Podcasts about keyloggers

  • 32PODCASTS
  • 38EPISODES
  • 40mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 30, 2023LATEST
keyloggers

POPULARITY

20172018201920202021202220232024


Best podcasts about keyloggers

Latest podcast episodes about keyloggers

Komando On Demand
Trust in news plummets, Netflix's password bet & spot hidden keyloggers

Komando On Demand

Play Episode Listen Later Oct 30, 2023 33:31


Plus, Regina's boss wants her to download an app on her personal phone. It's either that or lose her job — I offer her some advice. Also, I list the biggest scams going around this season. Tesla's issues just keep growing, Apple fights the right to repair, and a peek at what you're really sharing with your home listing.

Kim Komando Today
Trust in news plummets, Netflix's password bet & spot hidden keyloggers

Kim Komando Today

Play Episode Listen Later Oct 30, 2023 33:31


Plus, Regina's boss wants her to download an app on her personal phone. It's either that or lose her job — I offer her some advice. Also, I list the biggest scams going around this season. Tesla's issues just keep growing, Apple fights the right to repair, and a peek at what you're really sharing with your home listing.

Caffe 2.0
2743 Difendiamoci dai KeyLoggers

Caffe 2.0

Play Episode Listen Later Mar 1, 2023 5:36


Nuova voce del dizionario di internet su www.civile.it/dizionarioKeyLogger e' uno spyware, un programma malevolo che acquisisce i tasti che premiamo.Ci sono problemi reali enormi negli smartphone, con i suggerimenti e le correzioni automatiche. Ne parlo indicando anche come comportarsi per andare con il browser sui siti delle banche o della P.A. almeno per ridurre qualche rischio evitabile.Per il resto: antivirus e tracciare le attività di rete.Ricordate: caffe20.it/patreon per questi episodi senza pubblicità, Privacypod.it per i consigli in materia di sicurezza informatica

Consumer Tech Update
Find and remove keyloggers on devices

Consumer Tech Update

Play Episode Listen Later Feb 1, 2023 1:15


Is someone recording all the keys you press when you're typing? Here are a few ways to find out, in 60 seconds. Learn more about your ad choices. Visit megaphone.fm/adchoices

remove devices keyloggers
HeroicStories
Will Using an On-Screen Keyboard Stop Keyloggers?

HeroicStories

Play Episode Listen Later Dec 19, 2022 5:31


Using an on-screen keyboard instead of a real keyboard might stop some keyloggers, but there's no guarantee that other techniques aren't also being used. Will Using an On-Screen Keyboard Stop Keyloggers? from Ask Leo!. Get the Confident Computing weekly newsletter: https://newsletter.askleo.com

screen keyboard keyloggers
CBN Tecnologia e Novos Negócios - Ewerton Andrade
Como se proteger de spywares, keyloggers e outras aplicações que ameaçam a privacidade

CBN Tecnologia e Novos Negócios - Ewerton Andrade

Play Episode Listen Later Nov 23, 2022 11:14


Trecho do programa Estação CBN do dia 23/11/2022 da Rádio CBN Amazônica - Porto Velho (https://cbnamazonia.com). Participação do Prof. Dr. Ewerton R. Andrade (http://ewerton.andrade.pro.br/).

Paul's Security Weekly TV
Re-Routing Traffic, Pseudo Keyloggers, TLS Inside, LockBit, Cobalt Strike & Defender - PSW #750

Paul's Security Weekly TV

Play Episode Listen Later Aug 5, 2022 104:33


In the Security News: when hackers are not behind and outage, when hackers are behind re-routing traffic, neat pseudo-keystroke loggers, when XSS leads to code excution, TLS inside, post-quantum encryption that doesn't hold up to pre-quantum computers, Lockbit loading Cobalt Strike using Windows Defender, we love authentication bypass, and impress your co-workers with my Linux command of the week, & more!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw750

Paul's Security Weekly (Video-Only)
Re-Routing Traffic, Pseudo Keyloggers, TLS Inside, LockBit, Cobalt Strike & Defender - PSW #750

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Aug 4, 2022 104:33


In the Security News: when hackers are not behind and outage, when hackers are behind re-routing traffic, neat pseudo-keystroke loggers, when XSS leads to code excution, TLS inside, post-quantum encryption that doesn't hold up to pre-quantum computers, Lockbit loading Cobalt Strike using Windows Defender, we love authentication bypass, and impress your co-workers with my Linux command of the week, & more!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw750

Cybercrime Magazine Podcast
Cyber Safety. What Are Keyloggers? Scott Schober, Author & CEO, Berkeley Varitronics.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 23, 2022 3:30


In this episode of Cyber Safety, Scott Schober, CEO of Berkeley Varitronics, joins host Zack Hack to discuss online keyloggers and how they collect your information, as well as giving some tips on how to keep your data safe. To learn more about ransomware and more about cybersecurity, visit us at https://cybersecurityventures.com

Dasprive Podcast
69 – EU spyware wet, i-Police, en duizenden keyloggers online

Dasprive Podcast

Play Episode Listen Later May 17, 2022 63:46


De onderwerpen deze week: uiteraard even stilstaan bij het Europees wetsvoorstel om mee te luisteren op al onze communicatietools in naam van de kinderen. De politie haalt het nieuws met hun i-Police tool die alle power van politiedatabanken moet samenbrengen in een tool. Duizenden websites oogsten de gegevens die je ingeeft in formulieren voordat op… Continue reading 69 – EU spyware wet, i-Police, en duizenden keyloggers online

IT-säkerhetspodden
#167 - Ryssland vs USA med Sig Security

IT-säkerhetspodden

Play Episode Listen Later May 1, 2022 54:19


Ryssland har setts som en av de mest aggressiva aktörerna vad avser cyberoperationer. Däremot kvarstår många frågor om vad Ryssland gör åt sitt egna cyberförsvar eftersom de själva råkat ut för rejäla IT-säkerhetsskandaler och attacker både före och under invasionen av Ukraina. Och hur är det med USA? Vad händer i USA i rådande säkerhetspolitiska läge och hur ser de på saken just nu? Det och mycket annat handlar dagens avsnitt av IT-säkerhetspodden om. Mikael Simovits är kryptolog med lång erfarenhet av att arbeta inom data- och nätverkssäkerhetsindustrin och dessutom skicklig pen-testare. Pontus Krohn är en före detta svensk marinofficer med över 30 års tjänst. Han har under fyra år tjänstgjort som förbindelseofficer vid Pentagons utvecklingsavdelning för gemensam krigföring. För närvarande tjänstgör Pontus som lektor i underrättelsestudier vid Mercyhurst University i Erie, Pennsylvania. Detta avsnitt är ett samarbetsavsnitt med Sig Security och som bygger på deras föreläsning från i mars i år. Intervjuare: Erik Zalitis. Inledning av Mattias Jadesköld. På schemat: 00:00 - Vinjett 03:07 - Titeln är Ryssland vs USA - Vad betyder det för er? 04:37 - Vi börjar med Ryssland: hur är deras cyberattackförmåga? 07:35 - Om attacken mot OPCV 10:20 (Ryssarna) har ingen koll på sin egen data när de attackerar. 11:20 Vad gör Ryssland åt sitt eget cyberförsvar? De är ju också ett mål. 12:53 Är det något mer installerat på Ryska folkets datorer? (Keyloggers, bakdörrar, etc) 13:42 Runet : vad är kopplingen till Drutten och Jena? 15:09 Drutten stora öron, vad lyssnar de på egentligen?   16:10 Mikael: "Swift-bojkotten har inte hjälpt, Ryssland har sitt eget system kallat Mir." 16:42 Erik: - "De väntar sig att bli ex-kommunicerade ?" 17:59 - Berätta om cyberattackerna mot Ryssland - det finns en del mönster att se, eller hur? 21:35 - Allt detta måste ha påverkat Rysslands syn på cyberförsvar, eller hur? 22:11 - "RUNet har inte fungerat överhuvudtaget." 22:30 - En sammanställning av cyberattackerna mot Ryssland från världen före och efter Ukraina-invasionen. 25:23 - Attacken 29 mars 2022 mot Ryska "Luftfarsverket" 26:56 - Hur ser hotbilden ut från Ryssland mot Sverige. 26:37 - Vad är "Wiperware" ? 27:50 Över till USA - vad händer? 29:13 Hur ligger USA till cybersäkerhetsmässigt? 32:24 Hur är Ryska befolkningen när det gäller kunskap om IT-säkerhet 34:02 Pontus: "Republikanerna har blivit övervakade". Situationen är politiserad. 34:48 Pontus: "Ryssland har skickligt påverkat båda lägren" 35:45 2019 ville Trump-administrationen samarbeta med Ryssland om cybersäkerhet. Vad beror det på? 36:30 Pontus: "Nyhetstäckningen i Sverige är rätt ensidig". 38:32 Pontus: "Man börjar nu se en mer ensad linje i vad som måste göras". 39:51 USA och Stuxnet 40:07 Efter Snowden affären - har man gjort något för att hantera säkerheten? 42:41 Pontus: "Hunter Bidens laptop kommer bli en följetong". 43:17 Hur kommer det geopolitiska läget utvecklas enligt ett cybersäkerhetsperspektiv? 43:28 Mikael - Nato-vindar och osäkerhet efter valet 2016 med Trump samt historik om sanktioner mot Sverige under Sovjet-tiden. 44:25 Mikael: "Vi går från globalisering till nationalisering" 45:46 Pontus: "Håller med. En ny världsordning där vi måste fundera över situationen." 46:37 Pontus: "Kinesiska myndigheter ställer krav på Amerikanska företag. USA tänker på nationalisering". 48:50 "Vad kan man göra som privat-person eller företag?" 48:58 Mikael: "Det börjar normalt med social engineering. Bli mer misstänksam" 49:34 Pontus: "Utbilda alla" 51:03 "Vad gör ni härnest?" Show notes: https://www.itsakerhetspodden.se/167-ryssland-vs-usa-med-sig-security/

Techකතා Podcast
EP265: Looking for a Job?

Techකතා Podcast

Play Episode Listen Later Sep 4, 2021 58:53


VPS Datacenter in Sri Lanka, Program Automation, Game Streaming, Arduino IoT, Keyloggers, Stress management, Buying a Walkie Talkie in Sri Lanka, Buying a USB hub for a Mac, Pi Hole, Modana Vaccine and Nanoparticles… Download MP3 or Torrent

The Cybertraps Podcast
Your Digital Hygiene Cybertraps Live 24

The Cybertraps Podcast

Play Episode Listen Later Mar 15, 2021 33:22


Research 2020–09–14 What Is Digital Hygiene? - https://www.seaglasstechnology.com/what-is-digital-hygiene/ 2020–04–01 Hackers Play Dirty, So Practice Good Digital Hygiene - https://www.forbes.com/sites/forbestechcouncil/2020/04/01/hackers-play-dirty-so-practice-good-digital-hygiene/ 2020–01–16 5 digital hygiene tips to start the new year fresh - https://www.cira.ca/blog/cybersecurity/5-digital-hygiene-tips Show Notes What Is Digital Hygiene? “the practice of cleaning up your electronic/information assets and regularly updating them.” Cybersecurity Is the Responsibility of All of Us Password Managers Strong Passwords - A password is typically considered “strong” if it is long (at least 8 characters) and contains a combination of letters, numbers, and special characters Avoid reusing passwords Avoid using new passwords that are too similar to existing passwords Password Managers 1Password Dashlane Avoiding Malware (Viruses, Keyloggers, RATs, Ransomware) Use antivirus and antimalware sofware Built into both Windows 10 and Mac Microsoft Defender Antivirus macOS Security Keep existing protective software up to date Use firewalls Use pop-up blockers (some browsers are better than others) Minimize downloads and practice safe computing Know where you are downloading from Minimize or block automatic / unauthorized downloads Keep Operating Systems Properly Updated Practice Safe Surfing Avoid using public/open wifi connections without protection Do-it Yourself Online Safety Guide Use a Virtual Private Network How They Work Cisco: “A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. ” Cisco How to Choose A Complete Guide To Choosing and Using a VPN Great review of VPN services:

The technology blog and podcast
The Security Box, podcast 32: The Beginning of Keyloggers

The technology blog and podcast

Play Episode Listen Later Feb 17, 2021 154:04


These are the show notes. For full news notes, please check the blog. Welcome to the security box, podcast 32. On this edition of the program, we're going to taolk about keystroke loggers. I found a Wikipedia article which is detailed and there could be a possibility that this goes in to multiple weeks. We'll also have news, notes, questions, comments and even a "things to ponder" segment to boot. Topic, Keystroke logging: This may take several programs, but we must cover keystroke logging. We take from the Wikipedia page on keystroke logging so you can follow along. Different heading include, but not limited to: application, software based keyloggers, keystroke logging and writing processes, related features, hardware based keyloggers and history. There are 4 different headings for this article and a lot to read. I figured it would be a good discussion to have since it has come up in discussions of other things. I hope you enjoy the discussion as much as I am bringing it to you. Things to Ponder During last week's program, we were still learning about the possible issue in a small town in Florida that could've had some serious problems with its water supply if it weren't for a worker noticing something as simple as a mouse moving. In this things to ponder segment, I talk about what we've learned to date, and its quite interesting. To date, I have two sources you can read more, one an article by our good companion Brian Krebs, the other from CISA. You should read them both, and of course listen to what my thoughts are and participate. What’s most interesting about the Florida water system hack? That we heard about it at all. Krebs on Security Alert (AA21-042A) Compromise of U.S. Water Treatment Facility CISA I hope you'll participate in this interesting story.

