Podcast appearances and mentions of Norton AntiVirus

Anti-virus software

  • 45PODCASTS
  • 52EPISODES
  • 46mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 19, 2025LATEST
Norton AntiVirus

POPULARITY

20172018201920202021202220232024


Best podcasts about Norton AntiVirus

Latest podcast episodes about Norton AntiVirus

What's On Your Mind
Fargo to the Frontlines: Ag Threats, Border Chaos & the Big Beautiful Bill (5-19-25)

What's On Your Mind

Play Episode Listen Later May 19, 2025 93:20


Live from Washington, D.C., Scott Hennen dives deep into the intersections of agriculture, politics, and national security in this Monday edition of What's On Your Mind. Joined by Flag Family Ag Director Bridget Riedel, the episode covers rising ransomware threats to farms, surging exports to Mexico, bird flu outbreaks in Brazil, and the latest power plays in Congress. Plus, hear exclusive reflections from Senator James Lankford on faith, politics, and how to turn the country around. ⏱️ Key Moments & Timestamps: (0:00) — Live from D.C.: Scott sets the scene at the Fargo-Moorhead-West Fargo Chamber's Washington fly-in(1:07) — Upcoming guests and topics: Bridget Riedel, Senator James Lankford, and more(2:34) — Interview preview: Senator James Lankford on revival and returning to Founding Father values(3:35) — Scott debunks "fake news" panic about the House bill and discusses GOP infighting(5:17) — Medicaid reform explained: Work requirements and political landmines(7:01) — Sponsored Segment: Thor Buildings spotlight(9:14) — Bridget Riedel joins: Ag ransomware attacks on the rise, farms hit with $80K+ demands(10:25) — Who's behind the attacks and why food security = national security(11:23) — Underreported and underprotected: Why farms aren't reporting attacks(12:52) — Ag IT wake-up call: “Norton Antivirus isn't cutting it anymore”(13:48) — Mexico poised to become America's top ag trade partner

Och Menno
EP 210 - Crowdstrike etwas mehr post mortem

Och Menno

Play Episode Listen Later Jul 24, 2024 19:43


Eine globale Kriser, da kann man sich auch zwei Folgen gönnen.   Links: https://www.reddit.com/r/de_EDV/comments/1e8l85h/crowdstrike_h%C3%A4tte_nicht_in_kritischer/ https://en.wikipedia.org/wiki/2024_CrowdStrike_incident https://winfuture.de/news,144036.html https://forums.rockylinux.org/t/crowdstrike-freezing-rockylinux-after-9-4-upgrade/14041 https://news.ycombinator.com/item?id=41005936 https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/ https://www.ctol.digital/news/global-it-chaos-crowdstrike-development-cpp-complexity-enterprise-it-failures/ https://en.wikipedia.org/wiki/Null_pointer https://de.wikipedia.org/wiki/Nullwert#Nullwert_als_grundverschiedener_Wert https://www.businessinsider.com/crowdstrike-ceo-george-kurtz-tech-outage-microsoft-mcafee-2024-7 https://medium.com/@vp2005rawal/technical-post-mortem-on-the-july-19th-crowdstrike-falcon-sensor-outage-a-detailed-overview-with-35c148d067ce https://futurumgroup.com/insights/the-crowdstrike-outage-a-detailed-post-mortem/ https://www.security-insider.de/virenscanner-erkennt-windows-explorerexe-als-infizierte-datei-a-101013/ https://en.wikipedia.org/wiki/Antivirus_software https://www.heise.de/news/Norton-Antivirus-stuerzt-beim-Scannen-ab-148535.html https://www.heise.de/news/Avira-Update-sorgt-fuer-Bluescreens-172668.html https://www.heise.de/news/Fehler-in-Trend-Micros-Virenscanner-bringt-Windows-zum-Stillstand-157677.html https://www.heise.de/news/AVG-Update-legt-64-Bit-Rechner-lahm-1146771.html https://www.zdnet.com/article/defective-mcafee-update-causes-worldwide-meltdown-of-xp-pcs/ https://www.heise.de/news/Abstuerze-durch-Symantec-Endpoint-Protection-1640964.html https://www.borncity.com/blog/2017/04/10/windows-7-bluescreen-nach-avast-update/ https://www.heise.de/news/Blue-Screen-of-Death-Symantec-Endpoint-Protection-kann-Windows-Abstuerze-verursachen-4558016.html https://www.reddit.com/r/Malwarebytes/comments/kzes61/bsod_from_malwarebytes/ https://www.bitdefender.com/business/support/en/77209-77540-windows-agent.html https://www.reddit.com/r/Malwarebytes/comments/kzes61/bsod_from_malwarebytes/ https://www.bitdefender.com/business/support/en/77209-77540-windows-agent.html https://www.theregister.com/2022/08/24/vmware_carbon_black_boot_loop/ https://kcm.trellix.com/corporate/index?page=content&id=KB90301 https://support.sophos.com/support/s/article/KB-000045244?language=en_US https://www.businessinsider.com/crowdstrike-ceo-george-kurtz-tech-outage-microsoft-mcafee-2024-7    

The Daily Decrypt - Cyber News and Discussions
January 17, 2024 - Crypto Heists, Norton AV Scam, Remcos RAT

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jan 17, 2024 6:53


Today's episode covers a range of critical topics, including the surge in crypto heists, a sophisticated phishing scam involving fake antivirus renewals, and the spread of the Remcos Remote Access Trojan (RAT) in South Korea. Detailed Story Breakdown: Crypto Heists Surge in 2023, $16.93m Already Stolen in 2024 Overview of the increase in crypto theft incidents in 2023 and 2024. Discussion on the shift in crypto theft dynamics, with a focus on the severity of individual heists. Analysis of factors contributing to the changes in the crypto theft landscape, including the impact of the declining value of decentralized finance assets. Emphasis on the need for enhanced security measures in the crypto industry. US Court Docs Expose Fake Antivirus Renewal Phishing Tactics Examination of a phishing scam that resulted in a $34,000 loss, as revealed by U.S. Secret Service court documents. Insights into the methods used by scammers, including impersonation of Norton Antivirus renewal notices and remote access software installation. Discussion on the importance of vigilance in digital communications and verifying the authenticity of security-related emails. Remcos RAT Spreading Through Adult Games in New Attack Wave Analysis of the spread of Remcos RAT in South Korea through adult-themed games. Discussion on the use of web hard drive systems for malicious file distribution. Advice on safe browsing habits, avoiding unofficial content sources, and the importance of updated antivirus protection. Closing Remarks: A reminder of the evolving nature of cyber threats and the importance of staying informed and cautious. Additional Resources: Links to further reading and detailed reports on the stories covered in the episode. Contact Information: How to reach out to Colin for comments, questions, or feedback. Episode Availability: Information on where to listen to and subscribe to CyberNews with Colin. Remember to stay tuned for the next episode of CyberNews with Colin for more insightful updates on the constantly evolving world of cybersecurity.

iBUG Buzz
#614 December 18, 2023

iBUG Buzz

Play Episode Listen Later Dec 24, 2023 118:01


Facilitators:  Brad  & Sandhya Topics:  alternative to Voice Memos, is Just Press Record;  volume dropping suddenly when listening to music; audio ducking explained; automatic back to iCloud not working; iPhone XR supports 17.2; powering down the iPhone - holding down power button or asking Siri; soft reboot versus hard reboot; nested folders on Home Screen; scam involving text message offering to clear out malware; Norton Antivirus software; unlocking iPad; pairing bluetooth speaker; getting a list of widgets; changing typing mode on Apple Watch; navigating  to the end  of a long e-mail with bluetooth keyboard; iBUG Bytes - changing default notifications tone only in iOS 17; original sound in Zoom on iPhone; music recognition; Siri works better if wait a few seconds before starting asking a question.

The Really Useful Podcast
Amazon Accused of Price Manipulation, and the Best Windows Antivirus Tools

The Really Useful Podcast

Play Episode Listen Later Nov 9, 2023 26:35


Need a Windows antivirus tool? The chances are you already have the best option installed. That's the focus of this week's podcast, which also looks at accusations against Amazon concerning price manipulation in the online retail market.This week, we've got the following tech news that matters: Amazon's "Project Nessie" Manipulated Prices Elon Musk Launches X AI Author Stephen King Demands Elon Musk Revert X to Twitter We've also got these tips and explainers: Best Antivirus Tools for Windows 10 Best Open Source Antivirus Tools Completely Remove McAfee or Norton Antivirus from Your PC We finish the show with the following recommendations: Spotify AI DJ We Have Ways of Making You Talk (Podcast) Christian Cawley and Gavin Phillips host this podcast. You can contact them on Twitter: @thegadgetmonkey and @gavinspavin, with your suggestions for future topics. Oh, and don't forget to leave us a review on Apple Podcasts!You can subscribe to the Really Useful Podcast on Apple Podcasts, Spotify, Google Podcasts, Amazon Music and Audible, Player FM, or copy the RSS feed into your podcast player.

The Network
#152 - Luis Carchi - CTO y Cofundador de Shield. "Desarrollando Seguridad y Herramientas Antifraude para Web3"

The Network

Play Episode Listen Later May 23, 2023 50:30


Conversamos sobre el mundo de la seguridad y antifraude en Web3 con nuestro invitado especial Luis Carchi, co-fundador de Shield. Luis, junto con sus compañeros y exalumnos de Princeton y MIT, Emmanuel Udotong e Isaiah Udotong, dejaron puestos destacados en Facebook y McKinsey para involucrarse del lleno a la industria cripto y Web3. Primero con colecciones de NFTs, Ancient Warriors, y ahora con Shield. Shield, una startup centrada en proporcionar medidas de seguridad integrales para el ecosistema Web3, recientemente se destacó al levantar $2.1 millones de inversores. En este episodio, exploramos la historia de éxito de Shield, sus servicios de seguridad en Web3, como su API que identifica posibles estafas en aplicaciones móviles y su bot de Discord que ayuda a detectar actividades maliciosas. Además, descubriremos cómo Shield protege a más de 350,000 usuarios, incluyendo clientes de renombre como Fox Deportes, Rarible y Guild.xyz. Acompáñanos mientras Luis Carchi comparte su visión sobre la importancia de la seguridad en el ecosistema de las criptomonedas y cómo Shield está trabajando para convertirse en el equivalente de Norton Antivirus para las criptomonedas. También exploramos su participación en el Programa de Aceleración de a16z Crypto Startup School, donde Shield recibió $500,000 para impulsar su crecimiento y desarrollo. No te pierdas esta conversación Gracias a nuestros sponsors: xtrim: ¡El nombre de tu empresa en la camiseta de los árbitros! Participa en www.SponsorConectado.com Pardux: Expandir tu negocio por Latinoamérica nunca fue tan fácil. https://www.pardux.com/ Farmacéutica La Santé: Tu Generico, Tu Vida. ⁠www.lasanteecuador.com⁠ Anubis Crypto: Aprende a invertir en criptomonedas con Anubis Academy. ⁠https://www.grupoanubis.com/⁠ Facturero Movil: Con Facturero Móvil podrás crear documentos electrónicos autorizados por el SRI, sin contratos y desde 10 dólares. ⁠www.factureromovil.com

The Scamcast with Kitboga
A $10,000 Scam Gone Insanely Wrong - Ep 15

The Scamcast with Kitboga

Play Episode Listen Later Sep 30, 2022 153:53


In this episode, I play an old grandma named Tabitha, and I'm on the phone with scammers claiming to be from Norton Antivirus. They say that I've been automatically charged for antivirus software and they can refund me that money by remotely connecting to my computer. The remote connection software is usually safe, but in the hands of scammers, it becomes a dangerous tool they can use to capture your information and lock you out of your computer when things don't go their way. I let them connect to my virtual machine to try and scam me, but things start to heat up a little bit in the kitchen when grandma starts popping enough popcorn to fill an Olympic sized swimming pool for charity.Video: https://www.youtube.com/watch?v=XhvlclEVcBY&t=19sTwitch: https://twitch.tv/kitboga Twitter: https://twitter.com/kitboga Instagram: https://www.instagram.com/kitbogashow/

astro[sound]bites
Episode 56: Overpowered in the Universe

astro[sound]bites

Play Episode Listen Later May 21, 2022 40:55


Episode 56: Overpowered in the Universe   In this episode, Sabrina teaches Will gamer lingo and the gang applies it to astronomy. Alex discusses a class of super-charged supernovae with bumpy and clumpy physics, and Sabrina shows us how to use pulsars to upgrade our data security (once we figure out how to uninstall Norton Antivirus).    Then we discuss whether objects in the universe really can be OP (overpowered) and Alex begins to question if he ever really understood the definition (spoiler: he didn't).   Astrobites:  https://astrobites.org/2022/02/05/slsne-show-bumps-and-wiggles-at-late-times/ https://astrobites.org/2022/03/03/pulsars-the-key-to-secure-encryption/   Space sound: https://chandra.si.edu/photo/2022/sgra/animations.html#audio   Sonification Credit: NASA/CXC/SAO/K.Arcand, SYSTEM Sounds (M. Russo, A. Santaguida); Image Credit: Radio: EHT Collaboration; X-ray (NASA/CXC/SAO); Infrared (NASA/HST/STScI)

