair to their competition. You know, heaven forbid you've got a startup company that wants to go up against Verizon and offer a better deal, right. So, net neutrality, absolute failure and we have the Trump administration with the new chairman of the FCC who got rid of this net neutrality thing and when they got rid of it, of course, we still had people who were out there screaming hey, we've got to we've got to put it back in place its terrible the world we're going to come to an end. The Internet never existed without the FCC regulations, of course, you know I'm kind of going a little overboard here to come up with a point, but that's basically what is happening. In fact, it has gotten so bad that the chairman of the FCC has had to get armed protection for himself because of the death threats and armed protection for his kids. So, now we've got people like Ken out there who are we have noticed something which is since the repeal of net neutrality took effect just this spring.

[00:04:14] The internet has a ranking of the U.S. and the Internet has changed. The Internet has sped up in the U.S. and the U.S. has gone from being the twelfth fastest Internet in the world, average, average speed to people's homes so, we were 12th. And since this spring since net neutrality went away we're now the six fastest Internet in the world. We've basically halved our rank which is a very good thing. AT&T is investing nearly 120 million dollars just in Iowa to improve their network. So, now the businesses know they can get their money back out of it. That they can charge the kid sitting there using up all of their bandwidth. That they can charge Netflix, that's using half of the Internet bandwidth, at times, in the U.S. That the backbone carriers who have paid for the infrastructure can say hey Netflix you owe money, in order for us to carry all of these movies for everyone. Now, that's in place, we've got companies reinvesting in the Internet. We're seeing internet speeds improving and we're also seeing improvements for consumers. I just switched my mobile phone plan, my cell plan. I've had the same company for about 20 years now and I switched it because I'm now getting twice the speed for half of the cost. 

[00:05:38] And with net neutrality, in place it would have had to get permission from the FCC to lower their prices or to improve their performance or speed. So, thank goodness it's gone. I predicted this would be the case. if it did go in place and if it was removed. So, it is great. I know there's a lot of people who don't like it, and I want to warn those people who are more on the conservative side, who are now starting to call for more regulation of the Internet, because of what's been happening with Facebook and Twitter and other places where they are apparently censoring some of the conservative speech. So, we've got conservatives now out there saying oh we've got to have this regulation in place including just yesterday the new chairman of the FCC the guy that got rid of net neutrality really seem a kind of a personal statement if you will saying hey listen we may have to regulate the MAGAF companies. You know again Microsoft and Amazon Google Apple and Facebook we may have to regulate those companies because they are not treating all information fairly. So, it is kind of interesting here is the pendulum sways. Maybe, that should be a name of a new soap opera or something guys.

[00:07:02] Craig Peterson, our tech guru, joins us right now to give us an eye on the world of technology and before I move onto the next topic I should mention, speaking of net neutrality and whatnots, Ajit Pai, is going to be here, next Friday, coming to an event at the Maine Heritage Policy Center. So, if anybody's interested in that, Maine policy dot org, ladies and gentlemen Not interested. Yes, I know you're not. But maybe the great crowd out there listening to this might be. So Craig, now that I've done my little disclaimer. 

[00:07:26] Yeah, he's the FCC chairman for those who didn't know who that was.

[00:07:29] Correct. Basically, the one who is responsible for killing it, killing net neutrality, in the first place. So, anyway moving on to other topics. You know, if I were a small business owner right now I may be, I might be a target for cybercrime, but I'm just a small fish, right. So, I'm probably not. Am I wrong about that?

[00:07:50] That's one of the things that you hear all the time isn't it. No. I would say go after me. Why did Willie Sutton rob banks? Because that's where the money was. And, so many people are assuming that the bad guys are going after the big businesses which they are, and they are going after the banks online trying to hack them. They're trying to break into their networks into the computers get all kinds of information. But the big banks and the big businesses can afford to do security and do security right. And, now they are spending money on that. They're spending real money on trying to keep things secure, while small businesses and the home users don't have that money. So, where are they going to go. Well obviously, they're still going to hit some small people and you know in their homes. But, now the FBI is saying that small businesses are the biggest target, right now for the bad guys, for hackers. And, unfortunately, a lot of small business people are thinking that they're really not going to be coming after me. But, when you look at the numbers that are involved here, where an average hack can cost 130,000 dollars. We just picked up a client that had been hacked and they lost 180,000 dollars in cash. So, you know you've got to be careful business owners, just like you were indicating Matt, Don't think they are the target but they are the target. And, you've got to start using real multifactor authentication or two-factor authentication for your business e-mail accounts because that's where they're usually going to ask you, they're using something called a business email compromise. It's something the FBI has been warning a lot about. It's something that's been very effective and very cost effective for them and unfortunately has literally stolen the livelihood and the businesses, that people are working their whole lives for. It's been stolen from them. So, it's a big deal. Don't think that just because you're a small business you're not a target. Because in fact, you are the target. 

[00:10:03] We're talking to our tech guru, who joins us Wednesdays at seven thirty-eight. So, facial-recognition which works on my iPhone really well. Is it becoming more viable for security issues in airports?

[00:10:18] Yeah. What's in your iPhone is really interesting because it's close up. It's able to measure multiple points on your face simultaneously, to figure out if it's really you. And, by the way, Apple's expected to release some more information about their phones coming up here, next week. But, yeah facial recognition is interesting when you're talking about it for a crowd. We've used it at major events, major sporting events for about a decade now. And, we've had a lot of false positives which is OK, because it was new technology and the police understood that. What I'm concerned about is in the future. What happens when people are falsely identified, as well? Well, down in Washington D.C. Their main airport down there which is Washington Dulles is now using an interesting form of facial recognition. What they're doing is the computer looks at their passport photo and is able to use that photo without training like you have to train your iPhone, right.

[00:11:26] Can you see your face Yeah exactly.

[00:11:31] This is just training? So, he presented a French passport as his I.D. the computer scanned it. The computer used a camera that's sitting there. And, they do film all of your interactions at these international airports and was able to identify a man with a fake passport, just using this new facial recognition system. So, you can expect this is going to grow as time goes on is going to be used more and more. There are 14 airports, right now, using facial recognition technology. It is being used to help screen these people and this was the very first one ever caught using facial recognition and it was just a couple of weeks ago. So, it's kind of interesting and we're going to see more of it, as time goes on.

[00:12:17] All right Craig Peterson, our tech guru, joins us at this time every Wednesday to give us technology around the world. Craig, thank you very much, sir. We will talk again next Wednesday.

[00:12:27] Hey, thanks, gentlemen. Take care. All right.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Sep 4, 2018

Find out more about how we are winning with the end of net neutrality as Craig talks about it more in depth with Jim Polito.

 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

The End Of Net Neutrality Has Doubled Our Internet Speed Ranking!