Goood Morning Web
Goood Morning Web 2020 - #43

Goood Morning Web

Play Episode Listen Later Dec 7, 2020 45:15


microsoft slack sms cnil neuv saleforce keyloggers olivier martineau
David Bombal
#216: Python Keylogger

David Bombal

Play Episode Listen Later Dec 1, 2020 7:03


Be careful of where you type your password! Keyloggers can log all your keystrokes. Learn Python by having some fun :) This video is part of the FREE Security+ course covering the SY0-501 AND SY0-601 exams. Need help? Join my Discord: https://discord.com/invite/usKSyzb Get the code here: https://bit.ly/pythonkeys ================ Connect with me: ================ Discord: http://discord.davidbombal.com Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal ================ Support me: ================ Join thisisIT: https://bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Udemy CCNA Course: https://bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P comptia comptia security+ security+ python ethical hacking key logging keylogger python key logger python scripts cyber security Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Inside Out Security
Objective-See - Advanced MacOS Security Tools by Ex-NSA Hacker Patrick Wardle

Inside Out Security

Play Episode Listen Later Dec 16, 2019 56:23


Check out Objective-See: https://objective-see.com/Objective-See Twitter: https://twitter.com/objective_seeObjective-See Patreon: https://www.patreon.com/objective_seeWhile In Russia: Patrick's RSA talk on hacking journalists - Patrick's Twitter: https://twitter.com/patrickwardle This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/

Craig Peterson's Tech Talk
Welcome! Are KeyLoggers still a problem?, Is Someone Tracking Your Browsing?, Why China Is Banning Encryption, and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show11-02-19]