The History of Computing
Gateway 2000, and Sioux City

The History of Computing

Play Episode Listen Later May 9, 2022 18:56


Theophile Bruguier was a fur trader who moved south out of Monreal after a stint as an attorney in Quebec before his fiancé died. He became friends with Chief War Eagle of the Yankton Sioux. We call him Chief, but he left the Santee rather than have a bloody fight over who would be the next chief. The Santee were being pushed down from the Great Lakes area of Minnesota and Wisconsin by the growing Ojibwe and were pushing further and further south. There are two main divisions of the Sioux people: the Dakota and the Lakota. There are two main ethnic groups of the Dakota, the Eastern, sometimes called the Santee and the Western, or the Yankton. After the issues with the his native Santee, he was welcomed by the Yankton, where he had two wives and seven children.  Chief War Eagle then spent time with the white people moving into the area in greater and greater numbers. They even went to war and he acted as a messenger for them in the War of 1812 and then became a messenger for the American Fur Company and a guide along the Missouri. After the war, he was elected a chief and helped negotiate peace treaties. He married two of his daughters off to Theophile Bruguier, who he sailed the Missouri with on trips between St Louis and Fort Pierre in the Dakota territory.  The place where Theophile settled was where the Big Sioux and Missouri rivers meet. Two water ways for trade made his cabin a perfect place to trade, and the chief died a couple of years later and was buried in what we now call War Eagle Park, a beautiful hike above Sioux City. His city. Around the same time, the Sioux throughout the Minnesota River were moved to South Dakota to live on reservations, having lost their lands and war broke out in the 1860s.  Back at the Bruguier land, more French moved into the area after Bruguier opened a trading post and was one of the 17 white people that voted in the first Woodbury County election, once Wahkaw County was changed to Woodbury to honor Levi Woodbury, a former Supreme Court Justice.  Bruguier sold some of his land to Joseph Leonais in 1852. He sold it to a land surveyor, Dr. John Cook, who founded Sioux City in 1854. By 1860, with the westward expansion of the US, the population had already risen to 400. Steamboats, railroads, livestock yards, and by 1880 they were over 7,000 souls, growing to 6 times that by the time Bruguier died in 1896. Seemingly more comfortable with those of the First Nations, his body is interred with Chief War Eagle and his first two wives on the bluffs overlooking Sioux City, totally unrecognizable by then. The goods this new industry brought had to cross the rivers. Before there were bridges to cross the sometimes angry rivers, ranchers had to ferry cattle across. Sometimes cattle fell off the barges and once they were moving, they couldn't stop for a single head of cattle. Ted Waitt's ancestors rescued cattle and sold them, eventually homesteading their own ranch. And that ranch is where Ted started Gateway Computers in 1985 with his friend Mike Hammond.  Michael Dell started Dell computers in 1984 and grew the company on the backs of a strong mail order business. He went from selling repair services and upgrades to selling full systems. He wasn't the only one to build a company based on a mail and phone order business model in the 1980s and 1990s. Before the internet that was the most modern way to transact business.  Ted Waitt went to the University of Iowa in Iowa City a couple of years before Michael Dell went to the University of Texas. He started out in marketing and then spent a couple of years working for a reseller and repair store in Des Moines before he decided to start his own company. Gateway began life in 1985 as the Texas Instruments PC Network, or TIPC Network for short. They sold stuff for Texas Instruments computers like modems, printers, and other peripherals. The TI-99/4A had been released in 1979 and was discontinued a year before. It was a niche hobbyist market even by then, but the Texas Instruments Personal Computer had shipped in 1983 and came with an 8088 CPU. It was similar to an IBM PC and came with a DOS. But Texas Instruments wasn't a clone maker and the machines weren't fully Personal Computer compatible. Instead, there were differences.  They found some success and made more than $100,000 in just a few months, so brought in Tedd's brother Norm. Compaq, Dell, and a bunch of other companies were springing up to build computers. Anyone who had sold parts for an 8088 and used DOS on it knew how to build a computer. And after a few years of supplying parts, they had a good idea how to find inexpensive components to build their own computers. They could rescue parts and sell them to meatpacking plants as full-blown computers. They just needed some Intel chips, some boards, which were pretty common by then, some RAM, which was dirt cheap due to a number of foreign companies dumping RAM into the US market. They built some computers and got up to $1 million in revenue in 1986. Then they became an IBM-compatible personal computer when they found the right mix of parts. It was close to what Texas Instruments sold, but came with a color monitor and two floppy disk drives, which were important in that era before all the computers came with spinning hard drives. Their first computer sold for just under $2,000, which made it half what a Texas Instruments computer cost. They found the same thing that Dell had found: the R&D and marketing overhead at big companies meant they could be more cost-competitive. They couldn't call the computers a TIPC Network though. Sioux City, Iowa became the Gateway to the Dakotas, and beyond, so they changed their name to Gateway 2000.  Gateway 2000 then released an 80286, which we lovingly called the 286, in 1988 and finally left the ranch to move into the city. They also put Waitt's marketing classes to use and slapped a photo of the cows from the ranch in a magazine that said “Computers from Iowa?” and one of the better tactics for long-term loyalty, they gave cash bonuses to employees based on their profits. Within a year, they jumped to $12 million in sales. Then $70 million in 1989, and moved to South Dakota in 1990 to avoid paying state income tax. The cow turned out to be popular, so they kept Holstein cows in their ads and even added them to the box. Everyone knew what those Gateway boxes looked like. Like Dell, they hired great tech support who seemed to love their jobs at Gateway and would help with any problems people found. They brought in the adults in 1990. Executives from big firms. They had been the first to Mae color monitors standard and now, with the release of Windows they became the first big computer seller to standardize on the platform.  They released a notebook computer in 1992. The HandBook was their first computer that didn't do well. It could have been the timing, but in the midst of a recession in a time when most households were getting computers, a low cost computer sold well and sales hit $1 billion. Yet they had trouble scaling to their ship hundreds of computers a day. They opened an office in Ireland and ramped up sales overseas. Then they went public in 1993, raising $150 million. The Wiatt's hung on to 85% of the company and used the capital raised in the IPO to branch into other areas to complete the Gateway offering: modems, networking equipment, printers, and more support representatives.  Sales in 1994 hit $2.7 billion a year. They added another support center a few hours down the Missouri River in Kansas City. They opened showrooms. They added a manufacturing plant in Malaysia. They bought Osborne Computer. They opened showrooms and by 1996 Gateway spent tens of millions a year in advertising. The ads worked and they became a household name. They became a top ten company in computing with $5 billion in sales. Dell was the only direct personal computer supplier who was bigger.  They opened a new sales channel: the World Wide Web. Many still called after they looked up prices at first but by 1997 they did hundreds of millions in sales on the web. By then, Ethernet had become the standard network protocol so they introduced the E-Series, which came with networks. They bought Advanced Logic Research to expand into servers. They launched a dialup provider called gateway.net.  By the late 1990s, the ocean of companies who sold personal computers was red. Anyone could head down to the local shop, buy some parts, and build their own personal computer. Dell, HP, Compaq, and others dropped their prices and Gateway was left needing a new approach. Three years before Apple opened their first store, Gateway launched Gateway Country, retail stores that sold the computer, the dialup service, and they went big fast, launching 58 stores in 26 states in a short period of time. With 2000 right around the corner, they also changed their name to Gateway, Inc. Price pressure continued to hammer away at them and they couldn't find talent so they moved to San Diego.  1999 proved a pivotal year for many in technology. The run-up to the dot com bubble meant new web properties popped up constantly. AOL had more capital than they could spend and invested heavily into Gateway to take over the ISP business, which had grown to over half a million subscribers. They threw in free Internet access with the computers, opened more channels into different sectors, and expanded the retail stores to over 200. Some thought Waitt needed to let go and let someone with more executive experience come in. So long-time AT&T exec Jeff Weitzen, who had joined the company in 1998 took over as CEO. By then Waitt was worth billions and it made sense that maybe he could go run a cattle ranch. By then his former partner Mike Hammond had a little business fixing up cars so why not explore something new.  Waitt stayed on as chairman as Weitzen reorganized the company. But the prices of computers continued to fall. To keep up, Gateway released the Astro computer in 2000. This was an affordable, small desktop that had a built-in monitor, CPU, and speakers. It ran a 400 MHz Intel Celeron, had a CD-ROM, and a 4.3 GB hard drive, with 64 Megabytes of memory, a floppy, a modem, Windows 98 Second Edition, Norton Anti-Virus, USB ports, and the Microsoft Works Suite. All this came in at $799. Gateway had led the market with Windows and other firsts they jumped on board with. They had been aggressive. The first iMac had been released in 1998 and this seemed like they were following that with a cheaper computer. Gateway Country stores grew over 400+ stores. But the margins had gotten razor thin. That meant profits were down. Waitt came back to run the company, the US Securities and Exchange Commission filed charges for fraud against Weitzen, the former controller, and the former CFO, and that raged on for years. In that time, Gateway got into TVs, cameras, MP3 players, and in 2004 acquired eMachines, a rapidly growing economy PC manufacturer. Their CEO, Wayne Inouye then came in to run Gateway. He had been an executive at The Good Guys! and Best Buy before taking the helm of eMachines in 2001, helping them open sales channels in retail stores. But Gateway didn't get as much a foothold in retail. That laptop failure from the 1980s stuck with Gateway. They never managed to ship a game-changing laptop. Then the market started to shift to laptops. Other companies left on that market but Gateway never seemed able to ship the right device. They instead branched into consumer electronics. The dot com bubble burst and they never recovered. The financial woes with the SEC hurt trust in the brand. The outsourcing hurt the trust in the brand. The acquisition of a budget manufacturer hurt the brand. Apple managed to open retail stores to great success, while preserving relationships with big box retailers. But Gateway lost that route to market when they opened their own stores. Then Acer acquired Gateway in 2007. They can now be found at Walmart, having been relaunched as a budget brand of Acer, a company who the big American firms once outsourced to, but who now stands on their own two feed as a maker of personal computers.

Hello Fellow Kids
Chirp (Hello Fellow Kids #49)

Hello Fellow Kids

Play Episode Listen Later May 1, 2022 81:45


Content warning: this book features sexual harassment of minors. Have you ever been to a cricket farm? Neither have Mara and Josh. But this month they check out a fictional one! Listen in and see what they think of this summertime story. Also discussed: Buddy Holy, chicken nuggets, Bernie Sanders, Jim Gaffigan, umpires, and Norton Antivirus. Next month we will be reading Amari and the Night Brothers by B. B. Alston. Contact us at hfkpodcast@gmail.com or @hfkpodcast on Twitter and Instagram. We're also on GoodReads: www.goodreads.com/user/show/90379252-josh-mara Theme music composed by Ben Ash. Visit him at www.benash.com. Mixing and drums by Chaz Bommarito, guitar by Jakael Tristram. Note: This month's episode is being uploaded in WAV format instead of MP3 due to technical challenges. Please let us know if this affects your downloading or listening experience.

CuriosITy
Curiosity 113 - Crypto pe Rusia, Probleme China, Întinerire celulară, Laborator, Escobar Hack

CuriosITy

Play Episode Listen Later Mar 19, 2022 91:56


De la Bușteni, raportăm în direct că vremea e frumoasă, puțin cam frig pentru cât de gros ne-am îmbrăcat noi, și că soarele e pe cer gata să te încălzească într-o zi frumoasă de martie. La -2 grade.Bine, hai să nu fim nostalgici după primăvara pe care o știam de mici, și să ne concentrăm asupra realității. Avem multe știri interesante despre mai toți producătorii de tehnologie din industrie, câteva descoperiri interesante din domeniul științei și desigur o serie de inițiative mai ales de relocare a industriei în SUA și Europa. China nu mai pare o alternativă atât de plăcută, mai ales din cauza suportului Rusiei cât și din cauza problemelor recente cu COVID in fabrica Foxconn. Da, cea mai mare fabrică de cipuri din lume și-a închis porțile temporar pentru co mare parte din angajații lor au fost infectați cu cea mai populară variantă a virusului, Omicron.

Björeman // Melin
Avsnitt 291: Quantum of OLED

Björeman // Melin

Play Episode Listen Later Jan 14, 2022 120:26


Uppföljning/uppvärmning Nyårslöften – Christian satte några fler mål på pränt Projekt filmdatabas! Nya switchar till tangentbordet, tyst kan också vara trevligt(?) Toner av nötter och stall Battle of the skumtomtar. Jocke hyllar Aromas, Cloettas är också ok. Man kan inte ha ett “&” i fältet “itunes:keywords” i en RSS-feed för en podd för då ballar vissa poddspelare (Hej, Overcast) ur. Fixat. Norton Antivirus installerar crypto-mining-mjukvara (“Norton Crypto”) på användarnas datorer och kräver sedan 15% av allt som datorerna minar Jocke får gen 1 Airpods av Johan “Solnakillen” Wassberg (aka The Seal). Batteribyte ska testas Jocke bokar gymkort och ryggrehab. Nu händer det Ämnen 15 år sedan iPhone introducerades - panelen minns sina telefoner iMac G4 fyller 20 CES - höjdpunkter Apple Music och Homepod - sicket skit. Film och TV Forbidden Orange. Dokumentärfilm om hur A Clockwork Orange kunde visas i Franco-diktaturens Spanien trots att den var totalförbjuden. 4/5BMÅ. Don't look up. 2,5/5BMÅ. (det onda företaget heter Bash. Borde hetat Csh.) Länkar Limfjordsporter Christians mål 2022 TV- och filmarkivet TV- och filmarkivet på Github Gazzew boba u4 Karmin Johan Thelin Antennapod Castvalidator Norton Crypto Byta batteri i Airpods gen.1 Iphone-presentationen Nokia N95 Chrysler voyager Nokia N73 Slide to unlock Hitta Nemo-fisk-bilden Cover flow Imac G4 M1 i G4-iMac Imac G4-reklamen CES 2022 NFT Icke-svampbar symbol Moxie Marlinspike Signal Moxies NFT-experiment Alder lake Linus tech tips Dell XPS 13 plus Bärbar med pekskärm på sidan BMW:s bil med e-bläck Sonys konceptbilar Garmin vivomove sport Forbidden Orange Franco Don't Look Up Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-291-quantum-of-oled.html

Not So Critical Update
CRYPTOMINING in Norton Antivirus - A Good Thing? (Spoiler: No!)

Not So Critical Update

Play Episode Listen Later Jan 12, 2022 8:33


Early Birb Briefing with Eagle Falcon
1-10-22: No, Norton isn't mining without you knowing

Early Birb Briefing with Eagle Falcon

Play Episode Listen Later Jan 10, 2022 4:33


An accusation was thrown out there that Norton Antivirus is mining crypto currency without your knowledge or consent. Well It's not, but let's discuss what it actually is all about. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/earlybirbbriefing/message Support this podcast: https://anchor.fm/earlybirbbriefing/support

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 42 - Apple M1 Max Macs, Microsoft's Hair-Brained Y22K Bug, Verizon's Tracking Program, Norton Anti-Virus Launches Cryptomining Malware, Hazards of Buy Now, Pay Later

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Jan 10, 2022


Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast PEBCAK - Acronym of “problem exists between chair and keyboard.”

Crypto Daily
Why Crypto Dropped and a Virtual Land Grab | Jan 6 2022

Crypto Daily

Play Episode Listen Later Jan 6, 2022 5:13


In this episode of Crypto Daily, I discuss the two big factors as to why the markets dropped overnight, Norton Antivirus' new feature that allows you to mine Ethereum, a crypto coffee shop in Brisbane Australia, OpenSea's current market value, the virtual land grab happening in the metaverse, and Castlevania NFTs. Be sure to follow me on: Instagram: @DustinKnouse https://www.instagram.com/dustinknouse/ Twitter: @DustinKnouse https://twitter.com/DustinKnouse Linkedin: @DustinKnouse https://www.linkedin.com/in/dustinknouse/ Facebook: @DustinKnouse https://www.facebook.com/DustinKnouseOfficial/ TikTok: @DustinKnouse https://www.tiktok.com/@dustinknouse Resources: Bitcoin Tanked After the Fed Minutes Were Released. Here's Why. Kazakh government resigns, shuts down internet amid protests, causing Bitcoin network hash rate to tumble 13.4% Norton Anti-Virus can now hijack your computer for cryptomining Inside the CRYPTO cafe: New restaurant accepts Bitcoin and Ethereum as payment - and even the menu is inspired by the currency NFT Marketplace OpenSea Valued at $13.3B in $300M Funding Round The cheapest plots on popular metaverse platforms are already selling for more than $13,000 Konami Announces Castlevania 35th Anniversary NFTs, Auction Starts Next Week --- Send in a voice message: https://podcasters.spotify.com/pod/show/cryptodailyshow/message

60 Seconds to Comply
60 Seconds to Comply - Minute 44 - Norton Anti-Virus M.D.

60 Seconds to Comply

Play Episode Listen Later Jul 25, 2021 30:23


Facebook - https://www.facebook.com/Robocopminute/Instagram - https://www.instagram.com/60secondstocomply/ Follow Courtney at Travian Designs: https://traviandesigns.com/ https://www.facebook.com/prometheusbyminute/ https://www.patreon.com/traviandesigns Follow Simon at Fandom Crossing and Helios Photo: https://www.facebook.com/fandomcrossing/ https://www.facebook.com/heliosphotograph/https://www.youtube.com/channel/UCATzkJ0zQBaUIffJ4PmLACg'

Kortsluttet
Kortsluttet: Er tiden løbet fra antivirus?