With The End Of Net Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/04/2018

The Stats On Net Neutrality Are Out - We Are All Winning

 

Craig Peterson: 0:00 Hey, Craig Peterson here. You guys remember the whole quote, debate, unquote, about net neutrality? I never thought there was a debate here. There was no sense in this whole idea of net neutrality. It just when you played it out, it was absolutely ridiculous. So any how we got some stats, some hard numbers, what has happened since the end of net neutrality, and that's where I talked about this morning with Jim. So here we go.

0:30
He is the man. He is our tech talk guru. And he's our good friend. I'm talking about Craig Peterson. Got some important stuff to discuss today. Good morning, sir. How are you? Hey,

0:44
Good morning, Jim. Doing well this morning. You know, it's almost the end of the heat wave like this. And they get good again. Yeah, that

0:52
for a Canadian? Yes, absolutely. For Canadian. This is heatstroke. weather. So,

1:00
you know, I'm an American now, right?

1:03
Oh, no, no, no, no, I know that. I meant more like, you know, like, we, which we're very happy about that you did, because you're a wonderful addition to the country. I just met, like, you know, being a Canadian coming from Canada being raised. They're not necessarily the customs. I'm talking about the climate

1:23
and all that. Yeah. Yeah, like a please. You know, like half an hour of sunlight a day. You know, all that stuff. That's it. Well, actually, now, were you not where you came from? But, you know,

1:38
yeah, well, in the summertime, the sun never actually quite set. It was worse. It was Twilight though. And my daughter's in worse shape. Right now. She's up in Norway. And she's saying that the days are already getting cold. It's below freezing.

1:54
Yeah, that's, it's nice to go there in the summer.

2:00
If you wanted to come visit, I'm not so sure.

2:04
You just tell her dad. He's got a big new contract. He's working on me. Can't I'll be there. I'll be there in June.

2:13
Exactly.

2:15
Well, we need your help today. Because two things have come up net neutrality and an actual increase in internet speed ranking. So in the US. So remember, we I think we just need a refresher on what net neutrality was. And now we were told that the sky would fall if net neutrality went away. It did go away and the sky hasn't fallen. So could you lay it out for me, please?

2:46
Sure. Absolutely. I had a request to do exactly that. Another station and another station today, Craig, can you come on, I want you to take net neutrality from both sides. I want you to be productive neutrality and anti net neutrality. And I said, you know, I'm not sure I can take the pro side. But I can tell you what they're saying. And what they were saying, Jim, was that we need a way for the government to regulate the internet very, very closely. We need to make sure that the federal government has control over everything that's online, so that we can enforce free speech rights. But you know, more burden than ever, what we need to do is make sure that these big bad evil companies are not over charging their constituents never word your your internet service provider, whether it be you know, Comcast or whoever it might be even your phone provider, make sure that they have to obey the same rules that were put in place in the 1930s on top of the telephone companies. So that's what they were doing. They said, if we don't have net neutrality, everything's going to fall apart, the speeds are going to slow down and people going to get charged way more is just going to be a terrible, horrific thing. Of course, this was during the Obama administration. And they didn't bother mentioning that, in fact, the internet and it survive just fine without the FCC regulating it for more than 20 years. He back the internet internet had grown immensely over that time.

4:26
So it's this big monster.

4:30
Yeah, we need control over and you know, what I get concerned about right now is we've got the right wing voices and libertarian voices, basically everything except for socialist, slash communist, socialist, fascist voices, all of the other voices out there are getting squashed. And I'm getting concerned. Because we have a lot of people who are saying, whoa, wait a minute. Now, we need to regulate the internet. And the voices that are saying that today are tend to be on the right hand side of the aisle, the left hand side,

5:03
which is a flip,

5:05
yeah, it's a big flip. And, and I'm kind of wondering if this isn't the manipulation. But I was against to the whole idea of so called net neutrality, because here's, here's the bottom line problem. You've got some kid sitting in the basement of his mom's house, like the typical picture, right. And he's sitting there playing these streaming video games with a dozen of his closest friends around the world. He's got Netflix movie playing over here, and he's got his streaming music playing over there. And he's just using bandwidth coming out of the kazoo. And the people who are pro net battle net neutrality were saying, Hey, listen, he shouldn't have to pay more than the grandmother next door who's living off of social security and all she's looking for is a nice little picture of the great grand kids or grandkids to come in on a piece of email. So in their mind those were equivalent in their mind Netflix which uses more than half of all of the Internet bandwidth in this country that Netflix we should be paying the same and should not be charged by the backbone providers any more than your local soccer team was in the gym? Yeah,

6:23
because they were vacuuming it up

6:28
exactly and why would they have to be responsible for why would someone that pain Netflix to watch movies Why would they have to pay more if they have a plane movies all day long and someone that never opens a movie never streams video right it was insanity so I was absolutely against it. And I told everybody about it on my show on your show and they listen this is this is just stupid. And worst of all, what it's going to do is it's going to stop expansion the growth we had seen on the internets going to stop because you had to go to the FCC and kiss the ring, pardon me,

7:10
and and say, Hey, listen, I have a whole new model for doing business. And in fact, the very first case that was brought in front of the FCC for for arbitration was a company that wanted to give free streaming movies to people. And the FCC said, No, you can't do that. Because, you know, lines and isn't doing that. And it just wouldn't be fair to these other companies out there if you give stuff away for free. So under Obama's net neutrality rules, they were stopping us from getting free stuff. So it's it's absolutely wonderful now that President Trump put in a new chairman for the FCC, whose life has been threatened, whose children's arrives had been threatened by apparently left wingers because he did the see it's crazy. He now has armed security guards, but the new chairman of the FCC got rid of his net neutrality rules. And the beauty of this gym is exactly what I predicted would happen did happen. And that is the companies started to invest in the internet again, because they realize they could charge people based on what they were using. So now they could afford to improve the internet. It's like them well, maybe it's not like the mass pike. But you know, with a pipe if you use it more, you pay more

8:39
Yeah. And and they can, of course, do the repairs and make the better roads to handle the trucks, etc, etc. Right. So now the internet we have doubled in our position here. And since the end of net neutrality, the United States average internet speed has gone from in the world to six in the world. See, that's impossible, because the liberals are telling us that wasn't gonna happen. No, it's gonna get worse. Yeah, that's

9:08
it. That's impossible. You're lying. You're lying.