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 1, 2019 89:23


Welcome!   Today there is a ton of stuff going on in the world of Technology and we are going to hit a number of topics from Keyloggers, to Privacy and Encryption, and Tracking -- so stay tuned. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Who is tracking your web movements? Use Firefox if you want to know. Little Inexpensive Devices Can Remove Sensitive Data Security 101 - Passwords and Password Management  Common Password Vulnerabilities and How to Avoid Them Cyber Cold War Right on Our Door Step International News Hits the Dark Web When Businesses Are Required to Capitulate to Chinese Society Cloud Players Vie for Pentagon Contract Privacy and China -- Not So Much --- Automated Machine-Generated Transcript: Hello everybody, Craig Peterson here. Welcome to my Saturday show her right here on WGAN. And online at Craig Peterson calm. You'll also find me up on YouTube, where I am posting videos of this show. And I try and do that every Saturday. I've been doing this now, last few weeks. This Saturday's no exception. Next Saturday maybe because I am going to be out in the West in the conference. So we'll see how that all goes. I may end up doing next week's show from my laptop, which would be a little bit different. I haven't done that before. So we'll see how that all goes. Today we are going to be talking about Firefox. A lot of you guys asked questions about browsers. So I've got an article from naked security up on my website at Craig Peterson. Calm talking about this. But Firefox browsers and this came up in one of my masterclasses here over the last couple of weeks, you know, those free classes that I've been holding, these are not pitchfests, in the least, we spent two hours in the last one. And this particular one, we're talking about privacy, and I had mentioned the offer browser and have some questions on that. So we will be talking about that today. Keylogging is an ongoing issue. It seems that every business that we go into, to help them clean up or do a security assessment and action plan for them. They all seem to have key loggers, at least one machine, man This week, we just found one of our clients had a data x filtration going on. Thank goodness, we had the right kind of equipment in place because it automatically noticed it and shut it down. But keylogging is a great way to start. That whole BX filtration, we're going to be talking about passwords today as well, which is always a big topic. And we'll talk about one password and some common password problems. We've got a warning out from checkpoint, and those are some guys that make some security software. That is saying that there is going to be a new cyber Cold War next year like that's a surprise. So we'll be talking about what that means to you as a home user as a business. The BBC did something I don't know that anybody would think about, but when I thought about it a little more. It made sense. But the BBC is now on the dark web and will tell you a little bit about that. And that also goes into my whole commentary about some of the browsers out there. And by the way, if you want to sign up for these masterclasses, I don't think I'm going to be having one this coming week. But if you sign up for the master class, you can attend Live asked questions. I always answer all of the questions, which is why sometimes it goes much just three hours because I try and make sure everybody understands what we discussed. I've been doing them live as well on zoom so that you can kind of jump in and type in your question in the chatbox, and I'll make sure I get to it right away. And I will be having more so see the two I've done, I think, Okay, the last couple of weeks. I know I did one on VPN and one on mobile security just yesterday. So make sure you sign up Craig Peterson comm slash master class. And these are, as I said, they're free, and these are not pitchfests. But it's me looking at material trying out material answering questions that I can use in upcoming courses that I do so. Tick tock, by the way, if you haven't heard about it, I've mentioned it on one of the morning appearance appearances that I do on the radio, but Tick Tock is here. Getting back now about this is from China about claims that China is doing the nasty with it. Microsoft man who thought that they would win this Amazon was the shoe and winner for this contract with the feds. We'll talk about that. And a little bit about what does it mean for you if you are using cloud services and what's the government trying to do here, and China, they passed a cryptography law. You know, of course, about Facebook, as I mentioned this before, and Facebook's cryptocurrency while China's getting in the game as well. And hopefully, they don't beat us to the punch here when it comes to the cryptocurrencies. You can watch all of this, as I mentioned, and I just noticed myself right because I got a little monitor sitting here so I can see what we're streaming. And I noticed that this big green logo God is behind me. It is for my ball. I sit on one of these kinds of big bouncy ball things so I can keep my back moving. In fact, this whole table that I'm sending that that you can see in the video on YouTube, this whole table, and my website. Of course, this whole table goes up and down. So I've got my production equipment here. I've gotten more production equipment there. I've got a huge 4k TV up there that shows me all of the different feeds and things it's just a nice little setup, but that's what this is in case you're wondering watching on TV certainly caught my eyes I might have caught yours as well. So let's get into Firefox right now. Mozilla, these are the guys that make Firefox has been trying to focus on security and privacy. And there is a difference between security and privacy. Security is where we have information that is kept private, but it is also kept secure, so it doesn't get out. It doesn't leak out. There's no way for anybody to get it. So that's how we're defining. Well, no way, right? There's always some way. But that's how we're defining security when it comes to browsers. Privacy is different privacy is where you don't necessarily want websites to know where you are, where you've been, what you're doing when you're online. And we should have privacy. I'm more concerned about privacy, my privacy, right. When it comes to government monitoring, then I am worried about privacy rights when it comes to business monitoring. Because businesses all they're going to do is try and sell me another pair of shoes. Or a car, maybe when I don't need a car. Government, much, much different government is going to be very intrusive government is the sole authorized entity and that it states to use force against you for what they want. In other words, the government can pull out a gun, put you in jail, take away your rights, your freedom, and kill you in some cases. So I get concerned when it comes to government. If you don't have the government, then you are really at risk. Now, how good is the government? I don't know. We were seeing these impeachment hearings going on with President Trump. The accusations are that under Obama's direction, the CIA started an investigation into Trump for political purposes. Then the CIA fooled the FBI into launching an investigation, and then there were some people high up in both these organizations, right. It's not the normal, lower level of people that were running this sort of stuff. And there's we can tell, right? But I get concerned, because even if this was true, and also if it was only the top-level people within the CIA, the NSA, the FBI, that were involved in, could move downhill. And we keep hearing talk about the deep state and what they're doing. Well, do you want the federal government to have all this information about you about where you're going online, what you're doing, and it goes back to the socialists. The quote that I've had in the front of my mind for the last couple of months is, show me the man I will show you the crime. Because every last one of us has committed a crime, some of them felonies. You before you leave your house in the morning, you've probably broken some rules. Regulation or law? Because there's so many of them just on firearms, there are more than 20,000 laws, how can you be expected to comply with them all? So, if you've got a committee in Congress, for instance, that wants to impeach the president, or someone else and they're allowed to go after the guy everything look at everything they've ever done everything! YES, Everything Everything. They will find a crime because everything is a crime. Oh, finally, we found an offense. Do you think that you with what you do online might have committed a crime at some point in time? That's the real question. If you're online and you are doing something that they want to paint as a crime, right, all they have to have is rumors to destroy your life. Look What happened with Mike Flynn? Did he remember every word that was said when he was vacationing in the Caribbean? Man? I know a lot of people that are a vacation in the Caribbean and are tipping back. Few too many drinks. Do you remember everything you said last time you inebriated? Right? And then now you're led into a perjury trap. All of this can happen when it comes to your online browsing history, what you're saying online when you don't have privacy. Again, we're talking about the government here. What the government's monitoring with the recording -- Who are you calling? What are you doing? And me, I'm a member of the media. And as a member of the media, I talked to all kinds of people I'm sure people that I have interviewed over the years have ended up being arrested and Probably some of them convicted of who knows what crime. So now they go back, and they selectively look at things that I might have said I might have talked to that person, and now I am a criminal. So when we're talking about privacy, there are two levels. I'm not worried so much about businesses tracking me. I am apprehensive about government monitoring me. And when we get back, we're going to talk more about this because the government monitoring side of things, and the business side, end up merging. It's kind of like a Moebius spurt strip here, frankly. You're listening to Craig Peterson. I'm on WGAN and online at Craig Peterson, calm, stick around because we'll be right back. Hey, everybody, welcome back, Craig Peterson, here on WGAN. And online at Craig peterson.com. Of course, as Peterson SO and we were talking about privacy protection before the break, I want to add one more thing about privacy protection when it comes right down to it. And that is, you are the person responsible for it. So let's do a little bit of education here. Let me help you understand what we're specifically encryption. Your web browsers can use encryption when talking to websites out there so that any data from your browser to the site is encrypted. Not that they always do it, but they can do it, and there are some plugins to make sure that it is using eat in corruption when possible. So one of those plugins is called. What is SSL everywhere, I think, is what the name of it is. But there's a number out there. But there are many browsers that do aim at trying to keep your data safe online. And I talked about those in the masterclasses here that we recently had we got more coming up, and we'll be answering even more questions. Of course, correct. Peterson comm slash master class for those three classes. But you can use a different browser. So, for instance, you know that if you have windows, you probably had Microsoft Internet Explorer on it. And then, they switch to this Edge browser. And now they have switched to using Google Chrome as the base. So basically, it's there. It's called chromium, which is the base that Google Chrome is based on and is in the OpenStack Source space. And Microsoft, of course, put their stuff on top of it so that they make sure they break a lot of websites. Well, that's, that's not why they did it. They did it because they're Microsoft and they know better anyhow. Your current Edge browser is not a Microsoft product. It's a Google product for the most part. So some of us will also use Google Chrome, which is the most popular browser out there by far right now. If you are using a Mac, you probably have Safari. So I've run through the leading browsers that people are using out there. Currently, some browsers are privacy aimed. One of them is the Firefox browser. And the other one is Opera. Those are the two most common, and Opera is probably the better of the two. But as was brought up in one of my master class, by one of the attendees, there are rumors that China has started to take control of opera, which could be a problem. And then there is the most privacy oriented browser in the world called tour. But we're not going to go into that today. You can find all kinds of information on the tour. I have done some Facebook Lives on it. And you'll find those online at Craig Peterson comm slash Facebook. And you can find out how to use the most private and secure browser that there is out there and it's free, by the way. So Firefox is trying to be the browser when it comes to privacy. And they have a few different browsers that are available on iOS and your Android devices, each offering different levels of privacy protection. Still, they have offered another privacy treat tweak to Firefox version 70. And this is the ability to see how often websites are tracking you. So if you are running Firefox, you can go and access it by clicking on the address bar shield icon. That's where you would normally see the information about any SSL certificates in use right now. It has a drop-down at itemizes different types of trackers detected on the various websites that you might be using. Now, there are some other things that you could potentially use and what I use as well. And probably one of these days we'll have to get more into this and what am I using and how are we blocking things, but there there are a few other plugins that you could use one from our friends over at EFS Electronic Frontier foundation that I use and that I like. I recommend, but we're right now we're talking about Facebook and Facebook, Firefox. Okay. So naked security, as I mentioned, has an article you'll see up on my website as well. And it's talking about the enhanced Tracking Protection that they did test. They said users might not notice the detection of many trackers if you already have this set to a strict setting, but it works pretty well. I like what the EFF has done a little bit better. But to back up its claim that privacy protections with having of Mozilla released figures showing that Firefox had blocked 450 billion cross-site tracking requests since the second of July. And now that's risen to 10 billion blocks per day. So a cross-site tracking is a site that might put a cookie on your browser. So that it knows what you're looking at what you're interested in where you came from, right. And that's one level of being monitored by the marketers. The next level of being monitored by the marketers is this cross-site stuff, including scripting. And that is where they're pulling data from another website. I have a client that this just happened yesterday. And this client has been using Internet Explorer. Now, we have been after them for a long time to get rid of Internet Explorer. It's not even supported by Microsoft anymore. So there are all kinds of security vulnerabilities. And they use this one particular small bank to do all of their banking. And they went online to the bank, and they couldn't log in, they couldn't get it to work. And it hasn't been working for months. Well, as it turned out, the advanced security that we had installed in their Network found that the bank had used an embedded a cross-site script, going to a tracked customer relationship management system. That was a fairly new site. It's only been online for about three weeks period. So we consider that high risk because that's a typical mo modus operandi for a hacker group. So we blocked that access. And that access, then made it so that she couldn't get a login. Now, this is all good, because it's a high-risk site. And we don't want them going there. We don't like the cross-site scripting, because many times that's how hackers get your data. And we're not going to get into a whole bunch of detail on how that works. But the Mozilla will block that now, which is nice, frankly. And you have to turn that on. If Wanted again, it's called enhanced privacy protection. And by the way, there is also a built-in password tool on Firefox called block-wise. And they now can generate a secure password when signing up for a new account. Now coming up here a little bit later, I'm going to be talking about passwords, some specific stuff about password managers, and not what the best practices are. But you can use it to replace the weak ones, and Firefox has been doing a pretty darn good job. By the way, Mozilla says that lock wise can be protected using Apple's FaceID Android Touch ID face recognition systems. And they're using AS 256, which is pretty good. encryption, it's tamper-resistant, it's GCM, it's their block cipher technology. They're using one PW protocol to obtain keys a, and they're doing a pretty good all shocked to 56 for the encryption key. So have a look at that if you are concerned about privacy leading into security, have a look again. And a side note here from our friends and naked security reason test by the German Federal Office for information security Firefox as importantly only one of five browsers to be given a passing grade. And I will leave you to guess who some of the ones that had failed. Were and I talked about them all the time. All right, stick around. You're listening to Craig Peterson on WGAN. Online at Craig Peterson dot com. We're going to talk about vampires on your computer when we get back, so stick around. Hello, everybody, Craig Peterson here. Welcome back. Of course, we're alive. Every Saturday from one till three. You can see me on Facebook Lives I've been conducting master classes. We got a great class coming up on hardening windows. It is a course we'll let you know about that as well. Hopefully, you got this morning's email. I send it out every Saturday morning with my notes for the week, including all of the articles we're talking about today. So make sure you follow along. If you haven't already, go to Craig Peterson dot com slash subscribe, you'll get my special notes when they come out. You'll find out about some of the nastiness that might be happening out there, and you can be on top of and in Friend have any of these big problems that are out there? That's Craig Peterson comm slash subscribe. Well, let's get into the vampire side of things right the spooky time of year Halloween. Everybody's thinking about these vampires, and things about there's a kind of a cool new Walking Dead-ish show that it's a comedy on Netflix that we started watching. It is very, very cool. I think it's a fun one. But did you know that there may be vampires lurking in your computers? I mentioned a little bit earlier. But I have seen these vampires in pretty much every business that we've done an NSAAP in. So here's what an NSAAP is. An NSAAP is a network security assessment and action plan. We call them in NSAAP, right, so we'll go with In we charge 500 bucks. We analyze all of the machines that are on their network and what their security problems are. And then they have something they can run with, to try and fix the issues themselves or because it's so complicated, we'll fix them for them, right? That's what we do, we not only fix those problems, but we keep going. We keep the patches going, which is one of the most important things for you to do. We make sure that we have multiple layers of security on the machines and then on the network, and then at the network edge, etc., etc. So when we're looking at, these will look at two things that will look at vulnerabilities. And if they want us to, and there's an additional charge for this, we'll go ahead and look at indications of compromise, which means, Hey guys, not only do you have these vulnerabilities, but it seems like there's been a compromise. Now, you don't want to be compromised. I think that goes without saying the bottom line. But when we do this indication of compromise test, I think 100% of the times, and we have found one of these vampires on at least one computer. And what I'm talking about right now are key loggers. There is a guy that just went to prison sentenced just a couple of weeks ago for this type of thing. But there are two types of key loggers. But the bottom line is they're trying to find what you're typing because they know that you're going to have to type in password usernames, right? And they don't even need to know what's on your screen at the time because they can, you know, they can pretty reasonably recognize what you're typing. you're typing a letter versus you're logging into a system. And that, by the way, is why you need to factor authentication. That's why we use UB keys YUBI You can find them online Yubikey so that you have your account, you have your password, and then you have to physically insert this special encryption key to keep your data safe, right, that's the bottom line here. So the two types of these key loggers are there are hardware loggers, and the hardware key loggers are something that plugs into the back of the computer and then plugs into your keyboard. You don't see as much as you used to because many of us use Bluetooth keyboards. Now Apple is the best there is when it comes to it. And if you're watching me now, you see I've got an iMac over on my left, which is an Apple iMac. I've got Keyboard an apple keyboard, which is Bluetooth and an apple trackpad, which is Bluetooth hooked up to these, but it's using a special version of the Bluetooth protocol. To get the keyboard to sync up and the trackpad to sync up, I have to plug it into my iMac so that they can exchange security keys. So it's not just the basic Bluetooth security, it's much more advanced than that, which is great. So what they're trying to do now is get it so that with this apple keyboard and trackpad, there can be a key logger that pretends to be my Mac and then the keyboards talking to I'm Mac's talking to it, they get you can't do it right. Now, with the older stuff with a regular Bluetooth keyboard. What they'll do is they'll put a little Bluetooth receiver in the area, and it'll pretend it's the computer and the keyboard. Now regular Bluetooth keyboards do have security. And it does negotiate with the machine. So there's some security there. But most of them, the older ones, particularly all of them, are entirely hackable. So, what they were trying to do, again, is a key log. They sit in the middle between your keyboard and your computer and is easier to do with a hardwired or with a USB keyboard. You might want to switch to the latest version of Bluetooth available for your computer. Now the second way that keyloggers work and how we often find them when we're scanning the software. We're looking through the system registry, and looking in detail at everything. Those key loggers are pieces of software, and they've been inserting themselves into your operating system. So, that whether you're using a Bluetooth keyboard or hard wired keyboard, they see everything that you type. That's a problem because, again, they can figure out what your username is what your password is. Well, a New Jersey man has confessed to getting into businesses during hours and after hours and planting key loggers. And we've seen this happen in some congressional Democrats offices as well where they found installed key loggers. The Department of Justice has named the companies that were victimized one to New York, the others in Texas, and they both have offices in New Jersey. And what they said was that this guy, anchor wall 45 a month Ville news jersey pleaded guilty New York Federal Court on Tuesday this week to two counts of obtaining information from computers and one count of aggravated identity theft. So these can be bad, and they can be used to break into your bank accounts and all kinds of things. That's where identity theft comes in. And according to the court documents, it started in June 2016. When he trespassed into these companies, New Jersey, Brandt's branches, he got his hands on an access badge. And it let him keep, keep coming in when he wanted to write. And he installed the hardware key logger, those are the ones that sit on the USB port, or that you can program a Bluetooth keyboard into right so if you have physical access, all you have to do is just configure the Bluetooth keyboard to talk to your keylogger and then the keylogger talk to the computer. Then and then of This is hard, right? And apparently, he got employee usernames and passwords. He also snuck his computer and hard drive under the company's computer network. So we could install malware that does the same thing, which is the software key logger just talking about, then this gives the crooks a way to track everything, breach everything and get internet works completely. Okay. It's, it's a real problem. It's a real real problem. So, key loggers can be notoriously hard to find. But there is software that can find them in your normal antivirus. Sometimes it can. Hey, stick around. When we get back, we're going to get into passwords. You're listening to Craig Peterson here on WGAN. And I got a surprise for you when we get back. Of course, online Craig Peterson dot com slash subscribe. Hello, everybody, Greg Peterson here. WGAN online, Craig peterson.com. What we're going to talk about passwords right now, and there are some surprising numbers that have just come out. I'm going to be talking more about these next week. Zogby, these are the pollsters just came out with some statistics on businesses and getting hacked, which is amazing. Amazing. Because it turns out that a quarter of businesses hacked in 2019 went out of business, 10% immediately went out of business. It's just crazy, but we'll be getting into this in more detail coming up next week. But let's talk about passwords because this is one of the most important things you need for your security. Now there are movements underfoot, and Microsoft is involved in Google and others in getting rid of passwords entirely. That's good. And it's bad. Now, they're not saying they're getting rid of the password. So anybody can just say, Hey, I'm Greg Peterson, let me into the Twitter account, what they're going to be doing and what they're already doing actually, is those accounts that they are that they're trying to protect, or it's using an exchange between your browser, the website, As well as something that you have like the Yubikey. You know, TLTP it's a one-time password type thing. That's where it's going. It's not there right now. And right now, the best thing you can do is protect your past. passwords by using one of these pieces of software that automatically generates a unique password for you for every website, and also store them securely will fill out the form for you with your password in there, so you don't have to remember it. And we go the next step and my company because we are a master managed services provider, that in fact for a master managed security services provider, but that's a mouthful. Be meaning that we provide the security services that other companies sell. So we're the people behind the scenes for a lot of local break-fix shops, bars, etc. So the change is now that one password we can tie in and we do tie into something called do ODUO-and it's something else that Cisco Bought, it's interesting. I don't know if they're following us around, but three or four of these products that we've been using for years, Cisco recently bought that we've been using them because we found them to be the best that was out there. So one password has a Business Edition, as well as a condition that you can be using, and you should be using for your family and using it to share passwords. So with the business version here, you can create different groups of users with varying vaults of passwords. And it makes it very, very easy, therefore effective. And frankly, according to CIO magazine, and I agree with this, you can get a measurable, beneficial impact on security just a few days after you've rolled it out. Now they have one password advanced protection, which also has extensive monitoring tools that we use to So that you can take control of your security in your business. So look at one password. It's not expensive, and it's not cheap. Okay? It's right in the middle. But one of the things it does is it lets you know hey, we have reports at this website that you have an account on has been compromised, so you've got to go ahead and fix it. So you've got to keep control of your sensitive information I've talked to before I had quite a stir when I said .hey don't tell the truth your bank you should be lying to your bank when it comes to your password recovery questions. And some people push back one of my daughters is pretty high up in a bank, and she was taken back by the headline, which is Lie to your bank, right? And then she read the article, and she's going to share it with other people within the bank because it just makes a lot of sense. So one password business lets you securely share passwords across your teams, or do your parliament, and only the people that need access to an account can get the access to the account, which is very, very important. It's the whole concept of limited access and, and who should be able to have access, right? very minimal access. Now there are other password managers out there. As I've said many, many times, I like one password, I think it's absolutely the best out there. That's what we use. We use it in conjunction with do Oh, and use that in conjunction with Yubikey. So that we have multiple layers, multiple layers of security when it comes to logging in. So let's say that you can't use one password, maybe your home user, your Soho, small office, Home Office. Let's talk about the other options available. One of them's called LastPass, which is pretty good. I've mentioned when we've talked about Firefox that it has a password manager built-in. That's pretty good as well. But let's get into the common password vulnerability. Ladies and how to avoid them. The old thinking was that you should change your password every 30 days, maybe more frequently. And that you need to have a mixture of numbers, letters, special characters, upper and lower case. That is no longer true. Not at all. The best password is a long password, that phrase, and you throw a couple of uppercase letters and some special characters in there. That's the best password. And not having your people change passwords every 30 days is also beneficial because it encourages them to come up with better passwords. Okay, because weak passwords are just the worst. So length versus complexity. You know, a complex password. Some of them they're saying like eight characters or lowercase characters, numbers, special characters, and in reality, that's a weak way to come up with passwords. Because if you're talking about eight characters, that's easy to break, relatively speaking, you can download my table from the internet, it's about two terabytes and size is pretty long. But it allows you to break pretty much every password that was ever created by Microsoft, or that you've ever used on a Microsoft System older than Windows 10. And even Windows 10 systems where there's been a migration So in other words, pretty much every password used in Microsoft, and. And that's called a brute force attack. When you're going up to the character one's a long one, you can use these fancy crackers, okay, that are out there. Well, if you enter a 16 character password even let's get simple, a 16 character password that only has lowercase letters. Computers right now using brute force, it would take 224 million years to crack that password 224 million years, versus it could break your password in nine hours, an eight-character random password randomly generated. Okay, so the length is the key here. So whether you're using one password or you're using just one account by yourself length is what matters. Now, some applications older programs you're using, they used to be restricted eight characters, many of