Kortsluttet

Play Episode Listen Later Jun 29, 2021 56:41


Mikkel og Esben tager temperaturen på antivirus-programmer til computeren. For er programmer som McAfee eller Norton Antivirus lige så nødvendige i dag, som de var i 90erne og 00erne, da computervira trak overskrifter i aviser og TV? Og er det i så fald af de samme grunde? Derudover: Mikkel har testet en kunstig intelligens, der omsætter klatmalerier til naturfotografier. Medvirkende: Jacob Herbst. Værter: Mikkel Malmberg og Esben Hardenberg. kortsluttet@dr.dk

Here's What I Don't Get
Episode 219 - AMC 401K

Here's What I Don't Get

Play Episode Listen Later Feb 5, 2021 127:33


SELL, SELL, SELL! It's time to sell all your shares in all companies you have shares in and BUY, BUY, BUY the brand new stock HWDG. This mysterious company that just went public is HOT, HOT, HOT today and could be the next Red Lobster or Lowe's! No one knows exactly what they do yet, but we CAN tell you that they promise that for every share you buy they will donate one perfectly cooked medium-rare steak to two lucky men chosen completely by lottery. This just in: the owners of HWDG have just stated that their goal for the next 5 years is to completely eradicate:- Computerized Everything- Being Against WSB- Ruinous Characters- "Addressing the Problem"Everything what got computers in them these days. The problem? We haven't even got pain ol' computers right yet. If you can't get Norton Antivirus to stop pinging every time you boot up League of Legends, how are you going to rely on your self-driving Tesla to brake in time to avoid a collision?Hedge fund bankers. Those are the real heroes of 2021. Those brave soldiers that sit in A/C cooled, swanky offices betting on whether or not your favorite company should live or die while getting a hummer from their third secretary this year and shooting a money gun full of your literal hard owned money into a kiddie pool where two large Russian women wrestle in chocolate pudding. We should care about these people immensely, and no harm should come to them even though the government breaks its back to help them three times over anytime they screw up. Please Daddy Wall Street, I just need a little bit of that insider trading!Imagine if you hype up a show or movie so much to your friend that they finally give in and check it out and the first thing they hear is some asshole yelling for "Hello" for 35 seconds. Sometimes there are these characters so annoying and pathetic that it's a testament to the entire rest of the show that it doesn't just crumble under the weight of the like of Wesley Crusher's huge ego and Deanna Troi's pile of aborted alien babies.Look, we here at HWIDG acknowledge and apologize for the mistakes in this week's episode and promise to have them fixed by this time next year. Step 1A subsections 1 through 9 are currently planned to be put into effect as soon as July, barring any unforseen consequences. For any questions or concerns, please go screw yourself.All this and more on this week's episode! Don't forget to join us on DISCORD, and support us on PATREON or by BUYING A SHIRT!

Last Week in .NET
You can't have issues if you don't have a backlog

Last Week in .NET

Play Episode Listen Later Feb 1, 2021 7:37


Last Week in .NET - January 30th, 2021We're getting our first snow here in the DC area for the first time in what feels like forever; and the .NET team is pondering the true meaning of the words "Backlog management". Let's get to it.

Health Professional Radio - Podcast 454422
careMESH - Secure Patient Data Sharing

Health Professional Radio - Podcast 454422

Play Episode Listen Later Jan 11, 2021 13:34


Dr. Peter S. Tippett, founder and CEO of careMESH, a healthcare communication platform that enables hospitals and clinicians to securely share patient data with any other U.S. healthcare provider discusses how healthcare interoperability has changed over the years and how COVID accelerated the need for better patient-to-physician transfer of care. Dr. Peter S. Tippett is currently CEO of careMESH. He is a physician, scientist, business leader and technology entrepreneur with extensive risk management and health information technology expertise. One of his early startups created the first commercial antivirus product, Certus (which sold to Symantec and became Norton Antivirus). As a leader in the global information security industry (ICSA Labs, TruSecure, CyberTrust, Information Security Magazine), Tippett developed a range of foundational and widely accepted risk equations and models. He was a member of the President’s Information Technology Advisory Committee (PITAC) under G.W. Bush, and served with both the Clinton Health Matters and NIH Precision Medicine initiatives. Throughout his career, Tippett has been recognized with numerous awards and recognitions --- including E&Y Entrepreneur of the Year, the U.S. Chamber of Commerce “Leadership in Health Care Award”, and was named one of the 25 most influential CTOs by InfoWorld.Tippett is board certified in internal medicine and has decades of experience in the ER. As a scientist, he created the first synthetic immunoglobulin in the lab of Nobel Laureate Bruce Merrifield at Rockefeller University. His PhD in Biochemistry (Case Western Reserve University) included among the first computer modeling of biologic processes. He also holds a B.S. in Biology from Kalamazoo College.

Linen Suit & Plastic Tie
What Story Can You Engineer? ft. a Principal Engineer (Carey Nachenberg)

Linen Suit & Plastic Tie

Play Episode Listen Later Dec 9, 2020 29:50


A Principal Engineer at Lyft, co-inventor of Norton Antivirus, and a college programming Professor? This week, we talk to Carey Nachenberg. From his experience as both a Software Engineer and Computer Science Professor, Carey shares with us why Engineers - who we may think of as recipients of stories - should tell stories themselves, as well as why Storytelling alone is not sufficient for innovations. Carey Nachenberg is Principal Engineer at Lyft, Computer Science Professor at UCLA, formerly Principal Engineer at Google, and the senior-most engineer in Symantec. He is also author of The Florentine Deception - a cyber-security thriller - and a rock climber.

Call To Action
Quincey Collins - Cybersecurity, Hacking, BJJ, Whiskey, Hard Targets vs. Soft Targets | EP11 PT2

Call To Action

Play Episode Listen Later Nov 4, 2020


Our next guest is the Chief Security Officer for a global law firm, Sheppard Mullin Richter & Hampton that focus on large, international corporate clients. He is directly responsible for cybersecurity strategy, security operations, risk mitigation, and compliance initiatives for some of the largest companies on the planet with experience in areas such as the DoD, Intelligence communities, aerospace defense, banking, insurance, manufacturing and the technology sectors. He is also a United States Air Force Veteran, expanding his information technology experience while serving his country. THANK YOU FOR YOUR SERVICE SIR! As if this wasn’t enough to make you drool, he’s trilingual, speaking Italian and German alongside his native English. He’s an accomplished speaker, leading conversations around the country about Cybersecurity AND he’s even played semi-professional football (soccer) in Germany… Basically, he’s Norton Antivirus meets Captain America, that can code, on steroids - you aren’t getting anything past his security systems. Even Mr. Robot tried and failed… as legend has it… Please welcome our next guest to the show, Quincey Collins! Watch the Video on YouTube!

Grifthorse
Episode 68: Ten Jars of Elixir

Grifthorse

Play Episode Listen Later Nov 1, 2020 50:46


Master and pupil discuss vegan broth, Jerry’s Deli, Guitar Center, Norton Antivirus 2008, DVD Roadshow and pre paid Visa cards.

Call To Action
Quincey Collins - Cybersecurity, Hacking, BJJ, Whiskey, Hard Targets vs. Soft Targets | EP11 PT1

Call To Action

Play Episode Listen Later Oct 28, 2020


Our next guest is the Chief Security Officer for a global law firm, Sheppard Mullin Richter & Hampton that focus on large, international corporate clients. He is directly responsible for cybersecurity strategy, security operations, risk mitigation, and compliance initiatives for some of the largest companies on the planet with experience in areas such as the DoD, Intelligence communities, aerospace defense, banking, insurance, manufacturing and the technology sectors. He is also a United States Air Force Veteran, expanding his information technology experience while serving his country. THANK YOU FOR YOUR SERVICE SIR! As if this wasn’t enough to make you drool, he’s trilingual, speaking Italian and German alongside his native English. He’s an accomplished speaker, leading conversations around the country about Cybersecurity AND he’s even played semi-professional football (soccer) in Germany… Basically, he’s Norton Antivirus meets Captain America, that can code, on steroids - you aren’t getting anything past his security systems. Even Mr. Robot tried and failed… as legend has it… Please welcome our next guest to the show, Quincey Collins!

Vi streamer op ad åen
#107: Streamingnyhederne uden Anders Agger

Vi streamer op ad åen

Play Episode Listen Later Jan 26, 2020 78:51


Da vi i episode #105 og #106 talte om fortid og fremtid, har vi udskudt streamingnyhederne i de forgangne uger - det er derfor nogle lettere forældede nyheder, vi sender på gaden. Forældede og lange, men pisse relevante og underholdende! Bl.a. er Tobias ikke there for you og er træt af genforeningssnakke om Friends, Peter er forført af Jar Jar Ninja Warrior Binks, mens Anders tænker tilbage på dagene, hvor han legede med Playmobil. Vi kommer desuden ud på gevaldige sidespor som Ole Ernst, pædofili, Steves Home Network, Norton Antivirus og lumre Anders-kommentarer. Du kan også se frem til: De 10 mest sete serier på HBO i 2019 // Fremgang for Podimo // Doggystyle er de yngre danskeres foretrukne // Ny dansk HBO-serie med japansk navn // DR i nye klæder // Fornyelses- og Sløjfningshjørnet // plus meget mere! Vi høres på åen. Forresten... Vi er på Twitter - og Instagram-mediet: @streamaaen Og også Facebook: www.facebook.com/streamaaen. Kontakt os gerne: streamaaen@gmail.com. Bag podcasten står Peter Vistisen, Tobias Iskov Thomsen og Anders Zimmer Hansen - alle tidligere Shnorg-t-shirts. Yderligere noter: News Theme 2 by Audionautix is licensed under a Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/) Artist: http://audionautix.com/

You Tried Dat??
75: O'ke Doke Popcorn, Strawberry Wafers, and Bottle Caps

You Tried Dat??

Play Episode Listen Later Jan 12, 2020 56:19


The You Tried Dat?? gang dips into the nostalgia pool again, revisiting another trio of childhood snacks.  This time, they taste O'ke Doke Hot Cheese Popcorn, Great Value Strawberry Creme Wafer Cookies, and Bottle Caps.  How do these hold up over time?  They also discuss drop kicks, Norton Antivirus, and the number three.

Craig Peterson's Tech Talk
WGAN Tech Talk with Craig Peterson: Malware upends signature-based A/V, 5G not ready for Primetime, Data Asset Inventory and more today on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Dec 20, 2019 89:49