9:14
I have this stat you go online, you can see it right there. We've got some tweets that people will put the now basically say almost the same thing. But it's showing a dramatic increase. In fact, my I switched my carrier, my telephone carrier over and the for the first time in like almost 30 years, I got cell service 25 years ago. And I stuck with the same company the whole time and I just switched over because I found another carrier now that's given me twice the speed for half the cost under net neutrality they would have had to go to the FCC they would have had to beg permission to charge less and deliver more thank goodness it didn't happen and I morning the conservatives and out there don't to fall for the trap here of trying to regulate the internet in order to stop these left wingers from blocking free speech because if they will get what they want, and they will get all of this regulation and we'll go back to some of the insanity that we had in the 80s and 90s with the so called fairness doctrine that just backfired on everybody so it's gone thank goodness things are getting better dairy is

10:30
folks right there Craig Peterson explaining a said it before and he was right now if you want to get other information from Craig Peterson, you can without any hassle. The only thing is that the standard data and text rates apply. But I will if you text My name him to this number 855-385-5553. That's 855-385-5553.

11:01
You will get all of this information plus more. Plus, if there's ever a big hack. He will notify you and tell you what to do. He will never sell your name. And he will never try to sell you anything and he will protect you, Craig. Always a pleasure. That was an excellent explanation and vindication of really a position you took quite a while ago. Oh, yes. Oh, thanks. Yeah, thanks, Craig. All right. Don't go anywhere.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Sep 1, 2018

How is a world class trainer using tech and social media to help people achieve their goals? Listen in as I talk with Oonagh Duncan about her business Fit Feels Good.  

Congrats to Ajit Pai and President Trump!  I explain why repealing Net Neutrality has helped the industry and everyone else!

What is the biggest danger to SMB's?  Do you know?  Listen in and I will tell you what every business need to be aware of.

 

Craig is putting up a new membership site (Yes, it is free, but you have to sign up)  On it will have all his special reports that he puts out and you will be the first to get them.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 09/01/2018

Fit Feels Good's Oonagh Duncan, Net Neutrality Repeal Benefits, and Business Email Compromises

Craig Peterson: [00:00:00] Hey, Everybody welcome. Of course, tech talk with Craig Peterson. Same time every week, and online as well. Craig Peterson dot com. Today, we've got a couple of different things going on. One I've got a friend of mine I've known for a couple of years who have been using the online world in order to help build a business and help people. You know I'm an entrepreneur, right, and so is she. I think you're going to find this interesting. And if you know anyone who is a woman in their 40s who might have a couple of problems with losing that baby weight that was put on, well she can probably help them out too. But, it's interesting because she's using the modern technology, including some of the stuff that we're constantly complaining about it comes to social media. So, that'll be fun. So, she's up next. We're also going to be talking about a couple of security things, this week. Half of the small businesses believe they're not cybercrime targets. We'll explain why that's a really bad idea. We've got some more information on the DNC, and another hack that appears to be underway. The whole 'Struts' Bug. Hey, if you work in with a bigger company get this fixed. Now, this is critical absolutely critical. This is how Equifax got hacked the same subsystem called Apache Struts 2 Flaw. So, check that out, if you're a bigger business. We've got an Ohio man sentenced to 15 months for BEC scam. We've got new stuff with scanners at airports. AT&T, oh I've got to talk about this. So, we'll get to that and a whole lot more. But first, we are going off to Oonagh. Here we go. 

[00:01:47] We're joined right now by a young lady. No, I say young but she's working with women in their 40s her name is Oonagh Duncan and, Oonagh has been all over the place and associate fitness editor for a magazine. She's been a regular before on all kinds of podcasts and on the air as well as CBC up in the Great White North. And, we're going to talk with Oonagh in a little bit about technology. Now you know tech and you know tech has been influencing us. We've talked about some of the problems social media has caused with all kinds of negative things and when we think about it in kind of a negative stereotype, as well, so many times. The reason we're having Oonagh on is that she has been very busy in helping to build a community of these young women who in their 40's, who want to get back in shape, maybe lose some weight, maybe get that cardiovascular system going. And, then she's doing it using technology. So, I've known her for a while, and I asked her to come on she was gracious enough to do so. So, Hi. 

[00:02:51] Oonagh. Hi, Craig how it been going? It's going really well, now. 

[00:02:55] The first time I met you in person. I suspected that you were probably about 30 years old. You've got more than a decade on that, you've taken good care of yourself. What brought you to the point where you thought you might be able to help other people? And looking online Google, for instance, It has about a thousand people who have rated you 5-stars so, you're obviously good at it too.

[00:03:22] Thank you. Yeah. Oh my gosh, it's been an unbelievable ride. I was I was originally an actor and playwright and then in order to, you know, you would be shocked playwriting is not very lucrative. So, I began to teach fitness classes at 6:00 in the morning and 6 at night. So, I have my whole day to work on my playwriting. And, so I did that for a few years and then I found, that you know, I just kind of getting sick of auditioning all the time, and you know trying to reach my place. So, it's like, no actually, this is the kind of fun. Well, see if I can make a go of it, and it just really took off from there. And, then I noticed that a lot of my clients even though they were exercising, a lot, weren't really seeing the results on their body, that they wanted to because a lot of people don't know this, exercise is not that efficient for a fat loss. It's really efficient to keep off the weight once you've lost it. If you want to lose fat it's going to be almost all about Nutrition. So, I am putting the nutrition component of my program and that I put it all online. So, the only client that had moved away that was sort of my initial impulse but then it just started being like all the strangers come into now I have people in like Mexico, and Germany, and you know Latvia and it's unbelievable. It's so fun because you know I get to log in in the morning, and see how everyone in the UK is doing and then you know before I go to bed and they see everyone on the West Coast and what they have for dinner. So, it's really, really cool the global aspect of it. 

[00:04:49] It is a different world isn't it. You can get an expert to help you from almost anywhere, and that's what you're doing. Tell me about the success here? 

[00:04:58] Two thousand people all over the world with a 100 percent 5-star review. You're having a real shock then. How are you achieving this? 

[00:05:08] Oh, my gosh. Well, you know it is just it's really sort of happened, organically of course, and using Facebook to reach people. But, honestly, I see so much of it is word of mouth, and it's not because you know people are losing weight. My program is called a 28-day transformation challenge. We lose weight, in between. But, because we sort of have snuck in all these psychological triggers that build how bad people are tending to keep the weight off long term. I think that's like making all their friends go. Wait a second. What's going on here, and then? And, so, the word of mouth has just been like spreading wildfire. I think a lot of that is also about the community because there are so many. I mean, I don't know, if you know that there's no many, you know click thirty-nine-dollars to buy a PDF download. This meal plan and workout program that is everywhere. It's not everywhere, it is a life community where everyone is starting the program on the same day. We're all doing it, together. And, you have one on one access to a world-renowned trainer and a nutrition coach. And, it's sort of like sports that we can offer online and know into people's questions. My team, you know before long they're finished hyping it. So, people feel so unsupported, in order. If you were to try and figure that out locally, hey you know, who knows where you live, if you got access to that level of caliber of trainer, nutrition coach, but you know you have to work schedules and then see the cost could be prohibitive. So, really new technology is making history and more accessible to so many people.