them. Hopefully, they're not anymore, but give it the longest password that they allow that you can reasonably remember because you don't want to grab one of these. I'm holding up a sticky notes post-it notes here in the camera. You don't want to use one of these to write down your password and stick it on the screen. or stick it in the drawer, okay? Because now that guy or gal that is breaking into your office at night can find your password good, you wrote it down. So you don't have to be so complex it has to be written down. And you don't want it to be a character because that only takes nine hours to be cracked. Okay? So keep those things in mind length. Is it enough? Well, yeah, pretty much okay. But if you're using a password that is like your catchphrase, put down that cocktail that people might know that maybe you have on your Facebook page or something on your website at the office, your LinkedIn page. The bad guys are going to do a little doc scene and find it, and they're going to use it, and they're going to get in okay. So don't use these. You know, the quick Silver Fox jumped over the lazy brown dog or other things are going to be easier us Long password, if you ever have taken one of those memory courses to help you with your memory, and then it's a random list of words and it's like, airplane armed, low brown dog, etc. And then you associate them right. So the airplane flew over into the envelope, and the brown dog ate the envelope. Well, do that. Memorize that. And you can also use foreign languages. For many of these, you can come up with crazy words, anything that you know, well, that's a long-phrase going to be the best password that you can generate. And never, ever, reuse the password. Don't use them on multiple websites because if you use it on your kid's site for their x box, and you use it on the banking side, and the Xbox gets hacked, they now have your banking site password, okay? So be careful of all of this stuff. There's this out there called Have I been Pawned - spelled P-W-N-E-D? Go there, check your password, they'll tell you how good it is, based on whether or not that same password is located online. In one of these hacked websites, it's out there and use password managers use multi-factor authentication. These are things like DUO and YUBIKeys. Just do it the right way hardware tokens. They're getting more involved. Now I mentioned OTP. One time password, which is a new protocol, is going to get rid of passwords online. Google has their own called Titan. And there was just recalled on a bunch of those Google Titan keys. certain models of them. You know, stick with Yubikey. They are quite good. smart cards open PGP Fido is the new standard that I've been alluding to, and use them all the time. All of your passwords matter. All right. So that's it for passwords. And when we come back, we're going to talk about the new Cold War. That's coming up in 2020. will be talking about the BBC now on the dark web tech talk and their response over China's influence. And Amazon was expected to win this big contract of the federal government. We didn't talk about that and what my concerns are with us, and what your concerns should be when it comes to cloud computing. So those are coming up. So stick around. You're listening to Craig Peterson right here on WGAN and online. Craig peterson.com. Subscribe to my email list. Get my weekly emails to find out about the free masterclasses etc. Craig Peterson dot com Hello everybody, Craig Peterson here. Welcome, welcome. Welcome back. Of course, you're listening to me either on WGAN-AM online at Craig Peterson dot com, you might be watching over on YouTube Craig Peterson dot com slash YouTube or maybe Facebook, maybe LinkedIn, I'm starting to do a few things with LinkedIn. So we'll see where that all leads us. We're going to talk right now about some predictions, and this is from information security. buzz.com. An article by Checkpoint is a company that makes various types of security software. They were one of the very first firewalls many many years ago. I used them 20 years or maybe more ago, but Checkpoint has been around for quite a while, is not a product I use anymore. But they do have some useful information. And that's what we're going to talk about right now. And they're talking about 2020. And this is all about their predictions. And they're saying that we really could be looking at a significant cyberwar coming next year. What does a cyberwar look like? What are we talking about here? Because cyber Cold War's mean what what what is it cold war. You're not using kinetic weapons writing. In other words, you're not firing missiles. You're not shooting guns. You are playing games with each other, Right? We had as part of the cold war against the socialists and in the USSR in Russia, Soviet Empire. We had a trade war going on where we wouldn't trade directly with them. We wouldn't trade certain things with countries that did do trade with them at the time, and the CCC p ended up going out of existence entirely. That's an example of a Cold War. So today, what is a Cold War look like? We know the United States has started doing some cold war-ish things with trade. Right? We've got our president out there right now, President Trump, who is saying, Hey, listen, China, you need to smarten up. You are doing things that are hurting us. None of the Presidents before me, have had the guts to come out and say this, or do anything about it, but I am going to put tariffs on these various goods because we want you to stop stealing our intellectual property. We want you to be fair and open in your trade with us. China has been pushing back, and put some of their tariffs in place, and they go up, they go down. Is that a Cold War? Well, I don't think sustainable. But at some point, that's a Cold War. Right at some point to say, yeah, that China in the US is just going to butt heads together. I think it becomes a Cold War when we start trying to enforce sanctions against countries that do business with China, which will be bad for us. Now, the European leaders also sat on their hands for about 20 years. It's been since the late 90s. They sat on their hands and didn't do anything about China. So is this a Cold War right now? No, not really. Is it a trade war? Well, kind of. Yeah. We do have a cold war going on with North Korea. They're, they're not shooting missiles at the US, per se. We're certainly not shooting missiles at them neither South Korea. So yeah, there's a cold war there. Where else might we have Cold War's Well, you know, kind of a little bit of a one with the socialists in Cuba? You know, killing 20 million people in Cuba turns out to be a bit of a problem. We have a Cold War right now with Venezuela. And in Venezuela, of course, again, people starving to death in the streets with their socialist government. There seems to be a trend here right with socialist governments and people dying. So yeah, we have cold wars going on right now. So what checkpoint is saying that these nation-states that are out there that don't like us, but have very little power over us are going to get into a cyber Cold War with us? Because, again, if things were to escalate, you know, China versus the United States, if we wanted to hot, or where we were shooting at each other, the United States would probably win, you know, we we'd have to see, of course, it'd be a lot of lives lost, which would be horrific. Obviously, these smaller countries, we just go in, and we could topple them pretty easily look at what happened in Iraq, look at what happened in Libya, in Syria, where the Obama administration decided they would destabilize the Syrian government. They sure as heck did that didn't they looked at where Syria is right now. So we could do this with most small countries. So what can they do to retaliate back against the United States they're certainly not going to get into a hot war with us. Well, what I what checkpoint is saying is there is going to be a new Cold War, conducted in the online world. the world as western and eastern powers increasingly separate their technologies and intelligence. We've already seen Russia have a kill switch for the internet. China has a kill switch for the internet. And in both cases, particularly in China's case, they are controlling everything that people see on the internet. And that's where the whole Tor browser on your network comes in, right to help get that information out. Behind these curtains. We've got the bamboo curtain. We've got the Great Firewall of China, all of these things. So they're saying the ongoing trade war between the US and China and the decoupling of the two huge economy economies is a clear indicator of a potential Cold War, cyberwar. And it actually might be if we don't come to terms with China, we can see things getting worse. Talking about something that happened this week with one of my clients. It is a client that took some of my advice, but not all of my advice, right? Unfortunately, that happens. And so we had some equipment in place. We found with this client that they had given remote access to employees, for the employees to get into the systems at the office. And they didn't do it right. And we gave them a proposal to go ahead and make this, you know, make this happen clean things up. And they didn't. So they still had this, how do I even put this, it's like a big box retailer, firewall VPN controller, and you've heard of the company's name before, I'm sure and just a total joke. And they wanted to continue to use it, and they continue to use it. So then Week, what we found was that someone hopped in via that one of those computers that were used remotely that remote connection, right so so they hopped in, they got on that remote connection, probably because the employee's computer on the remote side was compromised. So they connected to this VPN server on this platform that I, I'm not going to mention their name because I don't want to confuse anybody. And think that it's a good platform because it's not it's cheap, though. It's cheap. And they were able to get in now on to the computer with remote desktop. And then from that computer that was on their internal network that we had no visibility into, they were able to go to another computer for the Operations Manager. And from there, they started uploading x Phil trading data, again, customer information potential They're intellectual property, etc., etc. So they were trying to accelerate it through a device that we control that is designed to look at all of the data, make sure that none of that data that's going out is data that contains confidential information, etc. Right? And it noticed something weird, which was waiting a minute is 6 am. Why all of a sudden is are there gigabytes worth of data on the way out of the network. And so our systems alerted our tax and immediately shut it down. I think about eight gigabytes made it out before we shut it down. So this is an example of what happens in a cold or cyber Cold War in this day and age we saw this week. It's a very, very big deal and this is a small company and trying to save a few bucks. I mean, a few bucks. They may have lost everything. We stopped it partway through. But because we don't have visibility throughout the whole network, who knows what's been going on in there, we can only see stuff that's going out x filter via our network connection on the outside. Okay. So it's they're expecting our friends over at checkpoint are expecting this to escalate next year. Where did this come from? Well, we did some tracebacks. However, what happens is someone can be sitting in China, using computers that have been compromised in Russia, to connect to computers that are compromised in Brazil to connect to computers are compromised in Mexico to connect to computers right here in the northeast United States. So you see what I mean. It's unpredictable but it is exactly what happened. But we did see a little bit about the source in the routing, what happened here. Now, cyberattacks are being used as proxy conflicts between smaller companies that are countries. I should say smaller countries aligned with these bigger countries that want to go after each other. It's going to be fascinating. So we got a couple more points here. We'll get to, and I will get to them as soon as we get back. So stick around. You're listening to Craig Peterson right here on WGAN. And online at Craig Peterson dot com. Peterson, with an O, stick around. We'll be right back. Hey, welcome back. Craig Peterson here on WGN online. Craig Peterson dot com. Thanks for joining us today. I know you got a lot of stuff going on. I appreciate you guys sticking around. Last time I saw the stats for my show. I had the stickiest show on Saturday of all shows, which means more people sit and listen to my entire show on the radio than any other weekend show. I thought that was cool and appreciate you guys for doing that. Also, our numbers keep going up. We've had some incredible days. When it comes to our podcast, we're changing it up a little bit on the podcast side, which you can get on iTunes. You can get it on tune in, SoundCloud, you name it, go to Craig Peterson dot com slash iTunes, if you wouldn't mind and give me a five-star rating. Hopefully, I've earned that from you. Craig Peterson dot com slash iTunes. Let's get into these last points here when we're talking about a new cyber Cold War in 2020. The 2016 elections were the first major fake news elections. Now, of course, Hillary Clinton coined the term fake news during her candidacy for President. Donald Trump kind of grabbed on to it. But we're talking about fake news 2.0 you think the Russians messed around with our last election Wowsers our next election 2020 is going to be a doozy and it's just going to get worse from there. Because now we can create deep fakes that are going to make a significant impact on the elections. President Obama was the first social media president, and he claims his election was due to social media, that social media was what led him to get his message out. And it was his message getting out. That got him elected. Right? Well, now we've got the ability for politicians to really master social media and then almost automated fashion, political adversaries going back and forth Republicans and Democrats. And now you can have the greenies the libertarians, the who was it pop their head up again. Another kind of crazy guy anyways, who's out there to spread false stories to build their narrative based on fake news 2.0 Okay, very, very big deal. And they are already in the process of implementing their plans to influence these 2020 elections. It's a huge deal. Part of what we're going to see with the cyber Cold War is more cyber attacks on utilities are critical infrastructure. They're all going to continue to grow. We've seen attacks on the US and South African utility companies this year, as well. In many cases, critical power and water distribution infrastructure and sewage plants have been using older technology and haven't been updated. Now I can tell you a little bit of inside baseball here that's not confidential that I talked with some experts about when I was running, the FBI Infragard program webinars. So the InfraGard is something the FBI put together to help critical infrastructure And other companies out there to help keep them up to date on what's going on. Okay. So I know there's been a lot of progress made, but they're not all to the point where they are highly resistant to these hackers that are out there and particularly nation-state. So we have to continue to increase our cyber defenses substantially. And another thing while we're on this topic, because of the solar flare activity, one of the most crucial things you need to be doing right now is hardening our electrical grid or electrical infrastructure. So that if we do get one of these massive solar flares, we don't end up with another Carrington event that could knock us back to the 1850s all technology gone. Something for another show, I suppose. So the checkpoints technical cybersecurity predictions for 2020 are targeted ransomware attacks are going to increase 20 1970 Somewhere being increasingly targeted against specific businesses, local government and healthcare organizations that we had a lot of that this year, you guys probably are aware of that I certainly have talked about it, okay. Attackers are spending time and intelligence gathering on the victims to make sure they can inflict maximum disruption. Remember, the disorder is what they're going to do. They want to disrupt our economy. They want to empty your bank account, they want to confuse, conduct phishing attacks going beyond the email, email is still the number one attack vector. And that's what we guard carefully for our clients. So most of our clients now are using some version of Microsoft Office 365. And remember, there's 10,000 plus skews that Microsoft has these different products and they've got a one through I can't remember where it goes now he five or seven for their email product. And then they've got data offerings, and I got all these different things. Don't go with the cheapest. Okay? But what we do with the email because Microsoft isn't very good at providing anti-phishing and anti-malware services for the email, we brought all the mail through us, we run it through some highly active filters, and then we send it on over to our customers, okay. So be very careful about that. Now, and frankly, next year and on there is now vision which is voicemail phishing, there are SMS texting attacks against mobile devices, gaming platforms, social media platforms, it's crazy. Mobile malware attacks are moving up in the first half of 2019 saw a 50% increase in attacks by mobile banking malware, over 2018. So we're talking about stealing payment data credentials and funds from the victim's bank accounts. And there are new versions that are already available for the bad guys. And this stuff isn't expensive, and you know that a nation-state might pay a million dollars to get their hands on some of the newest zero-day attacks. But there are some beautiful attacks that you can get for 20 bucks online on the dark web that you can use to destroy a company. Twenty dollars is all it takes. Okay? And unfortunately, that company is going to have to spend a couple hundred thousand in order to protect themselves from that $20 attack, right? Is it worth it or isn't it? They're getting more sophisticated phishing attacks here and more effective as well. They're getting mobile users to click on malicious web links, etc., etc. Okay. Nice little quote here from Checkpoint that we won't read right now, but we've got to protect ourselves. These are called generation-five attack vectors, and they are getting very shrewd. They are able to really inflict maximum damage, it is just crazy. So that's why we have multiple layers, right? It goes back to Shrek, that Ogres are like onions. That's how you have to think of your security. You have to have a stack of security, and you have to have all these different layers. If they get through one layer, there's another layer underneath to protect it further. And then another layer and then another layer. That is how we stopped them this week at one of our clients from stealing all of their company's information. And, you know, again, it isn't cheap, but how much is the company worth? How much is your job worth, right? And I feel sorry for everybody that is this De facto security person and organization who does not have the budget that you need. And man, I empathize. That's why we're doing these mini-courses and the master courses as well. And that's why we got these free masterclasses and the Facebook Live so you can ask questions and get them answered because I really, really, want to help you guys. Okay, of course, I want to keep my lights turned on. So that's why I have paid for courses that you can purchase. But all of these classes are simple and free. So make sure you know about them. Sign up today. Go to Craig Peterson dot com slash master class, sign up, and you'll find out about these free classes that I'm holding more or less two times a month to three times a month, depending on what my schedule allows. All right, everybody, stick around because we'll be right back. You're listening to Craig Peterson on WGAN Hello, everybody, welcome back. Craig Peterson here, man, the show is winding. Winding down, I guess, is what you'd say. We get about the last half hour here together, and we're going to be talking about some of the technology in our lives, some of the things we need to do to protect ourselves. Of course, that's what I do for a living. So that's what I know best. Right? So we've talked about a lot of technology, but we kind of stick most closely with some of the security stuff. We're going to talk about the BBC now and why they're using the dark web. If you've watched any of the war movies, you know, that we used the BBC the Allies did in world war two to get messages to the underground and other people who were in occupied territories. They did it through code words and things, you know, they'd have a little phrase that they would put up on the radio as they were broadcasting it. And sometimes, the phrase would mean something, and sometimes the phrase wouldn't mean anything. The whole idea was to confuse the enemy during the war. That way, the socialists in Germany didn't know what we were talking about. The Socialist Party, the Nazis, and that that's true to the Japanese and what was happening there with their socialist Empire. We wanted to get messages through, but how do you do that in a time of war when people are listening? Well, that's one of the proper ways to do it. Today, in this day and age, things a little bit different. It turns out that China, Iran, and Vietnam are three of the country's This is according to the BBC, that has tried to block access to the BBC. Now the BBC is biased, but you know, they overall have some pretty darn good news. And I get my news from several different places because I want to hear all sides. So I listened to the BBC. I listened to the CBC, I listen to PBS. I listen to Fox, I listen to NBC, I listen to all of these different ones in podcast format. Well, that's easy enough to do right now in the United States but in many places around the world, there is serious censorship. I've mentioned the Great Firewall of China before. And that is total censorship where they can pretty much ban anything at least that's their idea behind this. So what the BBC has done is they have launched our new website that looks identical to their existing normal website out on the dark web. You know, if you attend a masterclass where we were talking about VPN, and we're talking about mobile security. I talked about what the onion network is. And it is essentially a hidden network that sits on top of the normal internet. And it was established by the United States. It's still maintained by the United States. And it's for dissidents, to be able to communicate with our State Department. That's kind of what it was set up, for now, would use for almost everything. It's the dark web. We just talked about it in my show, where we're saying the dark web was also being used by the bad guys to sell these hacking tools. They use it to sell our identities to do trades with each other. Right? The dark web, though, isn't all bad. It was, as I said, designed to be good and to be very helpful. In fact, it still is. So the BBC set up a new version of their website on the dark web. And you can look it up on the BBC website to find out more if you'd like. And you can also find it on my website at Craig Peterson calm. What's the only way to get at it is for most people is to use the Tor browser to our browser. And the lot of detail I went into for like half an hour about the Tor Browser in the master class. But users of the Tor browser can visit a special URL. It's BBC News v to VJTPSUI dot onion. Now you're not going to remember that I'm sure which is why I told you to go to the BBC calm or go to Craig Peterson and you'll find it there. But it is a different type of URL than you're used to his net. And if you click on that address, it won't work. If you're using a regular browser, but if you're using a browser that's on the onion network that knows how to use it, like the Tor Browser, which is the ultimate and privacy, it can get to the BBC website. So the countries that are blocking it that I named a little bit earlier, including China, Iran, Vietnam, we know North Korea is and some others to people in those countries that have internet access, can use this browser even if they have some blocks, firewalls, etc, in place to stop people from getting out. So I think that's pretty darn cool and smarter. The BBC, they're saying is going to include foreign language services such as BBC Arabic, BBC, Persian, and BBC Russian. But UK only content like usual only be available within the UK due to broadcast right. So check out the TOR if you haven't already. T-O-R There is TOR clients for all major operating systems, including your desktop computers and mobile devices. And it attempts to hide a person's location and where they're going. It's not 100% effective, but it's pretty darn close. And that uses these exit nodes that are really all over the world. So it looks like you're coming from the United States or India, etc, etc. So check it out online and kudos to the BBC, for doing just that. I'm going to talk right now about Tick Tock with you guys. Because social media is really important to our kids, our grandkids, it's become important to society. It's one of the most effective ways to do advertising nowadays. Social media, it's where it's at. And there are these people on social media that have huge followings. haven't done anything, right? Like the Kardashians, right? They're famous for being famous. And they use the money from the OJ Simpson trial to really get that thing going because the or the old man had was a popular attorney and he charged a lot and she, his wife was able to manipulate it and do some amazing things with it just absolutely amazing. Well, one of the apps that our kids are using this become very, very popular is called Tick tock, ti KT, okay. If you have kids or grandkids or maybe you're using it, you need to need to have a talk with them and help them understand. Because Tick Tock is owned by a company called ByteDance. That is based in Beijing. And what many people forget is that China is a socialist country and it is socialist it is gone down the communist road. And any company that's based in China, you know, the Chinese government doesn't necessarily run the company, but they heavily regulate the country, which is why you compare the United States to, for instance, the Nordic countries, United States is very socialist. The Nordic countries are actually much more capitalist. But they have the money to put in these safety nets that we don't because of the socialist control anyways, blah, blah, right. So Tick Tock is owned by a company based in Beijing, China, which means there are surveillance systems in place. And the concern that's been expressed in the reason why people need not states are calling for Tick Tock to be banned in the US and they're calling immediately for people to delete it from their phone. is we just don't know how much of our data is being shared with the communist government over there. So let's look at the response and that one to think back. Right. President Nixon, I want to make one thing perfectly clear. Right. Let me make this perfectly clear. I did not have with Miss Lewinsky. When we get back, we're going to finish this. I'm going to read what the statement is that came out of China. You're listening to Craig Peterson are right here on WGAN. Online, Craig Peterson. com, of course, online kind of everywhere on all of the podcast platforms on YouTube on Facebook. And you can just go to my homepage, Craig Peterson, calm or keep listening to me here. We'll be right back. Hey, welcome back, everybody, Craig Peterson here. WGAN online, Craig Peterson calm. And I am videotaping everything today. So you can watch me online that Craig peterson.com slash for YouTube. And we're changing the podcast formats up a little bit as well, trying to put the concepts together and just single podcasts as opposed to how I do things here on the radio show where I might go from one segment to the next segment, and make this just a little more friendly for the general online consumption. Now, before the break, I mentioned that I want you to keep something in mind. Remember President Nixon Nixon, and this is quoted all of the time I want to make one thing perfectly clear. And remember President Trump, let me make this clear. I did not Have with that woman misc Alinsky. Let's read the statement that came out from the company that makes this. Let me be very very clear. Sound familiar? Tik Tok does not remove content based on sensitivities related to China. We have never been asked by the Chinese government to remove any content, and we would not do so if asked. We are not influenced by any foreign government, including the Chinese government Tick Tock does not operate in China, nor do we have any intention of doing so in the future. So it makes me wonder when I hear let me make one thing clear. Are they lying? Right? It's like I always tell my kids because I know they're not trying to be deceitful, right, but if someone starts to sent insane Well, to be honest, You have to wonder where they been dishonest with you before, and now they're honest. Have you had that happen? I know I caught myself saying that I got into the habit of saying Well, to be honest, even though I had been correct the whole time, and I realized, wait a minute now, I'm painting a picture of me having been dishonest before this. So when were you telling the truth after you said let me make this clear or before? So the pushback from Tick Tock comes after US senators Tom Cotton and Chuck Schumer requested intelligence officials assess the national security risks posed by Tick Tock as well as other Chinese content platforms. Hundred 10 million downloads in the US alone. It's a potential counterintelligence tool that we can't ignore. That was in the statement that came out. Facebook boss Mark Zuckerberg, Whose firm competes with Tik Tok, particularly in the youth market, has also recently attacked the platform. Oversensitive. Concerned, remember that Coburg makes a competing product. Another US Senator Marco Rubio previously asked us national security panel to review their acquisitions of musically as well that happened this year. Concerns about censoring concerns also, about whether or not these guys are honest with everybody. So there you go. There's Tik Tok. I've got two more articles. Let's see if we can get through them here in the last segment. One is about the Pentagon. Many people have been looking at stuff saying Oh, man, I'm just moving to the cloud because then I don't have to worry about security anymore or configuration or updating computers. Remember, the cloud is just another word for someone else's computer. Your legal responsibility These to protect your data do not disappear when you move that data to the cloud. And you are frequently much more exposed once you're in the cloud than if you kept it on your machines. So what's happened here now is the Department of Defense is looking at their budgets saying, Hey, listen, if we move everything to the cloud, it's going to be cheaper for us. Now the Pentagon realizes it's not necessarily going to be more secure. And, in this day and age, most cloud services are far less reliable because of Miss configurations that humans have made on them, so I don't think the Pentagon is looking at as this as a way to make things more secure. Like so many small businesses do unknowingly and end up out of business because of it. But the Pentagon is looking to save money, and The winner that everyone was expecting from this was Amazon. And then President Trump came into power and said, Hey, wait a minute now. My administration has been looking at this bidding process for this project and says it doesn't look like this was fair. It's called the Jedi contract. By the way, JEDI. It doesn't look like this was appropriate. So let's have another examination at it. And Amazon came out with a statement awarding it to Microsoft. Amazon said that a detailed assessment purely on the competitive offerings wo

