Podcasts about microsoft internet explorer

Web browser developed by Microsoft

  • 40PODCASTS
  • 50EPISODES
  • 38mAVG DURATION
  • ?INFREQUENT EPISODES
  • Dec 23, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about microsoft internet explorer

Latest podcast episodes about microsoft internet explorer

Videojuegos y Viejitos
Episodio rancio y perdido de octubre... ¡pero con video!

Videojuegos y Viejitos

Play Episode Listen Later Dec 23, 2023 86:10


¡¿Qué tranza viejitos?! Lo prometido es deuda, presentado por nuestro patrocinador oficial, Microsoft Internet Explorer, les traemos éste episodio rancio, culero y perdido de por ahí de octubre, ya ni recordamos bien exactamente, pero eso no importa porque aunque fuera actual, ya saben que nada de lo que decimos importa ni vale para nada. ¡Pero éste episodio tiene video y así pueden ver también nuestras feas caras mientras escuchan nuestras irrelevantes opiniones! Síguenos en nuestras redes: tiktok.com/@videojuegosyviejitos | tiktok.com/@elrengeek youtube.com/videojuegosyviejitos facebook.com/videojuegosyviejitos instagram.com/videojuegosyviejitos

Hacker Public Radio
HPR3834: 2022-2023 New Years Show Episode 5

Hacker Public Radio

Play Episode Listen Later Apr 13, 2023


Episode #5 printables: Kirby 40mm Fume Extractor. wikipedia: The Kirby Company is a manufacturer of vacuum cleaners and home cleaning accessories, located in Cleveland, Ohio, United States. It is a division of Right Lane Industries. lugcast: We are an open Podcast/LUG that meets every first and third Friday of every month using mumble. wikipedia: The PlayStation Portable (PSP) is a handheld game console developed and marketed by Sony Computer Entertainment. wikipedia: Rammstein is a German Neue Deutsche Härte band formed in Berlin in 1994. Goodluck with all the rest of the band/music chatter. I can't understand any of it. youtube: Burger Dance. Please no. Why did I signup for this. wikipedia: Syphilis is most commonly spread through sexual activity. wikipedia: Death was an American death metal band formed in Altamonte Springs, Florida, in 1984 by Chuck Schuldiner. Death is considered to be among the most influential bands in heavy metal music and a pioneering force in death metal. wikipedia: Death is a Detroit rock band formed in Detroit, Michigan in 1971 by brothers Bobby, David, and Dannis Hackney. wikipedia: BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. dell: Latitude E6410 Laptop. slackware: Slackware is a Linux distribution created by Patrick Volkerding in 1993. puppylinux: Puppy Linux is an operating system and family of light-weight Linux distributions that focus on ease of use and minimal memory footprint. tails: Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. debian: Debian, also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project, which was established by Ian Murdock on August 16, 1993. wikipedia: Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. pine64: ROCK64 is a credit card sized Single Board Computer powered by Rockchip RK3328 quad-core ARM Cortex A53 64-Bit Processor and support up to 4GB 1600MHz LPDDR3 memory. docker: realies/nicotine. wikipedia: rsync is a utility for efficiently transferring and synchronizing files between a computer and an external hard drive and across networked computers by comparing the modification times and sizes of files. funkwhale: Listen to your music, everywhere. Upload your personal library to your pod, share it with friends and family, and discover talented creators. mumble: Mumble is a free, open source, low latency, high quality voice chat application. youtube: Ernie (The Fastest Milkman In The West). Why?! youtube: Shaddap You Face - Joe Dolce. ironmaiden: Iron Maiden are an English heavy metal band formed in Leyton, East London, in 1975 by bassist and primary songwriter Steve Harris. wikipedia: Kamelot is an American power metal band from Tampa, Florida, formed by Thomas Youngblood, in 1987. wikipedia: Nightwish is a Finnish symphonic metal band from Kitee. wikipedia: Kitee is a town and a municipality of Finland. It is located in the province of Eastern Finland and is part of the North Karelia region. wikipedia: Evanescence is an American rock band founded in Little Rock, Arkansas in 1995 by singer and musician Amy Lee and guitarist Ben Moody. wikipedia: Deep Purple are an English rock band formed in London in 1968. wikipedia: Pink Floyd are an English rock band formed in London in 1965. wikipedia: Black Sabbath were an English rock band formed in Birmingham in 1968 by guitarist Tony Iommi, drummer Bill Ward, bassist Geezer Butler and vocalist Ozzy Osbourne. toastmasters Toastmasters International is a nonprofit educational organization that teaches public speaking and leadership skills through a worldwide network of clubs. bbc: The British Broadcasting Corporation is the national broadcaster of the United Kingdom, based at Broadcasting House in London. matrix: An open network for secure, decentralized communication. wikipedia: The General Data Protection Regulation is a Regulation in EU law on data protection and privacy in the EU and the European Economic Area. wikipedia: The Gopher protocol (/ˈɡoʊfər/) is a communication protocol designed for distributing, searching, and retrieving documents in Internet Protocol networks. wikipedia: Gemini is an application-layer internet communication protocol for accessing remote documents, similar to the Hypertext Transfer Protocol (HTTP) and Gopher. wikipedia: Slipknot is an American heavy metal band formed in Des Moines, Iowa, in 1995 by percussionist Shawn Crahan, drummer Joey Jordison and bassist Paul Gray. wikipedia: After Forever was a Dutch symphonic metal band with strong progressive metal influences. The band relied on the use of both soprano vocals and death growls. metallica: Metallica is an American heavy metal band. wikipedia: Queen are a British rock band formed in London in 1970 by Freddie Mercury (lead vocals, piano), Brian May (guitar, vocals) and Roger Taylor (drums, vocals), later joined by John Deacon (bass). wikipedia: Brexit (a portmanteau of "British exit") was the withdrawal of the United Kingdom (UK) from the European Union (EU) at 23:00 GMT on 31 January 2020 (00:00 1 February 2020 CET). The UK is the only sovereign country to have left the EU or the EC. imdb: A WWII bomb group commander must fill the shoes of his predecessor and get the performance rating up to snuff. wikipedia: Twelve O'Clock High is a 1949 American war film about aircrews in the United States Army's Eighth Air Force, who flew daylight bombing missions against Germany and Occupied France during the early days of American involvement in World War II. wikipedia: The Boeing B-17 Flying Fortress is a four-engined heavy bomber developed in the 1930s for the United States Army Air Corps (USAAC). IRC IRC is short for Internet Relay Chat. It is a popular chat service still in use today. wikipedia: Next Unit of Computing (NUC) is a line of small-form-factor barebone computer kits designed by Intel. plex: With our easy-to-install Plex Media Server software and Plex apps on the devices of your choosing, you can stream your video, music, and photo collections any time, anywhere, to whatever you want. ubuntu: Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. ebay: Buy & sell electronics, cars, clothes, collectibles & more on eBay, the world's online marketplace. amazon: Amazon Renewed is your trusted destination for pre-owned, refurbished products. wikipedia: Ryzen is a brand of multi-core x86-64 microprocessors designed and marketed by AMD for desktop, mobile, server, and embedded platforms based on the Zen microarchitecture. wikipedia: Apple M1 is a series of ARM-based systems-on-a-chip (SoCs) designed by Apple Inc. as a central processing unit (CPU) and graphics processing unit (GPU) for its Mac desktops and notebooks, and the iPad Pro and iPad Air tablets. wikipedia: The Apple M2 is an ARM-based system on a chip (SoC) designed by Apple Inc. as a central processing unit (CPU) and graphics processing unit (GPU) for its Mac notebooks and the iPad Pro tablet. wikipedia: A system on a chip or system-on-chip (SoC /ˌˈɛsoʊsiː/; pl. SoCs /ˌˈɛsoʊsiːz/) is an integrated circuit that integrates most or all components of a computer or other electronic system. wikipedia: ARM (stylised in lowercase as arm, formerly an acronym for Advanced RISC Machines and originally Acorn RISC Machine) is a family of reduced instruction set computer (RISC) instruction set architectures for computer processors, configured for various environments. youtube: One Woman’s Wilderness. wikipedia: Felix Unger (born 2 March 1946 in Klagenfurt, Austria) is a heart specialist who served as the president of the European Academy of Sciences and Arts for three decades. geekflare: How to create APT Proxy using a Raspberry PI with apt-cacher-ng? gpd: The world's smallest 6800U handheld Exclusive performance optimization tool Support SteamOS system. pine64: ROCK64 is a credit card sized Single Board Computer powered by Rockchip RK3328 quad-core ARM Cortex A53 64-Bit Processor and support up to 4GB 1600MHz LPDDR3 memory. wikipedia: Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines. wikipedia: Windows Subsystem for Linux (WSL) is a feature of Windows that allows developers to run a Linux environment without the need for a separate virtual machine or dual booting. wikipedia: In computing, a virtual machine (VM) is the virtualization/emulation of a computer system. wikipedia: A Chromebook (sometimes stylized in lowercase as chromebook) is a laptop or tablet running the Linux-based ChromeOS as its operating system. virtualbox: VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. wikipedia: Telemetry is the in situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment (telecommunication) for monitoring. gnu: Published software should be free software. To make it free software, you need to release it under a free software license. microsoft: MICROSOFT SOFTWARE LICENSE TERMS. apple: software license agreements for currently shipping Apple products. cdc: Health Insurance Portability and Accountability Act of 1996 (HIPAA). nhs: The NHS website for England. wikipedia: Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. wikipedia: Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a discontinued series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems. wikipedia: Microsoft Edge is a proprietary, cross-platform web browser created by Microsoft. oggcamp: OggCamp is an unconference celebrating Free Culture, Free and Open Source Software, hardware hacking, digital rights, and all manner of collaborative cultural activities and is committed to creating a conference that is as inclusive as possible. penguicon: A happy place where hackers, makers, foodies, open source software junkies, anime buffs, and science fiction fans of all ages and backgrounds come together. mozillafestival: MozFest is a unique hybrid: part art, tech and society convening, part maker festival, and the premiere gathering for activists in diverse global movements fighting for a more humane digital world. fosdem: FOSDEM is a free event for software developers to meet, share ideas and collaborate. wikipedia: A hybrid integrated circuit (HIC), hybrid microcircuit, hybrid circuit or simply hybrid is a miniaturized electronic circuit constructed of individual devices, such as semiconductor devices (e.g. transistors, diodes or monolithic ICs) and passive components (e.g. resistors, inductors, transformers, and capacitors), bonded to a substrate or printed circuit board (PCB). wikipedia: A real-time clock (RTC) is an electronic device (most often in the form of an integrated circuit) that measures the passage of time. eurovision: The Eurovision Song Contest. wikipedia: Blue laws, also known as Sunday laws, Sunday trade laws and Sunday closing laws, are laws restricting or banning certain activities on specified days, usually Sundays in the western world. wikipedia: A census is the procedure of systematically acquiring, recording and calculating information about the members of a given population. businesspundit: The Commercialization Of Our 25 Favorite Holidays wikipedia: Leave It to Beaver is an iconic American television situation comedy about an American family of the 1950s and early 1960s. wikipedia: The COVID-19 pandemic, also known as the coronavirus pandemic, is an ongoing global pandemic of coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The novel virus was first identified in an outbreak in the Chinese city of Wuhan in December 2019. who: COVID-19 transmission and protective measures. forbes: CDC: 10 Ways To Dine Safely At A Restaurant With Coronavirus Around. restaurant: COVID-19 Restaurant Impact Survey. subway: Subway is an American multinational fast food restaurant franchise that specializes in submarine sandwiches, wraps, salads and drinks. dominos: Domino's Pizza, Inc., trading as Domino's, is a Michigan-based multinational pizza restaurant chain founded in 1960 and led by CEO Russell Weiner. mcdonalds: McDonald's Corporation is an American multinational fast food chain, founded in 1940 as a restaurant operated by Richard and Maurice McDonald, in San Bernardino, California, United States. wikipedia: In public health, social distancing, also called physical distancing, is a set of non-pharmaceutical interventions or measures intended to prevent the spread of a contagious disease by maintaining a physical distance between people and reducing the number of times people come into close contact with each other. wikipedia: Due to the COVID-19 pandemic, a number of non-pharmaceutical interventions colloquially known as lockdowns (encompassing stay-at-home orders, curfews, quarantines, cordons sanitaires and similar societal restrictions) have been implemented in numerous countries and territories around the world. wikipedia: COVID-19 lockdowns by country. bbc: Covid-19: What is the new three tier system after lockdown? wikipedia: A telephone directory, commonly called a telephone book, telephone address book, phonebook, or the white and yellow pages, is a listing of telephone subscribers in a geographical area or subscribers to services provided by the organization that publishes the directory. cdc: It’s important to keep your blood sugar levels in your target range as much as possible to help prevent or delay long-term, serious health problems, such as heart disease, vision loss, and kidney disease. wikipedia: Whisky or whiskey is a type of distilled alcoholic beverage made from fermented grain mash. wikipedia: Powerade is a sports drink created, manufactured and marketed by The Coca-Cola Company. katexic: busthead (bust-head). noun. Cheap, strong liquor, usually of the illegal variety. skrewballwhiskey: The Original Peanut Butter Whiskey. olesmoky: Peanut Butter Whiskey. thepartysource: Blind Squirrel Peanut Butter Whiskey 750 ml. Thanks To: Mumble Server: Delwin HPR Site/VPS: Joshua Knapp - AnHonestHost.com Streams: Honkeymagoo EtherPad: HonkeyMagoo Shownotes by: Sgoti and hplovecraft

Mission To The Moon Podcast
อภิปรายทั่วไปรอบสุดท้าย ก่อนเลือกตั้ง | Mission Daily Report 16 กุมภาพันธ์ 2023

Mission To The Moon Podcast

Play Episode Listen Later Feb 16, 2023 62:33


Mission Daily Report February 16, 2023 1. ราคาดัชนีตลาดหลักทรัพย์ / ราคาหุ้นต่างประเทศ / ราคาน้ำมันดิบ / ราคาทองคำ / ราคา Cryptocurrency 2. Morning Talk สินค้าใดของไทยที่ควรส่งเสริมการส่งออก 3. การแจ้งเตือนพยากรณ์อากาศของกรมอุตุ 4. น้ำมันแพง Goldman Sachs คาดการณ์น้ำมันพุ่งทะลุ 100 ดอลลาร์อีกครั้งปีนี้ 5. ทุเรียนไทยแพ้เวียดนาม 6. วัตถุลอยฟ้าปริศนาในแคนาดาโดนยิงทิ้ง 7. ถนนเรืองแสงในซาอุดีอาระเบีย 8. อภิปรายทั่วไปรอบสุดท้าย ก่อนเลือกตั้ง 9. รัฐบาลขอเก็บเงินจากนักท่องเที่ยวเพื่อเป็นประกันสุขภาพ 10. ครบ 8 ปี นายกสกอตแลนด์ลาออก เปลี่ยนผู้นำใหม่ 11. Microsoft เตรียมปิดตัว Internet Explorer อย่างเป็นทางการ 12. Morning Talk สินค้าใดของไทยที่ควรส่งเสริมการส่งออก

Mission Daily Report
อภิปรายทั่วไปรอบสุดท้าย ก่อนเลือกตั้ง | Mission Daily Report 16 กุมภาพันธ์ 2023

Mission Daily Report

Play Episode Listen Later Feb 16, 2023 62:33


Mission Daily Report February 16, 2023 1. ราคาดัชนีตลาดหลักทรัพย์ / ราคาหุ้นต่างประเทศ / ราคาน้ำมันดิบ / ราคาทองคำ / ราคา Cryptocurrency 2. Morning Talk สินค้าใดของไทยที่ควรส่งเสริมการส่งออก 3. การแจ้งเตือนพยากรณ์อากาศของกรมอุตุ 4. น้ำมันแพง Goldman Sachs คาดการณ์น้ำมันพุ่งทะลุ 100 ดอลลาร์อีกครั้งปีนี้ 5. ทุเรียนไทยแพ้เวียดนาม 6. วัตถุลอยฟ้าปริศนาในแคนาดาโดนยิงทิ้ง 7. ถนนเรืองแสงในซาอุดีอาระเบีย 8. อภิปรายทั่วไปรอบสุดท้าย ก่อนเลือกตั้ง 9. รัฐบาลขอเก็บเงินจากนักท่องเที่ยวเพื่อเป็นประกันสุขภาพ 10. ครบ 8 ปี นายกสกอตแลนด์ลาออก เปลี่ยนผู้นำใหม่ 11. Microsoft เตรียมปิดตัว Internet Explorer อย่างเป็นทางการ 12. Morning Talk สินค้าใดของไทยที่ควรส่งเสริมการส่งออก

Digitaal | BNR
Zo stalk je met kentekens, elektrische doorbraken en Firefox houdt al 20 jaar vol

Digitaal | BNR

Play Episode Listen Later Sep 28, 2022 40:08


Parkeren met behulp van een app is heel gemakkelijk, maar levert ook een flink privacyrisico op. Door misbruik is het kinderlijk eenvoudig voertuigen te volgen door slechts andermans kenteken en je eigen betaalgegevens in te voeren. Wat moeten dit soort bedrijven, en eigenlijk ook de overheid, hier nu mee doen? Dat bespreken we met de ethische hacker die deze fundamentele privacykwetsbaarheid heeft aangetoond, Inti de Ceukelaire. Smartphone op wielen De Ford F-150 Lightning moet als elektrische pick-up voor een doorbraak van elektrisch rijden zorgen in de VS. Maar Amerikaanse techmedia zijn kritisch op de gebruikersinterface. Dus testten we 'm zelf ook maar even. Energie zonder accu's We zijn een stap dichter bij nooit meer batterijen vervangen! Tenminste, in sensoren en microcontrollers. Mark Beekhuis, onze energie- en klimaatverslaggever, licht dat toe in 'De Zoekopdracht'. Firefox viert feest Mozilla Firefox was ooit de belangrijkste uitdager van Microsoft Internet Explorer. Nu is het vooral hét alternatief op de browser van een andere techreus: Google Chrome. Hoe moeten we vandaag de dag naar deze groten der web-browsers kijken? Dat doet Jasper Bakker, bedrijfs-ICT-journalist bij AG Connect, met ons. Meer podcasts over tech? Luister dan naar All in the Game, De Technoloog en de Tech Update.See omnystudio.com/listener for privacy information.

Logbuch Digitalien
Episode 66: Wir waren in Berlin

Logbuch Digitalien

Play Episode Listen Later Jul 10, 2022 39:03


Mit Markus Hörster und Christian Cordes. In dieser Episode blicken wir zurück auf die re:publica 22 in Berlin. Außerdem sprechen wir über die Technik-Neuheiten, die von Apple auf der WWDC und von Google auf der I/O vorgestellt wurden. Neben einer kleinen Vorschau auf Android 13 blicken wir auch auf USB-C, was bei Geräten wie Smartphones in den kommenden Jahren zum Standard werden soll. Und wir beerdigen den Microsoft Internet Explorer. App-Tipps des Monats: SMS Backup & Restore (Android) heat it (Android, iOS) Viel Spaß mit Episode 66. Am 12. Juli 2022 hört ihr um 19.00 Uhr die nächste Ausgabe unserer Sendung auf Radio Okerwelle.

Ben's Community Commentary Space
Current Events Show: Black Tech Talent Summit and Game Night, MN Twins and MLB News, Vince Mcmahon Scandal, Mario vs Omarion Versuz, Black Music Honors,Microsoft Internet Explorer, Ethereal Miners a

Ben's Community Commentary Space

Play Episode Listen Later Jun 22, 2022 66:29


Stuff Magazine's Tech Bytes
Tech Byte - 17 June 2022

Stuff Magazine's Tech Bytes

Play Episode Listen Later Jun 17, 2022 5:46


In this episode: Instagram wants to steer teens away from harmful content Microsoft Internet Explorer is finally retired, for real this time Petrol prices could touch R25 per litre in July Tech Byte airs daily from Monday to Friday. For the latest tech news, be sure to follow Stuff on Twitter, Facebook and Instagram or head on over to our website.

DOU Podcast
Прощання з Internet Explorer, ознаки свідомості в AI та Дія.City в масштабах країни — DOU News #30

DOU Podcast

Play Episode Listen Later Jun 16, 2022 16:15


Протягом усієї повномасштабної війни ми висвітлюємо, як ІТ-індустрія реагує, допомагає та працює в умовах російської агресії. У новому випуску прощаємось з Internet Explorer, говоримо про PayPal в Україні, нових ІТ ФОПів, ознаки свідомості в AI та зрадницьку ІТ-компанію з Києва.

The Daily Zeitgeist
TDZ: Shredders ReTrendge 6/15: Saudi Arabia, Ryan Gosling, Ron DeSantis, Internet Explorer, Kim K., Zendaya, 'Lightyear'

The Daily Zeitgeist

Play Episode Listen Later Jun 15, 2022 22:33


In this edition of TDZ: Shredders ReTrendge, Jack and Miles discuss Joe Biden's trip to Saudi Arabia, Ryan Gosling as Ken in the new Barbie movie, Ron DeSantis garnering support from a wealthy "African-American", the sunsetting of Microsoft Internet Explorer, Kim K. bursting Marilyn Monroe's seams, Zendaya NOT being pregnart, and  'Lightyear' being meh. See omnystudio.com/listener for privacy information.

Rise & Grind
CJ Can't Spell, DeAngelo Williams, and Combo Jack and Coke - 6/15/22

Rise & Grind

Play Episode Listen Later Jun 15, 2022 77:22


On today's show: Meghan and Jessica find out that CJ cannot spell, talk about Sauce Gardner's new number, get DeAngelo Williams' thoughts on life and more. (6:00) NHL Finals (13:00) Deshaun Watson talks to the media (25:00) Sauce Gardner pays 50k for No, 1 (32:00) Brittney Griner's detention extended (41:00) DeAngelo Williams (1:08:00) Post Malone welcomes new baby (1:15:00) Microsoft Internet Explorer retired (1:16:00) Jack and Coke combo Watch LIVE at 8am, weekdays on YouTube and the Grizzlies App: bit.ly/MemGrizzApp Watch today's full show at: youtube.com/grindcitymedia

Highlights from Moncrieff
The end of Microsoft Internet Explorer!

Highlights from Moncrieff

Play Episode Listen Later Jun 15, 2022 10:20


Microsoft has announced it will kill off internet browser Internet Explorer, nearly 27 years after it first appeared on our desktop computers in 1995. Sean was joined by Elaine Burke editor of Silicon Republic, to explain what Internet explorer looked like when it launched and what Microsoft plan to launch in its place.

Science & Technology - Voice of America
Microsoft: Internet Explorer No Longer Supported - June 15, 2022

Science & Technology - Voice of America

Play Episode Listen Later Jun 15, 2022 3:20


Comsteria Podcast
Internet Explorer retires, Facebook takes on Roblox.

Comsteria Podcast

Play Episode Listen Later Jun 15, 2022 1:14


Today we say good bye to one of the biggest names in the history of the internet.   Microsoft Internet Explorer finally retires today after a 27 year run and of course it was, at one point, the world's most used web browser.   Microsoft has gradually been phasing out support for the software in favour of its new ‘Edge' browser.   Latest figures show just 0.45 percent of internet users access the internet through ‘Explorer', back in 2002 the figure was around 95%.   From today, the company will no longer support Explorer so it won't receive software updates and security patches - anyone doing so uses it at their own risk and is liable to viruses and other compatibility issues.   Chrome is now by far the most popular web browser with almost 65 percent of the market, followed by Safari and then Edge.   Facebook's launched a gaming platform similar to Roblox - it's called Crayta.   It allows users to create virtual worlds and play games, crucially - without a PC.   Any device that can run Facebook, can run Crayta.

Moncrieff Highlights
The end of Microsoft Internet Explorer!

Moncrieff Highlights

Play Episode Listen Later Jun 15, 2022 10:20


Microsoft has announced it will kill off internet browser Internet Explorer, nearly 27 years after it first appeared on our desktop computers in 1995. Sean was joined by Elaine Burke editor of Silicon Republic, to explain what Internet explorer looked like when it launched and what Microsoft plan to launch in its place.

Download This Show - ABC RN
Can cryptocurrencies survive without China?

Download This Show - ABC RN

Play Episode Listen Later May 27, 2021 28:22


Cryptocurrencies have come up against the might of China, which has warned financial institutions to "resolutely refrain" from providing services using digital currencies because of their volatility. So what does that mean for their future? Plus, trusting artificial intelligence to diagnose your skin condition on Google’s new skin check app, and the court case that could reshape Apple’s App Store. And it was the gateway to the internet for millions but as Microsoft Internet Explorer takes its final bow, is there anything that you’ll miss about it? Guests: Sarah Moran, CEO Geek Girl academy & Jennifer Dudley-Nicholson, National Technology Editor, News Corp

Security Conversations
Throwback: Zero-day exploit broker Chaouki Bekrar

Security Conversations

Play Episode Listen Later Mar 3, 2021 24:42


Sponsored by SecurityWeek (https://securityweek.com): This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar. The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox. We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest. (Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).

5 minutes a Day on the Parsha with Yiddy Klein
Purim Miracle: The Incredible Story behind Microsoft Internet Explorer 9

5 minutes a Day on the Parsha with Yiddy Klein

Play Episode Listen Later Feb 21, 2021 8:12


The Essential Apple Podcast
Essential Apple Podcast 206: Simple photo and video adjustments with Darkroom

The Essential Apple Podcast

Play Episode Listen Later Jan 19, 2021 63:52


Recorded 17th January 2021 This week there was a virtual CES, somewhat reduced in size but still with its array of prototypes, new products and as ever a few oddities. Apple announced what it is actually doing with its REJI and is apparently going to extend free Apple TV+ again. Also today we are joined by Jasper Hauser of Darkroom photo and video editor for Mac and iOS (the winner of an Apple Design Award in 2020). GIVEAWAYS & OFFERS Glenn Fleishman's Working From Home book is completely FREE and can be downloaded here and now he has also released Take Control of Zoom Essentials free as well. Steve at Geeks Corner has restarted his podcast which is a 5-15 min show of his thoughts on tech. Also keep an eye on his site or follow him on Twitter @GeekCorner_uk to watch for regular giveaways. Why not come and join the Slack community? You can now just click on this Slackroom Link to sign up and join in the chatter! Slacker @MacJim has a family friendly Flickr group for listeners to share photos because the Darkroom channel in the Slack has become so popular - if you're interested head over to to the Essential Apple Flickr and request an invitation. On this week's show JASPER HAUSER Web @usedarkroom on Twitter Instagram YouTube Reddit APPLE M1 Mac Bluetooth problems finally set to be resolved, says Apple – 9to5Mac Apple begins blocking M1 Mac users from side loading iPhone and iPad applications – 9to5Mac Apple Launches New Nationwide Racial Equity and Justice Initiative Projects – Mac Rumors Apple suspends Parler from App Store – CNN Apple CEO Tim Cook Says Parler Can Return to App Store If It Ups Moderation – Newsweek Apple is extending Apple TV+ trials again — TechCrunch TECHNOLOGY / CES The LG Rollable phone with expandable display is real, and coming in 2021 – CNet LG's transparent TV concept rolls up from foot of bed – Mashable UK Video of the transparent TV – Digital Trends The best foldables (and rollables) of CES 2021 – Digital Trends Masks, sanitizers, and social distancing gadgets: The COVID tech that dominated CES 2021 – Mashable Accessibility devices at CES 2021 reflect growing focus on inclusive tech – CNet SECURITY & PRIVACY Google Analytics opt out browser extension – Google Available for Microsoft Internet Explorer 11, Google Chrome, Mozilla Firefox, Apple Safari and Opera. Son from Simple Login replied to my suggestion of a Menubar App – go upvote it if you would like to see this (you have to register to vote) That's a good idea indeed! (and I would use it personally obviously :)). Just created https://trello.com/c/6S3WmqLP/152-create-mac-menubar-for-simplelogin, feel free to upvote it to make it happen sooner! Encrypted Messaging App Signal Sees Surge in Popularity Following WhatsApp Privacy Policy Update – Ultimate Pocket WhatsApp's New Privacy Policy Is Exactly Why No One Trusts Facebook – Inc Johns Hopkins security researchers 'shocked' at Android and iOS vulnerabilities – 9to5Mac WORTH A CHIRP / ESSENTIAL TIPS Fonts: Install New Fonts – App Shopper App Store Bufferi.ng: Create lag and buffering on video chats like Zoom, Skype and Microsoft teams JUST A SNIPPET For things that are not worth more than a flypast SmartDot radiation-protection phone stickers 'have no effect' — BBC News “They are supposed to use “scalar energy” (aka Undetectable Magic Powers) - brought to you by the same loons who will sell you a Faraday cage for your router… “ – Simon Essential Apple Recommended Services: Pixel Privacy – a fabulous resource full of excellent articles and advice on how to protect yourself online. Doug.ee Blog for Andy J's security tips. Ghostery – protect yourself from trackers, scripts and ads while browsing. Simple Login – Email anonymisation and disposable emails for login/registering with 33mail.com – Never give out your real email address online again. AnonAddy – Disposable email addresses Sudo – get up to 9 “avatars” with email addresses, phone numbers and more to mask your online identity. Free for the first year and priced from $0.99 US / £2.50 UK per month thereafter... You get to keep 2 free avatars though. ProtonMail – end to end encrypted, open source, based in Switzerland. Prices start from FREE... what more can you ask? ProtonVPN – a VPN to go with it perhaps? Prices also starting from nothing! Comparitech DNS Leak Test – simple to use and understand VPN leak test. Fake Name Generator – so much more than names! Create whole identities (for free) with all the information you could ever need. Wire – free for personal use, open source and end to end encryted messenger and VoIP. Pinecast – a fabulous podcast hosting service with costs that start from nothing. Essential Apple is not affiliated with or paid to promote any of these services... We recommend services that we use ourselves and feel are either unique or outstanding in their field, or in some cases are just the best value for money in our opinion. Social Media and Slack You can follow us on: Twitter / Slack / EssentialApple.com / Soundcloud / Facebook / Pinecast Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.