[00:06:43] So, you mentioned the kind of the social support side of this. Are you using Facebook? Or, do you have your own membership site? How does that all work? 

[00:06:52] Yea, we do have a membership site but most of the time the membership site we're really just using for, you know, content distribution. It is really all the action happens in the Facebook group. You know we had considered forums because now we have so many people that there's had to be some little you know breakout groups have been new moms, and you know breakout groups women going through menopause and you know you have a little small but really cool dude factor and you know so they might be cool to sort of break that open. Right, now we're just in a big jumble in the Facebook group and sort of organizing with hashtags and you know community memes and stuff like that and it seems to be working pretty well. 

[00:07:30] Now your wife excuse me my wife and you haven't had a chance to talk before. And of course she's almost 60 years old now and she has had a hard time over the years in losing weight and things. So, she has gone out, and we've done everything we've done the app can you name it we've done it and she's found apps online. Some free that she downloaded some she had to pay for and if it was like what you were talking about that 39 dollar PDF and she didn't get anywhere. But, I think maybe even the key that you have really hit on here is this whole idea of social support. Is that why the apps just typically aren't working for people? 

[00:08:15] I think of it, I think to be honest Craig I think part of it is that those are there. You know you pay 20 bucks and they all kind of look the same. You know maybe you get a push notification, if you allow them. But it's so easy to ignore. If you are a real person who follows up and says Hey, Craig what's up? Haven't heard from you for a little while. Hey, I'm looking you know I know you slept in today and you said you really work done after work. 

[00:08:38] I'm waiting for your sweaty selfie. You know. 

[00:08:43] Yeah. And then people were like, Oh yeah I have to do it. So, there's that sense of accountability not only to your trainer and nutrition coach but to the rest of the community because you know you log into Facebook and you see all these other people are like oh my gosh you the soup was fantastic and it The workout was so hard, I can't believe I finished it or whatever. Then you're feel like you're part of something and building the team down if you don't win. And this is a well documented all over the psychology of exercise adherence if you work out as part of a group and that's a team sport or even group exercise in the gym you are hundred percent more likely to adhere to your is to achieve your goal. 

[00:09:20] Yeah. No, part of the problem with the gym, Oonagh, is of course you've you've got to get babysitters, if you have younger kids, and you have a job, more than likely right. So, we only have a couple of minutes left but of course Fit Feels Good, of course, is your website will give that out again in just a minute. But you have this live community aspect that seems to make all the difference. 

[00:09:41] That's right. And you know I'm sure your people are pretty tech savvy so, you know a lot of people are like are you going to go evergreen with this You know make it's sort of passive income that just keep coming in I'm like well yeah I have figured out a way to go evergreen and that we start live you know often. But, it's still a Live start. It still has me physically in the group, Welcoming people, commenting on their things like I can't and I won't ever just turn it into a do it yourself program because I know that doesn't work. 

[00:10:12] Yeah, you've got to have that support. You know I've seen on your Web site you've got some other programs coming up you started with this outdoor kind of a boot camp. You mentioned your 28 day program now. Are you also have something. I think you're trying to set up to go down to Mexico and really kind of bootstrap people, but fit feels good Dot com is your Web site and know your brand is fit Feels good, as well. Can they find everything there or what's the best way to find out more? 

[00:10:42] Yeah. If you go to it feels good dot com. You'll see everything there. You'll see a heading called free stuff and you can grab  free goodies. And, if you find out about my 28 day transformation challenge and next one is starting on the September 10. It actually is a really wicked bonuses going with that one, including you know I've got a celebrity stylist who's going to come in and tell us how to dress for your body shape. I've got a flat belly strong core program. All of that goes with that. So, if anyone is ever interested in taking care of your body, your health, getting lean kind of once and for all if you're done trying all the 39 dollar apps and your like lets get down to business and get this done. And yet come join me September 10th and I will welcome you with open arms and so much accountability. 

[00:11:27] All right. Now, I've known you now for a couple of years I think give or take. And I got to say she's the real thing. She she lives, she loves this. I get on calls with her. And you know on Zoom or WebEx or you know all these types of technology online and she doing well she's on the call she's on a treadmill talking I'm gonna get on the call. All I know she's doing that right now. All right. 

[00:11:54] Well, I am actually pacing right now. 

[00:11:57] There you go. She she lives it, she loves it. The people that work with her absolutely love it. Oonagh is not compensating me in any way, for those of you who don't know me you haven't been listening for the last 20 years. I think she's got some great tech and great heart and is really trying to help out again. She has been an associate editor, fitness editor, in fact, for magazines. She has been all over the place helping women and some men as she said but kind of specializing in women in their 40s when it's really tough when you've got to start taking those pounds off from the kids. Helping them out doing that live and having a whole lot of fun while doing it. And again the Website is fit feels good dot com. Anything else, Oonagh like to add. 

[00:12:43] No that's fantastic. Thank you so much. OK. That was really lovely. Hey 

[00:12:46] You're welcome. Take care. OK. So now we're going to get into the tech side. We've got a lot of stuff to talk about. So here we go.

[00:12:59] You know we had a lot of complaints from people about this whole net neutrality thing and I think the reason is people just didn't understand it. We had a group just like we have right now a group of far leftists, socialists who want the government to control everything. And, if you don't think that's been the case for a while. Look at your tax bills we're over 50 percent now. What do you buy? What do you own, that you think it's worth 50 percent of your income? Right. Anything is your car worth working six months out of the year for?  Remember that means January through June or July. What's worth that? Is government? Are the services government providing you. Are they worth half of your whole income? Well, those same socialists were out there just beating this drum, because in the latter part of the Obama administration the FCC passed this net neutrality rule where they pulled the Internet under direct FCC control, by one simple ruling right. And the FCC said well we don't really have the authority to do this but they did it anyway just like President Obama said that we don't have the authority to do this but I did anyway. They were saying if net neutrality goes through we are out of luck. 

[00:14:17] Right. Because they're going to slow down the Internet. There's going to be advertising everywhere, if it doesn't go through we need it so that everything on the Internet is treated fairly. So, that your soccer team is treated fairly. So, that you're not overpaying for Internet access. And you'll remember at the time my argument to that was hey wait a minute now. Why should the old grandma, who's sitting there in her home doing nothing except waiting to get an e-mail or some pictures from the grandkids? Why should she pay the same amount as some kid sitting in the basement playing full 3D video games and talking to the friends all at the same time and streaming Netflix in the background? Maybe if Hulu in the background, right? Why should grandma pay the same as a super high end user of the Internet. It just doesn't make sense. Well, there's another factor I talked about which is that you will take the incentive to invest in the Internet away. If you have this so-called net neutrality, right. Why would businesses try new things? Why would businesses invest in more bandwidth, if they can't charge for it? Why would they invest in more bandwidth, if the high end users can't be charged more? 