Welcome!   The Holidays are almost here -- Hannakah begins tonight and the middle of next week is Christmas - Boy this year has flown by.  There is a lot of Tech in the News so let's get going! For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Signature Anti-Virus does not adequately protect you from today's Malware Lessons We Failed To Learn and Therefore Are Doomed To Repeat Business Computers Should Only Be Used For Business 5G - Not Ready For PrimeTime...Yet! Are You At Risk from Your Outsourced Software Provider Security - Knowing What You Have Is Essential Chrome 79 will continuously scan your passwords against public data breaches Getting the Perfect Tech Gift for Your Special "Techie" --- Automated Machine-Generated Transcript: Craig Peterson   Hey, hello everybody, Craig Peters on here on w GAM and online at Craig peterson.com. Hopefully, you're able to join me on Wednesday mornings as well as I am on live with Ken and Matt, we always talk about the latest in technology and news and of course in security since that's primarily what I've been doing for the last 20 plus years here in the online world, man, just thinking back, it's, you know, I first got on the internet. Of course, it wasn't called that. But way back in the early 1980s. And I remember in fact when I first started doing networking professionally back in 75, and there was no worry about anything with you know, yeah, okay, we didn't want people to hack into so you'd have leased lines for your business and I was doing a bunch of work. from banks way back when right, one of my first jobs, and I was really enjoying it, I just learned a whole lot up to today. And we're going to cover this here because my gosh, it's it has changed. The Internet used to be very libertarian, everybody on it was very libertarian or conservative. Of course, that's because there were a whole ton of government contractors on the ARPANET as well as some colleges and universities. And you look at it today, and you think that really it's changed dramatically which it has. But I think the ratio is probably still about the same. You've got the silent majority that just doesn't say much about anything, right. And then you've got this hugely vocal minority who's just yelling and screaming all of the time. And then some of these tech companies that are trying to straddle somehow in the middle and not get everybody all upset with them. It's really a Much different world. But when we're talking about security, it is nothing at all like it used to be. You used to go online, and you'd have some fun you, you know, exchange emails with people, you'd share some files and some fun things. I remember this one whole thread on chases. That was just absolutely amazing. I think I came up this time of years while it was all these puns about different cheeses. It was a lot of fun. Now today, we've got a whole different internet out there and a great article by Robert Limos and he is looking at WatchGuard Technologies' latest quarterly report that was published just last week. And this network security firm found that the percentage of malware that successfully bypassed anti-virus scanners IT companies network gateways has increased Significantly, watch guard technology is saying that the amount of malware that signature-based antivirus software catches, has plummeted to about 50%. Now, I think their numbers are high because I think it's more like 20%. But they're getting specific here. They're talking about the amount of malware that comes into a network via an external source. In other words, people are accidentally pulling it from a website they visit, or perhaps it's been injected into their systems through someone who's visiting their network and using another vulnerability. But they're saying that antivirus software This is signature-based stuff, that's what you get from Norton Antivirus. That's what you get from, you know, the Symantec people from McAfee from all of these different antivirus companies out there. It is just horrific what's happening because of what's known as zero-day now you might have heard of this before you might not have but basically what zero-day malware is, is malware is nasty software and malware includes things like viruses, worms, Trojans, etc. It is this type of malicious software that has not been seen in the wild before. And what it used to me is they would, you know, some brilliant person who as my mother would say, Why don't they do something useful with their time, some brilliant PR person would come up with a piece of software, no one had ever seen a way of attacking that no one had ever seen before. And they would attack us and they would get through because there was no signature for it or the engines in the antivirus software just could not manage to handle. You know malware like this new piece of malware that just came out the problem we're having today is that the majority of malware act just like zero-day. So here's what happens with a signature-based attack. You can think of it just like your body's anti-virus system night than what you have in your body. And your body looks at something that it sees and says, Have I seen this before. And if it has seen it before, it knows to attack it before. It grows really big and kind of starts to get out of control, and then the body has to attack it after it's already really, you know, it's taken the beachhead if you will use a military term. I've been watching a lot of world war two movies lately, but it's taken that beachhead and now has control of the beach and is starting to get in further and it's very difficult to get out versus it recognizes it almost right away as a nasty virus. And goes ahead and end the Jackson You know you have more cells in inside your body inside your skin there are more cells that are foreign to your body then there are body cells when you start counting all the bacteria and everything that's in your system and on your skin. It's just incredible. So our body relies on a lot of these things. In order to keep us healthy, if we had no bacteria, you be in trouble. It's like you know if you go on antibiotics, which is an anti-bacterial, what does the doctor tell you to do? Well, you know, start eating yogurt and, and other things. Maybe take some Kombucha or various other things in order to try and stay healthy. Get that good bacteria going in your gut again. Well, when your body is attacked by something that hasn't seen before. That's what we would call in the computer world as a zero-day virus has never been seen by Your body or in the case of a computer's never been seen by this signature-based antivirus software. So what the bad guys have been doing is they figured out how Yes, indeed we are trying to block them. And they figured out that the majority of us are using these signature-based antivirus software packages. So they've designed the viruses and the malware to change itself every time. So no longer can the antivirus software, just look for certain signatures. So for instance, if you were always attacked by blonde-haired blue-eyed Norwegians, you might be cautious next time you see a blonde-haired blue-eyed Norwegian approaching towards you maybe with a baseball bat or whatever it is, they might have in their hands, right? So you get worried about it. What's the old expression? Once burn shame on me. You twice burn shame on me. Right? So we learn we respond based on how we've been attacked before. And so does the antivirus software now it can take them days or weeks, even months to get a signature out and get it all dispersed. You know, I'm talking about the old software, not the newest stuff, not the enterprise stuff we use for our business client. But the stuff that you use as a consumer and Heaven forbid if your business and you're using stuff like Norton Symantec, or McAfee or any of these other a VG antivirus software packages that are based on signatures because they just don't work. So what happens is they change themselves constantly. So it might be a Norwegian, but they dyed their hair they put on colored contact lenses, and they change their clothing. That's effectively what's happening with our computers nowadays. It may be that Viking that's approaching you but you Don't know it because it just doesn't look like they change everything about themselves at least most everything except the malicious intent and what they end up doing once they've got control of you. So watch guard is saying that this is a major change here. Now I'm going to quote directly from them. The big change is that more and more malware is becoming evasive. So the signature-based protection is no longer sufficient. There's nothing wrong with having it because it will catch 50% to two-thirds of the traffic but you definitely need something more. And that's why I've been recommending you guys do a few things you can do the free stuff. If you are not a business, you can go to my favorite right now. Open DNS and sign up for an account. They have some paid stuff. I think it's $20 a month per computer, for business to get the basic business service. It's free. For a regular home user, but it does not allow you to do any customization. And then there are a few packages in between open DNS. Now we use a commercial version of is an enterprise version called brawler. That's where the calling it now, but it's the highest level where we can, you know, watch it and maintain it. So that's step number one of what you need to do get open DNS so that if you do get one of these pieces of nastiness like ransomware, and it tries to call home, it can't get the phone number, right. He can't call home because there's another phone number. And I think that's a very important thing to do. It's free if you're home user, you might want to pay for the family plan would block certain scary sites and certain things you probably don't want your kids to see pornography and other things open dns.com and then the other thing to do, I had it in my big course this last year and that was how to harden Windows machine. It's rather involved. And I'll probably do a course early next year on this. But make sure you harden your machine, you're going to want to turn off stuff you don't need, you're going to want to make sure your firewall is set up properly to do the types of blocks that you need. You're going to want to make sure that you've got Microsoft's new malware software installed properly and running properly. So I'll have a course on this early next year that you can get. Because when you're talking about 50%, and I've seen numbers as low as 20% effectiveness with anti-virus software, you have to do something. Hey, if you're looking to buy some gifts, I'm going to be talking about some of them in today's show, including five g should you get that phone, you're listening to Craig Peterson on w GAN and online. Greg peterson.com. Stick around. We'll be right back.   Craig Peterson   Hey, are you thinking about buying a mobile phone? We're going to talk about that right now. You're listening to Craig Peterson on WGN and online at Craig Peterson calm. Now you've heard about 5g. You're probably using 4g LTE right now, on your phone and maybe mobile devices you may be your iPad or a tablet that you might have. Amazon has its Kindles. They do not, by the way, have 4g LTE on them, at least, for the most part, they're using some of the much older technology because frankly, all they're doing is sending books right? Which are pretty small. But it is that time of year that we're buying presents and there are only a few days left here for that holiday season, purchasing time. And we've got a lot of competition in the 5g world. So let's talk about what this is. And I'll give you some tips. But what is going on? 5g holds a lot of promise. Now I don't know if you remember I remember how shocked I was at how fast 4g was. I bought a phone. And it had 4g LTE in on it. It was an Android phone. And I vowed never again for so many reasons. And you've heard them on the show here before, but I had bought an Android phone, and I didn't have 4g up where I lived. And I drove down. We were heading down. I think it was till Pennsylvania take one of the kids to camp. And I was going through Valley and I noticed Wait a minute. There's a big city right there. I got 4g so I immediately went to speed test.net and I ran the test to see just how fast is for G. And I was just shocked. I was getting like 20 megabits a second, which was absolutely amazing. Because I've been using cell phones since they first came out. And you know, back in the day it was 14 for right? Oh, cell phone so fast. And now just to see 20 megabits was absolutely mind-blowing. But there are some major limitations to the 4g LTE network that we are using today. And those limitations are speed for one. And then the other thing is the number of devices that can be supported. And then the cost of the data and the data transfers. So 5g has been under development for quite a while. And this is not we're not going to get into Huawei and how they stole all their technology. It really appears to be from our friends up at Nortel and put the whole company out of business because of the spine that they did. And thank goodness finally, we've got a president who's trying to do something about it. But five G's real promise for us right now is that we will get two things will get a gigabit worth of data bandwidth, which means by the way, that we may not even bother with Wi-Fi in our homes if you live in an area that has full 4g or 5g coverage because it's just going to be just as fast as your cable is right now. Now the cable companies are probably going to try and compensate by lowering their prices and giving you faster and faster and faster internet. But for a lot of people, it's going to make economic sense because the cost isn't going to be high. And then the second thing that 5g is going to give us is the ability to have billions of devices connected to the 5g network. That means that everything from our cars Which really the next generation of cars self-driving cars really do need 5g so they can talk to each other. So they can continually upload data to the cloud to let all of the routing computers know about local weather conditions and, and road and where the potholes are and everything is just, it's going to be amazing, right? On the one hand, on the other hand, well, there might be some data leakage that we might not want. So the cars are going to have it but so is pretty much every device that you have. A couple of years ago, I talked about the new jacket, the new trucker jacket that Levi's hat out. And that trucker jacket was designed specifically to connect your phone to your phone and allow you to control your phone. So it had Bluetooth in it. You could touch these little wires that were embedded into the sleeve with your hand and use that to control your cell phone. You know, listen to music and Suddenly things are just kind of cool. So our clothes are going to have the internet in them. Our computers, of course, everything you buy a laptop, it's going to have 5g built-in, you're not going to need to have an external device anymore. Just list goes on and on and on. I've everything that's going to happen is going to be phenomenal. But it is not there yet. And Apple did not include 5g with the iPhone 11 this year, it will include it with the iPhone 12. That's coming out next year. And I saw a very, very good summary of what's probably going to be coming out of Apple in September next year. The guy that published it has been spot on with most everything that Apple was coming up with. And they are he's saying that they are going to be having 5G on the phone and it would make a lot of sense. But right now you can put in orders for the Samsung Galaxy Note 10 plus the one plus 70 that's There are other phones that are claimed to have 5g. But listen, everybody, it is still too early to buy a 5g phone. That is really my big tip when it comes to 5g right now, these networks have not fully standardized, they are not running, none of them are running full 5g anywhere except in a couple of major cities. The biggest problem with building out the 5g networks is that they need to have basically what we've come to know as cell towers everywhere. I mean, everywhere. These are little micro things that are not big towers like we have right now. You know, those fake trees that you see that are actually cell towers. Now, these are going to be small boxes and they're going to be on pretty much every street corner in the big cities. They'll be on the sides of buildings. They'll be on the sides of people's houses. Cell companies are going to pay us to put these on our homes so that we can now provide 5g to us and to our neighbors. And then there's going to be people who will be upset because of the radiation, even though it's non-ionizing, and it's not known to cause any harm, people will be upset about it. But these things are going to be everywhere. And that's because remember, I'm talking about one gigabit worth of bandwidth coming down to your device. Well, you cannot do gigabit service on lower frequency so they have moved to higher frequencies. The old UHF TV channels are pretty much I think they're all gone now throughout the country. And the FCC has bought back the bandwidth and has auctioned it off to all of these different companies that wanted to buy it. And it's just everything is going to change and with the high frequencies that they need in order to deliver these beads, they now have a problem and that is these higher frequencies do not penetrate glass. They don't penetrate walls very well at all. And they just don't penetrate metal at all basically, it's really bad. So it T Mobile has announced nationwide 5g available as of last Friday. That is pretty darn cool. It's got a 600 megahertz 5g network which is going to cover most of the country. That is pretty impressive. But the trade-off is it's using low band 5g which means it is good at providing slightly boosted speeds inside buildings and is available in a lot more places than what competitors offer 18 T and Verizon are offering the opposite. They have ultra-wideband networks right now superfast speeds, but very, very small footprints very small pocket, and you got to be standing near one of these towns This is kinda cool T Mobile is expecting with theirs. That actually is p mag is PC Magazine, you can expect a boost of about 15 megabits with their new 5g nationwide. And you might see 150 megabits if you have a new 5g phone or 700 megabits if you have 4g LTE. So not a huge right now, but just wait. Okay, wait until next summer next fall, when things are really going to start happening. All right, stick around. We got a lot to cover still we're going to be talking about some guests who will talk about some of the big hacks of the year. What does it mean to us? What can we do? I'm going to give you some tips and some tricks, what not to do on your work computer third party security risks and some lessons from the National Security Agency. You're getting it right here from Craig Peterson on WGA and Craig Peterson Hello, welcome back. Greg Peterson here on w GAN will be enjoying the show today. We got a lot to cover here. Awesome. Good news, some gift ideas. I've got a very cool article from Ars Technica, about nine gift ideas for the tech enthusiasts in your life. And frankly, I am totally into this. It gave me a couple of ideas in fact of things that I'm going to be getting for people. So you might want to stick around and listen to that for the enthusiast in your life. And we're going to start right now with something that I think pretty much everyone's can be interested in. If you are, you know an employee, if you work at a company, and you use computers, there is a couple of words of caution here. In this segment, Now, first of all, the business computers are owned by the business. And that's kind of where this Bring Your Own Device thing has gotten everything a little bit fuzzy, you know, so if you are using your phone, for instance, your smartphone, and you're using it for work purposes, it's not the businesses phone. So there's not a whole lot that they can say about your phone and how you use your phone. However, the business has an absolute right to its data, and kinking troll, frankly, how you use your phone for the business data, right? Well, how about the computers that are actually owned by the computer? What can you do legally? And what can't you do? What can the business tell you that you should do with it and what can they not tell you what to do? Well, the bottom line is it depends. It depends on the business and what their policies are. So overall, that's kind of the first place you should check your employee handbook. Now we've provided a lot of businesses with employee handbook sections on this and you can certainly get them from your attorney from your corporate attorney, or from HR if you're an employee there. But if you're using a work-issued computer, now that includes a desktop computer includes a laptop, it's going to include things like iPads, even phones, you've probably checked your personal email on that device, you might have stored some files on there. You, you might have used it for a number of different things. Now in many cases, it's not a big deal as far as the company is concerned. You know, if you've got kids right to have a life outside the office, so for you to be able to send an email to the BBC. Or to make a few phone calls because babysitting didn't show up or a kid is sick or whatever. Most employers say that's absolutely fine if I died personally would not work for an employer. That said, That's