Kopec Explains Software
#24 The Browser Wars

Kopec Explains Software

Play Episode Listen Later Nov 23, 2020 27:35


Throughout the three decade history of the Web various browsers have battled for supremacy. In the 1990s it was Netscape Navigator versus Microsoft Internet Explorer. More recently, Google Chrome has dominated Mozilla Firefox, Microsoft Edge, and Apple's Safari. In this episode we dive into the history of the browser wars. We look at the various periods of web browser development, and identify how one browser's success or failure led to the rise of another. Ultimately we find connections that link every popular browser to every other. Show Notes Episode 6: How does the Web work? Tim Berners-Lee via Wikipedia WorldWideWeb via Wikipedia Mosaic via Wikipedia Marc Andreessen via Wikipedia Netscape Navigator via Wikipedia Spyglass Inc. via Wikipedia Internet Explorer via Wikipedia WebKit via Wikipedia Blink via Wikipedia Follow us on Twitter @KopecExplains. Theme “Place on Fire” Copyright 2019 Creo, CC BY 4.0 Find out more at http://kopec.live

Download This Show - ABC RN
The day the browser dies

Download This Show - ABC RN

Play Episode Listen Later Aug 27, 2020 28:21


We’ve lost a lot in 2020, but now things have gone too far as the once loved browser, Microsoft Internet Explorer faces its final days. Plus, Airbnb have banned something we all need but probably shouldn’t have. The mobile phone company storming its way through India. And Tik Tok is suing Trump. Guests: Rae Johnston, Science and Tech Editor, NITV @raejohnston + Nic Healey, tech writer and breakfast show host, ABC Western Plains @dr_nic

Download This Show - ABC RN
The day the browser dies

Download This Show - ABC RN

Play Episode Listen Later Aug 27, 2020 28:21


We’ve lost a lot in 2020, but now things have gone too far as the once loved browser, Microsoft Internet Explorer faces its final days. Plus, Airbnb have banned something we all need but probably shouldn’t have. The mobile phone company storming its way through India. And Tik Tok is suing Trump. Guests: Rae Johnston, Science and Tech Editor, NITV @raejohnston + Nic Healey, tech writer and breakfast show host, ABC Western Plains @dr_nic

Preferred Platform Podcast
002 - Sir You Are Going To Have To Put On These Cat Ears (08/20/20)

Preferred Platform Podcast

Play Episode Listen Later Aug 14, 2020 67:42


The Army wants you to git gud, Uber does not appreciate California, the internet is finally dead thanks to Microsoft, Fortnite will not allow you to make calls on your phone, Mulan continues her reign of digital terror. Will the boys survive? Linktree Referenced in this episode: Uber’s California Shutdown Threat Won’t Impact Its Real Money Maker: Uber Eats The U.S. Army's Return To Twitch Is Off To A Bizarre Start THE BEST - US Marines TV Recruitment Spot - Ever Produced Israel Wants To Use Xbox Controllers In Its Tanks, Which Is Horrifying Microsoft Internet Explorer is finally dead Apple fires back at Epic: ‘We won’t make an exception’ ViacomCBS In Talks To Sell Tech Website CNET Why Hamilton Works on Disney+ - and Why Mulan DOESN'T Uber, Lyft would pause ride-hailing in Calif. if drivers become employees Listen here: Apple Podcasts Spotify Podcasts SoundCloud Follow us! Twitter

Tek Talk
Tek Talk Welcomes Brian Hartgen of Hartgen Consultancy to discuss the topic: “Using Microsoft Edge with JAWS for Windows.”

Tek Talk

Play Episode Listen Later May 12, 2020


For years, many of us have been using Microsoft Internet Explorer to shop online, read the news, work with social media sites and much more besides.

Craig Peterson's Tech Talk
Welcome! Relying on Technology for Protection, Zero-Day Browser Vulnerabilities, Vulnerable Broadcom Chipsets, Social Engineering, Updates, Patches, and Cyber War and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 17, 2020 90:00