[00:15:39] Right. You remember me talking about that. Well, we now have proof that what I said was absolutely right. Because you know that President Trumps FCC and of course, the head of the FCC Ajit Pai just came out and eliminated that so-called net neutrality rule. Of course, the left was out all over the place saying oh the world is going to fall apart. Well, guess what. not only did it not fall apart, but the Internet has gotten much, much better because of the net neutrality repeal. So, I'm looking at two articles from this week. One is AT&T is investing more now. Iowa right. Not a big state kind of flyover country, as the Clintons like to call it, right. It's not an East Coast-West Coast which gets most of the attention. No, it's in the Midwest. Iowa. AT&T is investing nearly 120 million dollars to boost local networks in Iowa. That's just this week. So, they're boosting reliability coverage, speed, and overall performance for the residents and businesses of Iowa. Including rural Iowa. OK. So, they've already made 365 network enhancements across Iowa including new cell sites, network capacity, and network upgrades, since President Trump removed this so-called net neutrality, which was terrible, terrible to have in place I can't believe they did this. And, again it's the far left that's doing this. Here's another one. Absolute proof as to what's going on. That's just one sample right that article this week from MarketWatch which is an investment website. OK. And that ultimately came from PR Newswire. Our next one. The U.S. Internet speed has gone from 12th place in the world.

[00:17:38] So, we had the 12 fastest average internet speeds. Now the U.S. we invented the Internet, literally invented the Internet. And we've been we've fallen to 12th place in the world under President Obama, as far as internet speeds go. Well, here you go, we got rid of net neutrality. We've got companies like AT&T and of course Comcast and you name it. Everybody investing this week as well. T-Mobile came out wasn't T-Mobile it was a third-party analysis. T-Mobile right now has the fastest 4G LTE speeds of any company. They are just pounding it. And you know I switch personally from Verizon, I've had Verizon Wireless since the early 90s. So, since they first started providing cell service, before it was even called Verizon. So, I've been with them a long time, and I switched to T-Mobile. And, of course, you have to have a newer phone if your Verizon customer moving to T-Mobile because you need the additional bands. But they've done amazing things again since net neutrality was removed. Well, now we've got this article. We were 12th in the world. And, since the repeal of net neutrality took effect on June 11th. Since then, the U.S. Internet speed has gone from 12th in the world 12th fastest in the world we're now sixth fastest in the world. What does that mean? That means that as far as the Internet goes businesses are investing again because they realize that if they put like AT&T 120 million dollars into Iowa, they can get their money back out.

[00:19:31] Very good thing. I love the fact that they're doing this. So it makes a huge, huge difference here. You should see some of these tweets too about this article. Wow. So Ajit Pai. He announced late last year he's going to repeal it and stuff but it's oh it's going on and on and on. Of course, some positive comments and some others. So, my internet speeds have improved dramatically. How about yours? OK. So we're going to talk about new facial recognition stuff and I want to bring up this whole idea. Businesses have that, no one's going to come after me right.

[00:20:16] Now, of course, who robs banks. thanks, Willy. Text me his last name if you remember 8 5 5 3 8 55 53. He Robbed Banks because that's where the money is. So, where are the bad guys going to try and hack? Well, obviously they're going to go after the money. They try and go after banks and try and build up the whole idea behind banks. And they've got the money we're going to have them but the banks have the money to put into fixing their security. So, where else to go if you're the bad guy?

[00:20:52] Yes Sutton, you're right. Hey, thanks for that. 

[00:20:56] Any other comments, you can always send them there to 8 5 5 3 8 5 fifty-five fifty-three. 

[00:21:02] But, where do they go now? Well, they go after small businesses because small businesses are not savvy when it comes to security. And, I see that every day. You know I keep mentioning I'm picking up more and more customers two more this week where we're doing scans for them because you know in this case one of those cases was the unknown, unknowns right. I don't know. What I don't know about my security. In accountancy, an accounting company. And so we started looking. And of course they do billing for customers and things and we have a customer right now. Well actually their insurance company is our customer because they were an accounting firm and as an accounting firm, they had all of this data the data. Guess what was stolen? They got hacked. Their firewall right through it because most firewalls are pieces of garbage and they were able to use that stole 180000 dollars in cash from the accountancy's customers. So, if you don't think you're exposed, you're wrong. But, you wouldn't be out of the ordinary, because there is right now 76 percent of small businesses say that they have not activated any sort of multifactor authentication. And we've talked about that on the show before. You know I'm using Yubikeys. I've got my clients moving towards those, as well. We've got the integrated systems so, that if someone comes on board we can give them access to everything from one place and if they leave we can remove their access to everything, from one place. 

[00:22:42] But 51 percent of small business leaders who were polled are convinced that their companies are not our target for cybercrime. Now, have any of you have a board of directors that needs some information. Let me know. We just this week did an FBI webinar that I ran, on this very issue. How do you convince your board of directors that they need to do something and do something urgently? This is not the same world it was five years ago. So, 51 percent of small business leaders are convinced their companies are not a target for cybercrime. And yet at the same time, they are the ones who are getting breached. I pick up a new client at least every week that has been breached and we've got to go in and clean up the mess. Or as I mentioned our help when the in the lawsuits that ensue and get paid by the insurance companies and that's after the business is going out of business because they lost all of their working capital, their cash is gone. So, here's another example an Ohio man got sentenced to 15 months for a BEC scam, business email compromise Olemewa Jumeau. I'm probably mispronouncing that, targeted CEOs, CFOs and other business leaders with fraudulent e-mails. 

[00:24:06] So, Chief U.S. District Judge is this from the from the press report press release, Chief U.S. District Judge Janet Hall last week sentenced him to 15 months in federal prison for his role in a business email compromise scheme targeting organizations in the United States. You know I was looking at the stats from our clients from just last week and it was amazing to me to see wow how many attempts there were we stopped for our clients last week. I think it was like four dozen business email scam attacks directly actually attributed to it. Of course, you know tens of thousands of spam e-mails. But these were really directed attacks where they're going after a specific business. OK. So after 15 months in federal prison, he is going to have three years of supervised release. Now, it just bugs the heck out of me. Fifteen months. Here's a guy that stole the retirement, the livelihood of these business people, right. We're businesspeople, we're trying to run a business. We're hoping that it will support us in our retirement because heaven knows Social Security isn't going to cut it. We're hoping that maybe we have something left to pass on to the children, as long as the government doesn't take it from us. So, they've lost it all. They've lost it all. And this guy. It's 15 months. It's absolutely crazy. 