not fine. I think that's a very, very big deal a very bad thing, the right companies that are like that. But when you start to store your private files on the company's computer, or maybe the company's Dropbox or Google Drive, or you are maybe going down a rabbit hole, as you started with something on Cora or you started with something somewhere else, and all of a sudden before you know it, it's an hour two hours later, or heaven for Ben, you are going to Facebook or some of these other sites to poke around. Then things change. Now many of us use messenger on Facebook in order to keep in contact with family and friends. So is it legit to have a messenger window open? Is it legit to do that, right? Well, the bottom line is you probably shouldn't do any of this on a computer provided by your employer. You're not necessarily breaking the law, but you could get fired if it's against your company's policies. And also, you need to remember that employers can install software to monitor what you do on your work-issued laptop or desktop. Now we do not monitor employees and what they're doing on a computer, except to watch for things that the employees might be doing that might harm the business directly. In other words, if an employee's bringing in a file from home, we're going to check that file. If they're downloading something from the internet. We're going to check that download. We're going to check their emails are going to clean them up, we're going to stop the ransomware we're going to stop the zero-day attacks that I talked about earlier. As well as all of the known types of vulnerabilities. But remember that not everybody is like us, right? We are not interested in getting involved in the businesses Workplace Relations, a lawsuit that a business might want to bring to against an employee, right? That's not what we do. Although we've certainly been pulled into those before in the past. And you need to keep that in mind as an employee because they can monitor what you do, they might put keyloggers on there to see what you're typing, they might have a software that takes a random screenshot. We've done that before with these workers that are doing a specific project. So we outsource something, there might be a graphic or might be writing an article or something, and we're paying by the hour for that contractor to do the work. So as part of the agreement, we have software that sits on the computer and randomly takes screenshots So we have an idea that yes, indeed, they are actually working on our stuff. And it took them five hours and we spent it to take one hour. And it's because they're slow, not because they were out wandering the internet and doing research on the party that's going to be coming up next week at the office or at their home, right. So be very careful about it. And the type of surveillance and security software that's installed on the company computer is usually based on two things, one, how large the company is, and what kind of resources they have to dedicate to watching you, and what type of information you deal within your role. Now, almost all of our clients in fact, now I think of it I think all of our clients are in what are called regulated industries. So if you're a car dealer, you're in a regulated industry, because you have payment card information, you have financing information on all kinds of personal information. So that has to be monitored, right? We have doctors' offices that have HIPAA requirements personal again, personally identifiable information, healthcare information. So security numbers, phone numbers, email addresses, and under the new regulations that are coming out right now, January one in California and Massachusetts in the European Union right now, and they are working on similar regulations on the federal level, even an email address is considered to be personally identifiable information. Until the list goes on and on if you have government contracts, we have clients that have DFARs or Defense Department requirements or FINRA, which is for financial organizations, right? That's what we do. So all of these heavily regulated businesses need to have software that is going to detect that someone is trying to exfiltrate data, shut it down immediately. We need to know that employees are trying to steal information. And in many of these cases, we will work with the company if there are lawsuits and ensue because of the regulation or because of other reasons out there. So if you're working with a company like this, which is frankly, in this day and age, every company, right, what, what employer does not have security numbers of employees? How do you pay them if you don't have the social security numbers, those are all falling under the regulations nowadays. And unfortunately, a lot of businesses don't pay attention to that. So a very small company, they're probably not doing this. But larger companies are definitely going to be doing this. And there's a great little quote here from Jesse crims. He's an Information Security Analyst over the New York Times and he said Without supporting evidence at this scale, at scale, it's pretty rare that people are not doing heavy surveillance and tends to generate a lot of useless data, roped employee into liability issues and generally make the team that monitors the surveillance systems miserable. In other words, you probably don't want to know. And that's the standard we take. We make sure that all of the regulations are complied with, but whether or not someone's sending an email to the babysitter or whatever, it's just not worth it. We're worried about espionage. Okay, so there you go. There are some tips for you. And using business security or using a business computer at work. Stick around. We'll be right back. We got some more stuff to talk about, including some major updates to the Google Chrome browser. Should you be using it anymore. We'll be right back. Craig Peterson Hello everybody, Craig Peterson here. Welcome back. We're listening Of course on WGAN or online at Craig Peterson dot com, you'll find me on pretty much every podcasting platform out there. And if you really enjoy the show, you know one of the best ways to let me know is to share it. I love to see all of the people who are listening and getting feedback from everybody so send me a note as well. But here's where you can go if you would like to give me a five-star review, just go to Craig Peterson comm slash iTunes. And right there, you can give me a five-star review. on Apple, they're still kind of the 800-pound gorilla in this space. Rumor has it that the next release of iOS is going to have some major improvement to this whole podcasting stuff. Apple really kind of started it with the iPod, which is where it got the name from. I still have one of my original iPods kicking around. It was frankly, it was my favorite device for listening to music. Anyhow, let's talk a little bit about some of the browser issues that are out there right now. Many people are concerned about the web browsers you're using. We know we're being monitored. We know we're being watched right now, by these big companies. Google makes its money by what? By selling our information. Facebook's the same way. Now Google is going to sell us advertising, and so is Facebook. And frankly, I would rather know about cars and see advertisements for cars. When it is the time I'm looking to buy a car right? And I'm never going to buy a lot of from Russia, right? So why would I want to see ads for that? So I am Pro, the monitoring in that space. Right. I, you know, you kind of go back and forth about that. You look at what President Obama's team did back when he was running for election the first time where they grabbed all of Facebook's data about everyone. And then they used highly targeted advertising. And then you saw what happened eight years later with President Trump and while the Cambridge Analytica scandal that was Child's Play compared to what President Obama's team did, but somehow President Obama's team didn't get in trouble for it. But President Trump's team certainly did even though Trump's don't get into that right now. But the browsers that we're using are tracking us. And remember, again, this old adage, it's old now, right? It's relatively new frankly. But if you do not pay for service, the odds are you are the product. And Google certainly considers that. And so does Facebook, that you are the product. So when you're looking at browsers, what should you be using the biggest browser out there right now the one that any software developers going to aim at is the Google Chrome browser. Because that's what most people use. It is really a great browser. From a functionality standpoint, people are using Google's Of course search engine, which has been very, very good here over the years. They, they've just done some wonderful things. And Google has added more and more features to their browser. Now, people ask me constantly, what is it that I use? What is it that I recommend? Well, I can tell you that Craig recommends that you don't use the Chrome browser when you can avoid it. Now I do use Chrome. When I am on a website, and I'm trying to do something and one of these other browsers doesn't work quite right. I go over to Chrome because it's not the worst thing in the world. It's not as though it has a direct backdoor into Russia, at least not that we're aware of, or into the CIA or the NSA. We know that Google doesn't like to cooperate with the US military, in some of its research projects, but Google also loves to cooperate with China and has three artificial intelligence labs in China. So it's giving China our next generation of computing technology for free but won't share it with our government. Yeah. Well, anyway, I guess I do get kind of political sometimes on the show. Google's Chrome version 79 just came up with a new feature. Now you know, when it comes to password, That I highly recommend you use some software called one password. They have some free stuff, they have some paid offerings. And what one password does is it keeps all of your passwords keeps them secure. You only have to remember one password, which is, frankly a huge win. And it was great in the business environment where you can set up vaults of passwords so that you know HR can have their own vault and this software development teams can all have their own vaults, and you can have your own personal vault, and it'll create passwords for you that are highly secure, that conform to the requirements for different websites and, and you can share them within vaults. There are just all kinds of wonderful things that you can do using one password. And then if you've been around a while, a couple of years ago, you know I offered a service that we were doing internally. We did this for free for over 1000 People, but we double-checked their password to see if not passwords but email address to see if their email addresses and passwords are out on the dark web. And you know, we checked it at least a month and generated reports for people. And that might be something we decided to do in the future. Well, there is a huge database out there that we've talked about on the show before. Google has now adopted in its Chrome browser. So Chrome 79 has what they're calling as a password checkup extension. So that was what how it all started. It was for desktop versions of Chrome, and it audited your passwords when you entered them, and took a look at them to see if those passwords were known to have been breached. Now, it's not necessarily that your account was breached, although it might have been it the password in the Heres why. Here's why they looked at the password itself. What the bad guys are doing nowadays is they are comparing your password against millions, hundreds of millions, in fact, billions of known passwords that people have used. And they start with the most common passwords and then work their way out from there. So if you're using a password that has been known to been breached in the past, it isn't something you should use. So I thought that was great. They had this password checkout extension. So now what they've done is they've integrated into every Google account and on-demand audit that you can run on all of your saved passwords. And in version 79. Google has a password checkout integrated into both the desktop and mobile versions of Chrome. So what will happen now is that if you are using Chrome to save your passwords, which I do not do as a rule, except for a few accounts I don't really care about because again, I'm using one password to keep my passwords and can keep them all straight? So it is built-in now. And anytime you enter in a password, it's going to check to see if that password has been breached anywhere online. Google is calling this private set intersection, which means you don't get to see Google's list of bad credentials. And Google doesn't get to learn your credentials. But the two can be compared four matches and basically what it's doing is it's doing mild encryption on your password and comparing it against this known setup password. So it's very, very good to do. One password has this feature already built-in password will warn you if I website that you're going to has been known to have been compromised. And Google's figuring here, that since it has a big encrypted database of all your passwords, I might as well compare against, compare them against this 4 billion strong public list of compromised usernames and passwords. They've been exposed in all kinds of security breaches over the years. And little on little later on today, we're going to talk about the top half dozen or so big security breaches, what caused them and then you might want to pay attention to to see if your information was exposed. But the main reason I like to talk about this stuff is so that you can look at your position, you know, at home or at work and ask yourself, hey, listen, there is this breach something that would have worked against us, right? I think it's very, very good. So Here we go. I'm not going to get any details here on what exactly what Google is doing and how they're doing it. If you are a chrome fan, you might want to use it. So let's talk about what the alternatives to Chrome or opera is a big one. And I have heard rumors that the Opera browser, which is kind of my primary browser, I have another one will tell you about in just a second, but opera very fast. It's designed to be secure. It also blocks a lot of spyware out there. Very good. But the rumors are that it is now in the hands of the Chinese government apparently owns it. I'm not sure that's entirely true. But, you know, it's up to you whether you want to take any risks. I'll tell you also about an extension I use in all of my browsers, which makes it much more secure much safer for me. We'll probably have to wait until after the top of the hour to get into that, but I'll tell about that. So what do I use the most? And what do I trust the most? Well, Netscape, the Netscape browser. Mozilla is the next one that I use opera is number one, at least for the time being. I use Firefox as well. Both of them do a lot of blocking, oh, I have a lot of privacy enhancements. Those are the two I use the most. And then I also use Apple Safari. Apple, again, is not selling your information as Google does. So it's considered to be a little bit safer. So far, we haven't known Apple to really leak information. They've been relatively safe, they certainly aren't selling it to anyone. And that's what I use. And then if I have to all fall back to Google Now, if I wanted to be extra safe online, there is another browser out there that I do like, and it's called epic EP, I see the epic browser. And it is actually based on Google's Chrome browser underneath the hood, just as Microsoft's browser is based on Google's Chrome browser. And Google is actually using a base form from Apple's Safari browser, which is kind of interesting. They all share code nowadays. But the epic browser is the browser if you absolutely want to keep your data safe. It even has a built-in privacy VPN. So check it out as well. When we come back, I'll give you a little clue here. A couple of tips on what you can do to keep every browser just a little bit safer. We'll get into some gift ideas and more. So stick around you're listening to Craig Peterson on WGAN and online at Craig Peterson dot com. Stick around. We'll be right back. Craig Peterson Hello, everybody, Craig Peterson here. Welcome back and listening to me on WG A in an online, Craig peterson.com. Hey, if you are a new listener, I just want to let you know a little bit about my background I've been helping to develop the internet, they in fact, just called a pie in the air you the other day, which is kind of interesting to think about. But yes, indeed, I designed and made some of the very first routers and some of the very first firewalls and load balancers and stuff back in the day. Let me tell you back in the day, we had to write these things from scratch because they just didn't exist as commercial products. And, you know, there's a lot of products I could have sold over the years but I'm just wasn't that kind of guy. Anyhow, so now I do a lot of cybersecurity for businesses, government agencies, most particularly really, for anybody in a regulated business, which today in this day and age means any business because we are all regulators I talked about in the last segment. Well, we have some gift ideas. And let me just start with one here. And then we'll get into some more articles from this week. We've we're going to be talking about the NSA here and what their top recommendation is for businesses. But you know, I am a techie guy, and I love tech and tech gifts and it's all just a pretty darn cool thing. When you get right down to it, just like, you know, I just love playing with this stuff. I guess that's the way to put it. And using it and making my life a little easier and faster, more efficient, effective, etc. But I want to talk about the high-end tech gifts that you might want to give, and you might want to give for yourself. In fact, that's exactly what I'm doing with one of these this year. Well, if you have somebody who's a gaming enthusiast, there are so many things out there that you can get for them. There's this one particular mouse that is very highly rated for gamers. It's called the razor Viper. It has some very, very fast, maneuverability stuff built in. Because of course, when you're playing some of these video games interactive, you need to be able to move very quickly so anyhow, we'll leave it at that because I am not a game type person. I used to play some, some games way back when you're in a dungeon with twisty mages, mazes, remember right how things started. But let's get into this. Now. This is one of the things I think would be a great gift for almost anyone, it's great for a computer that has the USBC which is the newest version of the USB cable. It is what the new Mac books come with the new max do as well. It's the next generation of the high-speed stuff that the last generation max had. But it also works with regular USB cable has a little adapter that you can use with it. It's called SanDisk extreme portable SSD. This thing is very, very nice. It's a good option for data you need to have with you wherever you go. It's surprisingly small. It is rated for the extremely high shock it's like 500 G's or something crazy like that. And it will withstand water and dust as well as vibration. You can drop it from six feet in the air without suffering any damage at all. This thing is amazing. And right now it is half price. Over on Amazon. Just look it up there. SanDisk is the name of the company S-A-N-D-I-S-K, it's their extreme portable SSD fits in the palm of your hand that you're going to love this. It's available in 250 gig 500 gig one terabyte and two terabytes now, I would not get the 250 gig, not that it's too small. But for an extra $10 you double your space up to 500 gig. Now when you go up to the one terabyte, which again is twice the space, it's twice the cost. So the one terabyte you're gonna have to ask yourself what makes sense and two terabyte options. But this thing is so fast, or what I love this for is to have different virtual machines on it. It's the one I use when I am doing a demo or for when I need to do a client-side install.  I can have every version of Windows on my need to use Mac OS all the different versions of that a few versions of Linux all right there on the drive. It's very very convenient. And very, very fast you're going to love this thing. In fact, that's one of the fastest portable storage solutions that has ever been tested. It's kind of similar you know you can get Samsung T five SSD, they have very good SSDs. Okay, don't get me wrong here.  