Welcome!   Today there is a ton of stuff going on in the world of Technology, and we are going to hit several topics today. From Technological Protection to tactics. Zero-Day Browser Vulnerabilities, Malware Infected Phones, Vulnerable Broadcom Chipsets in Cable Modems. Why connections always mean hacking. Social Engineering. The absolute need for Updates, Patches. The Coming Cyber War is already here, and more on Tech Talk with Craig Peterson on WGANand more on Tech Talk With Craig Peterson today on WGAN and even more.  It is a busy show -- so stay tuned. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Technology Can Only Protect You So Much --- Then Other Tactics are Needed Zero-Day Browser Vulnerabilities A Free but Malware Infected Phone -- Courtesy of the US Taxpayer A Lesson to Learn - If it is Connected It can Be Hacked Routers and Firewalls with Broadcom Chipsets Are Vulnerable Social Engineering Comes to the Forefront of Attacks Updates, Patches, and Hackers Oh My! Cyber War isn’t Coming It is already here! --- Automated Machine Generated Transcript: Hello, everybody, Craig Peterson here a big week when it comes to security updates, and I mean a massive weekend. Welcome to show number 1043. That's weeks people. I've been doing this for a very long time, glad you have joined us, and if you are watching over on YouTube, I'd love to hear from you. Just email me at Craig Peterson calm you know if you're on YouTube or, or Facebook, I've noticed a few people who have subscribed, and I love that thank you very, very much. I hope you get a lot out of the show. If you're listening on the radio, of course, you can also email me at Craig Peterson calm with any questions that you might have. And I always try and answer them now sometimes it takes me a little longer than others. As you can imagine, I am a busy guy. It is kind of a labor of love, but we do want to answer your questions and help You out with everything. Keep an eye on your mailbox this week. Because I am finishing the course of courses. I am so excited about this, so proud of what we're doing. And what I'm trying to do here is help you get to the point where you have all the information you need. If you're the Operations Manager now responsible for it in a company, or you're a smaller company, you know, doctors office, etc. It is going to be great. So keep an eye on your email. Because what I want from you here as I'm finishing this course up is your questions. I want to make sure they all get answered. As I've been going through putting the course together, I've even noticed that there are things that would help take that kind of extra mile if you will, you know there are these concepts that people just don't understand. And I'm going through this thinking oh my gosh, you know, to me, it's so obvious, but to so many people, it's just not because this isn't what they do every day, and they've done every day for years and years. So we're adding a bunch of different things to this course, different bonuses that are going to help. Of course, as we always do, I will still do free training, that's always part of one of these courses when we lead up to it. And there's a lot of people out there that say, Hey, listen, I can get everything I need just from the free training. And you know, between you and me, that's not true. But you can learn a lot from those. So I hope you will attend. And if you're not on my email list right now, even if you're a home user and not a business person, you're not an office manager. Let's say you're a small business owner, and you're wondering if this is something that you should do or not. I think the answer is yes. Because really, I've never been so excited about something ever. It is something I think you're going to love. I know I have put mine all into this and solos my wife. I've had a couple of other people here in our team helping out as well had a great meeting this week. And it's just man, this is exciting. So anyway, if you're not on my email list, sign up right now so that you can get on you can get not just this, but every week I send out videos, I send out a newsletter. I do Facebook Live training and YouTube Live, and we have pop-up training when there's something that's hit the news that you know you're trying to stay ahead of we do all of this stuff, and that's all for free, but you got to be on that particular email list. So subscribe by going to Craig Peterson comm slash subscribe, make sure you're there. I think you're like it. You know, you can always unsubscribe, which some people do, right? It's not for everybody, but most people have been on there for years now. I have people on there. That man, I'm trying And remember, but it's been probably 25 years on that list. So join now Craig Peterson, calm slash subscribe. Now I started by saying that we have some real security problems this week. So I want I'm going to mention this a couple of times during the show, I want to make sure you guys know first of all, huge, huge, huge windows problem out there. And this problem was reported by the National Security Agency. Now, I made mention of this on the radio this week when I was a guest on the morning drive show, but I think it's worth mentioning again, and that is The National Security Agency when they have found these types of bugs. What do they do? They keep them for themselves. They don't want other people to know about the virus, because then they use that bug now to go and grab onto other people's computers, you know, foreign agencies, bad Guys, good guys, people that they're not sure of right all of this stuff. They've been using it for years. We saw this from Edward Snowden and his leaks, right? He went out, saying everything they are monitoring, and that they are capturing and, and they're putting up on to their computers and their data storage over there in Utah and just terrible things. So we know they're doing this stuff. Well, this was amazing to me, because I realized that here under the Trump administration, this is the first administration where the National Security Agency has recognized a more significant responsibility. It isn't just hacking into other people. It's providing security to us, to you to me, right, and helping us to understand what we need to do which yea yea yea right. I've always been trying to help everybody. Get more secure. So I'm glad the NSA is doing that. Now. They didn't do it under the Obama administration or the Bush administration or the Clinton administration, right? They just haven't done this, and I don't think ever. So kudos to them if they're listening. And of course, we know they are. And kudos to the government agency. So this is a big, big deal here with Windows. And we need to understand kind of what it is it's going on. But basically, it has to do with encryption. It has to do with that part of the windows that we use to try and keep ourselves safe. Now, it's not all encryption. I don't want to get too technical. Everybody, you know, my show here is really to help you guys understand things and not get all cliquey and clinical and buzzwordy, although sometimes I am accused of doing that frequently, I try not to. So it has to do with encryption. And it turns out that in the cases of this time, encryption. Microsoft isn't even validating keys, which, as you can gas, if you don't know anything about encryption, is a huge deal. So update windows pronto. Now, there are no known attacks in the wild, but you can be sure those are coming. Also, a big update this week from Firefox because of a massive security hole. You probably know, I love the Firefox browser. I use that Firefox browser. And I hope you do too. It is important if you use Facebook, because of Firefox browser has a special thing where it's fencing Facebook in so that it can't read all these other sites visited. It's great for that, but there is a security bug. So that's news, I guess. We want to make sure we fix that main, and you can do that by updating Firefox. Now Firefox is one of those browsers that updates itself. So hopefully you've recognized it Firefox came up and said, Hey, I want to restart to install patches, and then let it restart, you have to let it restart. And Chrome started doing that as well. Again, never, ever use Microsoft Internet Explorer, it is the definition of a problem for you. Okay, security and otherwise, so don't use Internet Explorer. And also, of course, the Edge browser. I wouldn't use either. And I'm not fond of Google browser, Google Chrome unless you have to use it, right, because some applications only work well in Chrome. So let's get to our first article of the day here. We're talking about half protected is half empty, and you can see behind me, technology can only protect you and me so much. Many of these threat actors, these cyber guys that are out there, they are coming after you and me. And one of the easiest ways to come after us is using phishing smishing some of these other tactics, and we're going to come up here in another segment Today, I'll be talking about smishing. And how bad that has gotten and how you can avoid it six tips. I'll give you here to avoid smishing. But in reality, right now, we're talking about the human element. And what the wetware You and I, right versus hardware and software you and I are doing, and we're getting confused, and they are taking us to task on this. But we've got to be careful here with our security controls. We got to make sure that people only have as much access to data as they need to know so so many businesses will see this all the time. And I understand if you're doing this because it gets kind of complicated to do it the right way. But so many businesses are sharing their file server with everybody. They've got an Active Directory server or some sort of a network-attached storage device, etc. And all of their files are on it, and everybody has access, you don't want to do that. Because all it takes is one person to get fooled into clicking on a link, downloading some of the malware software. And once that malware loads onto their computer, start to spread. Where is it going to spread? Well, heck, it says Look at this, a network-attached file system a file share. I'll just try start to spread that way, and it does. So keep your security controls in place. Make sure you have the minimum necessary access. Make sure when it comes to your password management, be sure that you are using password vault at a very minimum. You can go all the way up to things like Thychotic, which is just phenomenal; it changes passwords and everything as used. But be very, very careful because this can go a long way towards helping your business to stay safe. Train your personnel and make sure they know what they should be doing. You Google has some free tools you can use. I have some tools. In my weekly newsletter, a lot of businesses use that as their training. They have people go through that read it and then answer some questions. So that's all free at Craig Peterson, calm slash subscribe. So stick around. We're going to come back, and we're going to talk more about this whole Firefox warning. And we'll talk a little bit about browsers. You're listening to Craig Peterson. I'm of course on the air on WGN radio and other stations online at correct Peterson dot com Hey, hello, everybody, Craig Petersson here. Welcome back. We're going to talk a little bit right now about browsers. You know, this is the biggest problem I think many of us have when it comes to being online. which browser should I choose? And where am I going to see the problems? Well, as I just talked about in the last segment, and we're going to talk a little bit about now, we have a security vulnerability out there for Firefox. Now, Firefox is a browser made by the group known as Mozilla. And they've been making this browser for quite a few years. Now. I love this browser. I used to use it almost exclusively. Now, I've changed my tune a little bit. And I have a few different browsers that I use, frankly, for different reasons. So let's go through those reasons pretty quickly. One, if I need the most compatibility in a browser. And this usually means I'm using some sort of software as a service online. So I might be trying to do something extraordinary with a Canva, for instance, which is an amazing tool when it comes to graphics. And it doesn't always work so well with other browsers. It refuses to run under the Opera browser. So if I need the highest level of compatibility, it's Google, Google Chrome. And Google Chrome browser is the most supported, and it's number one out there, the most supportive browser, bar none. It didn't use to be, but it sure is now, the second browser level browser that I use for everything except for Facebook. Lately, I've been using Opera O-P-E-R-A. Now opera has browsers for your desktop, whether it's a Mac or Windows machine. Has it for tablets, it has it for your smartphones. P-opera is great. It is Every fast. That's kind of its claim to fame. It's the fastest browser, but it also has the highest level of security. Well, almost right? But of the common browsers that are going to work with most websites opera. So that's number two. Number three is the Firefox browser. Now, remember, I said, I don't run Facebook, inside of opera. And that's because Firefox has an incredible feature. When it comes to running Facebook. It fences it in quite literally see what far what Facebook's trying to do is get all the information they can get about you. Now, that's not necessarily a terrible thing. Because Facebook is frankly, selling advertising and they Want to know? What are you most likely to buy? And you know what this world runs on advertising. We see ads all the time on TV. We hear ads all the time on the radio like right now, if you're listening to me on the radio, you're going to hear ads, right? That's how the lights get kept on at all of these businesses. Now, would you rather see an ad for cars, new cars, when you're looking to buy a new car? Or do you want to see ads for cars all the time? Personally, if I'm looking for a new car, that's what I want to see. ads for a new car. If I'm looking for shoes, that's what I want to see ads for shoes, right? you get the point here. So if Facebook's able to kind of track what you're interested in what your friends are talking about, then it can give you the ads, and it thinks you're going to be interested in I love that concept. And as somebody who owns a business, I particularly love that concept. So I'm not wasting time or money, not wasting the time of people who aren't my customers and would never become a customer by showing them an ad, right? It's like the Super Bowl ads coming up in a couple of weeks here. But those Super Bowl ads that are almost useless and cost millions of dollars, you know, those are almost useless. So from an advertising standpoint, I love the fact that Facebook keeps that information. As a consumer, I love the fact that pays Facebook keeps that information. However, What I don't like is Facebook's habit of doing what's called cross-site tracking. What that means is Facebook knows Hey, I went to this site I went to that site, and it can help them with selling stuff it knows Hey Greg just went to the Ford website Ford trucks he was looking at, etc. etc. And so now it says Hey, Mr. Chevy dealer Are you interested in maybe buying some advertising is handed off to good old Craig there. And that's how they're making money as well. And so the Chevy guys happy because his ad went to somebody who was potentially going to buy the competition, which by the way, I buy an F 150. Any day over so many of the other products on the market, let me say that we can talk about that some other time, or a rather lengthy discussion. But that's what they're doing. So in the faith in the Firefox browser, when you're running Facebook, what it's doing is it is blocking that cross-site tracking. Because when you like something on Facebook, you might not be aware of it, but it can use some of that information for the cross-site tracking stuff. And there's a lot of information that I just don't want Facebook to have any of their business. Remember, it ends up in the hands of who knows who. Everyone to the Obama campaign. Did you want all of your information given to a political party? Then when Trump ran, they sold some of the information through a third party over in the UK to the Trump campaign. Alright, and so I certainly get it What? Why weren't people upset that the record of literally billions of people was handed right over to the Obama campaign, and yet, few only 10s of millions went to the Trump campaign, and everybody freaks out. Well, I guess that's part of the Trump derangement syndrome, right? So that's why I don't like Facebook to do cross-site tracking. none of their business was out. I'm going online, frankly. And that's where I use the Firefox browser. It's got some excellent cross-site tracking features built-in Plus it has some other features about advertising. And one of the ways that the web sites can figure out who you are, even if you turn off tracking, is to look at what plugins you have installed in your browser, right? A little bit about the history, the cache, the memory in your browser and your computer, right? The operating system version, the computer, the version of the browser, all of that stuff gets pulled out together, come up with a unique picture of who you are. So even if they can't say cookies, they can get all of this information, figure out who you are. Blocking Facebook from doing that when you are on Firefox, and in fact, Firefox blocks that kind of information gathering, no matter which website you're going to, it isn't just Facebook, so check it out. But the Department of Homeland Security now has come out issued a notification encouraging People to upgrade the Firefox browser. It is because there are serious critical actions where they use a security problem with the version of the Firefox browser. So they're warning us, they're advising us, they are encouraging us to make sure we update our Firefox browser up to at least version 72. Now the beautiful thing about the Firefox browser is it always tries to keep itself up to date. And so if your browser, whether it's Chrome or Firefox or anything if your browser comes up and says, Hey, I want to do an update, just let it do the update. Okay? Which usually means you have to quit the browser and restart it. So that's a huge deal because it's likely unless you configured it differently. You can tell it hey, I want you to reopen all the tabs I had open before all of the windows I had open and I do that all the time. I have, by the way, a little browser plugin that I use that you might like, it is called the Great suspender. I figured I should mention this to you guys, the great suspender. And what the great despite suspender does is if you go to a web page in a tab, it will automatically be suspended after an hour, 15 minutes whenever you set it for saving your computer memory and saving your computer execution time. Alright, so if you're like me, and you have a ton of tabs open, check that out the great suspender. So, in summary, if you have to have absolute compatibility, Google Chrome, normal browsing, you probably want to use opera and then Firefox for one year using Facebook, and then you know banks and things. Facebook or excuse me, and Firefox is pretty good. You're listening to Craig Peterson WGAN stick around because I'll be right back Welcome back everybody Greg Peter song here on WGAN and, of course, online as well. If you are watching on YouTube, and you want to see the articles, I post my videos on YouTube. This week we posted a few on Facebook as well. Hopefully, we'll be able to get them all up this week on Facebook as well as YouTube. So how do you find them? simplest way? Go to Craig Peterson comm slash YouTube if your YouTube user or Craig Peterson comm slash Facebook if you are a Facebook user, you know some of us like Facebook some of us don't like Facebook, I use it because of business. There are people on Facebook who are clients and who asked questions I often will put together these pop-up Facebook groups to address specific problems that people are having or the come up in in the news cycle as well. So all of that online at Craig Peterson calm, I'm also we're in the process of changing the website look and feel we got the new one laid out. But we don't have it up and active yet, but we should have it up hopefully within the next few weeks. So keep an eye on that too. I think you're going to like it a lot less confusing homepage than what used to be there. There's just too much stuff on there. So the new homepage has a couple of videos from the weekly summary of the articles. So you can click on them and read them and watch me as well. And then it has this is a new feature that we're adding to our newsletter right now. And that is, we have the top security tactics for the week. So the things you need to So like this week, as I mentioned at the top of the show, we've got a huge Microsoft huge security problem that the NSA told us about Homeland Security warned us about a problem with some of the older releases of Firefox. What software is being attacked right now in the wild? What needs attention now. So that's going to be a new feature of our newsletter as well. So keep an eye out for that. Lots of stuff going on as we get ready for our big training course that's coming up in just a few weeks from now. So keep an eye on your email box, because we're finishing up the course and I'm going to ask you guys what you think maybe I should add, make sure I have in the course. And I'm sure it's going to result in us having to produce a little bit more content than we thought, but the goal is to help you guys understand the security stuff. Now, this article is just mind-blowing to some people. It is from Forbes magazine. You'll find it at Forbes calm. And of course, I have a link to it on my website as well at Craig Peterson calm. But the United States has these programs. You remember all of the bragging people that, wow, I got my Obama phone now that President Obama took over and somehow they figured that it was from him, right. But we have had a program for a very long time for people who don't have much income. And I remember people with dial old rotary phones that got free phones, and the idea was that they could be used to call your doctor to call 911 or something that happened. A quick call to your family and friend. It was even back in the day when the phone call Company charged per minute to make a phone call on a landline. So these programs have been around for many, many years. And more recently, the government has been giving out to people, some of these smartphones. Now they're usually more limited functions and features, and they're trying to keep the costs of these phones down and keep them simple. But in this day and age, I look at it and say, Hey, listen, if we want people to be able to find jobs, they need an online web browser of some sort. So yeah, I love the idea of giving them a smartphone, you know, providing them a charity shouldn't be doing it. The government is doing it right now. But they should be able to go online and do some shopping. Some of the numbers I've seen out of Africa are amazing to me some of these charities I've worked with, who have gone and given phones even just the basic old phones you know, with the ten keypads on It that you can use to what was that called the T something rather. But you could use to spell out words and websites, and it would go there. And they've been giving them those phones, and now they've given them smartphones. But they have had some amazing results, particularly with women in Africa. They were able to build businesses now because they could communicate. Right? capitalism is a terrible, terrible name. Because the capitalists aren't the ones starting the companies. Then it's the entrepreneurs, and it's the people like you and me. Were the ones creating the companies? We're the ones taking the risk of the capitalists are the guys in the banks, who say, yeah, hey, if you don't need the money, we'll loan it to you. Right. Those are the capitalists, the people that are buying and selling stocks, and these big public companies. Yeah, those are capitalists. When we're talking about these African women, who have been some subsistence living for their whole lifetimes. Now being able to have a business where maybe they're making something selling it online, maybe they're selling their herds of animals buying herds, cheese, milk, whatever it might be. Those are entrepreneurs. And giving them the tools that they need, like the ability to be able to communicate is a huge, huge deal. Very, very big. So what are we doing here in the US? For years, the government has provided low-income households with cheap phone service, cheap cell service, and even free smartphones. Sometimes they are completely free, particularly if they are ill or injured, you know, on disability, etc. Well, one provider called assurance wireless, you probably heard of them before, offers a free Android device, along with free data, free trial. 16 and minutes now, this is all in this Forbes magazine article. So it sounds fantastic, right? smartphones can be expensive. Even if you buy the ones I say till I say don't buy, right like the Android phones, they can still be expensive, and they can still be $1,000. For some of these phones, it's not a cheap deal at all. But according to some researchers, the article goes on. There's a catch. The Android phones come with a pre-installed Chinese malware, which effectively opens up a backdoor onto the device and an endangers their private data. One of the malware types is impossible to remove, according to the researchers, and now the researchers here, our company called malware bytes. If you have bought one of my courses before you know Malwarebytes is one of the pieces of software, I recommend that you get it Not perfect right, but it helps much better than antivirus software, right? My gosh, did you realize antivirus software today? Today is effective against zero percent of the newest attacks is zero percent right, so having Malwarebytes is probably an excellent idea. So Malwarebytes said that they tried to warn assurance wireless, which is a Virgin Mobile company. And assurance wireless never got back to them. These devices that we're talking about have a backdoor and one that looks like it's impossible to remove. Those companies are still are those phones that are still out there. Man. So Forbes then after they found out from Malwarebytes about what was going on, Forbes reached out as well to assurance to wireless. Nothing happened. Okay. Then apparently, after the initial publication, this article a spokesperson for Sprint, which owns Virgin Mobile, and assurance wireless said, we are aware of this issue. We are in touch with the device manufacturer, unit max to understand the root cause. However, after our initial testing, we do not believe the applications described in the media are malware. So there you go. Chinese spying on Android smartphones. Well, that's nothing new. Having your phone coming pre-installed with malware. Hey, didn't we just talk about that a few weeks ago, how the latest releases from some of the major manufacturers of Android come pre-installed with over 100 vulnerabilities? So again, don't buy an Android period. Anyhow, let's see if the Craig Peters song. And here on WGAN online and Craig peterson.com. And we're going to talk about the ring controversy when we get back So stick around. Hey, welcome back, everybody Craig Peterson here on WGAN and online at Craig Peterson dot com. Thanks for joining me today. I appreciate it. We enjoy putting the show together, getting the information out helping everybody understand what's going on in the world of technology, you know, and I try and not use some of these industry terms that confuse people. And I've been told many times, that's one of the reasons people love to listen and to watch, and you can do both online at Craig Peterson dot com, and you can find me almost guaranteed in your favorite podcast app. No matter what it is. I'm pretty much there. I've been doing this whole podcasting business now for upwards of 20 years. So I am out there, and I appreciate every listener. Hey, if you enjoy the podcast, If you're listening to this podcast on TuneIn, make sure you spend a minute if you wouldn't mind and go to Craig Peterson dot com slash iTunes. Now iTunes is the 800-pound gorilla still in the marketplace, and they do a lot of statistical tracking. Go to Craig Peterson dot com slash iTunes. And if you would give me a five-star review, let me know what it is you like about the show, the best things. Hopefully, we can get even more people signed up. But I'm also on tune in, and I heart and all over the place. So you can go to Craig Peterson dot com slash, your favorite, whatever that might be tune in, and it'll take you right there, and then you can subscribe to the podcast. Well, we've talked many times about this general problem, and this is called the Internet of Things. What are you supposed to do? What is Well, we'll start there very briefly for those that aren't, you know up to date on this, because it is changing all the time. The Internet of Things now includes some of your clothing, yes, computers embedded in your clothes. Computers are built-in to the newest televisions, obviously, and into the refrigerator and your washer and dryer. At the Consumer Electronics Show, I saw some of the kitchen appliances like your stove, right? You no longer have to turn that knob on the stove. Now you go to an app, and you get your phone out, and it'll turn on or turn off whatever. That's the Internet of Things. The Smart light bulbs that we have the turn on and off the at the front door where you have maybe used to have a key, and now you can hold your phone up near that's the Internet of Things. Now, it brings about a whole lot of significant use cases and, and I love the Internet of Things. I have some of the devices at my home in my office that is all connected to the internet. And there's a good reason for it. And it works well for us. So that's the Internet of Things. Ring, which is a company that was acquired by Amazon a couple of years ago for $1 billion, is a security company. And their claim to fame was this video doorbell that they made, and they still do, and it's even still called Ring, and it's now being sold by Amazon who owns the company, as I mentioned. And the idea is you replace your doorbell on the front door, side door, whatever it might be with this little ring device. And the ring device has built into it a camera, and it's also hooked up to the internet. So if someone rings the doorbell, it will go ahead now, and it'll pop up and alert on your phone. And it'll say, hey, someone's at the door. Now you can not only look at the person at the door, and know that they are, who they are you can talk to them, you can hear what they're saying, you can go ahead and respond to them, have a conversation with them, whatever you might need to do. And then there are other ring devices now, and other devices in your home so you could unlock that front door. And Amazon has a service now that is used primarily in the bigger cities, where they'll walk into your home and leave the package inside by using a unique door lock that they can unlock. I don't know about you, Walmart is doing the same thing. With Walmart, that door lock is exclusive again, but Walmart will only use employees who have been with Walmart for more than a year and have a spot free record. Now that makes sense to me. You don't just want anybody walking in. But I don't want anybody walking into my house. So the idea behind Ring is you can be on that beach, you can be at work, you can be picking up the kids doesn't matter. And you know who has been at your home. So if you got a porch pirate, you can go back and look at the video. You can even turn it over to the police, which is where part of this problem starts. Because Ring has been doing some things that a lot of people say whoa, wait a minute now. Ring has stored all of these video recordings from the front doorbells and storing it in the cloud. Now just because it's in the cloud doesn't mean everyone has access to it, although we have certainly seen that with some cloud databases, which I believe is the problem that Ring had. So what happens then? Because now all of the videos that your ring devices have captured is online. Another problem that these companies had (Ring, Amazon Alexa, and Apple Siri) is that some contractors were looking at these video files listening to the audio. And people thought that was a terrible thing. Oh, you know, frankly, that's not a terrible thing. Because how are you going to make the voice recognition better? If nobody verifies the voice recognition, right? You have to have somebody listened to it. Well, in Rings's case, it turned out that some of their devices were getting hacked. Now we know this happens with the Internet of Things devices. Most of it's like 90 95%. I think all of the security cameras that we have in the United States get manufactured in China. Many of them are eminently hackable. I mean, in a very, very big way. So, if you have a device that's hacked, what does it matter to you? Well, it mattered to some of these people who claim someone hacked that their Ring device because they had a camera in their kid's room. And the bad guy took over the camera and started having a conversation with their kids. Now, if that's not a problem, I don't know what it is. Remember the LA Unified School District with their laptops. And the cameras on the laptops are being turned on remotely by their IT people at the school district. And young ladies had their laptops open in their bedrooms while they were getting changed. Think about the consequences here. They can be pretty steep, and there's no question about it. One of these days, we'll make a comparison of some of the smart devices that are out there. As far as things like smart-speakers go, Amazon has been excellent. They design their echo devices to have a hardware limit on them. So they can't just sit there and listen, unlike Google Home. There are some malicious apps on Google Home that could sit there and listen for hours on end and stream everything said. They heard streaming it all up to the internet. Okay, so Alexa is kind of the way to go there. There are these people whose kids' rooms now had hacked cameras and microphones and speakers going after the company. And in November senator Ed Markey, Democrat from Mass said that he wants to make some changes to something else that Ring has been doing. The other thing the Ring did was cooperating with police departments. What they've been doing with the police departments is sharing the video, live video as well as recorded video, from the doorbells, hopefully just the doorbells. The police are doing an investigation in the neighborhood. The idea is, hey, we can grab. They're up all this stuff from all of these different cameras. We can see this car that went through the neighborhood and spied on people. Right? Maybe, someone marking to come back to later and steal things. Now, that sounds perfectly reasonable to me. The problem was that people didn't know it was going on and didn't sign up for it. They were not aware they could opt-out of it, which is a huge, huge problem. When you get right down to it, we don't have the kinds of standards I think that we should have. There are some significant technical flaws in some of these devices. There have been Hackers accused of breaking into ring products, using the cameras and speakers to yell obscenities at customers in their home and harass children. It is an enormous thing, leaving data online uttering racial slurs issue violent and all kinds of extortion threats to residents. So it's a very, very big deal. Now Amazon responded to these charges, and this was Brian Huisman, an Amazon vice president said they take customer privacy and protection of customer data very seriously. Amazon acknowledged that on for occasions in the last four years, they fired employees for improperly accessing customer videos, and that's what I was talking about before. Ring used to have it set up so that anyone could access anything. It's kind of like God Mode over on Uber, where any of the employees could track any movement of anyone using Uber editor. Employees were using God Mode to track celebrities. It was just incredible login credentials, and a breach of more than 3600 Ring account holders last month. That's personal information. We've got to get more careful. If you are a company that has custom software that you've designed or that is designed for you, I urge you have it code reviewed. Make sure you are using the highest standards available so that you're not going to end up in a lawsuit. Ring is going to end up in a lawsuit over this. It's not just going to be Ed Markey going after him. Hey, you're listening to Craig Peterson on WGAN online and Craig Peterson dot com. Stick around. We got some more news, this time about cable modems. Hey, good afternoon. Welcome back. I should say I like Good morning anyways, it's a better greeting, isn't it then Good afternoon or good evening or Good night. So good morning, everybody. Craig Peterson here on WGAN and of course online and Craig Peterson dot com. We are also putting all of the show up on YouTube and Facebook. And you'll find all of that if you dig a little bit over on Craig Peterson calm, so hopefully, you'll be able to check it out over there. Now we have Greally seen a lot of security problems this week. You might even call it kind of a week of security problems. So just started with just a quick reminder to get everything patched up significant issues with Microsoft this week, and Firefox as well. Now the Microsoft problem was so severe that they released a patch for Windows the same day they announced the bug. They kept everything under wraps, which is how they try and do it. Typically someone will report it. Usually, they'll give 30 to 90 days to the vendor to get it fixed before they all kind of open source it before they tell the world about it. They want the vendor to fix the problem if it's a white hat guy, right? Of course, this time, had the NSA involved. And they did wait until Microsoft had a patch. But sometimes these vendors they'll sit on it for six months or more. And so they the guys that discovered it, say Okay, forget about it, we're just going to go ahead, we're going to release it out into the wild. We know everybody knows, you can usually expect attacks within a month after that happens. So make sure you patch up and patch up soon. You should have automatic updates turned on. We're going to be discussing this during the training that's coming up here in this course. It is going to be phenomenal. Let me tell you, but some of the free training, we're going to talk a little bit about that. We can't do this on the radio because I want to show you screenshots and where to go and what to do and how to do it. But make sure you have that all turned on. Okay. So now let's talk about our next article of the week. And this also has to do with the security problem. Now, if you are a listener to any of the radio shows that I'm on if you listen to have Jeepers, all over New England, any of these stations, you know, this week I was mentioned, I was talking about this problem with cable modems. And there are some huge, huge issues with them. And, you know, we got to be careful when it comes to our networks because that's how the bad guys get in and once they're in whether they came in on your system. Or they came in on that little thumb drive these stuck in the computer. Or maybe they came in some other way no matter how they came in. What we found is they use the network to spread. So what kind of network stuff can you get? What should you do? And most of us want to rely on it. We rely on our cable company, maybe our telephone company, etc., etc. So I'm pulling up right now. I'm just checking some pricing active here on my computer. What should you get? So first of all, this chipset that's used by several different significant vendors out there, including Campolo, net gear, sage, calm, Technicolor, they have ten different models that the researchers have found are vulnerable, which is not a good thing. And right now we know of over 200 Hundred Million cable modems that are affected. It means if you're a small business and man, we see a lot of these guys that get a cable modem because it's cheaper, right? It's going to save a couple of hundred bucks a month as opposed to getting fiber coming in with real professional gear. Yeah, the professional equipment is going to cost you more, but what's ultimately going to cost you more if you get attacked, right? Because 20% of the businesses filed for bankruptcy in less than a week. You know what's going to save you money. There's also the problem of you not knowing what to do or how to do it, and that is the reason I have created courses that help explain it to you? But with 200 million cable modems that are open right now in this is a massive, huge deal. So I've got an article up on my website talking about this that I got from Forbes.com. They don't require any authorization these cable modems to analyze what they call their analyzer. And they have two more. Two more of these vendors used an undeniably awful combination of this software and usernames and passwords a new spectrum for the username and the password to be able to get into these. So a very, very big deal. So what do I recommend? I have a lot of this in my, in my course, right, the DIY course that did last year. It's almost been a year, and I think since I did that course. But what I'm recommending right now, for most people in their homes is something get out a pencil, piece of paper, to text it to yourself, whatever you might need to do. It's called a net gear, or B or B i. Now, you can find these things at the big box retailers. You can buy it from Amazon, and you can get them all over the place. Now you know, I don't like Google stuff because I don't trust Google. Netgear has not been the best when it comes to security stuff. So they came out that's the main reason they came up with this thing. The RV allows you to have your main unit that plugs into the cable modem. And now that from that main unit, you can have used a mesh network is what it's called, you can have other Orbi devices around the house and get excellent coverage. Now in this day and age where everybody's streaming, the kids have streaming televisions in their rooms. Hopefully, you do not use the built-in Smart TV functions, but you have an external little smart box. But our kids have them in the room, so you need more bandwidth. If you see jerkiness when you're watching videos and having troubles on the internet, that's probably why, and you may only be using the old fashioned networks, the 2.4 gigahertz stuff as opposed to the five gigahertz stuff. Orbi of takes care of all of this for you now, it is not cheap. It is also not a professional grade. If you're a business, you should not be using this, and you should be moving up to the better Cisco stuff. Now, thank goodness Cisco got rid of the low-end line. They Cisco had bought, I think it was next year actually and some of their low-end equipment. And they can confuse the industry because people's you know, I got Cisco Well, no, really actually when she got was a home-based router, firewall, whatever it was. Small businesses medium, particularly in large businesses, you should have a Cisco network. Juniper doesn't have anywhere near the security stuff. Palo Alto Networks, nowhere near the security stuff. Cisco is 100%. Okay, so we count me on this. Back to the home users, and the real small business like a small office, Home Office, this Netgear Orbi, a tri-band whole-home mesh Wi-Fi system, is what you want. Three gigabits a second speed. It's very, very good. It's this particular model I'm looking at right now, and Amazon is called an RBK 50. It's a router, and the extender covers up to 5000 square feet. It is two-pack, and it is right now selling for $286 for the pair. You get the main unit, and then you also get another unit that is part of the mesh system that kind of expands the coverage and gives you the coverage you need in this day and age right because we have so much that's going on via the internet. So this works with all internet providers saying replace your existing Wi-Fi router and extender compatible with any internet provider, including cable, satellite fiber, DSL, and more. It has wired Ethernet ports and parental controls and even pauses device internet access. You can view history usage filter websites for free set online time limit schedule, device internet access, and more for five bucks a month, and they have advanced cyber threat protection. Now, it's not a tip. It's not the real commercial Advanced Threat Protection, but this is better than you're getting from the cable company. Okay. Advanced cyber threat protection, what they call net gear armor. And this is something a bit defenders provided but defenders you probably know something I like. Its network-wide anti-virus anti-malware fraud, phishing ransomware security on an unlimited number of devices, and comes to the free 30-day trial. And this is $70 a year for that service. Now you're paying per year like if you're a business and you buy equipment from us, you are paying monthly, and every year we at least right we do major software upgrades we keep the hardware up to date and because we're using the professional's stuff from Cisco. They're taking up literally hundreds of millions of endpoints. They're watching what's going on, and we're providing updates hourly for the commercial gear. Okay, so this is quite good. It's using, you know, mu MIMO. I'm not a big MIMO fan. Smart Connect for one Wi-Fi name being formed beamforming technologies, which is Primo. What that means is it aims a signal at the device so that it's not the kind of stomping over itself and stomping all over other devices, which is just fantastic. It has to be Bay to wireless security protocol, which is the lowest you want to use. It's quite good. Includes guest Wi-Fi access DLS which is a denial of service firewall VPN, Mr. Now we here's why I say guess Wi-Fi is excellent. You know home always talking about how you've got to be careful when it comes to your Internet of Things devices, like your Amazon Echo or your light bulbs or whatever. What you do when you set them up is you configure them to go on to your guest Wi-Fi network, which can still have a password, and then they cannot easily get on to your main Wi-Fi network and go after your computers. So there goes some actionable stuff. We learned that cable modems just aren't what they used to be, especially the ones we get from the cable company. I've got some courses that go into a lot of detail on this, but if you're kind of a techie person, you can probably figure this out. I brought up that at least right now. I still like this Netgear Orbi. It is a great little device. I'm seeing it at this very minute. Over on Amazon. com on the Amazon business site, by the way, an Amazon business they're selling it for $286. So good deal all the way around. Stick around. You are listening to Craig Peterson on WGAN. We will be right back. Hello everybody. Welcome back. Craig Peterson here. Glad you can join us today we are, of course, on WGAN and online at Craig Peterson dot com. Right now, I want to talk a little bit about a problem that you may not have heard about. You've probably heard of phishing, and you know, I talked about that all the time. That's the P-H-I-S-H-I-N-G. That's where someone sends you an email pretending to be someone that they're not trying to get you to do something. Often, it looks like it's from your bank, or maybe a bank you used to have dealings with, and they try and get you to click on something, and that might cause you to download and install something, and now all of a sudden, you are hacked. A lot of times that use this whole phishing thing to use it as a part of social engineering, right? They are trying to get you to do something, so you reveal your password and account numbers to them. Then they can get in, and they approach you and them, you know, make it look like it's all legitimate and hey, you know, we really want to help you out, and it just doesn't happen. That is the basics of phishing. If you're still if I'm not clear if you're still wondering what that is, just think of that good old standby right, the Nigerian prince scam from all those years ago. I wrote some software to help stop some filters. But that particular type of fishing doesn't go on like it used to. It's changed. And part of the reason it's changed is that our habits have changed. Now, how have our habits changed? Well, one of the ways that they have changed and changed hugely is that they have started using SMS. So you know, we're on our phones all of the time, these devices are formerly known as cell phones, these smartphones, these computers in our pockets. And if you look at the overall internet traffic, more than half of it now comes from these smartphone devices. So, by the way, if you have a business and you are not using a smartphone first strategy, you are probably missing out and maybe missing out massively. So make sure you handle that right handle that, okay, handle that for me. So, smartphones are a huge deal. Well, the bad guys aren't stupid. They're just greedy, and maybe even a little bit lazy. And that's where we get into this whole concept now of switching from email, where they're sending you phishing email trying to get you to do something to today, where they have switched over to SMS, where they are trying to get you to do something based on a text. They send you Now, and it used to be that if you send someone a text, the normal text was open within seconds after it was received nowadays. Now, with so much nastiness going on, we very frequently don't pay attention to the text messages. But they're doing the SMS phishing, and they're doing it more. So I wanted to cover five different attack examples so that you can see what they're doing and what it might mean to you. Alright, so let's go through them right now. So the first one up on the screen is a smishing. Example. Now. smishing is fishing over SMS. SMS is, of course, texting or a simple messaging system. Okay. That's what it is. That's what it was. So the first one is your bank account is locked. So you'll get a text message. It looks relatively legitimate. And it'll say from and the biggest example out there right now is the one that's up on my screen. You can see this by the way, by going to Craig Peterson comm slash YouTube, or Craig Peterson comm slash Facebook, if you're a Facebook user, you can see all of the videos from today's show. But it'll say from US Bank, separate US Bank unusual activity. It'll tell you your account is frozen.They want you to unlock it, and you want to go to a URL. Now they're not getting fancy with most of these URLs. And in this particular smishing case, it's taking them to their site. And then it has a question mark US Bank. So you look at it and say, Oh, well, this is from US Bank. I'm going to the US Bank website. I can click on that. so fast that this is not us banks URL at all. When you're looking at a URL, which of course, is what the browser uses to get you somewhere, the question mark just means pass this through to the program that's running on the original website. So there you can use it as a tracker saying, oh, wow, our US Bank submission attacks are working well, right now much better than the XYZ bank. So we're going to send out more than with the US Bank. Okay. So that's that after that question mark, in this case, is used for tracking but not always, right? There's a there are excellent legitimate uses. Not that tracking is not an illegitimate use. But in the case of bad guys, it's illegitimate. So that's number one. Number two is an urgent message about your credit card. And in this case, it's claiming to be from American Express. So if you look at this on the screen, you'll see it's from Amex. the message, which there is no such thing, right. And as you got a card alert and noticed the URL on this. It's WW, Http colon slash slash, www dot American Express dash message.com. So let's break down that URL for a little bit here. First of all, it's HTTP and not HTTPs. It doesn't matter a whole lot to you, if it's a scammer, because what they're trying to do most likely is avoid some of the tracking ability that's inherent in an HTTPS request. To be able to have an SSL certificate or a secure server certificate. They're going to have to at the very least go to a website and get a free certificate, and it's going to do a double verify, making sure they are who they say they are. That's going to record the Right. It's just a big hassle. So they're not going to bother doing that HTTPS thing. So that's why it's HTTP more than likely. And then it says www dot American Express dash message.coYou see that part? Well, again, that is not an American Express URL, not that you know, right. And not that you can verify when you go there. When you go there now, they kind of have Yeah, now in SMS, once you see, and you click on is where you're going. It's not like in an email where you can kind of hide what the real URL is people are going to, and it's going to show you the whole real URL. And when you get there, it's not going to know anything about you. But it's going to look like the American Express website. And it's going to have the login and password, and you're getting a card alert. So you're going to go there you can enter your username you can enter in your password. And tada, you're out of luck. Because now they have a username, password. And then they might redirect you to the real American Express website, and you have to log in again. You say, Well, that's weird. And you go on with life. No big deal. Well, in reality, what just happened is you gave it to them. And they're all set. So they're going to send you on over to the American Express website. And then you're done. Okay, next one up on the screen is you won a prize and click here to get it machine attack. You can see this one appears to come from our friends at Walmart. It says the example here on the screen is congrats, Kelly, we printed your code on your last receipt. You are among seven we randomly picked for $1,000 Walmart gift card promotion, and then it's got a link to a redirect Type site k three x VC dot-info, slash blah, blah, blah, blah. So if you click on that, you're going to their site. And again, they're going to squeeze you in this case for some Walmart information, maybe a bank account saying, Hey, we're going to wire the money to you what's your bank account number. And number four is, we're going to have to go through these last two real quick here and pretending to be from Amazon. You can see these up on the screen right now. And this last one is an unusual account activity from Apple support. So make sure you check these all out Craig Peterson dot com slash YouTube, or Craig Peterson dot com slash Facebook. I'll try and put this up on my homepage as well. You can see examples of these newest mission attacks. Stick around. We're going to talk about why some of these businesses are not patching and are leaving us vulnerable. You're listening to Craig Peterson on WGAN. Wow, can't believe it man is our last half hour together right now. You're listening to Craig Peterson here on WGAN. Thanks for joining me and online Craig Peterson dot com. Make sure you subscribe to my email list. You'll get all of the updates, and my most important videos of the week. You'll also find out about when the nasties are happening like they're happening this week as well. Sign up Craig Peterson dot com slash subscribe. I'd love to see you there. We're going to talk about the biggest problem we as consumers have, we as business people have. These lines cross because businesses are holding our data. With this new California law that's been in place for consumer privacy and keeping everything information safe, letting us know what businesses have about us and requesting its removal. There's a movement afoot to help get a handle on our personal information. You probably know that the Europeans passed a similar law, that when in fact that got teeth last year, went in a couple of years ago, just like the California law did last year. And these laws are rolling out all across the country. Massachusetts has it, and the federal government is looking at a law similar to California has to pass on a national basis. So what this ultimately means is, we could be in better shape as consumers and we could be in a lot worse shape as businesses, as we've been getting calls from businesses lately about how do I go ahead and protect myself as a business here? What do I have to comply with when it comes to this whole California Yeah, consumer privacy thing, right? Very, very, very big deal. So how do we do this? Well, as a business, the simplest thing we need to do is start at the very beginning, because the California law lots and lots, a customer client or prospect come to you and say, Show me the data you have. But there are crazy teeth in place in pretty much every state now that if you lose their data, you are in even deeper trouble. Look at what happened with Equifax. Look at what happened with TJ x right the TJ Maxx type companies who lost tons of our data Home Depot. Some of these companies had good security tools in place, but their people did not know how to use them. They couldn't read the reports. They had multiple vendors tools in place, and they didn't have just a single pane of glass. Lastly, they didn't have the type of automated systems that really can get rid of the false alerts. Man do we are there a lot of false alerts, every day hundreds of thousands, my company it for our clients we get 10s of thousands no think of it of these alerts every day. Oh my gosh, it's crazy. So you as an individual, whether you are just all just right, but if you are a consumer, or if you are a business, you have to patch now it's painful I get it. It is in nowhere near as painful as it used to be, you know, you used to install the windows patch and, and it was like putting your marble on red and Vegas, right? The odds are what 5050 not even quite that you're going to win it, it's crazy because you would install a patch and your machine Wouldn't boot. And so now you had to spend days sometimes trying to figure out, Why won't my machine reboot? What can I do? I think I'll get a new machine and move my data over. Make a good backup and write all of this stuff back and forth. The pros and cons. So how do you do all of that? How do you make that happen? Well, today, it's a lot less of a problem. Most of the time, when Microsoft releases patches, you're okay. It's not like the apple environment with a Mac where it's scarce that you ever have a problem with your Mac, okay, with an upgrade. It's sporadic. So keep that in mind as well. And now, let's go back to this. So if you are a big business like an Equifax and you find out that there is a major security problem with, let's say, some of the middleware that you're using. Now middleware is the stuff that sits between the front, which is typically the way site or your customer service people, and the backend, which is typically your set of databases. So that's your middleware. So let's say that there's a patch for the middleware, which there was. And you look at it and say, Oh, my gosh, this middleware changes. Because usually when they issue a patch, it isn't like, Hey, this is just a patch, install it, and you're fine. It's usually a hey, we've made a bunch of changes to improve things in our middleware, or our software and our web browser or web server software. We've made these changes. And as part of this, by the way, we fixed this other security problem. So when you as a business person now who have complex systems in the background, and you're trying to do an upgrade to make sure that middleware is up to date, or that database software or that front end software is up to date. It may not work properly anymore. It probably won't. Now you have to spend a bunch of engineering time to figure out what do I have to change? What other components do I need to modify? How can I make this whole thing work properly again, and that can cost you a lot of money. So what a lot of businesses have been doing is burying their heads in the sand. Hopefully, that's not you, but burying their heads in the sand. All of a sudden, before you know 200 million US citizens, data is out there. You have all of this inside information about people because your Equifax right now people lost jobs when it came to, to these hacks I just mentioned earlier, and that's probably a good thing. But I also empathize with them because I do outsource CISO, chief information security officer tasks for people. I can tell you most of the people who are in these positions have in their drawer, right there next to them, their resume. If they do get hacked, they'll pull out the resume and start shopping around again because they know it's over with. And yet they could not get the authority from the business to do the upgrades and the updates. So I have done this myself. You sit there, and you say, Oh, my gosh, what's the win here? It is not going to generate more revenue by doing these patches. And I'm just one of what millions of companies worldwide that using this software, open-source or otherwise, probably nothing that I need to worry about. So forget about it. I'm not going to mess with it. Have you fallen victim to that I know I have, and that can end up being a problem and a real problem depending on who you are? So pay businesses is upgrading. Sometimes it's because they don't know, which by the way, is another reason to be on my newsletter list. It's free. But every week now, we're telling you here are the top problems that are out there right now from a security standpoint that are being exercised right now by the bad guys in the wild. And if you don't have these patches done, you are in deep trouble. So that's easy to do just credit Peter song.com slash subscribe, and you'll get those types of things. But we're looking right now this particular article that came from secure World Expo, and they're talking about Paul's secure VPN, which we don't use for any of our clients. We have a much much better VPN software from Cisco. But anyways, patches came out for this a long time ago. months. In fact, and it turns out that most organizations have not done the patches yet. So be very careful here. If you're a member of a board of advisors, a board of directors if you're a business owner, if you have questions, reach out to me at Craig Peterson calm, I'll do what I can, but you have a responsibility. And now, it's fiscal responsibility. Coming June this year, depending on what kind of manufacturer you are, there are criminal liabilities tied into this including, ten years in prison. So hey, guys, pull up your socks and start taking this seriously. So you'll find me online. Greg Peterson dot com, and, of course, I'm right here on WGAN and make sure you subscribe to that newsletter. Craig Peterson dot com slash subscribe. We'll be right back. Hello, everybody, Craig Peterson here. Welcome back. Wow, the last segment of the show today. It's just going by fast, and I love it. I'm so excited about everything now. We have so many, so many things that are going to help you in the works right now. It's just been a phenomenal, phenomenal time for all of us here. So thanks for joining us. I want to do a quick review of what we've covered today. So let's go back here. I got my slides up. And we'll go right back here. So we started with some of our training and tactics. And we talked about technology and how it can only protect us so much. And in fact, part of the problem we have is the wetware. It's you, and it's me responding to things. Next up, we talked about some zero-day browser vulnerabilities. And in this case, we specifically were talking about Firefox and significant weaknesses this week in Firefox. And I told you what version of Firefox you should be running and what you need to do for the windows security vulnerabilities was exposed this week by the NSA. So you know, congrats to them. By the way. Here is your free phone, right? The Obama phones while it's not Obama's phone, it goes back for decades now, this program that we have in place to help underprivileged people who don't have much money, who maybe need some way of contacting their doctor, etc. Well, it turns out that some of these phones from one manufacturer, in particular, come with m

Business Processes Simplified Podcast
The Bulletproof Proposal Template with Troy Dean