[00:25:37] So, this guy admitted that he caused losses exceeding 100000 dollars in order to pay 90000 restitution. I don't know what the actual numbers are. That's all he admitted to but, bad news. Make sure you tighten up your security if you want me to talk to your board of directors. I'll be glad to make presentations. I do it all the time for annual meetings and other places. Reach out if you have any other questions or comments, reach out. Just pick up your phone you can text me 8 5 5 3 8 5 55 53 8 5 5 3 8 5 55 53. Keep an eye out in your e-mails, hopefully, you're on my e-mail list because starting this week, every week in September I'm going to be doing a different webinar. We're going to be talking about the big problems out there, ransomware what to do about it. Business email compromise. All of this stuff. So, if you want to be involved in those, let me know is well, free to attend. I have solutions that I'm going to offer, as well, but the free information here 8 5 5 3 8 5 55 53. Have a great week and we'll chat again next week. Bye-bye.

 ---

Related articles:

The End Of Net Neutrality Has Doubled Our Internet Speed Ranking

With The End Of Net Neutrality AT&T Invests Nearly $120 Million To Boost Local Networks In Iowa

Half Of Small Businesses Believe They’re Not Cybercrime Targets 

DNC Reports Attempted Cyberattack On Its Voter Database

New Facial Recognition System Catches First Imposter At US Airport

Ohio Man Sentenced To 15 Months For BEC Scam

Another Equifax-Style Hack On The Way? Could Be!

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

Aug 29, 2018

Find out how an 11-year-old girl changed the results of Florida's presidential vote as Craig talks with Matt and Joe on the WGAN Morning News.

 

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Hippies Are Going To End Up Killing Us All! How China Will Win The Deadly Race For AI Weapons

Election Systems Are So Insecure, That Even An 11-Year-Old Changed The Results Of Florida’s Presidential Vote.

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/29/2018

Hippies Could Kill Us All - How To Make Elections Safer

 

Craig Peterson: 0:00 Hey good morning everybody. Here in the northeast, we are going through a heat wave three H's hazy, hot and humid. Now I know I mentioned this on the FBI webinar I did yesterday I mentioned how hot it was and we're miserable because it's in the 90s and it's humid and poor us and I got notes from people in gas Dallas is hotter than even Houston this year more miserable down there so I get it but for us this is really hot, okay and I'm not really happy about this but you know falls coming that's my favorite time of year I love fall up here in the northeast up in New Hampshire it's just beautiful. So today I was on with Ken was out. So it wasn't Ken and Matt, it was Joe and Matt today. And we talked about two things really, we talked about the hippies in Berkeley and the Bay Area out there and how they are now putting all of our lives at risk. This is a very real threat. So we talked about it and get into some detail and then we get into a little bit about hacking and where things are going and what's happening with our voting system. Because of course, we got a route midterm and then a midterm primaries first. And then the general big election coming up in a couple of years. So what happened out at DEF CON black hat, and, and it's frankly, it's a little scary sides. Oh, here we go.

1:32
Okay. It is 737 on the WGAN Morning News with Canada. We have Joe Reagan in for Ken and we have Craig Peterson, Tech Talk guru who is joining us right now to give us an eye on technology around the world. Craig, how are you? 

1:46
Hey, good morning. I feel like I'm melting lately. This is kind of nasty. But last time of the year. I suppose I this is your last opportunity to get sweat out of your living room. Yes, absolutely.

1:57
And all you wouldn't look forward to is a very cold, long, cold, snowy winter. Yes. Yes.

2:03
I have a daughter right now over Norway. And she's working over there right now on a project. But anyways, she's saying that right now. She wants to send over her winter clothes because it's already about 32 degrees at night. So yeah, that's to look forward to

2:24
yesterday, just like it was yesterday. Okay.

2:26
So Craig, tell me exactly how the hippies are destroying America.

2:31
Oh, those hippies are back again. That's what you know about the military. You know about DARPA, you know that they're constantly trying to improve the technology to kind of one up bar potential enemies. And they've been doing it for a long time using military contractors and others. Right now, guys, when you're thinking about the most advanced technologies, you're probably thinking about mag AF. Right?

3:02
What you may get Microsoft, Apple, Google Amazon. And let me stop you right there. There are so many acronyms in my brain

3:13
government work, you can't start giving them new ones

3:17
like mega with an F on the end. I thought it would be easy for you. Is there a hat? I can put this on

3:27
Red Hat

3:29
Do you think about right? All these leading tech companies are kind of in the lead when it does come to the different types of technology out there. So what is the military do they go to all of those companies? And particularly, we're going to talk right now about Google. But they go to those companies and say, Hey, listen, you've got this great technology. Now, all of these companies license some of their technologies, you other people, and particularly when we're talking about Google, we've received some great technology. Look at me, Amazon now with the echo because I you guys, you know, those right, you have to have any those.

4:09
I have an echo and echo plus, I've got a tap. Yeah, no, I've got a lot of those things.

4:12
I got an echo show. And I got a couple of them. So I gave one to our granddaughter who's over in Kentucky so that we can chat with her. She can jump in anytime she wants. So I mean, Google Home, do you have Google Home or any of those devices now is now

4:28
home stuff terrifies me.

4:30
You know, a refrigerator tweeting is I don't

4:32
mind the refrigerator, tweeting. It's the security peace behind it. And having the cloud that concerns me.

4:39
Yeah, the IoT, right? The Internet of Things. We're talking about 50 billion devices within a couple of years. So that technology gets license Google, license it to other people, Amazon, license it to other people. So when the military of saying, hey, Google, you've got this really cool artificial intelligence project, and we want to use that in some of our development work every want to give it to them, some startup by contractors, you want to pay you for it, etc, etc. You would expect that to happen, right? That's a legit logical thing they license protect other people, why would they not license it to the military. So it started out with a small group of people inside Google who said, No, I don't want my work being used by the military to potentially kill people. And then it ended up being about three to 5000 people within Google who signed a petition saying, I'm going to quit my job, if you license any of this AI technology to the military. So now, we've got all of these peaceniks, which is bringing back in my mind, memories of the 60s and 70s, these hippies running around saying, No, no, no, you can't use our tech, you can't use our tech nine and I man,

5:58
but in the 60s, the government was investing heavily let me the whole purpose of Silicon Valley expanding was due to government investment in the 80s. Where did we get the internet from the army again, from the military? It was another ARPANET project, they will bring that in the internet today, right? That's right. It was the project of where they were linking universities into the military, linking them all together so they could communicate and develop stuff. It's all military, it was military funded. Heck, we even got pain from NASA, right? That does anyone tell you any more, by the way,

6:39
so that's not really a high bar to said,

6:43
Where's the snare drum there? We need to call

6:48
anyways, it's cold. It's cold room shop

6:51
shop there. So the military has long use high tax the years they're young with some

7:02
now they worked with our universities, etc. And now these hippies are saying, No, you can't use it. Now, here's the problem that's just

7:10
cots technology coming out of Google, DARPA is still doing

7:15
investigative research into those areas.