The Samsung t five is more affordable but the SanDisk extreme SSD is better. Now I got to tell you that the cost right now on Amazon for this portable drive, there's no moving parts in it. As I said it fits in the palm of your hand. The cost on that is lower on Amazon right now. It's half price is lower than I can buy it from my distributors at So just to give you an idea of what a great value that is, coming up, we're going to talk about, I think the coolest gift you can give to somebody that is truly a hobbyist in the computer world, you're going to love it. And then if you are that person when you go to someone's house for Hanukkah, Thanksgiving, Christmas birthdays, whatever it is, and they say, hey, Craig, come over here for a second. my computer's not working right can you have a look at it will will tell you about the best gift for somebody like that and maybe some need to get get for yourself as well. So I'm going to talk right now about some of the biggest security breaches we'll go over one and then we'll get to some others little later on in this our last hour. And by the way, if you want to listen to the whole show, my podcast and everything. You can just go to Craig Peterson comm slash iTunes or slash tune in if you'd like to listen to it. On tune in or slash pretty much anything well actually if you type in slash pretty much everything you need an error page right? But you'll find me Craig Peters on on most of the major podcast sites that are out there by just going to Craig Peterson comm slash, whatever it is like Sasha Hart or slash SoundCloud or slash tune in, etc, etc. Well, data aggregators are big targets that are out there and who is a data aggregator? Well, let me tell you about what happened when I was at a wedding last week I was staying with my sister in law my wife and I, and there we got home and there was a card in the door and there's from an insurance company members like all state or something and, and it asked for one of my sisters in law, who had been living in that house to call so we thought okay, well, it's just a hoax thing. You know, they're they're trying to sell some insurance or something. So we just ignore that fact, I think we just threw the card in the trash. Well, the next night, we were sitting there at home and there's a knock at the door. And it's the same insurance agent. And she wants to talk to my deceased sister in law. And we get into this a little bit more and talking and talking to her trying to figure out what, what, what, why, what's going on. It turns out that someone was involved in a fatal car accident. And that person gave my deceased sister in-law's identity as her own. Yes, indeed, the dead are, quite frequently in fact, a victim of identity theft. Now we know about the dead voting right particularly in Chicago, and but in other places around the country. Well, in this case, apparently according to the report - she had been involved in a fatal car wreck about six months after she had died, and someone was dead. Obviously, this was a case of mistaken identity, but the insurance lady who's at the door, and she's obviously, some sort of an investigator used one of these skip trace databases in case you're not familiar with those. These are databases that are put together by data aggregators and data aggregators are these companies that suck up data from every public source they possibly can. And even some paid sources. And it includes records from credit card companies, and you name it, they pull it all together, they try and make heads or tails of it. So she had this report from a data aggregator and listed my long-deceased father in law's name is part of this and, and my kids, couple of my kids that had at one point staying for a visit with their grandmother, for a few months, while going to school, etc. and include my wife's name, my name just kind of went on and on. They got a lot of data wrong. And that's what I found to typically 25 to 50%, sometimes even more the data they have is incorrect. But enough of it was correct that she could kind of start piecing things together. And she was able to figure out that this was insurance fraud. Well, these data aggregators have massive databases as frankly, you might imagine. And they have these databases online. Yeah, you know where I'm going. This was a Mongo DB Mongo database, which is used, it's kind of it's called NO SEQUEL. It's an unformatted database. It's perfect for these data aggregators, and a company called verifications.io. That provided email verification services, had a Mongo database Continued over 800 million records publicly accessible to anyone in the world with an internet connection. And they had four sets of data. They'd had email addresses, dates of birth, phone numbers, physical addresses, employer information, IP addresses, business leads and other information. Not everything was sensitive. So when we get back we'll talk about what lessons should be learned what you can pick up from this a couple of tips for you. If you are a business person of any sort, or if you have data that might be in one of these databases, so we'll talk about these big verifications Mongo DB breach from this year and some more gift ideas right area listening to Craig Peters on online and here on WGAN terrestrial radio. Craig Peterson Hello everybody Greg Peterson back here on WG and online at Craig peterson.com. If you enjoy my show, by all means, make sure you subscribe to the podcast. Pretty much everything that I do goes up there my Wednesday mornings with Matt and can during their drive time show Wednesday morning that goes up there Other appearances go up there the whole radio show goes up there as well. Craig Peters on comm slash iTunes and do leave me a review if you wouldn't mind. You know those five-star reviews help get the message out. And we just passed another hundred thousand downloads, which is kind of cool. I appreciate it. Every one of you guys for listening. We try and get as much information as we can. So let's get back to our Well actually, you know There's something I forgot to button up from the last hour. Let's get to that. And then we'll get to some, some gifts and some more risks and what the NSA is saying right now, I had been talking earlier in the show about web browsers, and which browsers you should be using, which ones I recommend, then, you know, if you missed all of that, again, you will find it at Craig peterson.com, slash iTunes, you can listen to the whole thing right there. But I was talking a little bit about a plugin that I use. This is a plugin that works with pretty much any browser out there and works differently than any plugin that you might have been familiar with before. This is from the Electronic Frontier Foundation. Now I've had my disagreements with them in the past. Overall, I agree with a lot of what they're doing. But this is a plugin that goes into Chrome Opera or Firefox or pretty much anything that is called Privacy Badger Privacy Badger. So think about badgers if you know these things, they you'll find them a lot over in England, but they're over here too. They burrow underneath hedges and they like to live in the ground. And they are mean they will fight anything way bigger than they are. They don't care. They're going to win because they go all in. Well, that's what this is all about Privacy Badger. So I am on a website. Right now I'm looking at my browser and the Privacy Badger plugin, and it's got a nine on it right now. So what that means is that Privacy Badger detected nine potential trackers on this web page that I'm on right now. And it has sliders for them up there and it says you shouldn't need to adjust the sliders unless something is broken. So what Privacy Badger does is it watches you As you go to different websites, it looks at the cookies that are placed on your browser from these websites and determines, Hey, wait a minute. Now, this is a cross-site tracker. This is another type of tracker that we probably don't want to have. So it's showing them all to me. So here we go. Here's what I have right now on this website that I'm on. And the website is otter in case you don't use otter it is phenomenal transcription service, very inexpensive. 600 minutes for free every month. otter.ai but it turns out otter is using some tracker. So the first tracker showing me that Privacy Badger blocked is graph.facebook.com. So this is Facebook gathering data about me what I do where I go, the next one that's marked yellow, which is it has three different indications here on the slider. One is a blocks it entire The next one is that it could block cookies and then the far right one is to allow a domain to do it. So graph.facebook.com was blocked automatically static.facebook.com was allowed the regular facebook.com was allowed Google Analytics completely blocked API's Google com was allowed stripe checkout was allowed stripe as a payment service. JavaScript on stripe com was allowed and stripe network usually m dot means it's a mobile site. So that was blocked and Q dot stripe com was allowed but those are tagged the one these all of the ones I mentioned that were tagged, are considered to caution level. So by adding Privacy Badger as a plugin to any of your browsers Basically is going to stop sites from tracking you and it does a very good job. It learns as you go. It is not something that is prefixed with I'm going to block this site or that site. It is absolutely dynamic. I really, really like it. So check that out. This is kind of a flashback, as I said to an earlier segment where I was talking about which browser to use, what the considerations are. And this will work with any of them out there. So just do a search for Privacy Badger, it should come up near the top of your DuckDuckGo search. And it's five the Electronic Frontier Foundation e FF, check it out online. Okay, so now let's get into gifts again. I mentioned my top gift recommendation in the last segment. This one is for total geeks. Now we are using this for actually keeping timing tracking It's called raspberry pi. So we have a special card that goes along with this that has a GPS antenna attached to it and GPS readers so that we can track the satellites in the sky. We use the timing that they provide us with, we do some advertising. So that one of the things we do for our clients is we have to track their logs and keep real detailed records on their logs. We need to know exactly when Did something happen? So that if after the fact heaven forbid, someone gets in, some piece of malware gets in when did it come in? Where did it go? What did it do, right? Because you want to be able to know after the fact Well, what does it get access to? unlike so many of these companies that have no idea what they lost? In fact, most businesses don't even know until six months later that they were even the hack versus what the best in the biz are doing right now is about six hours, not just to detected but to remediation, which is where we sit well, usually within that six-hour time frame. Well, this is called a Raspberry Pi. And they've got the newest version of Raspberry Pi four. This is a small Linux computer. So if anybody that you know likes to hack together science projects or you know, do a little bit of experimenting, this is phenomenal, absolutely phenomenal. You can turn it into a retro game console, it'll play a lot of these old video games. A smart speaker that's a DIY thing. You can build it into your Legos to make a real fancy remote-controlled car. Anything your hobbyist mind comes into mind. This is phenomenal. You can for 100 less than 100 bucks, you can get a complete kit. Okay? The Raspberry Pi fours a lot faster and the older Raspberry Pi three Model B plus faster CPU you can put up to four gigs of ram in this thing. It is a phenomenal USB 3.0 port. So if you are or you know somebody that's really into DIY hobbies, this is the way to go. Okay? The Raspberry Pi four does get closer to your general and genuine desktop PC performance. But it's not really there yet. It's not one running Windows, it does run Linux, as I mentioned. And you can write basic programs for it, which is a programming language Python. If you have a kid that wants to learn Python, this might be a nice way for them to learn because they can kind of hack it together but it's just it's basically just a motherboard, you're gonna have to put it in a case by a case forward, you're gonna have to put a keyboard on it. A mouse, you have to put a display on it, okay, all kinds of stuff, but you can get just the basic Raspberry Pi four For someone that that really, really is a total hacker here, for like 4050 bucks, it's absolutely amazing. Okay, plenty of power for your money. Very versatile. In fact, it's more versatile in many ways than your Windows PC is. And for the budding engineer in your life, they will love you for it. So stick around, we're going to come back, I've got some more ideas for tech gifts that you might like. And we're going to talk about a couple more big hacks this year, and what it means to you. We've got third party security risks, the NSA has some advice for business and we'll tell you about that too. When we get back, you're listening to Craig Peterson right here on w GAN and online at Craig Peter song.com. That's Peterson with an O. Stick around because we'll be right back. Craig Peterson Hello, everybody, welcome back, Craig Peters on here on WGAN. And we're talking about stuff we usually talk about, you know, some of the security things, some of the latest technology that's out there. We're also doing a bit of a recap here some great gift ideas for the techie people in your life, even frankly, some of the non-techie people. And the security side, which is, I think, very important, can't talk enough about that. Because it could destroy your company, it could ruin that, frankly, the rest of your life could be a bit of misery, depending on what the bad guys do to you. Oh, it's absolutely crazy. told the story a little earlier of what happened with my deceased sister in law's identity, and how it was used in a fatal car accident and it's just it's amazing what some of these people are. Doing nowadays. And by the way, one of the most valuable segments of our population. We are know already about the retired people, the older people, right, who might be a little confused, hopefully, have some assets. But one of the most valuable identities out there online is that they have a child because their social security number and their identity are going to be very useful for at least a decade, if not longer because those kids probably not going to use it until they get their first job. So keep that in mind as well. Well, I want to get into these two things before the last half hour, so we'll cover these fairly quickly. But the big one, and that is waking up to third party security risks. Now one of the big attacks this year was Capital One and that's on my list of the ones I wanted to talk about today. They had personal information blog into overall hundred million US individuals and 6 million Canadian residents. Now, this was exposed. And when a former employee at Amazon Web Services inappropriately accessed the data, we could get into all of the real details behind this but the compromised information included names addresses, dates of birth, credit scores, payment history, contact information, and other information on people who had applied for Capital One credit card dating back to 2005. also exposed where the social security numbers of 140,000 individuals and bank account data blogging belonging to 80,000 secured credit card customers. So think about this for a little minute here. How many of us are using a service like Amazon Web Services, how many of us are relying on cloud services to keep our information safe? Right? Frankly, that's most of us, isn't it? And when you're talking about somebody like Amazon Web Services, or now there's Microsoft Azure, those are kind of the two really big players. IBM also has its cloud online that they sell access to. Most businesses look at it as a way to save money. Most businesses consider, hey, I don't need to keep track of the security, because my vendor is keeping track of it for me. And what we found out is, that's not true. So the lessons learned here. We'll start with that here from Capital One is that cloud service may be attractive because it's cheaper than doing it yourself. And that's particularly true, frankly, throughout the whole range, but it's particularly true for large businesses, but even for small business. businesses, can you really afford the right kind of server? Now I know a lot of small businesses go to the local staples store and buy a computer and call it a server, right? And maybe $800,000 later, they're out of there. Whereas a real server that's going to be really reliable is going to last years, you should be looking at more like 15 to $20,000 for. So businesses say, well, I'll just do it in the cloud. I'll use Amazon Web Services for this and we'll hire a consultant who's going to help us set it up. And we're going to use maybe Dropbox for that and maybe office 365 for this and now all of a sudden, I'm safe. Well, you're not. And companies, you guys are putting your data at risk, because you haven't adopted a security infrastructure, with the vigor that you need to apply. It should be at least as good as what You're using for your on-premise stuff. But you know what so many SMEs aren't even doing it right for on-premise stuff. Okay? So you're ending up with all of the financial cost of the penalties that you rack up, and the lawsuit and the cost of those lawsuits, which will vastly outweigh any it savings that you might have down the road. So keep that in mind. And that's what Capital One just learned this year. The Why? Because we're not taking third party security risk to heart Ponemon Institute did a study here 2018 founded 60% of customers surveyed, had suffered a data breach caused by third parties or vendors in the last 12 months. So what's causing it? Well, these applications are being built very different than they were a decade ago. They are online. They're using APIs. And they are not considering the security risks. So all services are connecting internally and externally via these APIs, popular finance websites load on your browser mobile apps, you can see the results. Dozens of third party services, okay, web apps, middleware, other code. This is a real problem. So, protect your own infrastructure, Step number one. Step number two demanded the others protect their infrastructure, okay. And trust yet verify. What we do is we wrap special security software around all of these third party infrastructure Software-as-a-Service sites that are out there, okay. So be very, very careful and you have to test even more for third party sites and you know, businesses just aren't testing as much as they should. So there you go. There's a couple of tips here three tips on what to do. When you are talking about third party security risk, and that is with all of these guys, Okay, number one, make sure your infrastructure is protected that you have the right kinds of firewalls and you have the right kind of malware treatment that's in place. All the other security controls, make sure they're configured right? If you're using something like Amazon Web Services, or Sure, or office 365, make sure you have the right settings. You know, it's difficult I get it, Microsoft has over 10,000 skews 10,000 products that are available in they're all software and services. There are dozens and dozens just for office 365 based systems. So make sure you have the right stuff. Make sure that they have proper compliance and certifications. And remember too that the certifications they have just represented a point in time. Do they still have the right kind of security? And because we are running our technology in this new type of infrastructure, make sure, frankly, that we keep track of everything because a breach can happen quickly do millions of dollars of damages right away. And 20% of businesses will file for bankruptcy the very next day. All right, well, let's talk about another gift here real quick before we go to a quick break. And this is for those of us that we go to a family event, and we go anywhere, and it's a Craig come over here for a minute, I need some help and you go over there and of course, it's questions and problems about their computers. So here's what I recommend. Get that person in your life if they're fixing the computer for that for you. I fix it. Great site painting Go online to find out how to fix physical problems. But they have something called the I fix it pro tech tool kit. I have one of these my kids have one of these. My technicians in my business have one of these. It's a 64-bit driver set that has all these weird types of sockets and everything on them. Because these parts and the computers that have the special locking screws and everything else, you need this Okay, the I fix it pro tech tool kit. Stick around. We'll be back with a wrap up for today's show. And we'll talk a little bit more about some gifts right here. You're listening to Craig Peterson on w GN. And the course online Craig Peterson calm. Stick around because we'll be right back. Craig Peterson Hello everybody Craig Peterson here WGAN and online at, of course, Craig Peterson dot com. Hope you've enjoyed the show today we have covered a lot of different things we talked about third party security risks for businesses which web browser you should be using. If you want to keep safe and some of the updates that Chrome has from Google, they'll keep you safer online. What not to do on your work computer. Why it's still too early to buy a 5g phone and signature antivirus and how it is at best catching 50% of the malware out there. It's getting really, really bad. And we've talked a little bit about some of the top breaches this year and there are some pretty scary Ones out there. But how does it apply to you? And how does it apply to your business as well? And we got one more that was brought up on the website at Craig Peterson calm, you can see all of these up there, a little bit of mind commentary and links to other articles online. But this is about the NSA and what the NSA, the National Security Agency is saying that we should be doing as businesses, but this applies 100% as well, to you as an individual. And the basics are to focus on your assets. And this is a very, very big deal. W