Business Processes Simplified Podcast

Play Episode Listen Later Dec 9, 2019 29:25


Guest’s Background: Troy Dean is an online marketing speaker, coach, consultant and podcaster. He specialises in helping businesses and entrepreneurs use the Internet to attract new customers and build their communities. He also managed the online strategy for Jessica Watson, the 16-year-old Australian girl who sailed around the world and helped FebFast raise over $1 million in 2011 and 2012 for the drug and alcohol sector. He’s also a professional voice-over artist and has voiced campaigns for hundreds of brands including Ford, Telstra, ANZ, Hungry Jacks, Mitsubishi, AFL and Cricket Australia. Plus, he sang the Cadbury jingle – “Wouldn’t it be nice if the world was Cadbury?” His clients include: QuickBooks Law Institute of Victoria Westpac Melbourne Business Network Australian Anthill Edge of the Web Business Blueprint Uniting Care Wesley Website: troydean.com.au SNAPSHOT XXX is a [describe company here]. XXX has operated a website for some years. With advancing technology and the rise of social media, XXX needs to redesign their website to align with the goals of the business and the target audience. XXX needs a website that functions as a powerful marketing and communications tool to attract new clients, position itself as a thought leader in the industry and provide credibility to potential joint venture partners. XXX has approached [insert your name here] to design and develop a new website. BUSINESS NEEDS Specifically, the new website needs to fulfil the following business needs:  [insert business need here]  [insert business need here]  [insert business need here]  [insert business need here] Also required is a content management system that will allow XXX to easily manage content on the site and reduce administration costs. TARGET AUDIENCE NEEDS The target audience for the XXX website is defined as [describe target audience here]. The new website needs to assist the target audience to do the following:  [insert target audience need here]  [insert target audience need here]  [insert target audience need here]  [insert target audience need here] Ultimately, the XXX website should be a useful resource for existing clients, potential new clients and potential new partners. SOLUTION We recommend the development of a completely new website, built from the ground up, with a custom design to convey the value that XXX adds to its members. The new website will be designed to: [insert benefit here that helps achieve needs from above] [insert benefit here that helps achieve needs from above] [insert benefit here that helps achieve needs from above] [insert benefit here that helps achieve needs from above] [insert benefit here that helps achieve needs from above] [insert benefit here that helps achieve needs from above]   Additionally, the following “behind the scenes” features will be built-in to the website: regular pings to Google, Yahoo and Bing Google analytics performance reporting High-speed page loading anti-spam features on contact forms video tutorials and a user manual for the content management system Web hosting services are provided on a monthly or annual basis by our preferred hosting partner or by XXX’s existing hosting company. FURTHER CONSIDERATIONS Successful websites of those websites that continue to attract the right type of visitors and lead them down a path towards becoming a customer. This requires consistent content publishing and monitoring of the website to make sure it is achieving its objectives. Once the website has been launched we can assist you with your content strategy and make incremental improvements to the website to make sure that it continues to deliver a positive return on your investment. We would be happy to speak with you about this in more detail and answer any questions you may have. In the meantime, you can see more about our service here [insert link to website care plans]. PROJECT TIMELINE We offer the following timeline for the redesign of the XXX website: Discovery – 4 Weeks Development of a sitemap and interactive prototype so that all functionality can be tested and approved in the browser. Design – 3 Weeks The design of website user experience and user interface to allow the target audience to easily navigate and use the website to achieve their needs. Development – 4 Weeks Development of working website on the WordPress content management system. Testing – 1 Week Final testing and debugging on a development server before launching. INVESTMENT Project Essentials – $7,200 The following elements are considered essential to the project: Development of information architecture into the sitemap Development of interactive prototype to finalise functionality and any third-party integrations Design user experience and user interface Develop working HTML/CSS website to best practice web standards Develop responsive breakpoints for tablet and mobile experience Integrate website into WordPress content management system Integrate Search Engine Optimisation best practices to increase visibility in popular search engines such as Google and Bing Test and debug beta version of the website before launch Launch live website Integrate a daily and weekly backup schedule to protect the website Integrate Google analytics software Training and comprehensive video tutorials included   Project Options – $3,000 The following options are recommended to enhance the performance of the website and help XXX achieve the strategic objectives outlined in this proposal: Develop a highly targeted lead capture strategy to convert website visitors into leads Develop a well-structured blogging platform to allow XXX to post thought-leading articles in order to attract the targeted visitors to the website Develop a commenting module to allow website visitors to leave comments on the blog articles as a way of encouraging engagement and conversation Integrate social media sharing facilities to allow web visitors to share articles with their friends and colleagues on platforms such as Facebook, Twitter and LinkedIn.   Project Total – $10,200 The above pricing is effective for 30 days. FREQUENTLY ASKED QUESTIONS What is information architecture? Information architecture is the relationship of how all the different pages of a website are related to each other. This is communicated visually through a sitemap. Here is an example of a sitemap: http://sitemaps.thewpdevshop.com/proctormajor/ What is an interactive prototype? An interactive prototype is a black and white version of your website that is designed to prove the functionality and features as they will work in the browser. No design elements are applied at this stage as the prototype is just built to allow all parties to make final decisions on the functionality. Here is an example of a prototype: http://prototypes.thewpdevshop.com/proctormajor/ Why do you use WordPress? WordPress is open source content management software and currently powers around 25% of all websites on the Internet. The project is contributed to by tens of thousands of developers all over the world and is growing from strength to strength. WordPress allows us to develop flexible and customisable websites to modern standards and observes web development best practices. Furthermore, the community of web developers that use WordPress reaches far and wide and allows us to tap into this collective intelligence and bring that wealth of experience to your project. Where is the website hosted? Your website needs to be hosted by a hosting company that specialises in WordPress hosting. There are many companies that do this. WP Engine, Siteground, Pagely and Pantheon are just a few who specialise in this area. We are more than happy to make a personal recommendation should you require one. Who do I call if something goes wrong with the website or I can’t figure something out? Provided you subscribe to one of our ongoing website care plans, we will be your first point of call should something go wrong with your website. We will determine whether it is something the hosting company needs to fix something that is covered by your website care plan. We will provide training and video tutorials to assist you in using your website once it is launched. What happens after the website is launched? Once your website is launched, we will provide 30 days of support to make sure any bugs have been ironed out and that you are confident using your new website. After this, you will need to subscribe to one of our ongoing website care plans to make sure your website is looked after and maintained. These website care plans include updating your software, regular backups, security checks and making sure your website is online and open for business 24/7/365. More information on our website care plans are available upon request. How long will it take to appear at the top of Google? The time it takes for your website to appear on page 1 of Google depends on a number of factors. It depends on the search phrase people are using to find your website and the number of other websites that are also available for those search phrases. Nobody can truly say how long it will take for your website to appear at the top of search engine results pages (including people who actually work for Google), however, there are a number of factors that can improve your chances. Building your website on WordPress is a good start as WordPress has some great Search Engine Optimisation fundamentals built-in. Creating unique and interesting content on a regular basis for your website is also critical to increase your visibility amongst search engines. Launching your website and then forgetting about it is a surefire way to get lost amongst the noise. We are happy to talk to more about your search engine strategy if we haven’t already. How will I know if anyone is visiting my website? We will install Google analytics software on your new website and show you how to log into your Google Analytics account where you can see a wide range of statistics about your website including a number of visits, page views than the amount of time people are spending on your website. Once you subscribe to one of our website care plans you will also receive more detailed analysis about your website performance and recommendations on how to improve. What happens if I want to add some features to the website while you’re building it? Whilst we like to be flexible and responsive to your needs, we also like to deliver what we promise within the time frames and budgets we have allowed. If you ask us to add new features to your website while we are building it, will most likely ask why? If we all agree that your new request will help us achieve our objectives then we will be more than happy to oblige. If your new feature is something you would like to add to your website but is not directly tied to your original objectives then we will suggest to schedule it for a second iteration of the website once it has been launched. This will require a new proposal. NEXT STEPS To proceed with this project, XXX is required to take the following steps: Accept the proposal as is by clicking on the “Accept” or “Approve” button, or discuss desired changes. Please note that changes to the scope of the project can be made at any time, but additional charges may apply.  Submit an initial payment of 50% of the total project fee. Once these steps have been completed we will begin the project with an introduction of all relevant people and begin the discovery process. MUTUAL AGREEMENT This is a variation of the original Contract Killer template by Andy Clarke which can be found here: http://stuffandnonsense.co.uk/projects/contract-killer/ Between us, XXX and you XXX. Summary We will always do our best to fulfil your needs and meet your goals, but sometimes it’s best to have a few things written down so that we both know what’s what, who should do what and what happens if stuff goes wrong. In this contract, you won’t find complicated legal terms or long passages of unreadable text. We have no desire to trick you into signing something that you might later regret. We do want what’s best for the safety of both parties, now and in the future. In short You (XXX) are hiring us (XXX Pty Ltd) located at XXX to design and develop a website for the estimated total price as outlined in our proposal. Of course, it’s a little more complicated, but we’ll get to that. What Do Both Parties Agree To Do? As our customer, you have the power and ability to enter into this contract on behalf of your company or organisation. You agree to provide us with everything that we’ll need to complete the project – including text, images and other information – as and when we need it and in the format, we ask for. You agree to review our work, provide feedback and approval in a timely manner too. Deadlines work two ways and you’ll also be bound by any dates that we set together. You also agree to stick to the payment schedule set out at the end of this contract.organisation. You agree to provide us with everything that we’ll need to complete the project – including text, images and other information – as and when we need it and in the format, we ask for. You agree to review our work, provide feedback and approval in a timely manner too. Deadlines work two ways and you’ll also be bound by any dates that we set together. You also agree to stick to the payment schedule set out at the end of this contract. We have the experience and ability to perform the services you need from us and we will carry them out in a professional and timely manner. Along the way, we will endeavour to meet all the deadlines set but we can’t be responsible for a missed launch date or a deadline if you have been late in supplying materials or have not approved or signed off our work on-time at any stage. On top of this, we’ll also maintain the confidentiality of any information that you give us. Getting Down to the Nitty-Gritty Design If we are designing your application we’ll create designs for the look-and-feel, layout and functionality of your website. This contract includes one main design plus the opportunity for you to make up to two rounds of revisions. If you’re not happy with the designs at this stage, you will pay us in full for all of the work that we have produced until that point and you may either cancel this contract or continue to commission us to make further design revisions at our standard design rates. HTML and CSS Layout Templates If the project includes HTML markup and CSS templates, we’ll develop these using valid HTML and CSS code. The landscape of web browsers and devices changes regularly and our approach is to look forward, not back. With that in mind, we will test all our markup and CSS in current versions of all major desktop browsers to ensure that we make the most of them. Users of older or less capable browsers or devices will experience a design that is appropriate to the capabilities of their software. We do not cater to people using Microsoft Internet Explorer 6 and cannot predict the behaviour of that browser. We will also test that these templates perform well on Apple’s iPad. We will not test old or abandoned browsers, for example, Microsoft Internet Explorer 6 or 5.5 for Windows or Mac, previous versions of Apple’s Safari, Mozilla Firefox or Opera unless otherwise specified. If you need us to consider these older browsers, we will charge you at our standard old browser rate for any necessary additional design work, development and testing. Text Content We may have written a hundred blog posts but we’re not responsible for writing or inputting any text copy unless we specified it in the original estimate. We’ll be happy to help though, and in addition to the estimate, we will charge you at our standard copywriting or content input rate. Photographs You will supply us photographs in digital format. If you choose to buy stock photographs we can suggest vendors of stock photography. Any time we spend searching for appropriate photographs will be charged at our standard discovery rate. Changes and Revisions We know from plenty of experience that fixed-price contracts are rarely beneficial to you, as they often limit you to your first idea about how something should look, or how it might work. We don’t want to limit either your options or your opportunities to change your mind. The estimate/quotation prices at the beginning of this document are based on the amount of work we estimate we’ll need to accomplish everything that you have told us you want to achieve. If you do want to change your mind, add extra pages or templates or even add new functionality, that won’t be a problem. However, you will be charged accordingly and these additional costs will need to be agreed to before the extra work commences. This additional work will affect deadlines and they will be moved accordingly. We’ll be upfront about all of this if and when it happens to make sure we’re all on the same page before proceeding. We may also ask you to put requests in writing so we can keep track of changes. If the nature or functions of the project change significantly throughout the process, we reserve the right to deem the current project cancelled. At this, point you will pay us in full for all the work we have done and may commission us to complete the new project based on the new requirements. This will require a new quote and contract. Technical Support You may already have professional website hosting, you might even manage that hosting in-house; if that’s the case, great. If you don’t manage your own website hosting, or your current hosting environment does not support the solution we are providing, we can set up an account for you at one of our preferred, third-party hosting providers. We will charge you a one-off fee for installing your site on this server, plus any statistics software such as Google Analytics, then the updates to, and management of that server, plus any support issues will be up to you. We are not a website hosting company and so do not offer or include technical support for website hosting, email or other services relating to website hosting. Legal stuff We can’t guarantee that the functions contained in any web page templates or in a completed website will always be error-free and so we can’t be liable to you or any third party for damages, including lost profits, lost savings or other incidental, consequential or special damages arising out of the operation of or inability to operate this website and any other web pages, even if you have advised us of the possibilities of such damages. If any provision of this agreement shall be unlawful, void, or for any reason is unenforceable, then that provision shall be deemed severable from this agreement and shall not affect the validity and enforceability of any remaining provisions. Phew! Copyrights You guarantee to us that any elements of text, graphics, photos, designs, trademarks, or other artwork that you provide us for inclusion in the website are either owned by your good selves or that you have permission to use them. When we receive your final payment, copyright is automatically assigned as follows: You own the graphics and other visual elements that we create for you for this project. We’ll give you a copy of all files and you should store them really safely as we are not required to keep them or provide any native source files we used to make them. You also own text content, photographs and other data you provided unless someone else owns them. We own the markup, CSS and other code and we license it to you for use on only this project. We love to show off our work and share what we have learned with other people, so we reserve the right to display and link to your completed project as part of our portfolio and to write about the project on websites, in magazine articles and in books about web design. Payments We are sure you understand how important it is as a small business that you pay the invoices that we send you promptly. As we’re also sure you’ll want to stay friends, you agree to stick tight to the following payment schedule. 50% deposit upfront 30% instalment once functionality and design has been agreed upon 20% balance once the application has been tested and everyone agrees it is ready to go live. NB: If you are unable to supply all of the right content at this stage, it does not mean we have not done our job. Once the site has been tested and is ready to go live, either with your content or placeholder images and dummy text, we will issue the final invoice. Once the final invoice is paid we will hand over the keys and show you how to put your own content in once it’s ready. If the final invoice is not paid within the credit terms we have given you, we are under no obligation to keep the site on our testing server or continue with the project in any way. But where’s all the horrible small print? Just like a parking ticket, you can’t transfer this contract to anyone else without our permission. This contract stays in place and need not be renewed. If for some reason one part of this contract becomes invalid or unenforceable, the remaining parts of it remain in place. Although the language is simple, the intentions are serious and this contract is a legal document under exclusive jurisdiction of the courts of [insert your location here]. Authorising this project requires a signature below or approval of this proposal by clicking the “Accepted” or “Approved” button on the proposal website. Signed for XXX                                                                   Signed for XXX. Support the show.

Craig Peterson's Tech Talk
AS HEARD ON: WGAN Mornings with Ken and Matt: Browsing with Privacy and the Firefox Browser, Passwords and Password Managers and IoT and 5G and more

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 6, 2019 12:25


Good morning everybody! I was on with Matt and Eric Lusk who was subbing for Ken. We talked about browsers and privacy.  Firefox is taking the stance that privacy is where they need to concentrate their advanced efforts and updates.  That is great news for everyone.  We also hit Passwords and Password Managers and why you should use one and 5G and the internet of things.  I am out in Phoenix at a big conference and will have some big announcements after I return that will help every one of you to cyber secure your life. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Who is tracking your web movements? Use Firefox if you want to know  Security 101 - Passwords and Password Management  --- Automated Machine Generated Transcript: Good morning, everybody. Craig Peterson here. I was on this morning over on WGAN in Maine on their am FM stations and talked a little bit with Eric, who was in for Ken this morning, Eric and Matt, about browsers what you should be looking for. Firefox has a new claim that we talked about this morning, I gave some advice on the thing, you need to download the one plugin that you must put on all of your browsers, and where to get that. And Eric asked a little bit about 5g and how it's going to change his life. So, of course, we got into that as well. So here we go with Eric and Matt. Well, ladies, gentlemen, it is that time of the day and that time of the week again, because 738 on a Wednesday, and that means that it's time to talk to Mr. Peterson. Craig Peterson, our tech guru joins us now Craig, How are you this morning? Hey, I am enjoying the conversations this morning between you two. This is quite a time we live in. It is quite a time ladies and gentlemen that we live in certainly the day after the election in Portland which made Matt a happy man. is a great day. Yes, indeed. So, let's start off in the world of technology, sir, by telling me something that has been beguiling me for some time. Firefox, so so there's privacy protections that make website trackers visible here and I and I used to be a Firefox guy, I guess is where I'm asking this question. And I switched off what like the rest of America to Chrome ages and ages and ages ago and I never switched back. But I've heard good things sort of in recent times about Firefox sort of being worth it again. What do you what? Generally speaking your take on all this? Okay, well, I did a pop-up training about different browsers. And in this day and age, something worth talking about. Microsoft, of course, had their internet explorer, aka Internet Explorer, bum, bum bum, a really poorly designed and implemented browser that didn't work on many websites out there. And what really kind of got Microsoft to pull up his socks was what you were just talking about, which is the Chrome browser out of Google. So Microsoft realized Internet Explorer was not worth it's salt. So they went ahead and they replaced it with another browser that they had created. Internet Explorer was actually created by Paul de and, and TSA. And they took the code so I won't go into all the details. But now Microsoft's newest web browser is actually Google Chrome. And it's rebadged. It's using something called chromium, which is the basis for Google Chrome. So Microsoft has switched over to Google Chrome many people So Matt, you're not left alone. I'm sure Eric uses Chrome as well. I use it from time to time I use Google Chrome if I try to use the Microsoft Internet Explorer, the 8 gigabytes of ram just grinds to close. Right? It explodes. Hence the name Internet exploder. Your question about Firefox is really quite opportune because there are two worlds there are three browsers out there that really keep privacy in mind. Now, you might have noticed over the last two, there are a lot of plugins designed to block ads, etc. Google removed the ability to block at an in certain cases, they removed it from Chrome now, because of course, they make their money through advertising can't blame on the guys over at Firefox have decided they're going to make privacy there. No Bro one thing for Firefox, and their latest version, which is verse 70, settles, the Firefox browser has a lot of privacy protection built-in. So I like it. I like it a lot. And I'm going to give you guys a little plugin you can put into your browser that's going to help no matter what browser use. The other two privacy browsers out there are opera. And there are rumors that opera has now got some Chinese connections, I have not been able to verify that. But opera by far, very, very privacy-related much more so than then Chrome is. And then the most private browser is called epic epi C. And the epic browser is also based on Chrome and chromium. So it has a lot of that same functionality, but it blocks pretty much everything and cookies. Now here's what I want everybody to write down. If you're using Chrome or Firefox or anything, something called Privacy Badger. And its Privacy Badger BADGR. Just like that nasty little road and to cleanse around from the Electronic Frontier Foundation. Privacy Badger is available as a plugin for almost any browser out there. And it watches where you're going. And it looks for trackers on the website. And it automatically learns which trackers it thinks should be blocked. And it is the least intrusive that I have ever seen for keeping your privacy. Privacy Badger. Epic might not work with some websites, Firefox and Opera work pretty much with all websites, but you can add Privacy Badger to both of those. So what do I recommend? If you really want the ultimate and private use? Epic. There is something even more private called the Tor Browser but then it gets complex. But use epic. If you want good privacy use Firefox, I would say I use opera a lot. And in any case, even if you're using Chrome, get the Privacy Badger. It's free. It's easy to download and install it on your browser. All right, we're talking to Craig Peterson, our tech guru. He joins us every once in a while, Wednesdays at 738. By, by and large, to talk about what is happening in the world of technology. Craig, tell me a little bit about one password. What is it and why is it changing things for some enterprises? Well, one password is what I use it because allows me and my teams to be able to share certain information, one password to keep passwords and logins for, generate passwords. But it also allows you to apply it and so as a family, Husband, and wife can share bank account information with it in business enterprises. Because now with allows them to have team so you might have a team of people to work or even just a few people that are working on the website, for instance, so they can all formation and then if someone leaves a team, you can instantly remove their access to the passwords and have someone go through and change all the passwords. So one password businesses what we're talking about here, they've got advanced protection mode, as well as all kinds of monitoring tools that let you know if a website is being compromised, and it helps take care of the biggest threat to security for most organizations, and that the people with absolute phenomenal employees all kinds of factual information in their hands and sometimes it gets lost. So one password has some holes and some key levels. recommend to anyone in the business. And both guys, Matt and Eric, you should be using one password, because it really helps you keep all of your accounts all of your logins safe. And remember, I told you that you should lie to your bank. When it comes to rolling password recovery questions. One password keeps up straight for you. Because you should be making up the answers to which high school did you attend? was your first date you know those questions? Make up the answers use one password to store them securely so that if you do need to use the password recovery stuff, you've got the right information, which is the wrong information, right? Because you're just totally made it up out of thin air for the eventuality that the websites going to be compromised and to stop the bad guys from getting the answers to your password caliber security questions. Craig, and see if I can get in one quick question. How is 5g going to change my life compared to 4g technology? Did you just say that? That was a quick question? I got two minutes here. Here's the bottom line, Eric 5g is going to change everybody's life. Because first of all, Data Access is going to be way faster than it is right now ultimately when it rolls out, but it's going to be cheaper. And 5g is designed to handle billions of simultaneous connections. What that means is everything that can have activity is going to happen. Now, for instance, your Tesla, two parts in the garage connects via the internet, the Tesla, of course, I plug it in every night. Yeah, exactly. And when you plug it in, and it connects to the home Wi-Fi network, it updates that software automatically. It's 5g. Eric, what's going to happen is everything's going to be internet-connected, your glasses are going to be internet-connected. Because it's so inexpensive, so easy. And it's designed to have so many devices connected, which opens up, of course, a number of worms when you're talking about the things because it will make the internet of things I'm talking about. Anchor, you're going to keep track of how far you walk that morning and everything is going to be online, Greg. If I could just find my five-year-old sneakers every morning. I would be happy if I could just find them. Yeah, there's probably going to be an app for that. Yeah, exactly. There will. Alright, well, Craig Peterson, our tech guru joins us on Wednesdays at this time to go over what's happening in the world of technology. thank you as always, always a pleasure and we will talk again next week. By the way 1 pm on Saturday. By the way, 1 pm on Saturday, every Saturday, Craig has a show right here on WGAN. And thanks a lot, Craig. Appreciate it. And good luck with the show this weekend. Thanks. All right, so why don't we take a quick moment here and toss it back over the news. Hi, guys, hey, I'm out at a conference. And I'm going to be here for well about another week, actually. And I just want you to keep your head up. Because if you aren't on my mailing list, you are going to find out about some very cool stuff that we're going to be doing later here in the month of November and December, and after the first of the year, too. So if you're not on my mailing list, if you don't get my weekly emails that come out every Saturday morning, make sure you subscribe right now are you going to miss some amazing stuff? You might have already missed some of these pop-up training that I've been doing that have each gun a couple of hours apiece sometimes a little bit more. So go to Craig peterson.com slash Subscribe, and right there, you'll see a little form. I won't spam you. I do let you know when I have two training courses when I have the pop-ups when I have all of this stuff, but this is not one of those heavy sell marketing type things. And you're going to want to know about what we're doing coming up here to help you out. All right, have a great day and we'll be back with the show this weekend. Bye-bye. Transcription by otter.ai --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
Welcome! Are KeyLoggers still a problem?, Is Someone Tracking Your Browsing?, Why China Is Banning Encryption, and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show11-02-19]