united states god tv new york amazon netflix live texas tiktok halloween president google donald trump china social technology online mexico germany sound west friend digital russia chinese european government russian japanese microsoft new jersey united kingdom barack obama network brazil congress bbc fbi security defense ladies iran nbc empire nazis vietnam military republicans soundcloud android democrats iraq cloud caribbean concerns calm cuba mobile mac computers cia venezuela ios xbox windows contract tracking south korea privacy twenty syria cryptocurrency opera pbs mark zuckerberg walking dead cold war beijing kardashians jedi north korea south africans hillary clinton presidents pentagon regulation peterson home office lie currency allies sms cio concerned cisco syrian shrek cbc oj simpson tick safari bluetooth ville usb soho passwords tor state department persian nsa nordic banning libya duo ussr vpn computing hundred brandt keyboard operations managers browsers kt firefox ccc checkpoint chuck schumer imac tech talk google chrome tik mozilla bytedance encryption tick tock attackers carrington microsoft office internet explorer winding lastpass ssl memorize eff tok wgn ub tom cotton browsing otp moebius bx silver fox ogres pw everything everything socialist party greg peterson great firewall yubikey coburg right well right it business edition next saturday gcm alinsky soviet empire tor browser password management infragard okay so keylogger zogby apple imac bbc arabic microsoft internet explorer craig peterson okay it keyloggers keylogging tracking protection wgan right we've
Mashable Tech – Spoken Edition
How to check for keyloggers on your computer