7:17
Absolutely. DARPA has not stopped doing what they've been doing. And of course, they'll know that's the Defense Advanced Research Project Agency because I have to explain some of the fly is today some of the four letter acronym

7:31
so so that's what DARPA is, yes. But the AI technology that the military was trying to license is critical. And here's why China is ahead of us right now, with at least it appears to be with some of this AI technology. And where this could ultimately lead, if it came down to war could be a very, very bad path. We I'm personally I don't think that those people inside Google are thinking this through. I don't think they realize that by not allowing the military to use the most advanced technology in the world, we are going to start falling behind. And when that happens, I personally think things could turn pretty bad ultimately. But that's where the hippies coming back. Who knew?

8:24
Well, Craig, it's a great point. I think that, you know, looking at as far as foreign policy concerned, but also the impact of technology on our voting systems. I mean, we've had a lot of conversations around the use of the Russians both influencing through social media, traditional media. But then there's also discussions around the actual threats to the physical things in which we use to vote, right. Yeah,

8:46
we just had the big conference out there in Vegas, we had the black hat and DEF CON conferences. Now, these are conferences that every year, it's kind of interesting, because they are talking about how things can be hacked. And if go to one of those conferences, you do not want to bring any electronic devices, because the likelihood is they will be hacked. I don't care what they are, they're going to get hacked out there. And one of the things that they did this year is they expanded it. Well, let me just back up a little bit. You've been to conventions before, and conferences anytime. And they've got tracks, right. So you might have the CEO track or this tracker, that track record, they do the same thing out of these hacking conferences in Vegas. And this year, they had the biggest that they've ever had voting systems online. So they took a whole bunch of wanting system, some of which are in us, in the US and throughout the US. And they put them into a room and they said, have added guys, and they had contests and of course, they were they were all hacked, right? Every one of them. And I got to say that the secretaries of state say, Hey, listen, you know, that's not the real world. Because in the real world, we have more secure networks, we have air gaps, and of course, all that defeated to the thing that's most interesting. Joe, I'm glad you brought this up from the conference here just a couple of weeks ago, is that they also had a junior section. So they had they had let him loose. I mean, kids on voting machines and an 11-year-old girl hack voting machine. And I mean, what she ended up doing was, and this is interesting, right, man, how do the results get disseminated to the press? Most of the time it's via websites, right? You check the website and you've got it. So what does this 11-year-old girl do? She had a replica of the Florida Secretary of State's website out there at Black Hat. So again, every part of this is a problem because what happens if in Washington, they're not calling up and saying I'm you're the Secretary of State for me, give me the vote tallies. What was a code word of the week change code words? I know what you so I know the numbers are legit. What happens if they go to the state of Maine's website to find out what the vote tallies are to put them together to say yes, so it's always our new next president. And in fact, all they had to do was had website had the email. So, Joe, you're dead on this is a huge, huge problem. We have not fought all the way through yet. What are some of the solutions that are being proposed, you'd like to hope that when you look at what DEF CON is trying to do, is it's trying to bring in those white hat hackers that can come in and try and identify the problems in the hope that you're gonna have solutions that are going to come out of that. I mean, are there any ways in which we can further secure the voting system or there's being discussed? Well, yeah, I think they are. I think the best way to do this is a spot audience by people. I think that you using a piece of paper where you mark down who you're voting for, you know, and most of the states that are doing the paper ballots now or are using the optical scanners and it's not, you know, it's not Paper Paper till heavier than a sheet of paper. But then the machine reads it and then the machine gives the tallies and I think what should we only way to move forward here because we're gonna have to use some of this technology but he is you have the machines read them and then you have people spot check they manually go through looking for hanging chads rice in a flashback 20 years ago, and that they look at them, they looked at the tallies, make sure everything looks fine. And then we have to have a secure way of making sure that those tallies that are coming from individual districts and counties and state or all shared properly so that we get good final numbers. That's the only way we can really trust it. I think that the recount that we have right now some states have automatic recount. So if it's close enough of a race, some don't have that. But I think we should make recount easier. So if you want to do a recount, no problem. We bring you some of your people in we will watch you guys with the balance making sure you're not doing anything phony baloney so that anyone almost can do a recount so that we can trust the final tallies. That's the only way I think that we can move forward on this job. Because the tech the tech just cannot be 100% trusted.

13:34
Well, on that happy note, Craig, I think we're done. Unfortunately, we ran out of time. So we have to leave it there, Craig, appreciate your appearance. And we will talk to you again next Wednesday. Hey, gentlemen, take care. Thanks so much. All right. We're gonna take a quick break. We'll come back on the other side.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

 

Aug 28, 2018

What kind of effect do video games have on gamers? Do video games make people violent?

Listen as Craig discusses the latest news story about the video game shooting in Florida with Jim Polito.

These and more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Looks Like Google Is Always Recording Your Location -- Even When You Tell It Not To

---

Transcript:

Below is a rush transcript of this segment, it might contain errors.

Airing date: 08/28/2018

Psychology And Videogames

Craig Peterson: [00:00:00] Hey, Good Morning everybody! Craig Peterson here. And I'm saying good morning cause as you probably already know tape these in the morning. This morning I was on with Jim Polito. Jim was all by himself this morning. He didn't have Danny. His board op and producer to help him out. So, I kind of took it easy with him and we stuck with the one big story in the news this week, which of course is the story about the video game shooting down in Florida. So, we went a little bit more detail obviously a different track than I went on with Jack yesterday. But, you know if you heard Jack's interview you might skip today's, but you might want to listen to today's because there's always a little bit different. 

[00:00:41] So, here we go with Mr. Jim. Here he is, our tech guru, the man with all the answers. Craig Peterson. Good morning, sir. 

[00:00:55] Good morning, Jim. It's been quite a morning here with all of the video game stuff going on. Mental health issues. Did you know I was the chairman of the oversight board for Health and Human Services in New Hampshire for a couple of years? 

[00:01:11] Yeah, yeah I did not know that. 

[00:01:15] Oh, OK.

[00:01:17] Yet another hat that I've worn. Craig every time you're on the show, it's something else, next going to tell me you were an astronaut. 

[00:01:29] That would be fun I always wanted to go to that place down in Alabama. Are you kidding me? Yeah right. Right. No. Rocketown.

[00:01:40] Absolutely. You're absolutely right.

[00:01:44] No, go ahead. No, I'm just a space cadet. That's all.