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 1, 2019 89:23


Welcome!   Today there is a ton of stuff going on in the world of Technology and we are going to hit a number of topics from Keyloggers, to Privacy and Encryption, and Tracking -- so stay tuned. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Who is tracking your web movements? Use Firefox if you want to know. Little Inexpensive Devices Can Remove Sensitive Data Security 101 - Passwords and Password Management  Common Password Vulnerabilities and How to Avoid Them Cyber Cold War Right on Our Door Step International News Hits the Dark Web When Businesses Are Required to Capitulate to Chinese Society Cloud Players Vie for Pentagon Contract Privacy and China -- Not So Much --- Automated Machine-Generated Transcript: Hello everybody, Craig Peterson here. Welcome to my Saturday show her right here on WGAN. And online at Craig Peterson calm. You'll also find me up on YouTube, where I am posting videos of this show. And I try and do that every Saturday. I've been doing this now, last few weeks. This Saturday's no exception. Next Saturday maybe because I am going to be out in the West in the conference. So we'll see how that all goes. I may end up doing next week's show from my laptop, which would be a little bit different. I haven't done that before. So we'll see how that all goes. Today we are going to be talking about Firefox. A lot of you guys asked questions about browsers. So I've got an article from naked security up on my website at Craig Peterson. Calm talking about this. But Firefox browsers and this came up in one of my masterclasses here over the last couple of weeks, you know, those free classes that I've been holding, these are not pitchfests, in the least, we spent two hours in the last one. And this particular one, we're talking about privacy, and I had mentioned the offer browser and have some questions on that. So we will be talking about that today. Keylogging is an ongoing issue. It seems that every business that we go into, to help them clean up or do a security assessment and action plan for them. They all seem to have key loggers, at least one machine, man This week, we just found one of our clients had a data x filtration going on. Thank goodness, we had the right kind of equipment in place because it automatically noticed it and shut it down. But keylogging is a great way to start. That whole BX filtration, we're going to be talking about passwords today as well, which is always a big topic. And we'll talk about one password and some common password problems. We've got a warning out from checkpoint, and those are some guys that make some security software. That is saying that there is going to be a new cyber Cold War next year like that's a surprise. So we'll be talking about what that means to you as a home user as a business. The BBC did something I don't know that anybody would think about, but when I thought about it a little more. It made sense. But the BBC is now on the dark web and will tell you a little bit about that. And that also goes into my whole commentary about some of the browsers out there. And by the way, if you want to sign up for these masterclasses, I don't think I'm going to be having one this coming week. But if you sign up for the master class, you can attend Live asked questions. I always answer all of the questions, which is why sometimes it goes much just three hours because I try and make sure everybody understands what we discussed. I've been doing them live as well on zoom so that you can kind of jump in and type in your question in the chatbox, and I'll make sure I get to it right away. And I will be having more so see the two I've done, I think, Okay, the last couple of weeks. I know I did one on VPN and one on mobile security just yesterday. So make sure you sign up Craig Peterson comm slash master class. And these are, as I said, they're free, and these are not pitchfests. But it's me looking at material trying out material answering questions that I can use in upcoming courses that I do so. Tick tock, by the way, if you haven't heard about it, I've mentioned it on one of the morning appearance appearances that I do on the radio, but Tick Tock is here. Getting back now about this is from China about claims that China is doing the nasty with it. Microsoft man who thought that they would win this Amazon was the shoe and winner for this contract with the feds. We'll talk about that. And a little bit about what does it mean for you if you are using cloud services and what's the government trying to do here, and China, they passed a cryptography law. You know, of course, about Facebook, as I mentioned this before, and Facebook's cryptocurrency while China's getting in the game as well. And hopefully, they don't beat us to the punch here when it comes to the cryptocurrencies. You can watch all of this, as I mentioned, and I just noticed myself right because I got a little monitor sitting here so I can see what we're streaming. And I noticed that this big green logo God is behind me. It is for my ball. I sit on one of these kinds of big bouncy ball things so I can keep my back moving. In fact, this whole table that I'm sending that that you can see in the video on YouTube, this whole table, and my website. Of course, this whole table goes up and down. So I've got my production equipment here. I've gotten more production equipment there. I've got a huge 4k TV up there that shows me all of the different feeds and things it's just a nice little setup, but that's what this is in case you're wondering watching on TV certainly caught my eyes I might have caught yours as well. So let's get into Firefox right now. Mozilla, these are the guys that make Firefox has been trying to focus on security and privacy. And there is a difference between security and privacy. Security is where we have information that is kept private, but it is also kept secure, so it doesn't get out. It doesn't leak out. There's no way for anybody to get it. So that's how we're defining. Well, no way, right? There's always some way. But that's how we're defining security when it comes to browsers. Privacy is different privacy is where you don't necessarily want websites to know where you are, where you've been, what you're doing when you're online. And we should have privacy. I'm more concerned about privacy, my privacy, right. When it comes to government monitoring, then I am worried about privacy rights when it comes to business monitoring. Because businesses all they're going to do is try and sell me another pair of shoes. Or a car, maybe when I don't need a car. Government, much, much different government is going to be very intrusive government is the sole authorized entity and that it states to use force against you for what they want. In other words, the government can pull out a gun, put you in jail, take away your rights, your freedom, and kill you in some cases. So I get concerned when it comes to government. If you don't have the government, then you are really at risk. Now, how good is the government? I don't know. We were seeing these impeachment hearings going on with President Trump. The accusations are that under Obama's direction, the CIA started an investigation into Trump for political purposes. Then the CIA fooled the FBI into launching an investigation, and then there were some people high up in both these organizations, right. It's not the normal, lower level of people that were running this sort of stuff. And there's we can tell, right? But I get concerned, because even if this was true, and also if it was only the top-level people within the CIA, the NSA, the FBI, that were involved in, could move downhill. And we keep hearing talk about the deep state and what they're doing. Well, do you want the federal government to have all this information about you about where you're going online, what you're doing, and it goes back to the socialists. The quote that I've had in the front of my mind for the last couple of months is, show me the man I will show you the crime. Because every last one of us has committed a crime, some of them felonies. You before you leave your house in the morning, you've probably broken some rules. Regulation or law? Because there's so many of them just on firearms, there are more than 20,000 laws, how can you be expected to comply with them all? So, if you've got a committee in Congress, for instance, that wants to impeach the president, or someone else and they're allowed to go after the guy everything look at everything they've ever done everything! YES, Everything Everything. They will find a crime because everything is a crime. Oh, finally, we found an offense. Do you think that you with what you do online might have committed a crime at some point in time? That's the real question. If you're online and you are doing something that they want to paint as a crime, right, all they have to have is rumors to destroy your life. Look What happened with Mike Flynn? Did he remember every word that was said when he was vacationing in the Caribbean? Man? I know a lot of people that are a vacation in the Caribbean and are tipping back. Few too many drinks. Do you remember everything you said last time you inebriated? Right? And then now you're led into a perjury trap. All of this can happen when it comes to your online browsing history, what you're saying online when you don't have privacy. Again, we're talking about the government here. What the government's monitoring with the recording -- Who are you calling? What are you doing? And me, I'm a member of the media. And as a member of the media, I talked to all kinds of people I'm sure people that I have interviewed over the years have ended up being arrested and Probably some of them convicted of who knows what crime. So now they go back, and they selectively look at things that I might have said I might have talked to that person, and now I am a criminal. So when we're talking about privacy, there are two levels. I'm not worried so much about businesses tracking me. I am apprehensive about government monitoring me. And when we get back, we're going to talk more about this because the government monitoring side of things, and the business side, end up merging. It's kind of like a Moebius spurt strip here, frankly. You're listening to Craig Peterson. I'm on WGAN and online at Craig Peterson, calm, stick around because we'll be right back. Hey, everybody, welcome back, Craig Peterson, here on WGAN. And online at Craig peterson.com. Of course, as Peterson SO and we were talking about privacy protection before the break, I want to add one more thing about privacy protection when it comes right down to it. And that is, you are the person responsible for it. So let's do a little bit of education here. Let me help you understand what we're specifically encryption. Your web browsers can use encryption when talking to websites out there so that any data from your browser to the site is encrypted. Not that they always do it, but they can do it, and there are some plugins to make sure that it is using eat in corruption when possible. So one of those plugins is called. What is SSL everywhere, I think, is what the name of it is. But there's a number out there. But there are many browsers that do aim at trying to keep your data safe online. And I talked about those in the masterclasses here that we recently had we got more coming up, and we'll be answering even more questions. Of course, correct. Peterson comm slash master class for those three classes. But you can use a different browser. So, for instance, you know that if you have windows, you probably had Microsoft Internet Explorer on it. And then, they switch to this Edge browser. And now they have switched to using Google Chrome as the base. So basically, it's there. It's called chromium, which is the base that Google Chrome is based on and is in the OpenStack Source space. And Microsoft, of course, put their stuff on top of it so that they make sure they break a lot of websites. Well, that's, that's not why they did it. They did it because they're Microsoft and they know better anyhow. Your current Edge browser is not a Microsoft product. It's a Google product for the most part. So some of us will also use Google Chrome, which is the most popular browser out there by far right now. If you are using a Mac, you probably have Safari. So I've run through the leading browsers that people are using out there. Currently, some browsers are privacy aimed. One of them is the Firefox browser. And the other one is Opera. Those are the two most common, and Opera is probably the better of the two. But as was brought up in one of my master class, by one of the attendees, there are rumors that China has started to take control of opera, which could be a problem. And then there is the most privacy oriented browser in the world called tour. But we're not going to go into that today. You can find all kinds of information on the tour. I have done some Facebook Lives on it. And you'll find those online at Craig Peterson comm slash Facebook. And you can find out how to use the most private and secure browser that there is out there and it's free, by the way. So Firefox is trying to be the browser when it comes to privacy. And they have a few different browsers that are available on iOS and your Android devices, each offering different levels of privacy protection. Still, they have offered another privacy treat tweak to Firefox version 70. And this is the ability to see how often websites are tracking you. So if you are running Firefox, you can go and access it by clicking on the address bar shield icon. That's where you would normally see the information about any SSL certificates in use right now. It has a drop-down at itemizes different types of trackers detected on the various websites that you might be using. Now, there are some other things that you could potentially use and what I use as well. And probably one of these days we'll have to get more into this and what am I using and how are we blocking things, but there there are a few other plugins that you could use one from our friends over at EFS Electronic Frontier foundation that I use and that I like. I recommend, but we're right now we're talking about Facebook and Facebook, Firefox. Okay. So naked security, as I mentioned, has an article you'll see up on my website as well. And it's talking about the enhanced Tracking Protection that they did test. They said users might not notice the detection of many trackers if you already have this set to a strict setting, but it works pretty well. I like what the EFF has done a little bit better. But to back up its claim that privacy protections with having of Mozilla released figures showing that Firefox had blocked 450 billion cross-site tracking requests since the second of July. And now that's risen to 10 billion blocks per day. So a cross-site tracking is a site that might put a cookie on your browser. So that it knows what you're looking at what you're interested in where you came from, right. And that's one level of being monitored by the marketers. The next level of being monitored by the marketers is this cross-site stuff, including scripting. And that is where they're pulling data from another website. I have a client that this just happened yesterday. And this client has been using Internet Explorer. Now, we have been after them for a long time to get rid of Internet Explorer. It's not even supported by Microsoft anymore. So there are all kinds of security vulnerabilities. And they use this one particular small bank to do all of their banking. And they went online to the bank, and they couldn't log in, they couldn't get it to work. And it hasn't been working for months. Well, as it turned out, the advanced security that we had installed in their Network found that the bank had used an embedded a cross-site script, going to a tracked customer relationship management system. That was a fairly new site. It's only been online for about three weeks period. So we consider that high risk because that's a typical mo modus operandi for a hacker group. So we blocked that access. And that access, then made it so that she couldn't get a login. Now, this is all good, because it's a high-risk site. And we don't want them going there. We don't like the cross-site scripting, because many times that's how hackers get your data. And we're not going to get into a whole bunch of detail on how that works. But the Mozilla will block that now, which is nice, frankly. And you have to turn that on. If Wanted again, it's called enhanced privacy protection. And by the way, there is also a built-in password tool on Firefox called block-wise. And they now can generate a secure password when signing up for a new account. Now coming up here a little bit later, I'm going to be talking about passwords, some specific stuff about password managers, and not what the best practices are. But you can use it to replace the weak ones, and Firefox has been doing a pretty darn good job. By the way, Mozilla says that lock wise can be protected using Apple's FaceID Android Touch ID face recognition systems. And they're using AS 256, which is pretty good. encryption, it's tamper-resistant, it's GCM, it's their block cipher technology. They're using one PW protocol to obtain keys a, and they're doing a pretty good all shocked to 56 for the encryption key. So have a look at that if you are concerned about privacy leading into security, have a look again. And a side note here from our friends and naked security reason test by the German Federal Office for information security Firefox as importantly only one of five browsers to be given a passing grade. And I will leave you to guess who some of the ones that had failed. Were and I talked about them all the time. All right, stick around. You're listening to Craig Peterson on WGAN. Online at Craig Peterson dot com. We're going to talk about vampires on your computer when we get back, so stick around. Hello, everybody, Craig Peterson here. Welcome back. Of course, we're alive. Every Saturday from one till three. You can see me on Facebook Lives I've been conducting master classes. We got a great class coming up on hardening windows. It is a course we'll let you know about that as well. Hopefully, you got this morning's email. I send it out every Saturday morning with my notes for the week, including all of the articles we're talking about today. So make sure you follow along. If you haven't already, go to Craig Peterson dot com slash subscribe, you'll get my special notes when they come out. You'll find out about some of the nastiness that might be happening out there, and you can be on top of and in Friend have any of these big problems that are out there? That's Craig Peterson comm slash subscribe. Well, let's get into the vampire side of things right the spooky time of year Halloween. Everybody's thinking about these vampires, and things about there's a kind of a cool new Walking Dead-ish show that it's a comedy on Netflix that we started watching. It is very, very cool. I think it's a fun one. But did you know that there may be vampires lurking in your computers? I mentioned a little bit earlier. But I have seen these vampires in pretty much every business that we've done an NSAAP in. So here's what an NSAAP is. An NSAAP is a network security assessment and action plan. We call them in NSAAP, right, so we'll go with In we charge 500 bucks. We analyze all of the machines that are on their network and what their security problems are. And then they have something they can run with, to try and fix the issues themselves or because it's so complicated, we'll fix them for them, right? That's what we do, we not only fix those problems, but we keep going. We keep the patches going, which is one of the most important things for you to do. We make sure that we have multiple layers of security on the machines and then on the network, and then at the network edge, etc., etc. So when we're looking at, these will look at two things that will look at vulnerabilities. And if they want us to, and there's an additional charge for this, we'll go ahead and look at indications of compromise, which means, Hey guys, not only do you have these vulnerabilities, but it seems like there's been a compromise. Now, you don't want to be compromised. I think that goes without saying the bottom line. But when we do this indication of compromise test, I think 100% of the times, and we have found one of these vampires on at least one computer. And what I'm talking about right now are key loggers. There is a guy that just went to prison sentenced just a couple of weeks ago for this type of thing. But there are two types of key loggers. But the bottom line is they're trying to find what you're typing because they know that you're going to have to type in password usernames, right? And they don't even need to know what's on your screen at the time because they can, you know, they can pretty reasonably recognize what you're typing. you're typing a letter versus you're logging into a system. And that, by the way, is why you need to factor authentication. That's why we use UB keys YUBI You can find them online Yubikey so that you have your account, you have your password, and then you have to physically insert this special encryption key to keep your data safe, right, that's the bottom line here. So the two types of these key loggers are there are hardware loggers, and the hardware key loggers are something that plugs into the back of the computer and then plugs into your keyboard. You don't see as much as you used to because many of us use Bluetooth keyboards. Now Apple is the best there is when it comes to it. And if you're watching me now, you see I've got an iMac over on my left, which is an Apple iMac. I've got Keyboard an apple keyboard, which is Bluetooth and an apple trackpad, which is Bluetooth hooked up to these, but it's using a special version of the Bluetooth protocol. To get the keyboard to sync up and the trackpad to sync up, I have to plug it into my iMac so that they can exchange security keys. So it's not just the basic Bluetooth security, it's much more advanced than that, which is great. So what they're trying to do now is get it so that with this apple keyboard and trackpad, there can be a key logger that pretends to be my Mac and then the keyboards talking to I'm Mac's talking to it, they get you can't do it right. Now, with the older stuff with a regular Bluetooth keyboard. What they'll do is they'll put a little Bluetooth receiver in the area, and it'll pretend it's the computer and the keyboard. Now regular Bluetooth keyboards do have security. And it does negotiate with the machine. So there's some security there. But most of them, the older ones, particularly all of them, are entirely hackable. So, what they were trying to do, again, is a key log. They sit in the middle between your keyboard and your computer and is easier to do with a hardwired or with a USB keyboard. You might want to switch to the latest version of Bluetooth available for your computer. Now the second way that keyloggers work and how we often find them when we're scanning the software. We're looking through the system registry, and looking in detail at everything. Those key loggers are pieces of software, and they've been inserting themselves into your operating system. So, that whether you're using a Bluetooth keyboard or hard wired keyboard, they see everything that you type. That's a problem because, again, they can figure out what your username is what your password is. Well, a New Jersey man has confessed to getting into businesses during hours and after hours and planting key loggers. And we've seen this happen in some congressional Democrats offices as well where they found installed key loggers. The Department of Justice has named the companies that were victimized one to New York, the others in Texas, and they both have offices in New Jersey. And what they said was that this guy, anchor wall 45 a month Ville news jersey pleaded guilty New York Federal Court on Tuesday this week to two counts of obtaining information from computers and one count of aggravated identity theft. So these can be bad, and they can be used to break into your bank accounts and all kinds of things. That's where identity theft comes in. And according to the court documents, it started in June 2016. When he trespassed into these companies, New Jersey, Brandt's branches, he got his hands on an access badge. And it let him keep, keep coming in when he wanted to write. And he installed the hardware key logger, those are the ones that sit on the USB port, or that you can program a Bluetooth keyboard into right so if you have physical access, all you have to do is just configure the Bluetooth keyboard to talk to your keylogger and then the keylogger talk to the computer. Then and then of This is hard, right? And apparently, he got employee usernames and passwords. He also snuck his computer and hard drive under the company's computer network. So we could install malware that does the same thing, which is the software key logger just talking about, then this gives the crooks a way to track everything, breach everything and get internet works completely. Okay. It's, it's a real problem. It's a real real problem. So, key loggers can be notoriously hard to find. But there is software that can find them in your normal antivirus. Sometimes it can. Hey, stick around. When we get back, we're going to get into passwords. You're listening to Craig Peterson here on WGAN. And I got a surprise for you when we get back. Of course, online Craig Peterson dot com slash subscribe. Hello, everybody, Greg Peterson here. WGAN online, Craig peterson.com. What we're going to talk about passwords right now, and there are some surprising numbers that have just come out. I'm going to be talking more about these next week. Zogby, these are the pollsters just came out with some statistics on businesses and getting hacked, which is amazing. Amazing. Because it turns out that a quarter of businesses hacked in 2019 went out of business, 10% immediately went out of business. It's just crazy, but we'll be getting into this in more detail coming up next week. But let's talk about passwords because this is one of the most important things you need for your security. Now there are movements underfoot, and Microsoft is involved in Google and others in getting rid of passwords entirely. That's good. And it's bad. Now, they're not saying they're getting rid of the password. So anybody can just say, Hey, I'm Greg Peterson, let me into the Twitter account, what they're going to be doing and what they're already doing actually, is those accounts that they are that they're trying to protect, or it's using an exchange between your browser, the website, As well as something that you have like the Yubikey. You know, TLTP it's a one-time password type thing. That's where it's going. It's not there right now. And right now, the best thing you can do is protect your past. passwords by using one of these pieces of software that automatically generates a unique password for you for every website, and also store them securely will fill out the form for you with your password in there, so you don't have to remember it. And we go the next step and my company because we are a master managed services provider, that in fact for a master managed security services provider, but that's a mouthful. Be meaning that we provide the security services that other companies sell. So we're the people behind the scenes for a lot of local break-fix shops, bars, etc. So the change is now that one password we can tie in and we do tie into something called do ODUO-and it's something else that Cisco Bought, it's interesting. I don't know if they're following us around, but three or four of these products that we've been using for years, Cisco recently bought that we've been using them because we found them to be the best that was out there. So one password has a Business Edition, as well as a condition that you can be using, and you should be using for your family and using it to share passwords. So with the business version here, you can create different groups of users with varying vaults of passwords. And it makes it very, very easy, therefore effective. And frankly, according to CIO magazine, and I agree with this, you can get a measurable, beneficial impact on security just a few days after you've rolled it out. Now they have one password advanced protection, which also has extensive monitoring tools that we use to So that you can take control of your security in your business. So look at one password. It's not expensive, and it's not cheap. Okay? It's right in the middle. But one of the things it does is it lets you know hey, we have reports at this website that you have an account on has been compromised, so you've got to go ahead and fix it. So you've got to keep control of your sensitive information I've talked to before I had quite a stir when I said .hey don't tell the truth your bank you should be lying to your bank when it comes to your password recovery questions. And some people push back one of my daughters is pretty high up in a bank, and she was taken back by the headline, which is Lie to your bank, right? And then she read the article, and she's going to share it with other people within the bank because it just makes a lot of sense. So one password business lets you securely share passwords across your teams, or do your parliament, and only the people that need access to an account can get the access to the account, which is very, very important. It's the whole concept of limited access and, and who should be able to have access, right? very minimal access. Now there are other password managers out there. As I've said many, many times, I like one password, I think it's absolutely the best out there. That's what we use. We use it in conjunction with do Oh, and use that in conjunction with Yubikey. So that we have multiple layers, multiple layers of security when it comes to logging in. So let's say that you can't use one password, maybe your home user, your Soho, small office, Home Office. Let's talk about the other options available. One of them's called LastPass, which is pretty good. I've mentioned when we've talked about Firefox that it has a password manager built-in. That's pretty good as well. But let's get into the common password vulnerability. Ladies and how to avoid them. The old thinking was that you should change your password every 30 days, maybe more frequently. And that you need to have a mixture of numbers, letters, special characters, upper and lower case. That is no longer true. Not at all. The best password is a long password, that phrase, and you throw a couple of uppercase letters and some special characters in there. That's the best password. And not having your people change passwords every 30 days is also beneficial because it encourages them to come up with better passwords. Okay, because weak passwords are just the worst. So length versus complexity. You know, a complex password. Some of them they're saying like eight characters or lowercase characters, numbers, special characters, and in reality, that's a weak way to come up with passwords. Because if you're talking about eight characters, that's easy to break, relatively speaking, you can download my table from the internet, it's about two terabytes and size is pretty long. But it allows you to break pretty much every password that was ever created by Microsoft, or that you've ever used on a Microsoft System older than Windows 10. And even Windows 10 systems where there's been a migration So in other words, pretty much every password used in Microsoft, and. And that's called a brute force attack. When you're going up to the character one's a long one, you can use these fancy crackers, okay, that are out there. Well, if you enter a 16 character password even let's get simple, a 16 character password that only has lowercase letters. Computers right now using brute force, it would take 224 million years to crack that password 224 million years, versus it could break your password in nine hours, an eight-character random password randomly generated. Okay, so the length is the key here. So whether you're using one password or you're using just one account by yourself length is what matters. Now, some applications older programs you're using, they used to be restricted eight characters, many of them. Hopefully, they're not anymore, but give it the longest password that they allow that you can reasonably remember because you don't want to grab one of these. I'm holding up a sticky notes post-it notes here in the camera. You don't want to use one of these to write down your password and stick it on the screen. or stick it in the drawer, okay? Because now that guy or gal that is breaking into your office at night can find your password good, you wrote it down. So you don't have to be so complex it has to be written down. And you don't want it to be a character because that only takes nine hours to be cracked. Okay? So keep those things in mind length. Is it enough? Well, yeah, pretty much okay. But if you're using a password that is like your catchphrase, put down that cocktail that people might know that maybe you have on your Facebook page or something on your website at the office, your LinkedIn page. The bad guys are going to do a little doc scene and find it, and they're going to use it, and they're going to get in okay. So don't use these. You know, the quick Silver Fox jumped over the lazy brown dog or other things are going to be easier us Long password, if you ever have taken one of those memory courses to help you with your memory, and then it's a random list of words and it's like, airplane armed, low brown dog, etc. And then you associate them right. So the airplane flew over into the envelope, and the brown dog ate the envelope. Well, do that. Memorize that. And you can also use foreign languages. For many of these, you can come up with crazy words, anything that you know, well, that's a long-phrase going to be the best password that you can generate. And never, ever, reuse the password. Don't use them on multiple websites because if you use it on your kid's site for their x box, and you use it on the banking side, and the Xbox gets hacked, they now have your banking site password, okay? So be careful of all of this stuff. There's this out there called Have I been Pawned - spelled P-W-N-E-D? Go there, check your password, they'll tell you how good it is, based on whether or not that same password is located online. In one of these hacked websites, it's out there and use password managers use multi-factor authentication. These are things like DUO and YUBIKeys. Just do it the right way hardware tokens. They're getting more involved. Now I mentioned OTP. One time password, which is a new protocol, is going to get rid of passwords online. Google has their own called Titan. And there was just recalled on a bunch of those Google Titan keys. certain models of them. You know, stick with Yubikey. They are quite good. smart cards open PGP Fido is the new standard that I've been alluding to, and use them all the time. All of your passwords matter. All right. So that's it for passwords. And when we come back, we're going to talk about the new Cold War. That's coming up in 2020. will be talking about the BBC now on the dark web tech talk and their response over China's influence. And Amazon was expected to win this big contract of the federal government. We didn't talk about that and what my concerns are with us, and what your concerns should be when it comes to cloud computing. So those are coming up. So stick around. You're listening to Craig Peterson right here on WGAN and online. Craig peterson.com. Subscribe to my email list. Get my weekly emails to find out about the free masterclasses etc. Craig Peterson dot com Hello everybody, Craig Peterson here. Welcome, welcome. Welcome back. Of course, you're listening to me either on WGAN-AM online at Craig Peterson dot com, you might be watching over on YouTube Craig Peterson dot com slash YouTube or maybe Facebook, maybe LinkedIn, I'm starting to do a few things with LinkedIn. So we'll see where that all leads us. We're going to talk right now about some predictions, and this is from information security. buzz.com. An article by Checkpoint is a company that makes various types of security software. They were one of the very first firewalls many many years ago. I used them 20 years or maybe more ago, but Checkpoint has been around for quite a while, is not a product I use anymore. But they do have some useful information. And that's what we're going to talk about right now. And they're talking about 2020. And this is all about their predictions. And they're saying that we really could be looking at a significant cyberwar coming next year. What does a cyberwar look like? What are we talking about here? Because cyber Cold War's mean what what what is it cold war. You're not using kinetic weapons writing. In other words, you're not firing missiles. You're not shooting guns. You are playing games with each other, Right? We had as part of the cold war against the socialists and in the USSR in Russia, Soviet Empire. We had a trade war going on where we wouldn't trade directly with them. We wouldn't trade certain things with countries that did do trade with them at the time, and the CCC p ended up going out of existence entirely. That's an example of a Cold War. So today, what is a Cold War look like? We know the United States has started doing some cold war-ish things with trade. Right? We've got our president out there right now, President Trump, who is saying, Hey, listen, China, you need to smarten up. You are doing things that are hurting us. None of the Presidents before me, have had the guts to come out and say this, or do anything about it, but I am going to put tariffs on these various goods because we want you to stop stealing our intellectual property. We want you to be fair and open in your trade with us. China has been pushing back, and put some of their tariffs in place, and they go up, they go down. Is that a Cold War? Well, I don't think sustainable. But at some point, that's a Cold War. Right at some point to say, yeah, that China in the US is just going to butt heads together. I think it becomes a Cold War when we start trying to enforce sanctions against countries that do business with China, which will be bad for us. Now, the European leaders also sat on their hands for about 20 years. It's been since the late 90s. They sat on their hands and didn't do anything about China. So is this a Cold War right now? No, not really. Is it a trade war? Well, kind of. Yeah. We do have a cold war going on with North Korea. They're, they're not shooting missiles at the US, per se. We're certainly not shooting missiles at them neither South Korea. So yeah, there's a cold war there. Where else might we have Cold War's Well, you know, kind of a little bit of a one with the socialists in Cuba? You know, killing 20 million people in Cuba turns out to be a bit of a problem. We have a Cold War right now with Venezuela. And in Venezuela, of course, again, people starving to death in the streets with their socialist government. There seems to be a trend here right with socialist governments and people dying. So yeah, we have cold wars going on right now. So what checkpoint is saying that these nation-states that are out there that don't like us, but have very little power over us are going to get into a cyber Cold War with us? Because, again, if things were to escalate, you know, China versus the United States, if we wanted to hot, or where we were shooting at each other, the United States would probably win, you know, we we'd have to see, of course, it'd be a lot of lives lost, which would be horrific. Obviously, these smaller countries, we just go in, and we could topple them pretty easily look at what happened in Iraq, look at what happened in Libya, in Syria, where the Obama administration decided they would destabilize the Syrian government. They sure as heck did that didn't they looked at where Syria is right now. So we could do this with most small countries. So what can they do to retaliate back against the United States they're certainly not going to get into a hot war with us. Well, what I what checkpoint is saying is there is going to be a new Cold War, conducted in the online world. the world as western and eastern powers increasingly separate their technologies and intelligence. We've already seen Russia have a kill switch for the internet. China has a kill switch for the internet. And in both cases, particularly in China's case, they are controlling everything that people see on the internet. And that's where the whole Tor browser on your network comes in, right to help get that information out. Behind these curtains. We've got the bamboo curtain. We've got the Great Firewall of China, all of these things. So they're saying the ongoing trade war between the US and China and the decoupling of the two huge economy economies is a clear indicator of a potential Cold War, cyberwar. And it actually might be if we don't come to terms with China, we can see things getting worse. Talking about something that happened this week with one of my clients. It is a client that took some of my advice, but not all of my advice, right? Unfortunately, that happens. And so we had some equipment in place. We found with this client that they had given remote access to employees, for the employees to get into the systems at the office. And they didn't do it right. And we gave them a proposal to go ahead and make this, you know, make this happen clean things up. And they didn't. So they still had this, how do I even put this, it's like a big box retailer, firewall VPN controller, and you've heard of the company's name before, I'm sure and just a total joke. And they wanted to continue to use it, and they continue to use it. So then Week, what we found was that someone hopped in via that one of those computers that were used remotely that remote connection, right so so they hopped in, they got on that remote connection, probably because the employee's computer on the remote side was compromised. So they connected to this VPN server on this platform that I, I'm not going to mention their name because I don't want to confuse anybody. And think that it's a good platform because it's not it's cheap, though. It's cheap. And they were able to get in now on to the computer with remote desktop. And then from that computer that was on their internal network that we had no visibility into, they were able to go to another computer for the Operations Manager. And from there, they started uploading x Phil trading data, again, customer information potential They're intellectual property, etc., etc. So they were trying to accelerate it through a device that we control that is designed to look at all of the data, make sure that none of that data that's going out is data that contains confidential information, etc. Right? And it noticed something weird, which was waiting a minute is 6 am. Why all of a sudden is are there gigabytes worth of data on the way out of the network. And so our systems alerted our tax and immediately shut it down. I think about eight gigabytes made it out before we shut it down. So this is an example of what happens in a cold or cyber Cold War in this day and age we saw this week. It's a very, very big deal and this is a small company and trying to save a few bucks. I mean, a few bucks. They may have lost everything. We stopped it partway through. But because we don't have visibility throughout the whole network, who knows what's been going on in there, we can only see stuff that's going out x filter via our network connection on the outside. Okay. So it's they're expecting our friends over at checkpoint are expecting this to escalate next year. Where did this come from? Well, we did some tracebacks. However, what happens is someone can be sitting in China, using computers that have been compromised in Russia, to connect to computers that are compromised in Brazil to connect to computers are compromised in Mexico to connect to computers right here in the northeast United States. So you see what I mean. It's unpredictable but it is exactly what happened. But we did see a little bit about the source in the routing, what happened here. Now, cyberattacks are being used as proxy conflicts between smaller companies that are countries. I should say smaller countries aligned with these bigger countries that want to go after each other. It's going to be fascinating. So we got a couple more points here. We'll get to, and I will get to them as soon as we get back. So stick around. You're listening to Craig Peterson right here on WGAN. And online at Craig Peterson dot com. Peterson, with an O, stick around. We'll be right back. Hey, welcome back. Craig Peterson here on WGN online. Craig Peterson dot com. Thanks for joining us today. I know you got a lot of stuff going on. I appreciate you guys sticking around. Last time I saw the stats for my show. I had the stickiest show on Saturday of all shows, which means more people sit and listen to my entire show on the radio than any other weekend show. I thought that was cool and appreciate you guys for doing that. Also, our numbers keep going up. We've had some incredible days. When it comes to our podcast, we're changing it up a little bit on the podcast side, which you can get on iTunes. You can get it on tune in, SoundCloud, you name it, go to Craig Peterson dot com slash iTunes, if you wouldn't mind and give me a five-star rating. Hopefully, I've earned that from you. Craig Peterson dot com slash iTunes. Let's get into these last points here when we're talking about a new cyber Cold War in 2020. The 2016 elections were the first major fake news elections. Now, of course, Hillary Clinton coined the term fake news during her candidacy for President. Donald Trump kind of grabbed on to it. But we're talking about fake news 2.0 you think the Russians messed around with our last election Wowsers our next election 2020 is going to be a doozy and it's just going to get worse from there. Because now we can create deep fakes that are going to make a significant impact on the elections. President Obama was the first social media president, and he claims his election was due to social media, that social media was what led him to get his message out. And it was his message getting out. That got him elected. Right? Well, now we've got the ability for politicians to really master social media and then almost automated fashion, political adversaries going back and forth Republicans and Democrats. And now you can have the greenies the libertarians, the who was it pop their head up again. Another kind of crazy guy anyways, who's out there to spread false stories to build their narrative based on fake news 2.0 Okay, very, very big deal. And they are already in the process of implementing their plans to influence these 2020 elections. It's a huge deal. Part of what we're going to see with the cyber Cold War is more cyber attacks on utilities are critical infrastructure. They're all going to continue to grow. We've seen attacks on the US and South African utility companies this year, as well. In many cases, critical power and water distribution infrastructure and sewage plants have been using older technology and haven't been updated. Now I can tell you a little bit of inside baseball here that's not confidential that I talked with some experts about when I was running, the FBI Infragard program webinars. So the InfraGard is something the FBI put together to help critical infrastructure And other companies out there to help keep them up to date on what's going on. Okay. So I know there's been a lot of progress made, but they're not all to the point where they are highly resistant to these hackers that are out there and particularly nation-state. So we have to continue to increase our cyber defenses substantially. And another thing while we're on this topic, because of the solar flare activity, one of the most crucial things you need to be doing right now is hardening our electrical grid or electrical infrastructure. So that if we do get one of these massive solar flares, we don't end up with another Carrington event that could knock us back to the 1850s all technology gone. Something for another show, I suppose. So the checkpoints technical cybersecurity predictions for 2020 are targeted ransomware attacks are going to increase 20 1970 Somewhere being increasingly targeted against specific businesses, local government and healthcare organizations that we had a lot of that this year, you guys probably are aware of that I certainly have talked about it, okay. Attackers are spending time and intelligence gathering on the victims to make sure they can inflict maximum disruption. Remember, the disorder is what they're going to do. They want to disrupt our economy. They want to empty your bank account, they want to confuse, conduct phishing attacks going beyond the email, email is still the number one attack vector. And that's what we guard carefully for our clients. So most of our clients now are using some version of Microsoft Office 365. And remember, there's 10,000 plus skews that Microsoft has these different products and they've got a one through I can't remember where it goes now he five or seven for their email product. And then they've got data offerings, and I got all these different things. Don't go with the cheapest. Okay? But what we do with the email because Microsoft isn't very good at providing anti-phishing and anti-malware services for the email, we brought all the mail through us, we run it through some highly active filters, and then we send it on over to our customers, okay. So be very careful about that. Now, and frankly, next year and on there is now vision which is voicemail phishing, there are SMS texting attacks against mobile devices, gaming platforms, social media platforms, it's crazy. Mobile malware attacks are moving up in the first half of 2019 saw a 50% increase in attacks by mobile banking malware, over 2018. So we're talking about stealing payment data credentials and funds from the victim's bank accounts. And there are new versions that are already available for the bad guys. And this stuff isn't expensive, and you know that a nation-state might pay a million dollars to get their hands on some of the newest zero-day attacks. But there are some beautiful attacks that you can get for 20 bucks online on the dark web that you can use to destroy a company. Twenty dollars is all it takes. Okay? And unfortunately, that company is going to have to spend a couple hundred thousand in order to protect themselves from that $20 attack, right? Is it worth it or isn't it? They're getting more sophisticated phishing attacks here and more effective as well. They're getting mobile users to click on malicious web links, etc., etc. Okay. Nice little quote here from Checkpoint that we won't read right now, but we've got to protect ourselves. These are called generation-five attack vectors, and they are getting very shrewd. They are able to really inflict maximum damage, it is just crazy. So that's why we have multiple layers, right? It goes back to Shrek, that Ogres are like onions. That's how you have to think of your security. You have to have a stack of security, and you have to have all these different layers. If they get through one layer, there's another layer underneath to protect it further. And then another layer and then another layer. That is how we stopped them this week at one of our clients from stealing all of their company's information. And, you know, again, it isn't cheap, but how much is the company worth? How much is your job worth, right? And I feel sorry for everybody that is this De facto security person and organization who does not have the budget that you need. And man, I empathize. That's why we're doing these mini-courses and the master courses as well. And that's why we got these free masterclasses and the Facebook Live so you can ask questions and get them answered because I really, really, want to help you guys. Okay, of course, I want to keep my lights turned on. So that's why I have paid for courses that you can purchase. But all of these classes are simple and free. So make sure you know about them. Sign up today. Go to Craig Peterson dot com slash master class, sign up, and you'll find out about these free classes that I'm holding more or less two times a month to three times a month, depending on what my schedule allows. All right, everybody, stick around because we'll be right back. You're listening to Craig Peterson on WGAN Hello, everybody, welcome back. Craig Peterson here, man, the show is winding. Winding down, I guess, is what you'd say. We get about the last half hour here together, and we're going to be talking about some of the technology in our lives, some of the things we need to do to protect ourselves. Of course, that's what I do for a living. So that's what I know best. Right? So we've talked about a lot of technology, but we kind of stick most closely with some of the security stuff. We're going to talk about the BBC now and why they're using the dark web. If you've watched any of the war movies, you know, that we used the BBC the Allies did in world war two to get messages to the underground and other people who were in occupied territories. They did it through code words and things, you know, they'd have a little phrase that they would put up on the radio as they were broadcasting it. And sometimes, the phrase would mean something, and sometimes the phrase wouldn't mean anything. The whole idea was to confuse the enemy during the war. That way, the socialists in Germany didn't know what we were talking about. The Socialist Party, the Nazis, and that that's true to the Japanese and what was happening there with their socialist Empire. We wanted to get messages through, but how do you do that in a time of war when people are listening? Well, that's one of the proper ways to do it. Today, in this day and age, things a little bit different. It turns out that China, Iran, and Vietnam are three of the country's This is according to the BBC, that has tried to block access to the BBC. Now the BBC is biased, but you know, they overall have some pretty darn good news. And I get my news from several different places because I want to hear all sides. So I listened to the BBC. I listened to the CBC, I listen to PBS. I listen to Fox, I listen to NBC, I listen to all of these different ones in podcast format. Well, that's easy enough to do right now in the United States but in many places around the world, there is serious censorship. I've mentioned the Great Firewall of China before. And that is total censorship where they can pretty much ban anything at least that's their idea behind this. So what the BBC has done is they have launched our new website that looks identical to their existing normal website out on the dark web. You know, if you attend a masterclass where we were talking about VPN, and we're talking about mobile security. I talked about what the onion network is. And it is essentially a hidden network that sits on top of the normal internet. And it was established by the United States. It's still maintained by the United States. And it's for dissidents, to be able to communicate with our State Department. That's kind of what it was set up, for now, would use for almost everything. It's the dark web. We just talked about it in my show, where we're saying the dark web was also being used by the bad guys to sell these hacking tools. They use it to sell our identities to do trades with each other. Right? The dark web, though, isn't all bad. It was, as I said, designed to be good and to be very helpful. In fact, it still is. So the BBC set up a new version of their website on the dark web. And you can look it up on the BBC website to find out more if you'd like. And you can also find it on my website at Craig Peterson calm. What's the only way to get at it is for most people is to use the Tor browser to our browser. And the lot of detail I went into for like half an hour about the Tor Browser in the master class. But users of the Tor browser can visit a special URL. It's BBC News v to VJTPSUI dot onion. Now you're not going to remember that I'm sure which is why I told you to go to the BBC calm or go to Craig Peterson and you'll find it there. But it is a different type of URL than you're used to his net. And if you click on that address, it won't work. If you're using a regular browser, but if you're using a browser that's on the onion network that knows how to use it, like the Tor Browser, which is the ultimate and privacy, it can get to the BBC website. So the countries that are blocking it that I named a little bit earlier, including China, Iran, Vietnam, we know North Korea is and some others to people in those countries that have internet access, can use this browser even if they have some blocks, firewalls, etc, in place to stop people from getting out. So I think that's pretty darn cool and smarter. The BBC, they're saying is going to include foreign language services such as BBC Arabic, BBC, Persian, and BBC Russian. But UK only content like usual only be available within the UK due to broadcast right. So check out the TOR if you haven't already. T-O-R There is TOR clients for all major operating systems, including your desktop computers and mobile devices. And it attempts to hide a person's location and where they're going. It's not 100% effective, but it's pretty darn close. And that uses these exit nodes that are really all over the world. So it looks like you're coming from the United States or India, etc, etc. So check it out online and kudos to the BBC, for doing just that. I'm going to talk right now about Tick Tock with you guys. Because social media is really important to our kids, our grandkids, it's become important to society. It's one of the most effective ways to do advertising nowadays. Social media, it's where it's at. And there are these people on social media that have huge followings. haven't done anything, right? Like the Kardashians, right? They're famous for being famous. And they use the money from the OJ Simpson trial to really get that thing going because the or the old man had was a popular attorney and he charged a lot and she, his wife was able to manipulate it and do some amazing things with it just absolutely amazing. Well, one of the apps that our kids are using this become very, very popular is called Tick tock, ti KT, okay. If you have kids or grandkids or maybe you're using it, you need to need to have a talk with them and help them understand. Because Tick Tock is owned by a company called ByteDance. That is based in Beijing. And what many people forget is that China is a socialist country and it is socialist it is gone down the communist road. And any company that's based in China, you know, the Chinese government doesn't necessarily run the company, but they heavily regulate the country, which is why you compare the United States to, for instance, the Nordic countries, United States is very socialist. The Nordic countries are actually much more capitalist. But they have the money to put in these safety nets that we don't because of the socialist control anyways, blah, blah, right. So Tick Tock is owned by a company based in Beijing, China, which means there are surveillance systems in place. And the concern that's been expressed in the reason why people need not states are calling for Tick Tock to be banned in the US and they're calling immediately for people to delete it from their phone. is we just don't know how much of our data is being shared with the communist government over there. So let's look at the response and that one to think back. Right. President Nixon, I want to make one thing perfectly clear. Right. Let me make this perfectly clear. I did not have with Miss Lewinsky. When we get back, we're going to finish this. I'm going to read what the statement is that came out of China. You're listening to Craig Peterson are right here on WGAN. Online, Craig Peterson. com, of course, online kind of everywhere on all of the podcast platforms on YouTube on Facebook. And you can just go to my homepage, Craig Peterson, calm or keep listening to me here. We'll be right back. Hey, welcome back, everybody, Craig Peterson here. WGAN online, Craig Peterson calm. And I am videotaping everything today. So you can watch me online that Craig peterson.com slash for YouTube. And we're changing the podcast formats up a little bit as well, trying to put the concepts together and just single podcasts as opposed to how I do things here on the radio show where I might go from one segment to the next segment, and make this just a little more friendly for the general online consumption. Now, before the break, I mentioned that I want you to keep something in mind. Remember President Nixon Nixon, and this is quoted all of the time I want to make one thing perfectly clear. And remember President Trump, let me make this clear. I did not Have with that woman misc Alinsky. Let's read the statement that came out from the company that makes this. Let me be very very clear. Sound familiar? Tik Tok does not remove content based on sensitivities related to China. We have never been asked by the Chinese government to remove any content, and we would not do so if asked. We are not influenced by any foreign government, including the Chinese government Tick Tock does not operate in China, nor do we have any intention of doing so in the future. So it makes me wonder when I hear let me make one thing clear. Are they lying? Right? It's like I always tell my kids because I know they're not trying to be deceitful, right, but if someone starts to sent insane Well, to be honest, You have to wonder where they been dishonest with you before, and now they're honest. Have you had that happen? I know I caught myself saying that I got into the habit of saying Well, to be honest, even though I had been correct the whole time, and I realized, wait a minute now, I'm painting a picture of me having been dishonest before this. So when were you telling the truth after you said let me make this clear or before? So the pushback from Tick Tock comes after US senators Tom Cotton and Chuck Schumer requested intelligence officials assess the national security risks posed by Tick Tock as well as other Chinese content platforms. Hundred 10 million downloads in the US alone. It's a potential counterintelligence tool that we can't ignore. That was in the statement that came out. Facebook boss Mark Zuckerberg, Whose firm competes with Tik Tok, particularly in the youth market, has also recently attacked the platform. Oversensitive. Concerned, remember that Coburg makes a competing product. Another US Senator Marco Rubio previously asked us national security panel to review their acquisitions of musically as well that happened this year. Concerns about censoring concerns also, about whether or not these guys are honest with everybody. So there you go. There's Tik Tok. I've got two more articles. Let's see if we can get through them here in the last segment. One is about the Pentagon. Many people have been looking at stuff saying Oh, man, I'm just moving to the cloud because then I don't have to worry about security anymore or configuration or updating computers. Remember, the cloud is just another word for someone else's computer. Your legal responsibility These to protect your data do not disappear when you move that data to the cloud. And you are frequently much more exposed once you're in the cloud than if you kept it on your machines. So what's happened here now is the Department of Defense is looking at their budgets saying, Hey, listen, if we move everything to the cloud, it's going to be cheaper for us. Now the Pentagon realizes it's not necessarily going to be more secure. And, in this day and age, most cloud services are far less reliable because of Miss configurations that humans have made on them, so I don't think the Pentagon is looking at as this as a way to make things more secure. Like so many small businesses do unknowingly and end up out of business because of it. But the Pentagon is looking to save money, and The winner that everyone was expecting from this was Amazon. And then President Trump came into power and said, Hey, wait a minute now. My administration has been looking at this bidding process for this project and says it doesn't look like this was fair. It's called the Jedi contract. By the way, JEDI. It doesn't look like this was appropriate. So let's have another examination at it. And Amazon came out with a statement awarding it to Microsoft. Amazon said that a detailed assessment purely on the competitive offerings wo