Craig Peterson's Tech Talk
Welcome and Quick Start Reboot Guide for Solving Some Cybersecurity Issues and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show [10-5-19]

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 4, 2019 12:01


Welcome!   Hello, everybody, Craig Peterson here, you listening to me on WGAN. If this is Saturday, otherwise, you might be listening to me streaming on a podcast services and of course, you can find all of that at Craig Peterson dot com. Hey, we've got a number of problems this week, some of which you might have heard of, I was listening to the radio earlier today. In fact, I heard an ad for one of these companies that supposed to be able to help you out if your data is stolen. Remember, some of those guys can be good, some of them not so good. And I want to give you guys something here, we'll be talking about that a little bit later. I also, have a gift for you that can help you address some Cybersecurity issues. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Terminated Government Contractor Ends Up in Jail After Destroying IT System Resources  --- Automated Machine-Generated Transcript: Craig Peterson 0:06 Hello, everybody, Craig Peterson here, you listening to me on WGAN. If this is Saturday, otherwise, you might be listening to me streaming on a podcast services and of course, you can find all of that at Craig Peterson dot com. Hey, we've got a number of problems this week, some of which you might have heard of, I was listening to the radio earlier today. In fact, I heard an ad for one of these companies that supposed to be able to help you out if your data is stolen. Remember, some of those guys can be good, some of them not so good. And I want to give you guys something here, we'll be talking about that a little bit later. But if you need security, you almost certainly have to do a reboot, there is so much going on today. And you got to kind of start from scratch. You know, I was out at client side a new client, and we were looking at their systems. And we found no fewer than three and sometimes as many five pieces of anti virus software on their computers. Now, there's a few things to remember here when we're talking about security. And I'd have Iris software. Number one is, it doesn't work anymore. antivirus software is okay, in some cases, but it doesn't work for many of the problems that we're really facing today. You know, we have a bigger ransomware problem than we've ever had. Although it's not going out to just about everybody. It's it's been more targeted than it used to be. And it's it's almost useless when it comes to the via anti virus because so much of this code now ransomware and others is continually morphing, thinking of a virus in nature. Why do you get the flu every year or cold every year? If you right? Some of us don't. But why is there a new one coming out every year. And the reason there's a new virus every year and a new cold virus that's behind her maybe flu is because it is morphing. So your body's immune system sees it but doesn't really recognize it as an invader doesn't recognize it as something that should be fighting. And before it, your minister really knows what's happened, that virus is taking control and is using your own cells to generate viruses, then try and overwhelm your whole system. Well, that's kind of the simplified way of talking about it. Well, as much as the same true with the new viruses that are out there. They are constantly morphing themselves, they get onto one computer, it morphs itself before it goes on to another computer. And one of these weeks here probably pretty soon, we're going to talk more specifically about these new types of malware. The never even put themselves out on the heart desk. It's just amazing what they're doing. And they're using their internet connection in order to call home, but also in order to get another version of it. And it just gets kind of crazy. So when we're talking about antivirus software, it doesn't work. So what these guys have done is they put on multiple types of antivirus software from different vendors. Now I understand that right? I really do. What are you supposed to do? Well, maybe McAfee old kept some might catch some others, you know, the bigger Symantec packages might catch some others and see whether kindness anti virus is out there. And I want to turn on Windows Defender, and I'm going to do some stuff, make sure my Windows Firewall is turned on. And then I should be protected. And it makes sense when you think about it, right? They're all not going to detect all of the viruses, they're not all going to detect all the different types of malware. So maybe by installing three or four or five different versions, you're going to be a little bit more covered, even if they all only cover say 50 or 60%. And the real number, by the way, right now is about 20%. But no, let's say that will give them the benefit of the doubt. Even if they cover 50 or 60% 50 or 60%. Each time you install a new piece of antivirus software from a different company, you should be adding to that right. So maybe you get up to 8090 100%. That's not what happened. What ends up happening is the anti virus software starts fighting with the other antivirus software. Because we went ahead and we installed a whole stack of software. It's not just anti virus software. But it's all kinds of anti malware software, which is what we do, right? That's really what you have to do as a security professional nowadays, you can't just have antivirus. So we saw this whole stack. And we got a call from a company that we had done this with we had just installed all of this stuff. We hadn't removed all of their other antivirus software yet, because we want to do bit of a cleanup and get it going quickly, quickly, quickly because they had already been infected. So we had to go ahead and start doing some cleanup. And so we got a call from them. And the lady there was saying, Oh no, my Norton Antivirus software says you're the software you installed is a virus. Well, that's also true, because these antivirus packages are fighting against each other. And here's why. Most of the antivirus software looks for certain patterns in programs that are installed on your computer programs that are in your hard disk is that's the typical way. In our case for the last about two years now. We've also been monitoring all of the processes that are running in memory. So they're they're looking at it, they're saying, Oh my gosh, this new software that Craig installed, it has something in it that looks like a virus. Well, yeah, in a number of ways. It does, as does the Norton and Symantec and the McAfee and everything else out there. Because what they have in them are check sums of, or signatures of various types of viruses that are out there. So installing multiple pieces of antivirus software, and or anti malware software is not going to help. In fact, it's going to make life worse for you ultimately. And then of course, people they don't update them and they get out of date, and it gets to be a real big problem. So that's what this quick start guide is about. I've got it here right now in front of me. I have never given this away before except as part of a paid program. This thing's 32 pages long. And it goes through and talks about some of the detailed stuff that that you might need do. We've got bonus tips in here. Let's see how many of them are there. 1718 bonus tips. Okay, so there's 22 as well bonus tips, software availability, what you can do, what you might not want to do all of that is in here and have given this away before passwords what to do what kinds to use virtual private networks want you to use them when shouldn't to firewalls, securing your endpoints which are your computer's your printers, anything that sitting there on your network, some of the good anti malware software that's out there. So this is a very, very, very good guide. As I said, we sold it before we've never given it away. If you want a copy of it, you can get it by going to Craig Peterson comm slash Quick Start. Right now Craig peterson.com slash Quick Start. And this steps you through all the the major things you have to do now I have courses on how to do all of this. And, and they are dozens of hours long. Okay, so this isn't, this is just a quick start, okay, this isn't one of these big courses, where I'm going to hold your hand give you coaching or anything. This is just something that you can print out and and share with the other people in your organization or at home. Now, most of what I do is geared for businesses. So you'll see, this is called a security reboot guide for today's small business. And I go through a couple of stories of recent clients and the problems they had been having. So that you can kind of get an idea on what is going on out there. And you're not alone. Okay, if you've been hacked already, believe me it is not your fault. These people are selling you stuff that just doesn't work. And in isn't probably the right thing for you. So hey, I get it. But it's a quick start guide, you can get it by going to Craig Peterson. com slash Quick Start. Now if you don't want to go there, I get it. It's fine. Don't bother. Okay. This is not for everybody. But it's important enough. Just looking at what I have coming up today. We've got we're going to talk about Kaspersky today. This IT admin man. This is part of my Do It Yourself course. And I think this is really important. This just happened October 1, it appeared in zero day. And man, this, this IT admin, you got to be careful, okay? You gotta be careful when you hire people, when you bring in outsourced it people when you bring in outsource, break fix shops. This guy, he's a former systems engineer. And he ended up in prison, in prison because of what he did. So we'll be talking about that a little bit later. And some new some features that we'll talk about here. Amazon Echo, the father of identity theft. He's been convicted on 13 federal counts, we'll talk about what he was doing. And then into some security stuff here. We've got 172 malicious apps on the Google Play Store 35, or excuse me, 335 million installs. So these apps are all malicious. General Electric, what they're doing, of course, Words with Friends, you might have heard about that. Apparently, they had their data stolen, and it could affect 218 million users. So what I don't want to have happen is I don't want to have your business breach because most small businesses that are breached are out of business within six months, absolutely. no two ways about it, you get breached, you're out of business six months. And I want you to understand what you should be doing. So that's what this quick start guide is about. That's why I'm releasing it for free today. 32 page Quick Start Guide. And the only place you can get it right now unless you buy one of my bigger courses is by going to Craig peterson.com. Slash Quick Start. If you want to get it great if you don't I understand. Okay, there. This is confusing. It can be overwhelming. You already have it people, right. So is this going to step on their toes while it may and maybe they should have their toes stepped on? But that's what that's all about. Hey, when we come back, we're going to be talking about some of these problems this week. What's up with Kaspersky and the federal government you're listening to Craig Peterson on WGAN and online at Craig peterson.com. Transcribed by https://otter.ai --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

The History of Computing
The History of Computer Viruses

The History of Computing

Play Episode Listen Later Jul 26, 2019 17:00


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Todays episode is not about Fear, Uncertainty, and Death. Instead it's about viruses. As with many innovations in technology, early technology had security vulnerabilities. In fact, we still have them!  Today there are a lot of types of malware. And most gets to devices over the Internet. But we had viruses long before the Internet; in fact we've had them about as long as we've had computers. The concept of the virus came from a paper published by a Hungarian Scientist in 1949 called “Theory of Self-reproducing automata.” The first virus though, didn't come until 1971 with Creeper. It copied between DEC PDP-10s running TENEX over the ARPANET, the predecessor to the Internet. It didn't hurt anything; it just output a simple little message to the teletype that read “I'm the creeper: catch me if you can.” The original was written by Bob Thomas but it was made self-replicating by Ray Tomlinson thus basically making him the father of the worm. He also happened to make the first email program. You know that @ symbol in an email address? He put it there. Luckily he didn't make that self replicating as well.  The first antivirus software was written to, um, to catch Creeper. Also written by Ray Tomlinson in 1972 when his little haxie had gotten a bit out of control. This makes him the father of the worm, creator of the anti-virus industry, and the creator of phishing, I mean, um email. My kinda' guy.  The first virus to rear its head in the wild came in 1981 when a 15 year old Mt Lebanon high school kid named Rich Skrenta wrote Elk Cloner. Rich went on to work at Sun, AOL, create Newhoo (now called the Open Directory Project) and found Blekko, which became part of IBM Watson in 2015 (probably because of the syntax used in searching and indexes). But back to 1982. Because Blade Runner, E.T., and Tron were born that year. As was Elk Cloner, which that snotty little kid Rich wrote to mess with gamers. The virus would attach itself to a game running on version 3.3 of the Apple DOS operating system (the very idea of DOS on an Apple today is kinda' funny) and then activate on the 50th play of the game, displaying a poem about the virus on the screen. Let's look at the Whitman-esque prose: Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes, it's Cloner! It will stick to you like glue It will modify RAM too Send in the Cloner! This wasn't just a virus. It was a boot sector virus! I guess Apple's MASTER CREATE would then be the first anti-virus software. Maybe Rich sent one to Kurt Angle, Orin Hatch, Daya, or Mark Cuban. All from Mt Lebanon. Early viruses were mostly targeted at games and bulletin board services. Fred Cohen coined the term Computer Virus the next year, in 1983.  The first PC virus came also to DOS, but this time to MS-DOS in 1986. Ashar, later called Brain, was the brainchild of Basit and Amjad Farooq Alvi, who supposedly were only trying to protect their own medical software from piracy. Back then people didn't pay for a lot of the software they used. As organizations have gotten bigger and software has gotten cheaper the pirate mentality seems to have subsided a bit. For nearly a decade there was a slow roll of viruses here and there, mainly spread by being promiscuous with how floppy disks were shared. A lot of the viruses were boot sector viruses and a lot of them weren't terribly harmful. After all, if they erased the computer they couldn't spread very far. The virus started “Welcome to the Dungeon.” The following year, the poor Alvi brothers realized if they'd of said Welcome to the Jungle they'd be rich, but Axl Rose beat them to it. The brothers still run a company called Brain Telecommunication Limited in Pakistan. We'll talk about zombies later. There's an obvious connection here.  Brain was able to spread because people started sharing software over bulletin board systems. This was when trojan horses, or malware masked as a juicy piece of software, or embedded into other software started to become prolific. The Rootkits, or toolkits that an attacker could use to orchestrate various events on the targeted computer, began to get a bit more sophisticated, doing things like phoning home for further instructions. By the late 80s and early 90s, more and more valuable data was being stored on computers and so lax security created an easy way to get access to that data. Viruses started to go from just being pranks by kids to being something more.  A few people saw the writing on the wall. Bernd Fix wrote a tool to remove a virus in 1987. Andreas Luning and Kai Figge released The Ultimate Virus Killer, an Antivirus for the Atari ST. NOD antivirus was released as well as Flushot Plus and Anti4us. But the one that is still a major force in the IT industry is McAfee VirusScan, founded by a former NASA programmer named John Mcafee. McAfee resigned in 1994. His personal life is… how do I put this… special. He currently claims to be on the run from the CIA. I'm not sure the CIA is aware of this.  Other people saw the writing on the wall as well, but went… A different direction. This was when the first file-based viruses started to show up. They infected ini files, .exe files, and .com files. Places like command.com were ripe targets because operating systems didn't sign things yet. Jerusalem and Vienna were released in 1987. Maybe because he listened to too much Bad Medicine from Bon Jovi, but Robert Morris wrote the ARPANET worm in 1988, which reproduced until it filled up the memory of computers and shut down 6,000 devices. 1988 also saw Friday the 13th delete files and causing real damage. And Cascade came this year, the first known virus to be encrypted. The code and wittiness of the viruses were evolving.  In 1989 we got the AIDS Trojan. This altered autoexec.bat and counted how many times a computer would boot. At 90 boots, the virus would hide the dos directories and encrypt the names of files on C:/ making the computer unusable unless the infected computer owner sent $189 a PO Box in Panama. This was the first known instance of ransomeware. 1990 gave us the first polymorphic virus.  Symantec released Norton Antivirus in 1991, the same year the first polymorphic virus was found in the wild, called Tequila. Polymorphic viruses change as they spread, making it difficult to find by signature based antivirus detection products. In 1992 we got Michelangelo which John Mcafee said would hit 5 million computers. At this point, there were 1,000 viruses. 1993 Brough us Leandro and Freddy Krueger, 94 gave us OneHalf, and 1995 gave us Concept, the first known macro virus. 1994 gave us the first hoax with “Good Times” - I think of that email sometimes when I get messages of petitions online for things that will never happen.  But then came the Internet as we know it today. By the mid 90s, Microsoft had become a force to be reckoned with. This provided two opportunities. The first was the ability for someone writing a virus to have a large attack surface. All of the computers on the Internet were easy targets, especially before network address translation started to somewhat hide devices behind gateways and firewalls. The second was that a lot of those computers were running the same software. This meant if you wrote a tool for Windows that you could get your tool on a lot of computers. One other thing was happening: Macros. Macros are automations that can run inside Microsoft Office that could be used to gain access to lower level functions in the early days. Macro viruses often infected the .dot or template used when creating new Word documents, and so all new word documents would then be infected. As those documents were distributed over email, websites, or good old fashioned disks, they spread.  An ecosystem with a homogenous distribution of the population that isn't inoculated against an antigen is a ripe hunting ground for a large-scale infection. And so the table was set. It's March, 1999. David Smith of Aberdeen Township was probably listening to Livin' La Vida Loca by Ricky Martin. Or Smash Mouth. Or Sugar Ray. Or watching the genie In A Bottle video from Christina Aguilera. Because MTV still had some music videos. Actually, David probably went to see American Pie, The Blair Witch Project, Fight Club, or the Matrix then came home and thought he needed more excitement in his life. So he started writing a little prank. This prank was called Melissa.  As we've discussed, there had been viruses before, but nothing like Melissa. The 100,000 computers that were infected and 1 billion dollars of damage created doesn't seem like anything by todays standards, but consider this: about 100,000,000 PCs were being sold per year at that point, so that's roughly one tenth a percent of the units shipped. Melissa would email itself to the first 50 people in an Outlook database, a really witty approach for the time. Suddenly, it was everywhere; and it lasted for years. Because Office was being used on Windows and Mac, the Mac could be a carrier for the macro virus although the payload would do nothing. Most computer users by this time knew they “could” get a virus, but this was the first big outbreak and a wakeup call.  Think about this, if there are supposed to be 24 billion computing devices by 2020, then next year this would mean a similar infection would hit 240 million devices. That would mean it hits ever person in Germany, the UK, France, and the Nordic countries. David was fined $5,000 and spent 20 months in jail. He now helps hunt down creators of malware.  Macroviruses continued to increase over the coming years and while there aren't too many still running rampant, you do still see them today. Happy also showed up in 1999 but it just made fireworks. Who doesn't like fireworks? At this point, the wittiness of the viruses, well, it was mostly in the name and not the vulnerability. ILOVEYOU from 2000 was a vbscript virus and Pikachu from that year tried to get kids to let it infect computers.  2001 gave us Code Red, which attacked IIS and caused an estimated $2 Billion in damages. Other worms were Anna Kournikova, Sircam, Nimda and Klez. The pace of new viruses was going, as was how many devices were infected. Melissa started to look like a drop in the bucket. And Norton and other antivirus vendors had to release special tools, just to remove a specific virus.  Attack of the Clones was released in 2002 - not about the clones of Melissa that started wreaking havoc on businesses. Mylife was one of these. We also got Beast, a trojan that deployed a remote administration tool. I'm not sure if that's what evolved into SCCM yet.  In 2003 we got simile, the first metamorphic virus, blaster, sobbing, seem, graybeard, bolgimo, agobot, and then slammer, which was the fastest to spread at that time. This one hit a buffer overflow bug in Microsoft SQL and hit 75,000 devices in 10 minutes. 2004 gave us Bagle, which had its own email server, Sasser, and MyDoom, which dropped speeds for the whole internet by about 10 percent. MyDoom convinced users to open a nasty email attachment that said “Andy, I'm just doing my job, nothing personal.” You have to wonder what that meant… The witty worm wasn't super-witty, but Netsky, Vundo, bifrost, Santy, and Caribe were. 2005 gave us commwarrior (sent through texts), zotob, Zlob, but the best was that a rootlet ended up making it on CDs from Sony. 2006 brought us Starbucks, Nyxem, Leap, Brotox, stration. 2007 gave us Zeus and Storm. But then another biggee in 2008. Sure, Torpig, Mocmex, Koobface, Bohmini, and Rustock were a thing. But Conficker was a dictionary attack to get at admin passwords creating a botnet that was millions of computers strong and spread over hundreds of countries. At this point a lot of these were used to perform distributed denial of services attacks or to just send massive, and I mean massive amounts of spam.  Since then we've had student and duqu, Flame, Daspy, ZeroAccess. But in 2013 we got CryptoLocker which made us much more concerned about ransomware. At this point, entire cities can be taken down with targeted, very specific attacks. The money made from Wannacry in 2017 might or might not have helped developed North Korean missiles. And this is how these things have evolved. First they were kids, then criminal organizations saw an opening. I remember seeing those types trying to recruit young hax0rs at DefCon 12. Then governments got into it and we get into our modern era of “cyberwarfare.” Today, people like Park Jin Hyok are responsible for targeted attacks causing billions of dollars worth of damage.  Mobile attacks were up 54% year over year, another reason vendors like Apple and Google keep evolving the security features of their operating systems. Criminals will steal an estimated 33 billion records in 2023. 60 million Americans have been impacted by identity theft. India, Japan, and Taiwan are big targets as well. The cost of each breach at a company is now estimated to have an average cost of nearly 8 million dollars in the United States, making this about financial warfare. But it's not all doom and gloom. Wars in cyberspace between nation states, most of us don't really care about that. What we care about is keeping malware off our computers so the computers don't run like crap and so unsavory characters don't steal our crap. Luckily, that part has gotten easier than ever. 