[00:01:48] Never ever made it into the space force.  This whole thing is really interesting when you're talking about mental health issues and kids and video games. In fact, a lot of people might not really be aware of what it's like, nowadays. You know you and I might have played some Donkey Kong or I you remember when Pong came out and I had pong.

[00:02:11] I wish I had the original game because my parents bought it for me one Christmas. 

[00:02:18] Do you burn in the TV tube? Pretty much 

[00:02:21] It was an old black and white. And you know eventually, I did. But, nobody cared because it was an old black, a spare black and white that we had. 

[00:02:32] When did you get your first color TV? I remember my family of like 1970. 

[00:02:37] I think we were '72 because it was a tiny one. It weighed a ton. And I actually ended up bringing it to college as my TV. It was a small way too tiny it was one of those so-called portables. But, you know it was like a medicine ball trying to lift the thing. It was around 72 because this is the anniversary right about now the 72 Olympics I was just doing something on it earlier this morning Mark Spitz. I remember watching that small color TV when the Israeli athletes were taken hostage, in the siege and the slaughter. I remember watching Jim McKay on that little-colored TV that weighed a ton. So, it had to be around 72. The first real color TV like a big one. I don't remember but this was 72. The big old console TV.

[00:03:39] Yeah, we had a console TV in the living room, exactly.These games have come a long way. Now, what's happening at this event and if you've never seen one of these or been one of them. I think this will be a real eye-opener for a lot of people because these are huge events, and there is more excitement in the stands than I have ever seen anywhere, except for maybe the U.S. first event, the first robotics. To me, it's interesting Jim because I don't watch professional sports, right. 

[00:04:13] Period. Right. Right. Not even the Canadian Football. Craig, not even Canadian football but that's real football. An extra 10 yards on the field a field and one less down you know by that, by the way, no hockey, Craig. 

[00:04:31] Yeah. I was captain of my hockey team. But, you know I've never watched the game other than my dad was watching or my brothers were watching. My brother was on the minor league team for the Toronto Blue Jays. 

[00:04:45] That's a big deal. 

[00:04:47] It's a very big deal, but not me. Right. So, I just don't get it. Why would you be there cheering on someone? Watching them play a video game because that's what it is. You have the players up in the front and the players are playing, in this case, Madden football and they're they're all up at the front there's huge screens so everyone can watch. Yeah, and they're going through it. Now, there's lots of them. There's a shoot up scenarios you know you can be in World War Two. Yeah, and you're there with your platoon and you're talking back and forth with the other members of your platoon. Your killing zombie nazis and things, right, as you're going around. Now, they have this artificial feeling, like they are actually there. When they might be in their mom's basement and somebody else might be in Siberia, it doesn't really matter. They're all around the world. In reality, they're not building real friendships they're not really communicating, People, there's a whole huge business, look up twitch, a huge business built around people going to twitch and watching other people play video games. And you're not even watching them play the video game watching, you're watching their screen. 

[00:06:11] Yeah right. I don't get it.

[00:06:13] I don't either. I've seen it. I went to what is at PAX East and I watched some competition. Danny, who's not here today. Danny watches other people compete in things like Fortnight. I mean it's actually become something that people do. Watch these competitors on these games. I mean I get it. I do. I do get it. Now, the question is you know psychologically and I know you used to be when we were younger, Craig, people would say oh watching violent movies make people violent, you know. And now it's OK so playing these video games makes people violent. I just don't think that's it. I think it's like my psychiatrist friend years ago, 20 years ago, said to me how do you know if this person didn't have a psychiatric issue. If they wouldn't be violent, anyway. And the same thing about a gamer, just because they're playing the game, maybe if they weren't a gamer they'd still be a violent person. 

[00:07:25] There's a difference between correlation and causation, right. And that's kind of why I was going to add to Jim these types of games are attractive to certain people with certain types of mental disorders. However, the same can be said about circuses or almost anything that you might name, right. This is not causal, near as we can tell. I've had a number of psychiatrists and psychologists on my radio show, talking about this whole issue in general. Is it harmful? I think what we have to look at and I think pretty much everyone's in agreement when the child is very young like, in the single digits of age, particularly the first four or maybe even as much as eight years of their life. Now the first four certainly. Do not expose them to a whole lot of time either in front of the TV or in front of an iPad or in front of a computer. Because their brains need to mature those pathways need to develop. And near as we can tell those pathways don't develop as well when the kid is sitting watching something. As opposed to maybe they're outside or creating. I used to love Lego when I was a kid. Yeah, I made all kinds of stuff, that that's the right things flowing in the brain. Jim, I don't think there's really anything conclusive, there certainly is no agreement as to whether this is just kind of an associative sort of thing at that track that people with these types of disorders and obviously doesn't track a lot of them like this. This isn't happening frequently but it is a different world that I think a lot of people should look into a little bit. You know you mentioned PAX East. I have a son that went to that event. In fact, he went there with a girlfriend because he loves to play the video games on his little video game console. You know when you're 30 35 40 and you're still spending a lot of time in your video game. It's you know it's time to move on to real life.

[00:09:33] I get it. Craig I know we had so much other stuff to talk about today but it's always good to get your perspective when things like this are in the news. Especially I found fascinating, the stuff you sent me about how Google is still tracking me even when I tell it not to. That's a great, great piece and folks that's just some of the stuff, you can get from Craig Peterson if you text him my name Jim to this number 8 5 5 3 8 5 55 53 that is text the Jim or ask any questions you might have.

[00:10:13] to 8 5 5 3 8 5 fifty five fifty three. 

[00:10:18] That's right. Standard data and text rates apply. You get great information from Craig Peterson. If there's some type of an emergency with a massive hack or a data breach, he gets you the facts and what you need to do. He doesn't try to sell you anything and it's all free. Craig, thank you so, so much I really appreciate the time and your perspective on that news story.

[00:10:45] Take care, Jim. Already. Bye-bye folks don't go anywhere. Final word when we return you're listening to.

[00:10:52] Hey, everybody. I want you know this is a bit of a heads up. Starting next week for the entire month of September every week I'm going to be doing a special webinar. We're going to talk about how to protect yourself from certain types of attacks. And I have a package I'm going to offer to you if you are on the Webinar some really special deals with some real special bonuses. But, overall a whole lot of learning and stuff. I don't think you are already aware of. So, keep an eye out for that in your e-mail. And if you want to sign up you can always just text me or e-mail me at Craig Peterson dot com. Have a great day bye-bye.

---

Don't miss any episode from Craig. Visit http://CraigPeterson.com/itunes. Subscribe and give us a rating!

Thanks, everyone, for listening and sharing our podcasts. We're really hitting it out of the park. This will be a great year! 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553

1 2 3 4 5 6 7 Next » 21