united states god tv new york amazon netflix live texas halloween tiktok president google donald trump china social technology online mexico germany sound west friend digital russia chinese european government russian japanese microsoft new jersey united kingdom barack obama network brazil congress bbc fbi security defense ladies iran nbc empire nazis vietnam military republicans soundcloud android iraq democrats cloud caribbean calm concerns cuba mac mobile computers cia ios venezuela xbox windows contract tracking south korea privacy twenty syria cryptocurrency opera pbs mark zuckerberg walking dead cold war beijing kardashians jedi north korea south africans hillary clinton presidents pentagon regulation peterson home office lie currency allies sms cio concerned cisco syrian cbc shrek oj simpson tick safari bluetooth ville usb soho passwords tor state department persian nsa nordic banning libya duo ussr vpn computing hundred brandt keyboard browsers operations managers firefox kt checkpoint ccc imac tech talk google chrome tik chuck schumer mozilla bytedance encryption attackers tick tock carrington microsoft office internet explorer winding lastpass ssl memorize eff tok wgn ub tom cotton browsing otp moebius bx silver fox pw ogres everything everything socialist party yubikey great firewall greg peterson coburg right well right it business edition next saturday gcm alinsky soviet empire tor browser infragard password management okay so keylogger apple imac zogby bbc arabic microsoft internet explorer craig peterson okay it keyloggers keylogging tracking protection wgan right we've
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Configuring MTA-STS https://isc.sans.edu/forums/diary/Configuring+MTASTS+and+TLS+Reporting+For+Your+Domain/24840/ How to Find Hidden Cameras in Your AirBNB https://isc.sans.edu/forums/diary/How+to+Find+Hidden+Cameras+in+your+AirBNB/24834/ Insecure Storage of VPN Credentials https://www.kb.cert.org/vuls/id/192371/ Microsoft Patch Problems https://support.microsoft.com/en-us/help/4493472/windows-7-update-kb4493472 https://support.microsoft.com/en-us/help/4493446/windows-8-1-update-kb4493446 Internet Explorer XML External Entity Vulnerability http://hyp3rlinx.altervista.org/advisories/MICROSOFT-INTERNET-EXPLORER-v11-XML-EXTERNAL-ENTITY-INJECTION-0DAY.txt

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Configuring MTA-STS https://isc.sans.edu/forums/diary/Configuring+MTASTS+and+TLS+Reporting+For+Your+Domain/24840/ How to Find Hidden Cameras in Your AirBNB https://isc.sans.edu/forums/diary/How+to+Find+Hidden+Cameras+in+your+AirBNB/24834/ Insecure Storage of VPN Credentials https://www.kb.cert.org/vuls/id/192371/ Microsoft Patch Problems https://support.microsoft.com/en-us/help/4493472/windows-7-update-kb4493472 https://support.microsoft.com/en-us/help/4493446/windows-8-1-update-kb4493446 Internet Explorer XML External Entity Vulnerability http://hyp3rlinx.altervista.org/advisories/MICROSOFT-INTERNET-EXPLORER-v11-XML-EXTERNAL-ENTITY-INJECTION-0DAY.txt

Craig Peterson's Tech Talk
Researchers Our Smart Home Be Big Brother - Health Records On Smart Phones - New Browser Attacks - Momo Challenge Today on TTWCP Radio Show

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 1, 2019 28:09


Browsers are being Attacked.  Just this week we are hearing about another attack against the browsers we use daily listen in for more details. We have all seen reviews online. But can they be trusted?  Turns out --- maybe not.... New research is being done on Swine diseases in China. These diseases are rampant and now the Chinese are running full force to technology for answers. Android is trying to up their Security.  Listen in to find out what they are doing. The FTC has just issued a ruling on TokTok.  I'll be talking about that today too. Health records are now a big business. I'll tell you why so many of the big tech players are trying to get into the game. We will also talk about the MOMO challenge.   There's lots to talk about tech this week.  So grab a seat and join me.  For more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 03/02/2019 Researchers Our Smart Home Be Big Brother - Health Records On Smart Phones - New Browser Attacks - Momo Challenge Craig Peterson: 0:00 Hey. Hi everybody. Craig Peterson here, it's time for our weekly radio show. A lot to cover as always, it has been a very fun week. For me. I have really been enjoying this as we've been doing more and more content for our Insider's site, and the people who signed up for this master course. And welcome aboard. Thanks, everybody, for being with us. You are, I'm sure going to continue to love it. We've had great feedback, more and more people giving us just, you know, a little bit of encouragement, which I always, always appreciate. Let me tell you, it is difficult to put some of this stuff together and to do it. Yeah, you know, so I appreciate the appreciate should including here on the radio show. So welcome to everybody. I had a couple of conversations last week about some of the browser hacks that are going on so we're going to cover that again there's a new browser attack a whole new type the to really just kind of an old browser hack that is back again. Some very troubling news coming out of Hawaii and some scientists over there we're going to talk about and no, it's not about the volcano or global warming. It's about Alexa and what they're proposing trusting online reviews. This is a biggie, biggie, biggie, can you really trust them? And you know you go to a site like Amazon or eBay. And what do you see on there? You see people saying, Oh, this is the greatest thing ever. I love it. It's too big. And sometimes, oh, no, it's too small. It's never worked for me. How legitimate are those we rely on and those don't we know. We're going to talk a little bit about that China, they are doing some interesting things with pigs over there. you know, about the tracking that the law enforcement doing here to try and catch bad guys. And that makes sense, right? We want the bad guys caught on and off the street in London, the most surveilled city in the world, at least, it used to be, it's probably Shanghai nowadays. But in London, you can't go anywhere and not be caught on one of these closed-circuit cameras. Well they're doing the same thing now and trying and with pigs. And we'll talk about why Android it kind of, you know, kudos to them. They've had all kinds of security issues they now have part of what's called Fido available on their devices is a fast identity thing, we'll talk about that and its use. We're just not gonna have enough time today, the Federal Trade Commission is ruling is find here a $5.7 million to a company that has an app called TikTok. And this is under the law that was passe, man it's been a few years now, I can't remember. I'm kind of looking through the article to see if it says when it came up at the COPA regulations, and it went beyond the statutory limits as to say that story. And storing health records now is a big business and Apple's trying to get into the game as, as Google and of course, many others, because there's so much money in it. But how about the privacy side of it is Apple going to continue to keep your data private. and in this case your medical data private. We've got a note to this week, from one of the listeners to the podcast, he texted me and he was asking about this Momo challenge, then. So I want to bring that up as well. So a very busy day. Today, I'm going to try and keep these things short. But you know me I'll just have to explain them in a little bit to detail. So here we go. Now, you've been online, I'm sure you've been to YouTube. This even made it onto most of the news sites is 24/7 news cycle that we have nowadays. But that bucket challenge writes the Ice Bucket Challenge. It was phenomenal. From a fundraising standpoint, it really helped to raise some funds for a very good cause. And the whole idea was, Hey, I'm going to get a bucket of water, I'm going to fill it with ice. And I'm going to dump it over my head. And it's part of a fundraising campaign where people would donate, you know, and if you do it I'll give you 10 bucks, or I'll donate 10 bucks to it. And so they did it, which is really kind of cool. I'm glad they did all of that. Well, there's an internet home that's been around for a while now it is a hoax. But there is a problem with this as well. And it's called the Momo challenge. It's been spread by users on Facebook has been talked about in the media and different channels. And the whole idea behind this reporting is that children and teens are getting enticed by this username Momo, to ultimately commit suicide. And the whole concept is you start out small, you do some  you know, almost innocuous things, and then it gets keeps getting more and more violent. There's attacks and then eventually suicide. And it really reached worldwide proportions last summer, in July 2018, and the number of actual complaints was actually quite small. And there's no police force that is out there right now that I could find that reported that anybody was ever harmed as a result of this phenomena. no direct result, right? There could be other things and there's a great by the way page about this up on Wikipedia that you might want to check out. But reports about this and the awareness of the digital challenge rose again this month after police in Northern Ireland posted a public warning on Facebook. And that's a problem it keeps popping up. As you know, we're actually concerned parents concerned police departments are trying to say hey, listen, everybody, keep an eye on what your kids are doing online because it could be very dangerous, which is very, very true. It could be. Let's see Momo WhatsApp messages apparently are being used to try and convince people to contact them and their cell phone there are some other ones out there known as blue whale where players quote unquote players are instructed to perform a succession of tasks and refusing to do so gets met with threats. So, the messages are often accompanied by frightening or gory pictures. It really does appear to be a hoax. I've got a country by country breakdown where they have looked at this and the problems Quebec the police forces of the Longueuil, Sherbrooke, and Gatineau have indicated that people in their jurisdiction have been approached to participate in the Momo challenge. But there are no reports of any victims. They're asking people not to use a phone number provided in the WhatsApp messages to send screen captures and images of the of the phone to police authorities. Bottom line the phone numbers that have been used in these hoaxes just don't work. It goes through Columbia, Europe, Brazil, France, Germany, Luxembourg, India, Mexico, so pretty extensive run down and you'll find that online as well. Just look up Momo challenge over on Wikipedia. And thanks to the listener that sent in that question. It's a good question and good concerns. And it's hit the news cycle again, because of these police in Northern Ireland. So next up here, let's talk about this new browser attack that has been hitting people. Now one of the most interesting parts of this to me is it's not really a new attack. This particular type of attack was first documented in a research paper back in 2007, this new attack is called MarioNet. And what it does is it is opening the door for creating huge bought net and button that's are used to do a lot of things. They're used to attack businesses, somebody they don't like for their political opinion might be attacked with a botnet and the botnet then ends up sending just malicious data, basically, to whoever the intended victim is. So their website goes down, and they can no longer really conduct business at all. That's what a botnet that is there. They're also used for other types of attacks. And now the real big thing for botnets is called cryptojacking. And what cryptojacking does is it allows the bad guys to use your browser your machine in order to earn Bitcoin for themselves. And just oversimplifying it dramatically. Now, previous versions of this allowed you when you shut off your web browser, or close the window, get what it's no longer running. So the bad guys, we're not using your computer any longer. However, there is a new feature that has been added to the modern web browsers, it's using an API called service workers. And this allows the website to isolate the operation of the service worker from a web page. And the idea is that the web page UI isn't going to freeze up when it's processing a lot of data. So you could go and this is there are legitimate purposes for this, you go to a website, and you wanted to have a look at something that a history of 23andMe type of site, for instance, I might do real-time live analysis, which 23andMe does not do, by the way, I don't want you to think poorly about them for that. But the service workers really are an update to an older API. But now this MarioNet, which is actually supposed to be pronounced to marionette, but it's spelled MarioNet, it's taken advantage of these things. It's a very silent attack, it doesn't require any user interaction at all the browsers on going to alert you about it, they're not going to ask for permission before registering your service worker. everything's happening under the browser's hood as the user waits for the website to load. And about, the only thing you're going to notice is that if it's used for cryptomining is that your machine is going to slow down, slow down a lot. But let some place malicious code on your high traffic websites gain a huge user base, it's it's a very scary thing. And there's not a whole lot that you can do about it, unfortunately. So the research is going on, it's been discovered. So, expect patches from all of the major vendors out there. And they will be hoping, hoping to have them fix this. Some vendors are course better at patching than others. And you already know who I think are some of the better ones. If you want privacy then the Epic browsers. Fantastic. The Google Chrome browser is the industry standard browser, frankly, very good browser. And Safari is very good. Dead last one you should never use is Microsoft Internet Explorer. They have their new Edge browser, which is nowhere near as bad as Internet Explorer. But Microsoft has come to realize that all other browsers are terrible. So Microsoft is switching over to Google Chrome. So in the future, the little IE button is going to launch the new Edge browser, which is not really IE Internet Explorer, nor is it edge it is actually Google Chrome. So how's that for a good time for all but at least Microsoft is finally realizing that they have no idea how to make a good web browser, right. So let's talk a little bit here about your health record, Great article that NPR has up, on their website about storing health records. I saw a lot of mentions of this all over the internet. So I had to have a look at it myself. And he, Well, he would back up a little bit. The author of this is Laura Sidell, and it's talking about Sam Cavalier, he's a San Diego tech worker. And he is using Apple's Health app. And a lot of us are, particularly people who have the Apple Watch, who might have some concerns about their cardiac rhythms. All of that stuff can be tracked now on your Apple device. So he's using the Apple Health app in order to keep track of his weight to his exercise routines, how many steps he takes a day find that really too when I'm going out and I'm walking, how far have I walked, where did I go, and I'll do the walk around the mall in the walk around the blocks. And it's really kind of nice to be able to see that and have that all tracked. Well since March last year. So about a year now, Apple's had a feature that allows people to store their medical records as part of the Health app information. Then the University of California, San Diego health where this guy, the same guy goes to get his medical checkups, etc. But UC San Diego is one or more than 200 healthcare providers in the US who are using this new health records feature. He travels a lot for work, he likes to keep track, that was blood pressure. And he has a special confidence link to his health app. And he likes the convenience of having that app and really having all those records there with them. If you travel a lot, it's can be phenomenal to have all of your health records with you in case something were to happen, right? Doesn't that make sense? And then the doctor can also look at it and see what the trends are, and analyze where they're not, there might be some sort of a real problem with the guy's health that they may be want to have a look at. Well, the global health industry is expected to reach $10 trillion by 2022, which is absolutely phenomenal. Just health alone is bigger than any economy of any country other than the US and China. And I mentioned earlier, we've got Apple who's in the foray, Google is in it. And so is Amazon and Microsoft, trying to get a piece of the medical pie in retail pharmacies, artificial intelligence for disease detection, and healthy living apps. And we've seen some of these apps, we've seen already that some of these computer programs are better at spotting skin cancer than even a cancer doctor is, that's actually pretty cool when you get right down to it. And they let you take a picture of moles, and they track the moles over time. And they look at the edges of the moles to see if they are real little rough, they look like there might be precancerous, etc. So the AI part of it, at least machine learning is really going to go a long way. And Apple has invested a lot in machine learning. If you have one of the newer iPhone models, it has a machine learning chip dedicated to machine learning built right into it kind of makes me wonder if maybe that's part of Apple's goal. That's why they put it in there. And part of the reason I should mention too is Apple tries not to send any data up to the cloud that it doesn't absolutely have to send up to the cloud. Which also means makes a ton of sense to me anyways. It's not like Google or Amazon that basically send everything up to the cloud for processing. Apple tries to process it locally, which is really good from a security standpoint. So where are things going? I read a really great article about Apple and their direction just yesterday because a lot of people are saying, Hey, listen, iPhone sales are slowing down. Is this the end of apple? What should we be worrying about it? What should we be doing? And it turned out that no, no, no, none of those things were true. Apple is looking to get into the service areas. And one of them, of course, is health care. Now, having privacy as a key like Apple does, and has done for quite a while is a big, big, big win for our friends over at Apple, because people are now used to expecting maybe that's even a better way to put it. People are expecting Apple to keep their data safe. And frankly, I think they will. Their CEO, Tim Cook's been very vocal about privacy rights. He also is really ticked off at Google and Facebook for making money off of user data, which is I know, I go back and forth on that. But they certainly do keep it private. So how about you? What do you want to do? Do you want to give your medical data to any of these big companies, Facebook, or Amazon, Google, Microsoft or Apple, there are pros and cons to all of it. And the whole HIPAA regulations, that whole thing was supposed to make it so that our information would be digitized. And we could take it with us as we moved around the country or change doctors. But somehow that really hasn't come into fruition. Frankly, I don't know that it will, hey, I want to talk about this other thing right out of the universities. This is the University of Bergen. And we're going to talk about this conference over in Hawaii, and how this could have a huge, huge impact on our privacy. There was a conference in Hawaii here recently. And they were talking about our fish, artificial listening devices. And we have those all over the place, we just found out that if you have a certain smart thermostat that's been on the market for a while that built into it was a microphone people had no idea it was there. And I personally don't like that idea, right. So it had a built-in microphone that was kind of hidden. Frankly, there's no mention of it in the marketing materials in the owner's manual, nothing. And then the company decided just about two weeks ago, hey, we're going to turn on that microphone so that you can ask questions and get things done. And it's a piece of hardware that Amazon had picked up through one of its acquisitions. So we have these we have the Amazon Alexa is we have our series, we have our Google Homes, and there will be many others, of course, coming over the years, I'm sure, but one of those three is probably going to be the winner. So we have these in our homes. We've already talked on the show about police departments who have since subpoenas to get the audio from these devices. And frankly, those subpoenas don't really go very far. Because they don't really have the audio from the devices, all they'll have is the audio for about 30 seconds after you give it the wake word whatever your wake word is. So in other words, you might wake it up by calling a computer or whatever might be, and it responds, it listens for up to 30 seconds, sends out audio up to the cloud words process tries to figure out what you're talking about. And then and then goes ahead and processes. And I should mention too, that on that exact same front, a lot of people are upset with Apple, and how Siri just doesn't perform as well as Alexa does, for instance, or as Google Home does. And I want to remind everyone, again, it's a trade-off on privacy in the apple space. It's trying to do as much of the processing locally as it can. And so it doesn't have all the benefits of all of the cloud data that has been collected and stored and analyzed by the other competitors out there. So Apple, Apple is in a bit of a disadvantage because of their privacy stuff. Anyhow, the devices are listening. So these scientists over at the University of Bergen decided, hey, let's do a little bit of study on these devices. Can we turn these into monitors for the home? And what they are suggesting is that these smart devices should have built into them in the future what they're calling a moral artificial intelligence so they're sitting there listening to what's going on they should be able to say wait a minute and it sounds like somebody's getting a beating, somebody's a whooping. Okay. And whooping weapon me not a great idea, right? But is frankly, the device really shouldn't be responsible to try and decide whether or not it should call the police on your behalf. I get it if you tell it if you wake it up and say you know, call the police it should right but if it's just listening does not sound like 1984 is in that very Orwellian where it's listening and it tries to make decisions based on all of this, right? It's, it's an interesting problem. If you ask me. The University of Cambridge has stepped in and made their little comment saying humans and human situations are far messier than what the scientists over there from Norway, University of Bergen has been really saying and contemplating. Because you think about family and family dynamics, and there can be some pretty heated arguments, but that doesn't mean that there's a crime committed or someone was particularly harmed and when we see some agencies being very, very ready to just grab children and run away and then investigate later is is it something that's legitimate, something we should be doing? We had in the UK in April 2018, the House of Lords artificial intelligence committee said that ethics need to be put at the center of the development of AI so there you go. And Britain they're poised to become a world leader in the controversial technology field of you guessed it moral artificial intelligence. And remember, I said the Londoners are some of the most surveilled people in the world. It's very, very interesting. Also, in the UK, they are European actually parliament, they are looking at creating a legal status for robots. And it goes on and on. We have a lot of things we've got it assigned on over the next few years when it comes to artificial intelligence tracking us. And this whole concept of moral artificial intelligence, which frankly, really kind of scares me. Well, I don't want this article to just go away. We have a couple of minutes left here. And today's show. So let's talk about this. This is called Fido, it's been around a little while. If you use your key or some of these other hardware tokens, many of them tie into Fido. And the idea behind Fido is to have a mechanism that gets rid of a password. That's the bottom line here, password list web. And that's the goal. So if you go on to the Internet, and you go to a particular website, the idea is that you can use this Fido certification to figure out if it's really the person that says it is right. So automated Google Play Services update is going to push that to your device. If you have that turned on. You can this is for Android, obviously they can log in with other forms of authentication compatible with final to spec like the yubi keys are or Google Titan. Titan was an internal project at Google, they use it for life getting into all of their devices. And now they are marketing that it's available for purchase. So have a look at that as well. We're helping a lot of businesses move over to start using hardware keys, particularly in the medical and legal realms, where access to information is severely limited on the legal side, right. So let's see final two supports can allow Android to accept secure web logins using these devices including Bluetooth by the way so you can use your smartphone as part of your identifier Google's anticipating fingerprint nothing authentication will be the easiest way just like to become the users preferred method and in this case it doesn't send your fingerprint to the website the fingerprint is analyzed locally and then there is a cryptographically secure handshake that occurs between the website and your final compatible device anyways, there's a lot there. Naked Security blog had a very good article on this if you're interested. It's up on my website as well. http://CraigPeterson.com. But that's it for now. I had a couple of really great webinars this week. I want to mention one for the FBI Infragard. This is their National Cyber camp program and it's really really kind of cool so I did a whole webinar on that for the leaders in all of the 80 Plus Local in for guard chapters. But as you're thinking about summer and summer programs and camps, have a look at that if you are an InfraGard member and if you're not, check it out Infragard.org. You'll find out more there, about what they're doing with this whole FBI related program. So, that's it for this week. Have a great week. And we'll be chatting again soon. You've been listening to Craig Peterson and all of this can be found at http://CraigPeterson.com. Bye-bye. ---  Related articles: New Browser Attack Lets Hackers Run Bad Code Even After Users Leave A Web Page Alexa, Call The Police! Smart Assistants Should Come With A ‘Moral Ai’ To Decide Whether To Report Their Owners For Breaking The Law, Experts Say Can You Trust Online Reviews? Here’s How To Find The Fakes China’s Tech Firms Are Mapping Pig Faces FTC Ruling Sees Musical.Ly (Tiktok) Fined $5.7m For Violating Children’s Privacy Law, App Updated With Age Gate Storing Health Records On Your Phone: Can Apple Live Up To Its Privacy Values? Android Nudges Passwords Closer To The Cliff Edge With Fido2 Support --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Bli säker-podden
#005 Den säkraste webbläsaren