Mashable Tech – Spoken Edition

Play Episode Listen Later Sep 5, 2019 6:32


Technology is the making, modification, usage, and knowledge of tools, machines, techniques, crafts, systems, methods of organization, in order to solve a problem. A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you can't read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com

technology computers spokenlayer keyloggers spokenedition
Craig Peterson's Tech Talk
Cybercriminals Using Social Media to Attack Businesses, Kids Mental Health and Social Media Usage, and Unified Cryptocurrencies.and more on Mornings with Ken and Matt On WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Jul 24, 2019 16:19


Craig is in the WGAN Morning News with Ken and Matt. This morning we talked about cybercriminals using social media to attack businesses, kids mental health and social media usage, and unified cryptocurrencies. These and more tech tips, news, and updates visit - CraigPoeterson.com --- Related Articles: The Fertile Garden of Social Media is ripe for attracting Cybercriminals to your Business How DMVs Make Millions – Selling Your License Information Big Tech Banks, U.S. says Not So Fast When Governments Demonetize by Force How Cold? Researchers Predict Large Decrease in Sunspot Activity Increases in Teen Depression — Check their Social Media --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 07/24/2019 Cybercriminals using social media to attack businesses, kids mental health and social media usage, and unified cryptocurrencies. ---  Craig Peterson Good morning, everybody, Craig Peterson here. I hope you're doing well today and are enjoying listening no matter whether you're on that gym treadmill, or one of those exercise bikes, walking, or even in the car. Hey, I'd love to hear how you consume my podcast, you can email me at Craig Peterson dot com. I know a lot of people binge-listen on the weekend while they're out doing their chores on Saturday, etc. Hello to everybody out there. This morning, I was on with Ken and Matt, and little inside baseball for everybody with an announcement about a new radio show starting up here in Maine in a couple of weeks, it's going to be on the same stations as Ken and Matt. So that's cool because I'll now be covering just tons of New England when I add it in. That'll be a two-hour show on Saturday. And I'm thinking about podcasting that as well. I don't know what you guys think about that because there's so much stuff I want to share. Is it better on the podcasts or YouTube? Let me know. I will be kind of a simulcast is maybe the best way to put it as I don't have enough hours in the day to take care of my customers and do all of this as well. But do let me know. Hey, this last week I picked up a new client. So a shout out to Rich and Sue, if you guys are listening. I love going in and helping these businesses. But again, here's somebody that wasn't sure about the state of their security but they did have inklings that something might not be quite right. They had an outsourced firm that was supposed to be taking care of their systems. But there were some issues, right? People usually know when something's not quite right. We went and had a look. We started with a detailed cyber health assessment and produced a 530-page report. Now the systems are getting all cleaned up, and that's a very, good thing. If you would are interested in finding out if your security is up to par, get cyber health assessment done for your business. Just contact me if it is something you would like to have done. We will install some software, on one of your machines and then do a poke around and check the security of that machine. Let us know be glad to help, me at Craig Peterson dot com. Think of this like going to the doctor, right? You think something is not quite right, so you see a doctor. The doctor wants to run some tests, and then they can tell you what's going on. Sometimes they need some more extensive tests, maybe a CAT scan or an MRI. Well, that's what we do when it comes to computers and networks. An excellent place to start is with an assessment. We're not charging for this basic look into one machine, but it can reveal quite a bit but not as much as a Whole Network Scan ( similar to CAT Scan or MRI) which we also offer. Let us know if you need a little diagnosis. Just email me at Craig Peterson dot com. I'll be glad to do a cyber health assessment for you. Let's get into today's appearance with Ken and Matt. Here we go. Matt Gagnon He's back, ladies and gentlemen, Craig Peterson. Great American joins the program every Wednesday at this time. Ken Altschuler You know he's not like the Americans or that cute Russian spy Matt Gagnon I don't know that, but I'm assuming as much for this segment. Craig, how are you this morning? Craig Peterson I'm doing well. You know that I'm not one of the Americans because that show is off the air now. Ken Altschuler True. Yeah. Matt Gagnon Although the actor who was the the the guy spy will appear in that new Mr. Rogers movie, A Beautiful Day in the Neighborhood, where he'll turn up alongside Tom Hanks as a jaded magazine writer assigned to profile Mr. Rogers. I believe he is living with or married to Keri Russell. I think they're married. Ken Altschuler I think they are too. I didn't. But it wasn't like that. And don't tell me because I haven't seen the rest of it. Matt Gagnon She's got a new show coming out. I forget which one it was. Ken Altschuler Keri Russell is in a movie? Isn't she going to be in Star Wars? Craig Peterson With six seasons of the American's, you realize it was the end of an era. It was an excellent performance. However, I must say I was so disappointed with the ending of it. By the way. Don't Ken Altschuler Don't Tell me, Don't tell me. I haven't seen it. Don't tell me. Craig Peterson It was just kind of a letdown. It's the ending you get when you think the show is canceled, at the last minute sort of a thing. Okay, guys, you have to wrap it all up. Matt Gagnon You know, you know, within minutes when Eric and I were talking about the best last shows, it's in the ratings of the top 10 best endings of TV shows. Did you know that? The American's? Yes, it is. Craig Peterson Yeah, I was disappointed. It frankly was expected. I was disappointed. You know, oh, wow. What are you going to do? Matt Gagnon What are we going to do about social media attacks by cybercriminals on businesses, Mr. Peterson? Craig Peterson It is a very, big deal. I did a webinar for the FBI InfraGard program talking about this specifically. We've got a huge problem out there. And this problem is reaching into our businesses. I don't know if you saw right now, but there is another warning out. Did you see this about China? And hacking? Yeah. Last week we were brought into a company to scan their network just last week, that small business here locally. Hey, we don't have any secret stuff. Why would they care? Right. Sure enough, there were keyloggers on their CFOs machine. Keyloggers, which means that someone from the outside was keeping track of everything typed. It means they got passwords. Additionally, we found a password cracker on the machine. It cracked all the passwords on their network on all of their devices. We've got an enormous problem, everybody. Here's is how Social media is playing into what is going on right now. We're still putting things up on social media, and we're even saying stuff on social media that lead the hackers to come after us. You know, we sit around and say why would anybody care about me, as I said, like this, I hear this all the time. I don't have anything top secret. Why would they care? Well, remember, this is an industry in Eastern Europe. It is an industry in Russia. It is the government in North Korea and China. So huge, huge industry, we're talking now 10s of billions of dollars, the last estimate from the FBI that I saw was over $12 billion. It is a vast industry. When we're putting things up on social media, you know, I'm not just talking about Facebook, or you know, the basic ones. I'm talking about LinkedIn, and I'm talking about putting it up on your website. I'm talking about right now this summer, right? The last couple of weeks of August, we're going to take some vacation. We are putting things out there on all these sites saying, Hey, we're going to go on vacation. Yeah, we're taking the kids are going here going there. We link into other people in the organization, making it easy for the bad guys to find all of this stuff about us. That's what I'm talking about right now. And that's what China is using right now. It is also what Iran is starting to use. Iran is using a blunt instrument by probing networks and sending out some of the nasty software that's been available for a long time. But this type of phishing. Spearphishing or direct attacks, it's happening every day. We've got to be careful everybody about what we put up online. And frankly, if you want to keep up with your family. For instance, we all have iPhones, which I'm sure it comes as no surprise to Matt. But with the iPhones, you've got Imessage, which is encrypted end to end. We use this app to share family pictures, and we use that to share vacation information. You can use an email and make a private little email list that you use to send stuff back and forth. Because at least email unless they hack your email account. With an email, it is not out being posted on the public billboard in the town square for everybody to see. Matt Gagnon Excuse me we are talking to Craig Peterson is our tech guru he joins us now as he always does on Wednesdays to go over what's happening in the world of technology. Craig, my son, just went to a baseball camp down in Cape Cod. I still haven't given him a phone yet. I set him up and use a Facebook account, which he never really uses. But I let him use it for this thing. He was sending me messages back and forth while he was there. I guess my point to this little quick mini-story is that he's now using social media, should I be worried that he's now going to end up depressed and suicidal, now? In this social media universe? Should I take it all back? Craig Peterson You know, what I did with my granddaughter, who was living with us for many years, is when it was kind of time that she was going to be out at an event. They have these little watches that you can give a kid, and it's highly controlled and allows you to track the kid, and they can send messages they can call a half a dozen members that you preset, so she can call mom or dad or whomever they might need to reach out to, but it doesn't have social media. That's what we did to solve that problem. Check with your phone vendors see what they have. Now, your question is more specific here. And that is about letting kids onto social media. And there was a study that just came out of Montreal. And they studied 3800 kids from 2012 to 2018. Teens. These adolescents were in grade seven to 11 in 31 different Montreal schools. What the team found was, there was an increase in depressive symptoms when the adolescents were on social media. It wasn't just depression when they were active on social media and watching TV. They had increased symptoms of depression, on platforms like Instagram, where teens are more likely to compare their lives with others. Of course, Instagram is way more popular than Facebook is right now. These social media sites are kind of like echo chambers. They are a reinforcing spiral. It is there's a great article I have up on my website from the CBC talking about this. Because they're so reinforcing, and because of the downward spiral, frankly, it's particularly toxic. They found this was true for kids, of the ones that they studied. So basically, middle school to high school-age kids. They are there have been other studies that showed the same thing in adults. However, the thing is that surprised me, and I think it's going to surprise to both you guys they found that okay, TV was kind of showing symptoms of depression and the kids. However, video games did not contribute to depressive symptoms. It is kind of interesting, because, you know, we've seen studies before, I'm sure you guys have heard about them, where video games are shown to be a problem, and the kids get depressed, etc. That those playing video games are loners, etc. Nowadays, and Matt, this is probably true of your video games, they are not socially isolated, but connect with to other kids interactively. Today these video games are interactive. And you're on there playing against other players where whether it's one of these Super Mario Kart type things or one of these military time games, man, you're playing with other people nowadays. So the study found that video games did not contribute to depression. Ken Altschuler As you know, our tech guru, is Craig Peterson joins us at 738? Will, I be banking at Facebook or Google? Is it possible that I will have a Facebook checkbook or go to them for a loan? Is that going to happen? Craig Peterson Yeah, you're talking about the future here. Of course, we've had some problems. Look at Hong Kong, now with their octopus card where they track everything. In China, they use WeChat, which is their social media. It's fascinating to look at and delve into it. Now we've got Facebook saying, Hey, we're partnering with some credit card companies, and we're going to release our virtual currency our cryptocurrency, then, of course, this is one of President Trump's famous tweets last week, where he said if Facebook wants to do that they should become a bank. I am concerned about it. First of all, I mentioned this when I was talking to you guys before. I love the idea of a universal cryptocurrency. That's what Facebook's new cryptocurrency would become, instantly, 2 billion people worldwide, would be able to engage in commerce. That's the ultimate in capitalism, right. Capitalism is this is the only form of government that is not only just democratized but has brought prosperity to countries and the world. It's a fantastic thing. Now if you have people in the deepest, darkest corners of some country, who can go online, and sell their services, sell their products trade, even within their local community that they couldn't do before. It is phenomenal. The other side, and what I'm starting to get a little more worried about. It boils down to trust. Do you trust Mark Zuckerberg? I don't. Okay. I don't trust him, nor should you. Yeah, yeah, yeah. And I don't think he can be trusted to keep it secret. I don't trust him doing this at all. Cryptocurrencies aren't that stable yet. I don't trust the government, ultimately. It's like what's happening in Hong Kong right now. Thank goodness, they still have some cash. These protesters are going to these protests are using in cash, as opposed to using cryptocurrencies issued by the government that they track. It is a concern. Can I agree with you? I agree with Matt to we can't t trust Facebook is the bottom line. I don't know where cryptocurrencies are going to go. However, only a big one like this is capable of being solidly backed. Some other cryptocurrencies can do backed by gold, but only to a degree. We'll see what happens here we'll see of Libra, which is the main one that Facebook is proposing, actually comes to be next year. Ken Altshuler All right. Craig Peterson is our tech guru. He joins us at this time every single week, and today is no exception to that, Craig, as always, thank you so much. And we will talk to you again next week. Craig Peterson Gentlemen, take care. Bye. Bye. Thanks a lot. Matt Gagnon All right. We're gonna take a quick break here. When we come back on the land. Craig Peterson Of course, we are working about that today and tomorrow working on finalizing everything for my security summer summit. Keep an eye on your email. If you're not on my email list yet, by all means, go to Craig Peterson calm, you'll see it come up at the top of the screen. Alright, everybody, take care. We'll be back this weekend with more. Take care. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
Driving A Tesla Increases CO2 Emissions - Sen Hassan Aid Stole Gigabytes Of Data and more Today on TTWCP Radio Show