Bli säker-podden

Play Episode Listen Later Feb 21, 2019 27:17


I veckans Bli säker-avsnitt diskuterar Tess och Nikka vilken webbläsare som är den säkraste för Windows och Mac OS. Bland kandidaterna finns Google Chrome, Mozilla Firefox, Apple Safari och Microsoft Edge (gamla Microsoft Internet Explorer bör inte längre ses som en webbläsare). Nikka förklarar också innebörden av de säkerhetsbrister i lösenordshanterare som bland annat Washington Post rapporterade om i veckan. Korrigering: Artikeln om brister i lösenordshanterare låg alltså i Washington Post och inte i Wall Street Journal som Nikka felaktigt hänvisar till i podden. Bli säker-podden produceras av Nikka Systems tillsammans med Bredband2. Läs mer på nikkasystems.com respektive bredband2.com.   

Craig Peterson's Tech Talk
How Secure Are Our Gifts and more all on TTWCP Radio Show

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 5, 2019 28:09


Guess what Facebook is in the news yet again. Listen in and I will tell you about one of the tricks they playing and why you must be concerned. Did you get an Apple Watch?  Today, I will be talking about what they have done with their new Heart Monitor and how it can help you. How many Apps do you have?  Are you using them all?  Do you know what information they share?  Today, I will be discussing Apps and how to stop them from tracking you.  Which browser is your favorite? With Internet Explorer going by the wayside and the Edge Browsers being updated using the chrome engine. it is time to talk about all the options you have and the benefits of each. These and more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 01/05/2019 How Secure Are Our Gifts Craig Peterson: 0:00 Hi everybody, Craig Peterson here. Welcome to the new year. Where's the time going? You know, it's going to be like that. And is going to be 2020. And we're going to be asking the same question man does time fly? I was at the barber the other day, got my haircut. And it was really funny. I don't know. Maybe she just wanted a bit better tip or something. But she thought I was about 10 years younger than I actually am. Is that legit? Or do you think she was she was just pulling my leg here trying to give complex to bugs out a man or she seemed like a nice enough girl, right? Maybe she's legit. But I don't know, time just keeps marching on. Oh, my family members keep getting older. I'm lucky enough to still have both parents alive, which is really kind of cool. But it's, you know, it's not going to last year forever. Craig Peterson 1:00 Anyhow, we got a lot to cover about post-Christmas post-gift-giving season, we're going to talk about a few of the gifts that you might have given or received and the security and then one of the things you should be considering what are the things you should do with these devices. We'll talk about some specific devices. And we'll also talk about them in general Facebook. Oh, my gosh, right. Are they ever not in the news? Well, in the news again, because it turns out, they never really did care about expanding the internet to the whole world. It was all about Facebook. And we're going to talk about one of the tricks they played in order to get it so that your Android device would tell them where you are, what you're doing, basically, without you knowing without that little pop-up screen. Coming up, we're going to talk about airdrop assaults. I have seen this before. I've had a couple of my listeners contact me and saying this has happened to me. So we'll talk about what that is Apple Watch, we're going to talk about how the new features in that Apple Watch. You might have gotten as a gift work that can detect certain types of rhythms and that you know, Craig Peterson 2:12 your regular rhythms, arrhythmias, there you go. That's where I was looking for. And that's really good. It's good news for a lot of people. And we're going to talk a little bit more about how to stop apps from tracking you because they're doing everything they can to track it. We talked a little bit about this, I think Craig Peterson 2:31 it was last week Craig Peterson 2:32 of the week before as well. And we are, of course, doing a video again this week. So make sure you check it out at http://CraigPeterson.com. Well, let's get right into our holiday season. You know how I have talked many times in the past about security and privacy, right. That's kind of my thing. Because there's so many of us just don't understand it, we're on doing it the way we should, especially if you're small, medium business, they just they're doing it wrong, right. You can't hire the right people most of the time. So get somebody to come in help you get it all established and then let them run with it. But there is a web browser out there that I've recommended in the past. And I want to talk about web browsers here for a minute. Because most of us would have done some shopping online over the last few weeks. Craig Peterson 3:22 The big one, of course, you know about his Google Chrome, Google Chrome is about to be adopted by Microsoft, the getting rid of that Edge browser that they've had. That is not a good browser, which replaced an even worse browser, Microsoft Internet Explorer, do not use Internet Explorer, any more people don't do it. If you have a vendor that depends on you, using Internet Explorer, in order for your web services to work, have them fix it threatened to go to a new one because it is terrible. And it always has been well, they've decided that edge is also terrible, which it is they just don't have the compatibility. So to go for the ultimate in compatibility. Microsoft is getting into bed with Google, at least for the browser. And they are going to be using the Google Chrome browser as the basis for their new browser. And trying to remember now I think they said they were still going to call it Edge, The Edge browser, but it's going to be chrome in disguise, it will run the chrome plugins and extensions that you're used to running. So kudos to Microsoft I gotta say it again, they haven't proved so much since Steve Ballmer left, you know, getting rid of Steve Ballmer was a wonderful co it's really helped the company they've grown in some wonderful ways it's going to help us share growth in a long term. Bill Gates did not do them any favors in his last years. So I'm very impressed with their new management, I think this is a very good choice for them. So we've got Chrome. And that's now going to be the Microsoft browser as well. We've got Safari on our various Mac devices. But most people nowadays, frankly, are using Chrome. Well, there's another browser out there that you should pay attention to. That's also based on Chrome that's really rather safe. And I just had somebody reach out to me about a month ago, because I asked you guys quite frequently, let me know what you like about the show. Let me know what I should be talking about some of the things that you've learned because that helps me understand what I should be talking about here, what I should be researching because you realize that it takes a lot of research and a lot of work just to do this radio show. And this these videos, the epic browser Craig Peterson 5:51 API, see is what was mentioned by the listener, and he was saying, Hey, listen, I use the epic, just like you had said that. He uses DuckDuckGo for his searches. By the way, I think it was Google own Duck.com. And they relinquished it. They gave it over to the DuckDuckGo guys. Craig Peterson 6:10 So pretty soon, I've actually probably haven't tried it in a while. I was just going to DuckDuckGo. But you'll be able to go to Duck.com to do your searches. And yeah, frankly, I think that's a pretty good thing. So that's also a chrome based browser. There's others out there that I use you've got opera, which isn't, you know, reasonably popular browser. But the Mozilla Foundation is one I want to talk about right now. Mozilla has the Firefox browser. And they have designed it to be safe. Now, they, they really kind of pulled in their wings, worked at it, and came up with a very safe version and new faster, they got better tab handling the new version 64, I think is what they're calling it. And it's something to seriously look at because it is designed with security in mind. You can run certain plugins, certain extensions for it, but not all of them are going to work if you're running older extensions, many of those just plain don't work. In fact, most of them don't, because they're trying to be safe. That's their mantra. And you should check it out. If you haven't checked out Firefox in a while. Have a look at it. One of the things I love the most about it is it isn't Google right, who's trying to collect all of the information they can possibly collect on humanity and then sell it to other people or use it themselves for marketing and other things. So have a look at Firefox they've put out the Mozilla Foundation something they're calling privacy not included and I was debating whether I should talk about this before Christmas or wait until after obviously, I didn't talk about it did not before now I'm going to talk about it and what Mozilla's done with this privacy not included as they've looked at some of the most popular gifts and some of the most popular devices out there and tried to figure out is this safe do they spy on us with them. So it's really good. You'll see it up on my website at http://CraigPeterson.com. There is a lot of different devices that there is a lot that they have reviewed here. The Nintendo Switch coding kit, the Kindle, Hugh light, coffee makers, pet trackers, just a ton of stuff, little robots and things. Roku streaming players. Obviously, we're not going to take the time to go through all of these. But if you have a device you might want to check it out. It's on the foundation.mozilla.org site. It's also up there on http://CraigPeterson.com. But I do want to talk about a couple of things. One, a very popular gift this year was the Nintendo Switch. This is a brand new Nintendo in we've had them over the years. Nintendo what was it the six for I'm trying to remember. And the kids also we had the Nintendo we which Nintendo shot in the head and they moved on this Nintendo Switch is really cool. You've got the main unit. And then you've got the remote controls. And you can play right there. All of these classic video games plus new ones, you can play them right on this little handheld devices. Kind of like a fabulous, you know, very large phone or small tablet. And you can also take the signal and push it up to your TV set in order to watch it very nice. And if you are looking to trade in a gift, maybe this is something you might want to try for me. I have to wear my reading glasses when I'm using it. But it does meet the minimum security standards that Mozilla has Craig Peterson 9:50 put out, you know, here's what they look at is what Craig Peterson 9:54 Mozilla is looking at. And here's what you should probably look at as well. First of all, can it spy on you? Do you remember, a week or two ago, I was talking about our kids. And they're playing video games is a serious security risk for us. Craig Peterson 10:12 Because it is our kids are now being manipulated by online criminals who are getting them to do things via these multiplayer video games. So being able to spy on you. And knowing if it does or not, is an important thing for you. Craig Peterson 10:31 So the Switch does not have a camera. Now, remember, a lot of these devices need, you have the physical device. And then you also have an app that you use with that device. So you've got the device, you've got the app, so the app is on your smartphone. And that app may, in fact, have built into it the ability to use the smartphones camera or its microphone. So remember that as well as you're looking at these things. So these the Nintendo Switch does not have a camera. And the app does not use the device's camera. It does not have a microphone. But it does use the app's microphone. So that could be a bit of an issue for you. And then from a location tracking standpoint, the device does not track you. And the app does not track you. So those are the dynamics. They look at those of the things that the Mozilla people have been looking at stuff you should look at as well. Now deeper into it, you can't tell Craig Peterson 11:36 by looking at it, right. Like you can see a camera right, you might be able to see a microphone. This does use encryption, it has a privacy policy that you'd have to have a college degree to read. I love the way they put this right. And it does share your information with third parties for unexpected reasons. But remember, didn't make their minimum standards. It all automatically apply security updates, it deletes data, it stores on you and has parental control. The company manages their security vulnerabilities, which is really nice. We spend a lot of time with our clients trying to keep their machines up to date on the security vulnerabilities. So that's Nintendo Switch. It's well worth doing. You know, you can be tied in with external devices to those have their own security problems. minimum standards met again, here. Privacy not included from Mozilla on the Philips Hue smart light kit. This is something I have, I love these things, the lights come on in the morning, they can dim they can give you kind of a morning dawn type sequence, they can give you different colors of the light in our room, we turn it down to read at night, which is, of course, better for your eyes. So you sleep better. It's the blue lights that really kind of nail you with these. But you can also have the lights dance with your music and jump with the movies and video games is a very, very cool a safety here camera, no on the app or the device microphone. No on the app or the device location tracking know on the app or device. Now Phillips had a security problem with a few balls a few years back that we talked about here, which was that people could remotely turn lights on and off, which is it's a problem. But it's not the worst problem in the world. So they really pulled up their socks. And they've got some nice security in it. Now it does use encryption. It does require a college degree to understand the privacy policy. And it does share your information with third parties. Craig Peterson 13:44 See, you have to change passwords that have automatic updates at deleting your data that it stores. It has the company controlling security vulnerability. So I'll have a look at that. Okay, hijacking he Philips Hue Bob's much harder than it used to be. This did not get a good privacy rating. And that's the nest learning thermostat. Craig Peterson 14:06 I like this. I think it's a cool thermostat. And I've been tempted to get one forever. My son in law or one of my sons in law bought one of these thermostats. Craig Peterson 14:15 And it is neat, and it does save energy and stuff. But it also connects to your network. So a few in my house, we have an IoT network, which is an Internet of Things. So devices like, you know, an Amazon Echo, or Google nasty, etc, those would go on to the IoT network, which has no access to any of our computers in the house. Nothing at all. Okay, so if I hadn't asked, that's where I would put it, I would advise you guys to do that, too, for your homes. Now, businesses, I deal with this all the time with security cameras and other things. Businesses just are not segmenting the networks as they should, it is important to segment them put these types of devices on a different network. If you have manufacturing equipment, make sure that also on a different network. Because frankly, these devices can be and are being used to launch attacks against you these security cameras that you see these Chinese security cameras. Oh my gosh, that's terrible. What's happening with these, many of them are coming pre-installed with backdoors. And then the Chinese are getting into the devices. In some cases, the Russians are hacking them, and they're using them to see all of your data, get all your bank account information, etc, etc. So again, here is an important safety tip. If you're going to have a number of Internet of Things, devices, like these light bulbs, like these thermostats, etc. etc. Make sure they are on a completely separate network. This nest learning thermostat, the app does have and use a camera the microphone again in the app location tracking in the app. So the device itself doesn't have any of those. But the app does and that uses down your smart device. It does have encryption, it apparently does not share your information with third parties. And it has automatic security updates Delete to date at stores on you. And the company manages security policy. So some good news there on a bunch of fronts. So look them up. Go online, you'll see this whole report privacy not included from Mozilla. You can just go to Craig Peterson. com. You can probably find it in a Google search as well. Lots of good information there. Craig Peterson 16:44 Next up, our friends over at Facebook. In the news again, Mark Zuckerberg. Well, not just Mark but What's your name as well? Oh, my. This is very interesting. Because they were doing some things they promised they would never do. They said they weren't going to spy on people. They weren't going to sell the information that we're going to tell you about stuff, right? And we already know they've just totally ignored all of that stuff. Sheryl Sandberg right is their name. Wow. It turns out that the UK, Britain Craig Peterson 17:20 seized emails, internal emails from Facebook. And it was part of a parliamentary committee's investigation into Facebook. And isn't this interesting. So of the company Facebook plan to gain users permission to get at the user's call logs and lists of everybody Craig Peterson 17:44 they had called in texted on their phones without explicitly asking for permission. In fact, they plan to do it as part of an update to the mobile Facebook app. So normally, androids policies would dictate the user See that little pop-up notification if you're an Android user, you're used to seeing that so that notification pop up saying, hey, they want access to your call logs to your phone records to your texting records. And you would say no, I don't want Facebook to have them. Well, apparently, they figured out a way around that so that they could have a new application update come in you to accept the update to the application. And it wouldn't tell you that Facebook was trying to monitor all of your phone call logs, isn't that something. So if Facebook shipped its app update with only one permission request, it would not trigger the permissions pop up. That meant that users would be opting into the call log tracking when they downloaded the update without Android making them aware of what they were opting into a Facebook Product Manager put it this way, quote. This is a pretty high-risk thing to do from a PR perspective, but it appears that the growth team will charge ahead and do it and quote so that's from one of their internal emails. And obviously, it's pretty shocking. And the UK Government is pretty upset about all of us. And hopefully, we pick up on it here. I don't know what the democrat controlled house what's going to happen. They have a lot of tight ties into Facebook. The Republicans have certainly been investigating Facebook. Hopefully, they will. And everybody needs to know these guys. They are not straight shooters. Absolutely not. So the same email this is again from slate.com up on my site, you'll see to http://CraigPeterson.com, the same email suggest holding off another invasive permissions request not out of respect for users. But due to concern, the backlash from the call logs request would subject the second sensitive permission request to public scrutiny to Craig Peterson 19:59 So Facebook ultimately went ahead with the update and the collection of Android call logs and succeeded in keeping it quiet. Craig Peterson 20:07 Oh, my gosh. Okay. So we start off 2019 with some more we're good news about Facebook and what they've been up to. Craig Peterson 20:18 I don't know if you've heard about these airdrops assaulted, been going on one of one of my sons, Craig Peterson 20:25 he kind of figured this out. Oh, you're too ago that he would go on to his iPhone. And he'd see who had their airdrop turned on now you can set it up and this is a way I do it. So that only your contacts can see you. On Airdrop he would look and see who has their airdrop wide open. And Airdrop is fantastic. Because you can send photos, videos, documents, anything you want directly to another person locally. So just it's literally airdrop to that person. They don't have to go up the apples clouded. You don't need to use your internet connection forward just goes right to them. So I got a contact from one of our listeners saying they were driving down the highway. And all of a sudden this request came up on their phone. And they're trying to figure out what's going on. Should I accept this? And obviously, they didn't. Right. And they reached out to me after the fact you're trying to figure it out. Well, there's something new called cyber flashing. Now. That's not what my son did. My son would just drop the means on people's phones about turning off air job or securing it. But cyber flashing is the act of sending lewd pictures to unsuspecting victims via the airdrop functionality on their phone. Craig Peterson 21:49 Okay, very, very bad. Now it's become such an issue in New York and particularly New York City that laws have been created to help prosecute dead digital sexual harassment in Philadelphia, please safe cyber flashing is happening there as well its kind of interesting to read through the article. Again, Associate Professor Temple University Fox School of Business recognizes a vulnerability it goes on and on. But if you get an airdrop request from somebody that you don't know, it could be cyber flashing, you might want to go into airdrop and either just turn it off. Now it's available right from that little-locked screen. So you know how normally you might slide up on the bottom of your phone or the top right corner, depending on what kind of device you have iOS device and you turn on your flashlight. You know how to turn that flashlight? Well, it's on that same screen. So you can turn your air drop off all of the time. And just turn it off. When you're trying to send something or someone else's trying to send something to you. That's probably your safest bet. Craig Peterson 22:58 Now if you got an app watch over the holidays, a brand new one, the newest model, it is now designed to detect irregular heart rhythms. Now that can save a life frankly, and it isn't like it's monitoring all the time. It's not designed to detect a heart attack in the process. What it does is it waits for you to be calm. So you're kind of sitting, you're not really moving very much. And then it monitors your rhythm. And it's looking for some basic arrhythmias, and it'll inform you about them. It's designed to be used by people over the age of 22, and they're not all designed for people who've already been diagnosed with atrial fibrillation by their doctor. But it can help with all the stuff Apple got first of its kind clearance for the electrocardiogram app from federal regulators in September, they did a preclinical study with 2000 people they did clinical trials was 600 other people and founded it could distinguish between a normal heartbeat and atrial fibrillation. So that's where they're starting. This is going to get a lot faster, better as time goes on. But if you have the latest software on your watch, you can migrate over to the watch app on your iPhone. Then scroll down to heart health, you'll see a new menu of options. And you can enable a set of notifications so that your Apple Watch will detect in your regular rhythm. You can also view your electrocardiogram readings. Once you have taken them, it's they are calling it ECG CD. Often it's EKG. So it's got notifications and ask you for your date of birth to make sure you're over 22. And it kind of goes on from there. So set up the app on the watch, make sure you follow the instructions lightly touch the crown without pressing down on it. And then it'll come up with some screens, telling you some more details about what's going on and give you that data. Pretty cool. If you got an Apple Watch and you don't want to eat just send it to me care of the local radio station. Craig Peterson. Now stopping apps and tracking you this is a very big deal. I've talked about this a couple of times recently. But now we found out that at least 75 companies are receiving people's precise location data from hundreds of apps. Now, people have enabled location services on these apps. Sometimes unwittingly, you know, a lot of times you just don't think about it. And you just click Yeah, except right or allow you got to pay attention to this in the iOS space. As I've mentioned before, it's safer than for tracking than it is an Android it's more clear, Apple's done more about that, but these companies are using the and information they're selling it to advertisers, investment firms, and others. Can you imagine being in a doctor's office or, you know, an emergency room and, and getting a notification that this clinic has the same features half the price etc, right, while you're there in the emergency room, or don't get that abortion because it's seen that you are at Planned Parenthood, etc, etc. So they're collecting all of this data and they are selling it Craig Peterson 26:31 so it's kind of difficult to know the language for the disclaimers can be pretty dense, pretty hard to understand there's no definitive list. It's just a problem here. So here's what you do to stop location tracking. On iOS. First, you open your settings select privacy, it has a blue icon in a white hand then select location services you're going to see a list of apps along with location setting for each one of them it also has a little icon that tells you if they've used location services recently and turn on the option while using the app and don't let them use it all the time. Because that's where most of the problem comes in. On Android you can go to Settings security and location app level permissions you'll see the list of apps and you got to dig around in order to turn it off but it's good advice to turn that off make sure it's off making sure it stays off because you really don't want all this stuff happening to you. Hey I hope you are planning on a good year I've got a whole series of master classes planned we are starting them up these are master classes on security completely free we're going to give them to you but you have to sign up go to crank Peterson comm slash subscribe to make sure you're on my list http://CraigPeterson.com/subscribe we're going to be talking about backups how to do them how to do them for business or we're going to be talking about turning on free security tools what paid security tools you should be loot using six weeks here master classes every week http://CraigPeterson.com/subscribe. Hey, Have a great year ahead. Take care. Bye-bye. --- Related articles: Airdrop Assaults On The Rise As Criminals Cyber Flash Strangers Are Your Holiday Gifts Safe? Apple Watch Can Now Detect Your Irregular Heart Rhythms And Other Problems: Here’s How It Works Facebook Never Really Cared About Connecting The World How To Stop Apps From Tracking Your Location --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

TecWord
Microsoft Internet Explorer

TecWord

Play Episode Listen Later Oct 13, 2018 1:18


Microsoft Internet Explorer O Microsoft Internet Explorer, agora chamado de apenas Internet Explorer, ou Windows Internet Explorer, em muitas ocasiões é escrito apenas de IE, é um navegador web gráficos produzido e comercializado pela Microsoft. https://www.tecword.com.br/microsoft-internet-explorer/ --- Send in a voice message: https://anchor.fm/tecwordcombr/message Support this podcast: https://anchor.fm/tecwordcombr/support

NCBI Labs
Archive-NCBI Technology Podcast-2018-8-August

NCBI Labs

Play Episode Listen Later Aug 8, 2018 99:38


Technology Podcast Episode 75: August 2018There are some changes on the way for our Technology Podcast and Stuart explains what's happening.Sharon Lyons is along to continue her alphabet shortcuts series, this month we are exploring the letters L and M.We meet Dean Mills, who is actively using the Aira service in the UK, and gives us his first-hand experience.Eric Damery visited NCBI on July 13th and we bring you some highlights from his presentation.Stuart is joined by Sean Doran, a technology trainer at NCBI, who explains why we should move away from Microsoft Internet Explorer.Finally, we re-play an interview with the late Paul Traynor from March 2015.Support the show (https://www.ncbi.ie/supporting-us/donate-now/)

Zengineering: A Philosophy of Science, Technology, Art & Engineering
052 - with Jonathan Sampson, on Brave, Basic Attention Token and Browser Security

Zengineering: A Philosophy of Science, Technology, Art & Engineering

Play Episode Listen Later Feb 20, 2018 52:34


What's up Zengineers!!?? It's that time again? What time you may ask? Time to get jiggy inside a high tech rabbit hole. Our guest this week is Jonathan Sampson, programmer, world traveller, technologist, and Head of Developer Relations at Brave Browser (https://brave.com/). A new revolution of web based technology is upon us, and Jonathan is here to help us make sense of it, and discuss how the team behind Brave Browser is leading the way. Brave is a new web browser (like Google Chrome, Microsoft Internet Explorer, Apple Safaris, or Mozilla Firefox) ... The difference is, this browser is aiming to totally alter the internet landscape. Through security by design, privacy as a business model, and tight integrations with blockchain and crypto-currencies, Brave browser is working to re-imagine the internet in its original incantation. This new creation rides the incredible tidal wave of internet that we all know and love, but also, at times, fear and loathe.

Soy Profesor Online
16. Bonifica la formación de tus alumnos virtuales

Soy Profesor Online

Play Episode Listen Later Nov 14, 2017 13:32


En el podcast de hoy hablaremos sobre cómo conseguir que tus alumnos virtuales bonifiquen la formación de tus cursos online Hay muchas maneras de enfocar la comercialización de los cursos que desarrolles para Internet. Hoy toca el turno de hablar de cómo facilitar el aspecto económico para captar empresas que tengan trabajadores. Una fórmula muy interesante para conseguir nuevos alumnos. ¿Qué es esto de la formación bonificada? Todas las empresas disponen de un crédito anual, el cual es aportado por los trabajadores y la empresa a la Seguridad Social, en función de la contingencia de formación profesional de cada año. Este crédito es el que se utiliza para la formación de sus empleados. En otras palabras, los trabajadores a cargo de una empresa o profesional aportan una pequeña cantidad de sus nóminas mensuales que se acumulan en un saldo formativo disponible para todo el año. Lo cierto y hasta que la normativa legal no cambie, a título general, cualquier negocio con entre 1 y 5 trabajadores dispone de 420€ para invertir en formación continua. Algo muy útil para que, nosotros como formadores, podamos vender nuestros servicios como profesores online. El organismo que gestiona todo esto se llama Fundae, antigua Fundación Tripartita, y depende del SEPE y a su vez del Ministerio de Empleo y Seguridad Social. Por lo que tendréis que cumplir una serie de requisitos para formar parte de esta cadena de formación bonificada. Empezando por acreditarse y continuando por cumplir las normas con el fin de que vuestros alumnos virtuales puedan conseguir recuperar la inversión en formación realizada una vez que haya finalizado. El proceso a grandes rasgos es: Vender un curso de formación. Impartir la el temario formativo. Facturar y cobrar vuestro servicio. Recuperar por parte del cliente el importe abonado anteriormente. ¿Qué debes hacer para darte de alta como profesor de cursos bonificados? Empecemos por lo básico, vuestro objetivo, según lo define Fundae, es el de acreditaros como “entidad formadora”. Lo que básicamente podemos definir como aquellos centros de formación que quieren utilizar el sistema de bonificaciones para sus clientes-alumnos. Entendamos “centro de formación” como empresa o profesional que imparte alguna actividad formativa. Lo primero que debéis hacer es daros de alta a través de la aplicación telemática de Fundae siguiendo estos pasos Tener el certificado digital e instalado en vuestro ordenador. Si no lo tenéis, entrar en el siguiente enlace y seguir las instrucciones: https://www.sede.fnmt.gob.es/certificados/persona-fisica/obtener-certificado-software Utilizar un navegador compatible con tecnología Java (Mozilla Firefox, Microsoft Internet Explorer o Microsoft Edge), Google Chrome no lo es, en la actualidad. Una vez lo tengáis, acceder a https://empresas.fundae.es/ A la derecha podréis encontrar un menú titulado “Utilidades”. Hacer clic en la opción de “Inscripción sin especialidad”. Una vez firméis el acceso con vuestro certificado digital, entraréis en la web donde cumplimentar los datos personales que os pide. En el apartado “Modalidad de impartición de la formación”, deberéis escoger “Teleformación” para impartir cursos online. Podríais escoger “Mixta” si tenéis pensado, en algún caso, dar parte de la formación de manera presencial a los alumnos. Dentro del apartado de “Áreas profesionales”, debéis escoger las que impartiréis a vuestros clientes. Ahora, en “Ámbito de actuación”, seleccionar “SI” para justificar que impartiréis formación online a cualquier persona de cualquier comunidad autónoma española. Para continuar, firmar abajo del todo a la derecha. Al final, se habrán generado 2 documentos en PDF que deberéis conservar, uno con los datos introducidos a modo de resguardo y otro con un código que os asignan. El cual debéis de facilitar al cliente que lo solicite y desee gestionar la bonificación de cualquiera de vuestros cursos virtuales.

GRINDHARD RADIO
Season 3 Episode 53 of the Sade Champagne Show

GRINDHARD RADIO

Play Episode Listen Later Aug 16, 2017 90:00


"The Sade Champagne Show" (Season 3 EP53) Each episode is full of Inspiration, Encouragement, Entertainment, and Empowerment. Join us with Celebrity Guest Billboard Charting gold selling artist BLAKE LEWIS!! Blake Lewis first came to national attention as one of the most unique contestants ever to compete on American Idol, and long before that, as a teenager, he was well-known as "Bshorty" in Seattle's a cappella, hip-hop, and rave scenes. But with the release of his ambitious and completely independent third album, Portrait of a Chameleon, Blake is taking things to a whole new level. The follow-up to the critically acclaimed Audio Day Dream (which sold 350,000 copies and spawned the top 40 single "Break Anotha") and Heartbreak on Vinyl (the title track of which went to #1 twice on Billboard's dance charts), Portrait of a Chameleon is "fun, sexy, and positive. I'd call it 'future pop,'" says Blake. His new album is on Audio Day Dream Records and distributed through InGrooves. The album also features the hard-hitting, bass-in-your-face "Your Touch," the soundtrack to 2013's Microsoft Internet Explorer 10 campaign — which starred Blake, played on more than 19,000 theater screens across the U.S., received more than 1.2 billion impressions, and has already sold 130,000 copies worldwide.ords and will be releasing their newest studio album this summer.  Also featuring a brand new Mind Right, Game Tight segment with castmate MICHELLE MORGAN and Entrepreneurs on the Move segment where Sade will be sharing how she became an entrepreneur as a child and some of her favorite tips. Call-in @ 323-693-3043 and press "1" to stream LIVE and CHAT with Sade, the cast and her guests. Presented by: GrindHard Radio. #SadeChampagneShow

Blind Abilities
ONYX OCR and the ElBraille Overview by VFO's Richard Tapping

Blind Abilities

Play Episode Listen Later Apr 10, 2017 7:30


Richard Tapping gives our listeners an overview of the ElBraille and the ONYX OCR devices from VFO. These new devices are shipping soon and Richard covers each along with pricing packages from VFO. Descriptions from the VFO web site are posted below and Richard gives a great overview in this podcast. Join Richard Tapping and check out the new products from VFO.   You can contact Richard Tapping 800-444-4443 or 727-803-8000 Sales: Info@vfogroup.com   Thank you for listening. You can follow us on Twitter @BlindAbilities On the web at www.BlindAbilities.com Send us an email Get the Free Blind Abilities App on the App Store. The ElBraille A cutting-edge, extremely portable Braille computer The ElBraille is a portable device designed for users who are blind or deaf-blind and want to stay connected at school, work, or home as well as on the go. The twenty-first century, take anywhere replacement for the dedicated notetaker, ElBraille combines the power and flexibility of a modern mainstream computer running the Windows® 10 operating system with JAWS® and a Braille display with a full Braille keyboard to offer a fully accessible compact computer. JAWS provides the best screen reader experience with either Eloquence speech output or the highly responsive and life-like Vocalizer Expressive Compact voices as well as full Braille output. Type text into documents or perform JAWS and Windows® commands right from the Braille display’s keyboard using the JAWS BrailleIn® feature. Run any Windows application such as Microsoft Word®, Excel®, PowerPoint®, or Outlook®. Use FSReader to read DAISY books from sources such as Bookshare.org or browse the internet with Microsoft Internet Explorer® or Mozilla® Firefox. ElBraille also includes a set of specially designed apps for performing popular actions such as the creation of voice or text notes, listening to audio content, and more. The ElNotes application developed by Elita Group is designed to create, store, and manage text and voice notes on the ElBraille Notetaker. ElNotes allows a user to quickly create text and voice notes using a set of special keystrokes and then export them to TXT or MP3 files respectively, if needed. These files are saved to a user-specified folder and then are available to be read and listened to using other ElBraille applications. Save by upgrading your current investment - Compatible with your existing Focus 14 Blue or Focus 40 Blue Braille Display and your existing JAWS license.     Features •Runs Microsoft Windows® 10 ◦Latest JAWS version with Eloquence comes preinstalled •Braille display: 14 or 40 refreshable Braille cells, an 8-dot Perkins-style Braille keyboard •Microprocessor: Intel® Atom™ x5-Z8300, Quad-Core 1.84 GHZ CPU •160 GB of internal memory, 2 GB RAM •2 stereo speakers •Built-in Microphone •An additional system speaker with sound and vibration feedback •Wireless WLAN802.11 A/B/G/N/AC networks support (2.4 and 5 GHz) •Bluetooth V4.2 •A built-in 4G LTE modem supporting 7 cell networking standards: TDD-LTE, FDD-LTE, TD-SCDMA, WCDMA, CDMA1X/EVDO, GSM/GPRS/EDGE. Download speed up to 150 Mbps, upload speed up to 50 Mbps •GPS 1/8" (3.5 mm) headphone jack •Memory card slot supporting SD, SDHC, SDXC up to 256 GB •USB 3.0 port •Mini HDMI port •Rechargeable 10,400 mAh battery •Approximately 17 to 20 hours on battery, even with wireless networking turned on •Powered with an AC adapter (110 to 240 V) or from battery ◦An AC adapter with replaceable plug (UK, US, EU, AU) •ElBraille-14 dimensions: 7.4×4.7×1.5 in (189×118×38 mm) •ElBraille-14 weight: 27 oz. (750 grams) with battery Software •Microsoft Windows 10 operating system •Supports Microsoft Office 2016, 2013, or 2010 •Available with JAWS for Windows 18.0 screen reading software including high-quality Vocalizer Expressive voices •A specially designed self-voiced and self-Brailled emergency menu allows recovery of the device without system reboot or loss of data in case speech and Braille output is interrupted       The ONYX OCR LOW VISION SOLUTIONS: ONYX® OCR Portable Video Magnifier The ONYX OCR magnifies and reads aloud any document. The clear voice, magnification and high contrast makes reading so much easier. Comfortably change your focus from reading magnified texts yourself, to letting the ONYX OCR read them to you when reading becomes too tiring. Just place your document under the fixed OCR camera on the left and activate the speech function. Enjoy listening to any document as it is read aloud by a high quality voice, without straining your eyes. This four-in-one solution integrates two separate cameras: one for transforming text to speech output and one for magnifying documents and observing the room around you. This way, you can clearly see what you want, whether it is across the room or at your desk! The ONYX OCR is a video magnifier for users who want to combine magnification and speech. The self-contained design integrates two cameras and a 24-inch touch screen. It allows you to view a full letter page on screen, and to magnify materials up to 131 times. The ONYX OCR combines the perks of several video magnifiers in one design. With this four-in-one solution, you can magnify text on your desk, write, work on hobbies, view images from a distance, view yourself, and even listen to documents as they are read aloud! You can comfortably switch between reading magnified text and listening to documents. Just place your document under the fixed OCR camera on the left side of the magnifier, tap the touch screen and enjoy listening to the text, without straining your eyes.     Features •Four-in-one video magnifier with two separate cameras for distance, document, self view and OCR functionality: ◦Flexible camera to observe objects across the rooms or auditoriums in sharp focus (distance view), to magnify documents such as reading materials, daily business tasks, classroom assignments, product labels and craft projects (document view), and to get magnified true mirror image (self view) ◦Convenient fixed position OCR camera to listen to documents effortlessly – Always place the document in the same place •Touch screen monitor: Tap the screen to begin reading at any point and from any place in the document •Displays full pages and automatically identifies the document layout Free In-home Demo Documentation GSA Information   Advanced Features •Autofocus HD camera •OCR camera – 13 Megapixels •Magnification Range: 24-inch monitor: 1.7x to 131x •24-inch full color TFT widescreen display •Point & Read functionality: intuitive touch interface •Overview: full letter page viewing •Assistive reading with automatic text zone recognition •Fast text recognition (OCR) •Over 60 reading voices in 31 languages •Saving and opening documents on a SD card or USB stick •Large icon and large font menu •Volume control •Speed control •Digital photo viewer •Built-in stereo speakers •SD card slot •USB port •Headphone connector •Weight: 24-inch – 25.8 lbs / 11.7 kg •Working height under camera: 16.4 inches / 41.6 cm  

DEF CON 23 [Audio] Speeches from the Hacker Convention
Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 15, 2015


Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers Saif El-Sherei Analyst, SensePost Etienne Stalmans Analyst, SensePost Fuzzing is a well-established technique for finding bugs, hopefully exploitable ones, by brute forcing inputs to explore code paths in an application. In recent years, fuzzing has become a near mandatory part of any major application's security team efforts. Our work focused on fuzzing web browsers, a particularly difficult challenge given the size and quality of some of their security teams, the existing high-quality fuzzers available for this, and, of late, bug bounty programs. Despite this, our improved fuzzing approach was able to find four confirmed bugs within Google Chrome and two within Microsoft Internet Explorer 11. The bugs had varying potential exploitability. Interestingly, some had been independently discovered indicating others are active in this field. The work is on going, and we hope to have more before the presentation. As browsers continue to grow as the new universal interface for devices and applications, they have become high value targets for exploitation. Additionally, with the growth of browser fuzzing since 2004, this is a complex field to get started in. Something we hope to help address. Our research and presentation will consist of two parts: The first part is an introduction to fuzzing for the security practitioner. Here we combine the approaches, tool sets and integrations between tools we found to be most effective into a recipe for fuzzing various browsers and various platforms. The second part is a description of our work and approach used to create, and extend, browser fuzzing grammars based on w3c specifications to discover new and unexplored code paths, and find new browser security bugs. In particular, example of real bugs found in the Chrome and IE browser will be demonstrated. Saif is the body double for Borat, but couldn't pull off a mankini and ended up in information security. His focus is on fuzzing and vulnerability research. Etienne hopes he will outlive his beard, but in the meantime, this hacking schtick pays for beard oil. His other interests lie in mobile applications and no-sql databases. Both are analysts within SensePost's London office.

Deviant Robot Transmission
Episode 40 - Deviant Robot Transmission

Deviant Robot Transmission

Play Episode Listen Later Sep 11, 2015 120:01


This episode of the Deviant Robot transmission is very very late indeed due to some problems with the recording and editing computer. These problems were caused be Adobe Cloud being the worst software created since Microsoft Internet Explorer. This episode features the first appearance of Alex Rogers and also the first ever phone in section. Phone in sections are very technical and in no way did we achieve this by just holding the phone up to the mic. Mostly this episode was about eating brains.

The Web Platform Podcast
32: Microsoft Spartan & Internet Explorer

The Web Platform Podcast

Play Episode Listen Later Feb 24, 2015 66:08


The Internet Explorer team at MIcrosoft are making waves in the developer community. The Internet Explorer browser (AKA IE or Internet Exploder) has a long and jaded history. Newer developers may not recall, but fifteen years ago Internet Explorer was arguably THE best browser experience we had.  IE had some basic developer tools, it practically invented AJAX with its ActiveX Technology, and it was the standard that corporate web development was measured by. Then, something happened. Firefox was born.   The Firefox browser, created by Mozilla, in contrast to IE was rapidly developed and it worked with standards bodies to guide feature implementation. One key success factor for Mozilla was that Firefox was an open source community driven project. Microsoft did not follow the same philosophies as Mozilla in their development. They opted to continue using proprietary technologies and continued on the path that led them to success for so many years.   The community began to resent Microsoft & Internet Explorer because Internet Explorer was, and as of today, stil is the default browser for its Windows Operating System. Since its creation, Windows has the majority market share in the corporate & government spaces. For better or for worse, the most successful development companies traditionally have targeted these markets and related sub markets because they typically yield the most profits comparatively to their costs.   The Safari & Opera browsers also fell in line with Firefox as far as standards implementation. Some extra code is needed to make everything work the same across browsers & devices but it's minimal in effort. This ‘cross-browser' coding is not as insignificant with Internet Explorer. Developers now had to build extra code and spend extra time needed to support Internet Explorer which cost companies a ton of money.   Something happened to Microsoft in recent years that slowly changed the way they looked at the business of web & mobile development. Microsoft decided to invest in open source. They created Microsoft Open Tech. They adopted JQuery as an officially supported JavaScript framework in their products. They began taking an active role in standards bodies and implementation of open standards. Microsoft also started doing something that surprised the developer community. They started telling the public what they were building into Internet Explorer as well as the development status of those features.   The  IE team began adding support & tooling for popular open source projects for their .NET platform. One of the most surprising moves by Microsoft is that The Internet Explorer team publically empowered developers & users to voice the features they want in the next versions of the Internet Explorer Platform experience.   Jacob Rossi, Charles Morris, & Adrian Bateman join The Web Platform Podcast to chat about the future of the web and how Microsoft is returning to its former glory and, arguably, leading the way in developer happiness. Microsoft is making massive improvements in the experience of Internet Explorer. On top of that they are actively assisting companies with the upgrade process and involving users in a Technical Preview Program of Windows 10 where users can help improve the product before the official release. This preview has a new browser alongside the modern Internet Explorer. This new browser, code named ”Project Spartan”, is free of the old Internet Explorer legacy and ushers in a new way to think about MIcrosoft's Web Platform.. Resources Asm.js on IE - http://blogs.msdn.com/b/ie/archive/2015/02/18/bringing-asm-js-to-the-chakra-javascript-engine-in-windows-10.aspx IE Blog - http://blogs.msdn.com/b/ie/ IE on Twitter - @IEDevChat Smashing Magazine article on Spartan - http://www.smashingmagazine.com/2015/01/26/inside-microsofts-new-rendering-engine-project-spartan/ Modern IE - https://www.modern.ie/ Free Windows Virtual Machines for Mac & Linux - https://www.modern.ie/en-us/virtualization-tools#downloads Public Platform Status - https://status.modern.ie/ Remote IE - https://remote.modern.ie/subscribe User Voice Post - https://wpdev.uservoice.com/forums/257854-internet-explorer-platform Rethinking Microsoft's Browser with Rey Bango - http://www.thewebahead.net/94 EcmaScript 6 (ES6) Compatibility Tables - http://kangax.github.io/compat-table/es6/ Sitepoint article - http://www.sitepoint.com/microsoft-spartan-future-internet-explorer/ Panelists   Erik Isaksen - UX Engineer at3Pillar Global Nick Niemeir - JavaScript Agent Engineer at New Relic Rob Simpson - Senior Front End Developer & host of The Watercooler Web Dev Show Rachel Nabors - Web Animation Developer Advocate & Founder of TinMagpie

The Future And You
The Future And You -- November 14, 2012

The Future And You

Play Episode Listen Later Nov 14, 2012 40:12


Ramez Naam (author, futurist and IT professional) is our featured guest. Topic: Global Climate Change is just one of the many topics he covers in his book The Infinite Resource: The Power of Innovation on a Finite Planet. Looking beyond the arguments and hyperbole, in this interview we discuss what we know scientifically and what we don't know. We explore the problems and inconveniences which global warming will likely produce, as well as the strengths and weaknesses of some possible engineering methods of placing a thermostat on the Earth. Hosted by Stephen Euin Cobb, this is the November 14, 2012 episode of The Future And You. [Running time: 40 minutes] Ramez Naam is an IT professional, futurist and author. His background is in computer software and high scale web services. He held leadership roles on early versions of Microsoft Outlook and Microsoft Internet Explorer. He was one of the early employees on the Bing search engine and led all of Program Management for Bing for two years and the Relevance and Ranking Team for four years. He is a member of Humanity Plus and the Institute for Ethics and Emerging Technologies, and he teaches at Singularity University. He is the author of the nonfiction book More Than Human: Embracing the Promise of Biological Enhancement which came out in 2005. And has a new book coming out in the spring of 2013 entitled The Infinite Resource: The Power of Innovation on a Finite Planet.

The Future And You
The Future And You -- November 7, 2012

The Future And You

Play Episode Listen Later Nov 7, 2012 41:29


Ramez Naam (author, futurist and IT professional) is today's featured guest. Topics: good trends such as: poverty and hunger are down world-wide, while health and longevity are up; but also mixed trends such as in: education and the jobs of the future, the rising shortage of fresh water, how desalinization works and why it is increasingly important, the good and bad truth about fracking and natural gas, limits on agriculture--just how much food can we produce? the good and bad news about china, as well as other topics he covers in his book The Infinite Resource: The Power of Innovation on a Finite Planet which is due out in the spring of 2013. Hosted by Stephen Euin Cobb, this is the November 7, 2012 episode of The Future And You. [Running time: 42 minutes]  Ramez Naam is an IT professional, futurist and author. His background is in computer software and high scale web services. He held leadership roles on early versions of Microsoft Outlook and Microsoft Internet Explorer. He was one of the early employees on the Bing search engine and led all of Program Management for Bing for two years and the Relevance and Ranking Team for four years. He is a member of Humanity Plus and the Institute for Ethics and Emerging Technologies, and he teaches at Singularity University. He is the author of the nonfiction book More Than Human: Embracing the Promise of Biological Enhancement which came out in 2005. And has a new book coming out in the spring of 2013 entitled The Infinite Resource: The Power of Innovation on a Finite Planet.

The Future And You
The Future And You -- October 31, 2012

The Future And You

Play Episode Listen Later Oct 31, 2012 37:29


Ramez Naam (author, futurist and IT professional) is today's featured guest. Topics: Internet Search Algorithms (what they are and how they do what they do); what and why he teaches at Singularity University; why he joined Humanity Plus and the Institute for Ethics and Emerging Technologies; why he believes (as does your host) that all human beings are transhumanists by their fundamental nature; why he dislikes the term "Transhumanist" even though he is one. We also discuss his article in Scientific American which describes how photovoltaic cells (solar cells) are undergoing an exponential price change similar to Moore's Law; why the power grid is not ready for widespread use of photovoltaic cells, and what needs to be done to make it ready; and the difference between smart grids and dumb grids. Hosted by Stephen Euin Cobb, this is the October 31, 2012 episode of The Future And You. [Running time: 38 minutes]  Ramez Naam is an IT professional, futurist and author. His background is in computer software and high scale web services. He held leadership roles on early versions of Microsoft Outlook and Microsoft Internet Explorer. He was one of the early employees on the Bing search engine and led all of Program Management for Bing for two years and the Relevance and Ranking Team for four years. He is a member of Humanity Plus and the Institute for Ethics and Emerging Technologies, and he teaches at Singularity University. He is the author of the nonfiction book More Than Human: Embracing the Promise of Biological Enhancement which came out in 2005. And has a new book coming out in the spring of 2013 entitled The Infinite Resource: The Power of Innovation on a Finite Planet. News Item: As of Oct. 28, 2012, every observation from the extrasolar planet survey made by Kepler since its launch in 2009 through June 27, 2012, is available to scientists and the public. What's more, all future data will be no longer exclusive to the Kepler science team, its guest observers, and its asteroseismology consortium members and will be available immediately to the public. This treasure-trove contains more than 16 terabytes of data and is housed at the Barbara A. Mikulski Archive for Space Telescopes, or MAST, at the Space Telescope Science Institute. MAST is a huge data archive containing astronomical observations from 16 NASA space astronomy missions, including the Hubble Space Telescope. It is named in honor of Maryland U.S. Senator Barbara A. Mikulski. Over the past three years the Kepler science team has discovered 77 confirmed planets and 2,321 planet candidates.

Webdesign-Podcast.de
Microsoft Internet Explorer 9 ist da

Webdesign-Podcast.de

Play Episode Listen Later Mar 16, 2011 4:19


Am gestrigen Dienstag hat Microsoft den neuen Internet Explorer 9 veröffentlicht. Der unter den Webentwicklern eher verpönte Browser macht in der neuen Version einige große Schritte nach vorne. Microsoft scheint begriffen zu haben, dass... Ähnliche Artikel: Must have AddOns für den Mozilla Firefox Piwik die OpenSource alternative zu Google Analytics W3C stellt das neue HTML5 Logo vor

Knowledge@Wharton
Better Faster Customizable: Who Will Win the Browser Battle?

Knowledge@Wharton

Play Episode Listen Later Nov 23, 2010 14:26


In the world of web browsers it's beginning to look a lot like the 1990s. Back then the Internet was just starting to become an integral part of daily life and Netscape Navigator and Microsoft Internet Explorer vied for control of the market. This time around the browser battle includes an increasing number of competitors most notably Internet Explorer Mozilla Firefox and Google Chrome. Newcomers like RockMelt a start-up that promises to integrate web browsing with social networking are banking on innovative new features to stand out. But does winning the browser space mean much in environments -- like mobile devices -- that increasingly focus on standalone web-connected apps? See acast.com/privacy for privacy and opt-out information.

Appleando, el Podcast
Appleando 03 Podcast Navegadores, macniacos y WWDC

Appleando, el Podcast

Play Episode Listen Later Jun 10, 2008 30:08


Aquí está el capítulo número 3, con los siguientes temas: - Navegadores: * Safari. * Firefox. * Flock. * Instalando Internet Explorer en MAC OS X: - Darwine. - ies4osx. - Microsoft Internet Explorer 6.0 - Revisión de blogs y podcast: macniacos. - Lo que nos trajo la keynote de Steve Jobs en la WWDC. Música de CSW Studio: Bobby doesn’t get a Th y de ..,just for claire: Sometimes it is good; obtenidas en Jamendo. Para cualquier comentario vía mail o de audio usar mi dirección de correo: appleando@gmail.com

Strike Point
Internet Explorer 7 Additions

Strike Point

Play Episode Listen Later May 1, 2006 66:12


Dave chats about the fact that Microsoft debuts a few additions to the new Microsoft Internet Explorer 7 browser, and his dying allegiance to Firefox