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 26, 2019 28:13


What is a green car?  It might surprise you. So be sure to listen in today. Today I will unpack the problems with our new junior Senator Maggie Hassan. Yea, she hired someone who stole gigabytes of high-value data. What do you think of Facial recognition?  Well, I will discuss some of the problems with the FBI facial recognition program. WiFi? Is it bad for your health? I will talk about what a new study out of the Czech Republic found.   If you think that by going to the cloud, your business is going to be safe, you have another thing coming to you. I will explain why in today's show. Amazon? Wow, I can't believe they're doing this with books. If you have not heard about this, listen in. There are a number of mental health apps available for your tablets and smartphones. Do you know what data they share?  It may surprise you. For all this and more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment; it might contain errors. Airing date: 04/27/2019 Driving A Tesla Increases CO2 Emissions - Sen Hassan Aid Stole Gigabytes Of Data Craig Peterson 0:03  Hi everybody. Craig Peterson here. We're about to get started with another one of our Saturday shows heard every Saturday morning here on these iHeart Radio broadcast channels. Yes, terrestrial radio. And I also have it out online. You can find it all at http://Craig Peterson.com. Well, today we are going to be covering a couple of articles that I think might be a bit of a surprise to you. One of them has to do with green cars. Now, if you've known me for a long time, you know that green cars aren't green. But but there's a study out we're going to talk about that yet another study, remember the one that said that the Hummer H2 was actually, no it was the H1 was actually greener than the Toyota Prius, while the new study up right here in New Hampshire, that's where I'm located Senator Hassan, her aid, stole gigabytes of high-value data. So we'll talk about that. And what happens when a business or in this case a government agency, has one of their employees go rogue? The FBI facial recognition program is under fire. WiFi? Is it bad for your health? A new study out and a very interesting article from the Czech Republic on that. If you think that by going to the cloud, your business is going to be safe. You have another thing coming to you. New research out on that. Amazon? Wow, I can't believe they're doing this with books. You might have heard about this with 1984 that George Orwell book a little while ago. Well, there's a whole lot here we're going to talk about. And mental health apps, and what data are they actually sharing. So here we go with all of our news that's fit for today. Craig 2:02 So first up today, let's talk about driving your Tesla. Now they are cool. And I had a really interesting discussion with one of my daughters. She lives in Norway right now. She's running a huge project, autonomous ships for Kongsberg, which is just a huge shipping company. They well they make the controls and stuff for shipping. They just bought Rolls Royce marine here a few months back. And I was talking to her about Teslas because electric cars get a special subsidy in Norway. Now, here in the US, Tesla has already reached the 200,000 car mark. And the idea behind this was that they would provide, the federal government would provide extra money to help subsidize the purchase of electric cars, not just Teslas. But once they hit the 200,000 car mark, that subsidy would go away. And some of the Democrats in Congress are pretty busy right now trying to figure out how can they re-establish that deal, get that deal going again. And they may end up doing that. Well in Norway, they have similar things where the government is subsidizing electric vehicles, and to a very large point, because in Norway, right away, you don't have to pay the sales tax, which is 25% sales tax. Imagine that. And then it's a VAT, too. So it's not just the sales tax when you buy it, but there's sales tax every time a product changes hands, from manufacturing parts through distribution through the final retailer, and then you. So things are just crazy expensive there. And they have a great free market economy. Don't get me wrong, they are not a socialist country. None of the Scandinavian countries are socialist, but they are very heavily taxed and they do have a lot of government programs. So they were talking about getting rid of this subsidy, effectively a subsidy for electric cars, Tesla stock went down. And there's a lot of reasons it goes up and down, right? Well, here in the US what's the reason everybody seems to be giving for an electric car. Why do they want these electric vehicles? What's the big deal? Why does it matter? Well, here in the US, they're telling us this story that while it's more green, there's less carbon that goes into the atmosphere. And it's just it's a wonderful thing. And every Friday night, we get together all of us electric car owners, and we lock arms and we sing Kumbaya, right? And it's all because it's green. They're just wonderful vehicles. And you know that there's obviously some miss truths to that, let me put it that way. And in fact, there are there, it's just not true. And that's what the studies showing. In Norway, they're much more saying about this. And Norway, they're saying, hey, yeah, that these electric cars are not more green. But what we're trying to do is prevent the pollution in our environment, in our environment here in Norway. So we don't want these cars to, to be emitting all of this nastiness and trucks and things. We just want electric vehicles, we don't care that they're made in China and Japan, and that shipped all over, we don't care about the pollution they're causing worldwide and the fact that the recycling this stuff. It's just it's hazardous, right. But what we care about is we have clean air. Now, that to me, is a legitimate argument. I think there are legitimate arguments might be its cool technology. And the other argument might well be that you know, the air here tends to be a little bit cleaner. Now, of course, they're dumping all of the crap that there, their byproducts making these batteries in these cars. They're dumping them in the ocean in China and into the air and eventually gets here, all of this plastic in the ocean that's coming from these third world countries and communist countries that just don't care about it. Right. So this article is absolutely fascinating. And it's saying that driving a Tesla results in more CO2 than our Mercedes diesel does. So think about that for a minute. Diesel's have gotten a really bad name lately, because of some cheating that was done on an emissions test. Now, I put that cheating in air quotes, you saw that, right? If you're watching this http://CraigPeterson.com/YouTube. You saw me do that? Well, the reason I do that is the diesel's are it's a different type of emission. And when the engine is cold, they run different currently, then when the engine is warm, or when it's hot. And some of these tests that were being done by our EPA and the European Union, don't really give the diesel vehicles credit. And you know, Europe, if you've been there, if you've rented a car, even if you were driven around, you notice most of the cars were diesel, because, in fact, a lot of the gases that are emitted by the vehicles, it's better if it's diesel, it washes down more quickly out of the atmosphere. But they're worried about the nitrous oxide and some other things that can cause problems for some people. So you know, hey, I get that. So hydrogen methane technology that is being used right now in the new diesel's has made a huge, huge difference. So if you look at this a little bit closer here, I'm going to pull this article right up on the desk area go see now you can see it on YouTube on http://CraigPeterson.com/YouTube. Craig 8:02 It's touted as a zero-emission vehicle. Now we're talking about the Tesla Model 3, but in actuality, it creates more carbon dioxide dumped more into the air than a comparable diesel-powered car. And it's I love this article, when the CO2 emissions from the battery productions included, electric cars like Teslas are, in the best case slightly higher. We're talking about CO2 emissions here, in the best case, Teslas have slightly higher emissions of CO2 then a diesel engine, and our otherwise much higher and this is from a German Think Tank. And it's just absolutely fascinating here Daily Caller article that we're quoting from, and I love this picture they have of the Model 3 in the car show here in Toronto. So they looked electric car production in Germany, it's heavily reliant on coal power, we're in the US, of course, we burn coal, we burn wood, we have things that the left really hates, like, heaven forbid, we have nuclear power, which is course, frankly, the cleanest of all. And if the Nuclear Regulatory Commission, we get off of their hands, and use some of this new nuclear technology that was invented here, 30 years ago, we would be in incredible shape, there'd be almost no nuclear waste at all, because we can re-burn it and certain types of reactors and things but people just got completely scared about it. California is requiring automakers to cut greenhouse gas emissions in cars, producing lower emission vehicles buying credits, which is making people like Al Gore very rich right? At the federal level, the US government's giving you a $7500 per electric vehicle tax break. It's it just goes on and on. A study here from the University of Cologne, talking about what they found in responsible energy, which forgets it, right, and who wants responsible energy policies, it's just not out there right now. But a study released to 2018 also found that driving electric cars might come with higher emissions of diesel vehicles, largely because of the lithium-ion production. For those that are unaware. This lithium most of its harvested in Quebec, NASA uses the area for miles, hundreds of square miles around the lithium battery mine, if you will. NASA uses it for testing lunar landings because there is no life at all. And then that is shipped off over to China for pre-processing and shipped to Japan, to turn it into a type of foam, is shipped back to China to finalize the battery components, shipped back to the US to be installed in the Tesla. Think about all of the carbon dioxides from that. A Manhattan Institute study from Tony teen found that putting more electric cars on the road would likely increase emissions compared to internal combustion engine vehicles. Now, you know that I have a libertarian band. So part of my dislike of this whole thing is that you know, come on people bottom line. Why should the government be the one that's deciding that's what the next best technology is going to be? Does that make any sense to you really doesn't make any sense that the government should be deciding, hey, listen, we're going to bet your tax money on electric vehicles rather than hydrogen fuel cells or some of these other technologies that might win. Again, let the private sector decide. And this is yet another area that our government has become socialist with a government trying to control the means production, the types of production, trying to incentivize it, etc, etc, right? Stuff that I obviously just don't agree with. But I guess you guys already know that. Right? Okay. Craig 12:12 So next up, let's see if I can make this work here for YouTube. That's http://CraigPeterson.com/YouTube, I think it was this key combination. That didn't work. Yeah, I'm doing something wrong. So what I'm going to do is this, because I'm pretty sure that will work. Yes, there you go. Okay, so now you can see the article. This is from the Daily Caller, this is former senator has a son from New Hampshire, you know who she is what her one of her former aides now is in very, very much trouble. Now we know the Democrats have been, I'm going to say it, I'm going to say it out. Because this is true. They have been stupid when it comes to their IT people, they have not hired, in most cases, the people they should have hired, and we got a listener out there. So hat tip to Guy if you're listening, who have decided that because I keep talking about these problems with security, that he's going to take up a career in security. So he signed up for this six-month course, kind of getting started in cybersecurity. Once he's done with that, it'll take a year or so of him having real-life experience in it, and then he'll be really quite good. But man alive here, they missed all kinds of red flags about what this guy was doing. But here's the bottom line. This is a plea agreement that he did sign apparently extraordinary, extensive data theft scheme is what it was called. He installed keylogging devices that picked up every keystroke on these machines. So a keylogger, in case you're not aware, if you're using a keyboard, with a USB cable, and then that USB cable plugs into the back of your computer, as someone can insert on the back of that computer, one of these keyloggers and the way this keylogger ends up working is that you're typing your keys, and they're all being intercepted by this little USB device. So you might want to right away, especially if you are democrat senator, apparently, you might want to right away go and check the back of your computer and see if there if your keyboard is plugged in directly. Now, you know, if you watch for a while I use Macs, right? So here's an example of the mouse I use. And on the Mac, it's Bluetooth wireless, but it also has available here, a USB port, right? It's actually one of Apple's proprietary port. And I have the also the keyboard here. This is what I'm using on my iMac, in fact, to control the video that we're creating for YouTube on that iMac. So that's what that's all about right there. Okay, and that was really nice. It's really handy. But what Apple does is everything is super-encrypted. In fact, in order for me to configure this trackpad to my Mac, I have to plug it in via cable. It does some handshaking it automatically configured the iMac for this trackpad or this keyboard. Same things true for laptops of using external devices. So Apple has gone the extra extra mile. Craig 15:39 If you're using a regular Bluetooth keyboard like here's my other computer here. This is a standard older Mac, keyboard, and mouse I have it in the mount. So it's all together. But this uses regular Bluetooth and regular Bluetooth has encryption as well. So typically, generally speaking, your Bluetooth is going to be safer than using a wired keyboard or wired mouse because you can install these keyloggers right so that's kind of what I was getting at here. Craig 16:16  So back to our friend here at senator Hassan's office. What she did is or he did I should say is he installed these keyloggers so they usually have to come back to get back keylogger in order to read it. But remember, if you're typing on your computer, what are you typing? Oh, a username and a password. And usually, those are pretty well identifiable pretty easily identifiable. So apparently, Jackson Cosko worked with an unnamed accomplice and other Hassan employee who reportedly lent him a key that he used to enter the office at night and who allegedly tried to destroy evidence for him after the fact. So Cosko accepted responsibility for the events revealed by federal prosecutors in court last Friday. Apparently was doing it from July and October. But he really did a lot more than that. It kind of goes on here in this article from the Daily Caller, he sneaked into her office, reportedly multiple times at night gathered dozens of gigabytes of data, including usernames and passwords belonging to Senate employees, okay, like really come on guys. Tens of thousands of emails, internal documents, credit card information blog, the Senate employee social security numbers, blah, blah, blah. So be careful out there. These IT people are not what they appear to be in many cases. And of course, the huge thing with the Democrats. And I couldn't believe how they responded when it was disclosed that Wasserman Schultz's IT people had had just committed me incredible crimes all the way across the board. And she was throwing the tantrum or when they tried to investigate. In fact, I don't think the FBI ever got to fully investigate this thing. Craig 18:10  So anyhow, keep an eye on your IT people. Make sure you know who they are. Make sure they're of good character. It's easy enough to do basic background check nowadays, you can get them done for 20, 30 bucks online, just check in public record and make sure they look okay. Okay. And it's difficult. I get it. It's difficult to hire the right person. because, frankly, how do you know who the right person is? What do you know about IT? What do you know about security, it's difficult, you got to find somebody that's been in a long time. Craig 18:43  Alright, so next up, let's talk about this FBI problem here. This is from NextGov.com. I'll put it up on my screen here http://CraigPeterson.com/YouTube. Of course, you guys the audio guys listen to the podcast. And here on iHeart Radio as well. You guys are my primary audience. Okay. But if you want to see some of these articles, I put them up here on the screen. But this is huge. The FBI reportedly has ignored, for the most part, the GAO, the Government Accountability Offices concerned over its use of facial recognition technology, in criminal investigations, its new technology, its kinda neat. They can scan all kinds of public cameras and photos as well as records, the FBI has to try and find suspects and close cases. That part's fine. But apparently, what they've been doing is they're pulling from a database of more than 30 million mug shots and other photos. And while they're doing this, they're looking for matches, right? Doesn't that make sense? And they're trying to find the matches, they're trying to get the right people, but they get bad matches, they get mismatches with people who were nowhere in the area. Okay, I get that. You figure it out, right, and you take care of it. But apparently what they've been doing is they have been going after them and prosecuting and trying to get convictions. The auditors and the GAO recommended that the FBI tests the accuracy of these things at least once a year, make improvements, etc, that are very interesting. So if you're charged nowadays by the FBI or local prosecutor, what's the right thing to do? Because you weren't in the area. You didn't do it. Are they going to convict you on bad evidence now because they trust the computer so much? I don't know. Craig 20:49   Okay, so next up from the TechRepublic, we got an article about WiFi, how many people complain about WiFi saying it's bad for our health? Well, another study out and I've been saying this for a long time. And man that I feel bad one time I was keynoting at an annual event for it was for a bank. And I was their keynote speaker for their annual shareholder's meeting and talked about the future of technology. Where it's going? What's happening? And a lady came up to me and said, so what do you think about radiation from phones, from cell phones? And I said, well, you know, I've been an advanced class amateur radio operator for many, many decades. I have had a lot of radiation from these radios exposed to me, I've never had anything happen. And most of the studies that have been done about ham radio operators have said, hey, there's nothing definitive about a problem. So bottom line, you know, doesn't really matter. It's not a big deal, that you have this happening. And then she said, you know, you can see the tears welling up in her eyes. And she says, Well, I think it was her husband had been diagnosed with cancer. And they said that it was because he had the phone up to his head all the time using it at work. And that work should be paying for all this medical treatment and, and pain and suffering and stuff. And man made me feel really bad. But the truth is, there are no strong ties between these various types of radiation. And the biggest problem I think people have is a misunderstanding. We call it radiation. But this isn't x rays. This isn't, you know, the radiation you get from outer space, it is non-ionizing radiation. And radiation from a scientific definition is just energy moving through space, it's not a big deal. So these new WiFi devices that are going to be rolled out all over the country for 5G, they're going to be everywhere. And that's one of the reasons you can get such high data rates. They are everywhere. And so you're going to be close to them. Even mount them on our houses, on telephone poles are going to be just everywhere. But the RF signals, these radio frequency signals that are generated by WiFi, by Bluetooth, by your phones, in any device that's sold legally in the US is tested. And you know, I'm not one for trusting government testing necessarily, right. But in reality, the safety limits are just incredible. You know, you're talking about 500 milliwatts, and I have routinely been transmitting at 50 watts, which is a lot more power, and I haven't experienced any problems and, and 100 watts on some of the HF bands and even higher. So studies just, there was one of University of Barcelona, looking at RF exposure of children, ages 8 to 18 in Europe over three day period, WiFi represented 4% of total RF exposure. 62% of the RF exposure came from cellular base stations. 23% from broadcast TV and radio. And 10% from a nearby cell phone. So the exposure is approximate point .001% of that of the safety limits imposed by the European Commission, which is even tighter than here in the US. So back to this article, again, TechRepublican on http://CraigPeterson.com. You'll see it. WiFi is just not bad for your health. Craig 24:45 So we're going to whip through a couple more here pretty quickly because we only have a couple of minutes left. If you think that switching over to cloud services is going to make you safe. I'm afraid there's another thing coming for you. Because right now cloud services are the Wild West. And various cloud services have various amounts of safety with them, if you will, they have really kind of an abysmal record. You think about all of these huge data breaches that have happened on the cloud recently. And it's incredible, like 2 billion records found on the cloud from one of these cloud services providers just in the last couple of months. So just because you're using Office 365, or you're using some other type of cloud services, Salesforce.com, etc, does not mean it's safe. Now, I'm not saying that they aren't relatively safe, but there's a new study out. And this is from the global phish report from Avanan. And they looked at 55 million emails sent to Microsoft Office 365 and Google G Suite account. Those are the big guys. If you have an email for your business, you're probably either with Office 365, or Google G Suite. And they found roughly 1% of all messages or phishing threats that use malicious attachments or links. And of those, 25% that were marked safe by the Exchange Online protection built into Office 365. And delivered to us. So just a little word of warning there. Just because you're using the cloud service does not mean that your emails are safe. Craig 26:31 I've got to bring this one up too. Amazon, they are burning books. And I don't know what to do about this. You know, remember Jeff Bezos said that he was going to be you know, open, they sell any books, he wanted the exchange of ideas, which is, of course, a very libertarian classic liberal way of doing things. But now apparently he is removing books from the store. We know already that he has removed books from people's iPads etc. So in February this year, they banned a number of books from white identitarian Jared Taylor, a book called The White Nationalist Manifesto by Greg Johnson. You may completely disagree with these guys. Right. But again, they need to have their voices out there as part of the public debate. They also banned, had bans on Holocaust revisionists books in 2017, a purge of all books by the controversial pickup blogger and author Daryush Valizadeh, I guess it is. Many others, many others. Amazon's refused, by the way, to take down a book defending pedophilia on first amendment grounds. They have not removed certain books that are up there that are anti-christian, even though there have been complaints about them. So they got to get their act together. Craig 27:57 And if you're using a mental health app, you can see it on my screen here http://CraigPeterson.com/YouTube, be careful out there because of the data they're sharing. Alright, have a great week. I am out of time. We will chat next week and of course during the week as well on my podcasts. http://CraigPeterson.com/iTunes. Take care, everybody. Bye-bye. ---  Related articles: Driving A Tesla Results In More CO2 Than A Mercedes Diesel Car, Study Finds Former NH Sen. Hassan Aide Stole Gigabytes Of ‘High Value’ Data Wi-Fi Is Not Actually Bad For Your Health, Scientists Say FBI’s Facial Recognition Programs Under Fire Over Privacy, Accuracy Concerns Using Cloud Email? Office 365? You’re Not Safe From Phishing Attacks Amazon Has Been On A Digital Book Burning Spree For Months That Mental Health App Might Share Your Data Without Telling You --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
SecurityThing - High Paying Cybercrime Jobs Available

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 7, 2019 6:59


It's time for another Security Thing with Craig Peterson. Today, Craig discusses about the cybercrime gangs advertising the high paying cybercrime jobs that are available out there. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles  Cybercrime Gangs Advertise Fresh Jobs, Hacking Services --- Below is a rush transcript of this segment, it might contain errors. Airing date: 02/07/2019 High Paying Cybercrime Jobs Available Craig Peterson 0:00 Hey, good morning everybody. Craig Peterson here with A Security Thing, hey, if you aren't into security and trying to understand it and trying to fight against the bad guys, you're in the wrong place. Because that's all this is about is security. And today we have another real quick one that I think is important for everybody to understand. I heard in the ad the other day from this company that we've all heard their ads before. The company's called Lifelock. And you know, I already have a special report out about how to protect your data and keep it safe and how Lifelock is you know, essentially a waste of money. You can freeze your credit and it doesn't have to cost you a dime and all Lifelock does this come in afterwards and maybe help you clean up right? So should you do it? Shouldn't you do it? I don't know. I've got a special report about it and I've got an explainer video that I produced about it as well. And you can get that if you want. But anyhow. What they said in that ad was that there is a job offer right now out on the dark web for $700,000 for a hacker. $700,000 a year, supposedly. So knowing how Lifelock some time to says, played a little fast and loose with things in the past, and in fact, got sued by the federal government and a whole whole big mass, I decided I would look it up a little bit. Now, the dark web is a little more difficult, right? It's not like there is Google for the dark web. Yeah, there's some search engine-ish things out there that you can use and you can do a little poking around. So I did but I also look for articles that made a similar claim because at least then you've got something to go on. And sometimes it's an echo chamber, right? Like what happened with this whole Russian investigation thing with President Trump, where it was a democratic investigation that was entirely politically motivated. And then the it was they told it to a friend who told to a friend who told to a friend, and all of a sudden now the FBI, it's got to come in from six different sources, the same basic story. And you know, from playing broken telephone as a kid that the story changes a little bit, right, every time it's passed along. And of course, some people purposely change it. So of course, the FBI is going to get a bunch of different stories from bunch of different people and say, Oh, well, maybe there's something here, maybe we should look into it. So I expected to find at least that online. The Lifelock this commercial, they were saying $700,000 a year for a cyber hacker to try and steal people's personality. So I figured someone had to mention it. It had to be in the regular press somewhere, right? So I go and look at some of the left wing sites like the New York Times, and then Huffington Post and don't find anything there. And I look at some of the conservative sites that are out there. I look at Google, I do a Yahoo search. I do a Bing search, don't find anything. Try a couple of dark web search engines as they are. Couldn't find anything. So once again, that leaves me kind of wondering is Lifelock pulling in another fast one on us and it might be. But here's what we did find, a website called http://banksecurityinfo.com and this is talking about cyber crime gangs advertising fresh jobs for hacking services, and it goes through and lists a bunch of payments that they'll have.Now the the jobs it's not like a job Hey, you know, we'll pay you so much they do have some of those. In fact, this one hacking group out there according to Bankinfosecurity is offering full time employees a monthly salary of 50,000 pounds, likely rising to 70,000 pounds. Now, aren't those interesting numbers out there? So if you take 50,000 pounds, that's about what 65,000 US, and you multiply that by 12, you get $780,000. Tadah! I think I found where Lifelock might have gotten some of this stuff. So it's interesting. This is called dark overlord. In case you're wondering, and you want to go apply for a job. But there are a lot of offers out there. For hacking a web server, they'll pay you 220 to as much as $3,000. Keyloggers, 170 bucks. Denial of service attacks, and those vary from 350 to 2500 bucks. Hacking a personal computer 280 to 3500. Cell phones, it's about 500 bucks. Email hacking again, about 750 bucks. Social media account hacking about 500 bucks. Of course that varies as well. Change school grades 1200 to 3700 bucks. Wow. It's gotten expensive. And a FUD ransomware and decryptor, depends. 12 months 900 bucks. Six months 490. 1 month, 120. So interesting, right? And they're looking for fully undetectable ransomware. So there's some decent money out there who knows about these jobs? If these are legitimate. Multi lingual candidates are desirable. It'll add 5% of your salary or commission for fluency per language. Chinese, Arabic and German being particularly desirable. And must have a winning attitude. It sounds like something you would normally post doesn't it? so I figured you know if you're interested in security you'd like to know a little bit about this. Digital Shadows found this job advertisement out online and the dark markets really do persist but I got a warn you. Of course you can get serious US prison time if you're caught doing any of this stuff and that's probably why they pay so well. So the bad guys are out there. They're trying to get us and no surprise there we got to defend ourselves. Anyways that's today's Security Thing and we will be back tomorrow with another one and of course on Saturday with my regular radio show. Taking Sunday off per usual while at least from doing podcasts and I hope you keep an eye out for all these master classes I'm doing. http;//CraigPeterson.com/subscribe. Alright, have a great day. Talk to you later. Bye bye. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Message Input: Message #techtalk Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Identifying a Phisher https://isc.sans.edu/forums/diary/Identifying+a+phisher/24164/ Phishing via Azure Blob Storage https://www.netskope.com/blog/phishing-in-the-public-cloud Zoho Domains Used for Phishing and Keyloggers https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/ Dell iDRAC Exploit https://www.servethehome.com/idracula-vulnerability-impacts-millions-of-legacy-dell-emc-servers/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Identifying a Phisher https://isc.sans.edu/forums/diary/Identifying+a+phisher/24164/ Phishing via Azure Blob Storage https://www.netskope.com/blog/phishing-in-the-public-cloud Zoho Domains Used for Phishing and Keyloggers https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/ Dell iDRAC Exploit https://www.servethehome.com/idracula-vulnerability-impacts-millions-of-legacy-dell-emc-servers/

Computer America
HybridBlockInterview, HP Keyloggers, Apple Shazam, Microsoft Quantum Guide

Computer America

Play Episode Listen Later Dec 11, 2017 58:00


First Segment: HybridBlock. Carson Knuth, VP of Operations HybridBlock is the world’s most innovative platform for leveraging the disruptive technologies emerging from the blockchain space.  It is an alternative for those who want to benefit from the explosive growth of cryptocurrencies without the high risk and complexity that accompanies digital asset trading.  HybridBlock is simply the most efficient and effective way to participate. https://www.youtube.com/embed/lWzO2FYAHTQ Second Segment: Computer and Technology News. Today's Topics Include: Unofficial Ether Wallet Hits Top 3 On iTunes HP Laptops Found With Keyloggers Facebook's Effects On Society Apple Confirms Acquisition Of Shazam And more! For full show notes, check out ComputerAmerica.com!

Betriebsrats-Arbeit leicht gemacht | Erfolgreiche Arbeit im Betriebsrat | Mitbestimmung, Aufgaben und Rechte des Betriebsrats

In dieser Folge geht es um "Big Brother und kein Problem damit?" Wie kann es sein, dass der Arbeitgeber Überwachungsmaßnahmen immer wieder durchbekommt?  In dieser Folge lernen Sie Nicht gerade eine Herzensangelegenheit: Der Datenschutz im Betrieb (Arbeitgeber- und Betriebsratserwartungen) (ab 01:14 Min) Der aktuelle Fall (Bundesarbeitsgericht): 2 AZR 681/16 (ab 02:50 Min) „Zweifelsfrei überführt“: Muss der Arbeitnehmer Beweise gegen sich gelten lassen – bei offener Überwachung? Bei heimlicher Überwachung? (ab 04:00 Min) BAG-Rechtsprechung im Lichte des kommenden EU-Datenschutzes: Die Überwachung „ins Blaue hinein“ (Verwendung eines Keyloggers) (ab 04:35 Min) Was erlaubt ist (und was nicht): Stichprobenartige Überwachung, anlassbezogene Überwachung, heimliche Überwachung, „zweckfreie“ Überwachung (ab 05:22 Min) Noch einmal: Zur Bedeutung der „Einwilligung“ in Überwachungsmaßnahmen – Gilt die Losung „unterschrieben ist unterschrieben“? (ab 05:40 Min) Fazit für Arbeitnehmer und Betriebsräte: Totalüberwachung ist (immer) unzulässig! (ab 06:40 Min) Was tun? „Hausaufgaben“ für Betriebsräte mit „Überwachungsallergie“ (ab 07:34 Min)

Reetin Podcast
Podcast 126: We Are Back

Reetin Podcast

Play Episode Listen Later Nov 20, 2017 78:30


In this episode of the podcast Reetin, Aroah, Parallax Abstraction, and Earl talk about Gamestop, Intel, AMD, Keyboards being Keyloggers, and Facebook Revenge Porn. There is also a discussion about the Framemeister which I am sure everyone loves to hear about. Gamestop Game Rental: https://techcrunch.com/2017/10/30/gamestop-is-launching-a-game-rental-subscription-called-powerpass/ Gamestop Stops Gmae Rental: https://www.engadget.com/2017/11/14/gamestop-halts-powerpass-unlimited-used-game-rental/ Intel and AMD Processor/GPU: https://www.engadget.com/2017/11/06/intel-core-h-8th-gen/ Keyboard Keylogger: https://www.techspot.com/news/71768-popular-budget-mechanical-keyboard-found-contain-hidden-keylogger.html Facebook Porn: https://www.techspot.com/news/71781-facebook-asks-users-send-their-nudes-can-stop.html Follow on Twitch: http://www.twitch.tv/reetin Follow on Twitter: https://www.twitter.com/reetin Buy Stuff From Green Man Gaming: https://t.co/fhL17TWpi4 Subscribe on Youtube: http://www.youtube.com/reetin Follow on Beam: https://beam.pro/Reetin https://play.google.com/music/m/I6jatgkdbr7mbmgkilzbwbo5li4?t=Reetin_Podcast https://itunes.apple.com/us/podcast/reetin-podcast/id991683896?mt=2 See omnystudio.com/listener for privacy information.

Vulgar Tech
016 : Keyloggers, Hackers, RansomWare, and a Bunch of Weird Tech News

Vulgar Tech

Play Episode Listen Later May 18, 2017 83:45


Oh, snap! A Big Hack! Yes, yes, of COURSE we talk in-depth about the huge multi-country, multi-target WannaCry / WannaCrypt / WannaCrypt0r hack. In fact, we even discuss motives, methods, history, and resolution of the hack by way of Mitcz over-explaining boring technical details of the code involved. But, like any good sandwich, the meat is in the middle where we talk about security, Artificial Intelligence, Apple, Amazon, our boyfriend Elon Musk, Netflix, and a whole lot more weird news in and around the tech world. Also, for the first time ever, this one features a “coming up next time on Vulgar Tech…” teaser. There’s just so much going on!

Blog - CyDefe
Minicast 9 The one about carbanak and keyloggers

Blog - CyDefe

Play Episode Listen Later Jan 30, 2017 36:37


On this episode we talk about the return of carbanak and an individual facing jail time for creating keyloggers.

minicast keyloggers carbanak
Chiens de garde
Les Chiens de garde #18 - 2016/09/15

Chiens de garde

Play Episode Listen Later Sep 14, 2016 32:43


Retour sur le keynote d'Apple, les IMSI catchers au UK et la censure d'Internet au Cachemire et au Kurdistan

The CyberWire
Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?

The CyberWire

Play Episode Listen Later May 25, 2016 9:47


In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but they may be a lot more like battlespace preparation (and so traditional EW and intelligence). Microsoft Azure Active Directory does something about bad passwords. And Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains why the FCC and FTC are holding back on IoT regulation.

Canaltech Podcast
Podcast Canaltech - 07/10/14

Canaltech Podcast

Play Episode Listen Later Oct 7, 2014 5:04


Nono dígito em mais 5 regiões do Brasil; FBI acusa China de ataques a empresas; Queda nos lucros da Samsung; Robô capaz de matar o Ebola; Fraca adoção do iOS 8; Keyloggers no Windows 8 preview.

Banking Information Security Podcast
Editor's Choice: Fighting Keyloggers and the Global Zeus Fight

Banking Information Security Podcast

Play Episode Listen Later Oct 30, 2010


Banking Information Security Podcast
Editor's Choice: Fighting Keyloggers and the Global Zeus Fight

Banking Information Security Podcast

Play Episode Listen Later Oct 30, 2010


Credit Union Information Security Podcast
Editor's Choice: Fighting Keyloggers and the Global Zeus Fight

Credit Union Information Security Podcast

Play Episode Listen Later Oct 30, 2010


Info Risk Today Podcast
Editor's Choice: Fighting Keyloggers and the Global Zeus Fight

Info Risk Today Podcast

Play Episode Listen Later Oct 30, 2010


Tech Talk Radio Podcast
December 20, 2008 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Dec 20, 2008 58:41


Keyloggers, wi-fi sniffing, Profiles in IT (Seymour Robert Cray, father of the supercomputer), three Mediterranean fiberoptics trunks severed, RIAA will stop suing downloaders (will now pressure ISPs), Polaroid in bankruptcy, Gadget of the Week (GPS Angel, speed trap and stop light camera warning device), Homeland Security still without cyber security plan, the rise of the netbook (Asus Eee, HP Mini-note, Dell Mini), more Christmas gift ideas (backup hard drive, personal domain name, set up wireless router, netbook, battery backup system, high capacity RAM, media extender for HDTV, iPod, universal remote, Bluetooth headset, Skype account with headset), and American IT staffing still strong (survey of CIOs). This show originally aired on Saturday, December 20, 2008, at 9:00 AM EST on WFED (1500 AM).

Tech Talk Radio Podcast
December 20, 2008 Tech Talk Radio Show

Tech Talk Radio Podcast

Play Episode Listen Later Dec 20, 2008 58:41


Keyloggers, wi-fi sniffing, Profiles in IT (Seymour Robert Cray, father of the supercomputer), three Mediterranean fiberoptics trunks severed, RIAA will stop suing downloaders (will now pressure ISPs), Polaroid in bankruptcy, Gadget of the Week (GPS Angel, speed trap and stop light camera warning device), Homeland Security still without cyber security plan, the rise of the netbook (Asus Eee, HP Mini-note, Dell Mini), more Christmas gift ideas (backup hard drive, personal domain name, set up wireless router, netbook, battery backup system, high capacity RAM, media extender for HDTV, iPod, universal remote, Bluetooth headset, Skype account with headset), and American IT staffing still strong (survey of CIOs). This show originally aired on Saturday, December 20, 2008, at 9:00 AM EST on WFED (1500 AM).