Craig Peterson's Tech Talk
Iran, Boeing, Keeping Safe and More on WTAG the Jim Polito Show

Craig Peterson's Tech Talk

Play Episode Listen Later Jul 2, 2019 14:43


Craig was on with Dan Ferrantino sitting in for Jim Polito. We talked in some detail about some of the things that are going on right now. Did you know that there are retaliatory strikes from Iran going on right now? Unfortunately, they are aiming them directly at your business? We went through some of the details of that what you can do. I gave some real-world examples and solution. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Trumping Iranian Aggression  Is Your App Safe? Maybe Not! Are You Ready? Iranian Cyber Counter Attacks ---  Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 07/02/2019 Iran, Russia, Boeing and Keeping Safe  Craig Peterson Good morning, everybody. Craig Peterson here. I was on with Danny this morning because Jim is on vacation. We talked in some detail about some of the things that are going on right now. Did you know that there are retaliatory strikes from Iran going on right now? Unfortunately, they are aiming them directly at your business? We went through some of the details of that what you can do. I gave some real-world examples and solution. So here we go with Danny. Danny Ferrantino That music means it is Tuesday morning and our tech talk guru, Craig Peterson is joining us. Good morning, Craig. Craig Peterson Hey, good morning Danny. Good job, Danny Ferrantino I try and try and try. You're kind enough to send us the show notes early. Looking through the show notes. There seems to be kind of one correlation between all of the topics. Everyone's out to get me, buddy. Craig Peterson That's the bottom line. It isn't just the government coming after you for tax money. Now we're not only supporting the some of these people who are on welfare, maybe down on their luck, etc. We're also supporting people living in Eastern European countries, their entire families, extended families. There is one story from last year, or maybe it's two years ago now, this lady over there in Eastern Europe. She did what's called from doxxing. That begins with figuring out a little bit about some companies she found a guy who was at a Facebook page had a LinkedIn profile. She found out that he was the president of this company. You know, a midsize, a small, medium-sized company. After finding out more about the guy, she sent a link a LinkedIn to him, and a Facebook request friend request saying remember me back from school, you know, using the information she had she knew what school he went to because he posted it online. She did some more research on the business website. Of course on the business website, it says, here's the CEO. Here's the CFO here, all of my top guys and gals. She researches them, find out more information about them. She spent time watching the CEO and followed him for a while. She found out he was going on vacation to the Bahamas, not the D.R. Okay. So he will probably come back alive. She figured out okay, well, this is when he's going on vacation. By the way, criminals breaking entering now, robberies at homes home invasions are also using the same technique. They know when you're gone during the summer time because you post it on social media, and they use that all online information to figure out who you are? If you might have good assets, and then they break into your house while you're gone. Because you told them you're going away for a week. Danny Ferrantino Yep, I got it. Craig Peterson Yeah, exactly. In this case, the CEO is out on vacation, and he's pretty unreachable. She has found out what his email addresses, calls up, and gets his password reset. Yes, this takes a while to explain all of this. But it only takes about two-three days worth of work. She sends in an email off to the CFO saying posing as the CEO, "Hey, we got this new vendor, they're critical. We haven't paid them in three months". "If we don't send them the money right now, they're going to cut us off, or our manufacturing is going to shut down in the business. I need you to wire this money, Right now. Danny Ferrantino I see where this is going. Craig Peterson She got the CFO to wire $45 million out of the country. Now, the FBI is saying that, and the secret service as well, in the briefings I've had with them that it only takes 90 seconds for all that money to be unreachable almost guaranteed. It was in this case, as well. She's supporting not only herself the rest of her life, her family and her the extended family the rest of her life, and it is all because of what people are posting on social media. What we're doing with our devices.? So if you go to my company and mainstream dot net online, Danny, there is an Officer's page like everybody else has. Right? You've seen them here's our senior staff. So you go to that page. But ours is quite different, and it says due to security concerns, we're not telling you, sucker. That's what we need to start doing ourselves with our data with our businesses and our business data. Because they are out to get you, Danny, Danny Ferrentino Everyone thinks that you know, you want to be all-inclusive, and let everyone know and try to sell yourself online. More times than not that can come back to hurt you as you just discussed. Craig Peterson Yeah, look at how great we are. We have all these attorneys here from H-A-AR- VARD, you know, they have Native American blood and all these other things that you want to highlight. However, bragging about them, now, in this day and age can be dangerous. Even in press releases, we used to say a lot more than we say now because they are using it against us. I regularly see businesses, small businesses, here's another one where they had about $80,000 that was stolen right out of their operating account. Now, that's money that they need to stay in business. A group operating out of China took it, and it was, obviously, a big deal. The company spent 10s of thousands of dollars flying over to Hong Kong, trying to file police report trying to get their money back and they never did. Craig Peterson Now we've got this thing going on with President Trump and Iran. Of course, there was a whole thing in place, and we're going to bomb bomb bomb bomb bomb Iran. If you remember the early 80s, that little ditty. And he pulled it back. And what did he do instead? I don't know if you follow this. But he decided, here's what we're going to do. It wasn't reasonable. They shot down an unmanned drone, and it was not a reasonable response for us to drop bombs and maybe kill 150 people. Well, in what he did instead was he launched a cyber attack against Iran. It is all from what we can gather and public statements and everything. He began a cyber attack against the Iranian infrastructure that controls the missiles that launch the missiles. Also, do you remember this thing with Russia and the power plant? Where we flicked Russia's lights on and off a few times to let them know we were in their systems. Danny Ferrentino Hey just to let you know, we're here. Yeah. Craig Peterson Yeah, exactly. So now Iran has started attacking. They've increased their attacks now, primarily on our businesses, because they're trying to hurt our economy. They're using some special malicious software designed to wipe the contents of your computer. They're not going to bother holding it ransom. They want to put you out of business. It is straight from the Homeland Security Department. We have to be careful now. The Homeland Security is warning us that there's been a dramatic increase in Iranian hacking, and what are we doing, Danny? Our businesses are not protected. It's crazy. It's like 95% of our companies are easily penetrated. They have said that two-thirds of all companies in the SMB space will be compromised this year. That's what they're expecting. Two-thirds. And we're not doing enough about it, too. Danny Ferrentino We're talking with our tech talk Guru, Craig Peterson. Craig. Now, this isn't new with the hacking the cybersecurity. Why is it that people are just so far behind the eight-ball on something like this? People like you that are out here telling us we need to do something. Is it people don't care? Is that they don't believe it's going to happen to them? Craig Peterson Well, I, I talked to a lot of people, as you know, because I run these webinars for the FBI Infragard program. And I have a lot of clients, up pick up new clients every week, and help them out. And so here's what I hear the most right? It is confusing. It is overwhelming. They feel like they have no control over it, and there is nothing they can do. None of which is true, by the way. But at the same time, I also think that they have legitimate reasons to feel that way. You know, the software they bought, they bought Norton Antivirus and so they're all set. They purchased this Symantec software or whatever. Both companies, by the way, have had employees, high up like the CEO or Executive V.P., saying their software is useless today. I can't blame these companies for feeling that way. So I'm trying to help people I know there's a lot of businesses that can't afford to hire me. So, Danny, what I'm doing this summer for everybody that's on my email list, everyone who's on my text list is going to get an invite, I'm going to be doing a dozen 15-minute if you will give or take, webinars. It's my security summer. It's 100% free for anyone who wants to attend. We're going to go through the brass tacks of what you need to do, the basics, let's get back to the basics. Let's make sure you're securing your stuff, let's find out what the data you have, what your data assets are of your small business and medium business and what you need to protect them. I'm going to help people understand this. And, you know, I've got my fingers crossed, that we're going to help move that needle. I've helped a lot of businesses, over 5000 so far, move the needle. I am doing this for my listeners. As you were mentioning earlier today, 76% of mobile apps have flaws, that are allowing hackers to steal passwords, to get into bank accounts to find your texts and things. What this goes back to the unprofessional nature the people who are writing software. Did you see what came out about Boeing? Sorry, I am rambling a bit. On Boeing with their 737 Max 8, did you hear what came out yesterday? The software in the Boeing jet has that is having problems right now. It turns out some of that software had been written by software developers in India, who earned $9 an hour? You know, it's, how do you know how good that software is? Do they do proper code reviews? Do they have the senior people in place that understand the security implications, that understand all of the flight systems? You can't fix a problem with a computer if you don't understand all of the components involved? So I, I put a lot of blame on some of these businesses trying to save money on the bottom line. They are not hiring the experienced technical people, and I know a few people, quite a few that, that have significant experience programming and managing projects for 30 years that are having some trouble finding work. Why? They want to hire the young kid, is it going to be with them for the next 30 years, right? It's a, what do they call that, where you're you're not going to hire an older person, age discrimination. Danny Ferrantino You've got to have the experience. They don't know what they're doing, Craig. And so that's why there are so many of these issues nowadays with these either be poorly written code, or poorly written security measures or whatever else. And unfortunately, a lot of our cyber enemies are picking up on this. Craig Peterson Very, very true. I blame Microsoft. Here's why. Okay, you know how easy it is to program. Nowadays, it's drag and drop. It's like, if you want to build the car, you pull this transmission off the shelf, and you put it on top of this frame. Nothing by that you had to bolt together, by the way, you drop them on, and all the parts fit together. But when something happens, all you have is a red light on the dashboard, and you have no idea it's a problem with the transmission the drive, train somewhere, right. Or maybe you have a low tire. Bill Gates made it so easy for so many years for people to write software. And on one side, it's terrific, I'm glad that he's done that because we've got some great software because of it. But, on the other hand, we are now surrounded by people that are considered professionals. Look at the average small business their I.T. person is whoever likes computers the most. They I.T. professionals, they haven't worked at all these different levels. That's what the whole security summer is going to be about. I'm going to let everybody know. So you can attend you'll know which sessions There are so that you can go the ones that apply to you the most I'm not charging a dime, but for this, okay, so it's simple. I'm trying to get this information I'm trying to help the Small Business/medium business that says to an employee you're my computer gal now because you like computers the most. This security thing, as you pointed, out is enormous. We've got nation states coming after us who realize what our weaknesses are. Right now we've got Iran coming after our businesses, massively, as a retaliatory strike. Danny Ferrantino Well, Craig, as always, great stuff and now that you've scared me straight,   --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Message Input: Message #techtalk Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Love, Life & All Things Weird ~ Megan Sillito & Suzanne Stauffer

Love, Life & All Things Weird Radio Show Our divine blueprint is abundance . Translated , that means we’re hardwired for loads of Moolah . Problem is sometime between conception and now , your hard drive got contaminated with spyware and the result is lack programs namely : I’m not worthy Money doesn’t grow on trees Money is hard To name a few.. is it time to change up that shit ? Are you ready to install the Norton Antivirus software you need to run your true operating system. Join us this Wednesday for a special activation and start generating more cash now. ~ More about Love, Life & All Things Weird ~  What if you really can have it all? No–really? What if everything you THINK you desire is only a starting point for the life you are truly capable of creating? On Love, Life, & All Things Weird, we will explore topics from magic to practical step by step processes, and everything in between. There’s no place we won’t go, nothing too ridiculous or weird in the quest to live as grand a life as possible. Hosts Megan Sillito and Suzanne Stauffer are the embodiment of “opposites attract”. Collectively, they’re the summation of Megan’s big vision coupled with Suzanne’s knack for details. Partnered in love and in business for the last five years, they’re taking co-creation to a whole new level. Join Megan and Suzanne for Love, Life, & All Things Weird, where we will talk about living a life that’s inspired, overflowing, and completely awesome. Together, they’re the embodiment of “opposites attract”, and the result is true synergistic power. Collectively, they’re the summation of Megan’s big vision coupled with Suzanne’s knack for the details, Megan’s universal wisdom punctuated with an exclamation point by Suzanne’s incisive truth, and Megan’s playful meanderings subtly sorted by Suzanne’s practical step-by-step approach. So what does this means for you? In true “two birds, one stone” fashion, you’ve found a one stop shop for invoking inspiration, unearthing tools for transformation, and having two crazy-weird chicks who will stop at nothing to support you in HAVING IT ALL! http://www.MeganSillito.com      http://livingyoursoultruth.com Join our fun Facebook group where we give additional tips and tools and continue the conversation after the show:  https://www.facebook.com/groups/1615639452040672/ AND COME PLAY with Live Your Magic, LIVE - Anywhere in the world!!  Find Dates & Details HERE - http://tinyurl.com/LiveYourMagicNow To get more of Love, Life & All Things Weird with Megan Sillito and Suzanne Stauffer, be sure to visit the archives page for replays of all their shows here: https://www.inspiredchoicesnetwork.com/podcast/love-life-all-things-weird-megan-sillito-suzanne-stauffer/  

Computer Talk with TAB
Computer Talk: Congress or Criminal Mugshots? (5/25/19) - Part 2

Computer Talk with TAB

Play Episode Listen Later May 24, 2019 38:17


Cloud-based backup service Crash Plan stops backing up certain types of backup files, leaving customers stranded. A caller asks about a recent Microsoft update for older Windows systems (Windows 7 and earlier.) This security update is necessary to stop a possible future virus attack. Millions of financial records exposed on First American Financial website, says a computer security journalist. A Windows 10 laptop user has problems keeping Firefox as the default browser. A listener wonders if Norton Antivirus can be used with Malwarebytes, plus tries to recover from a hacked PayPal account. Snapchat employees spied on users with an internal tool meant for law enforcement use. Department of Homeland Security warns that software used in Chinese-made drones may be stealing data or used to install malware on networks. A tech-savvy listener provides a possible solution of installing Ubuntu Linux on older computers that cannot run the latest Windows software. We help a caller with set-up questions with OpenDNS on a router. Configuring OpenDNS can help you surf the web more safely. A caller with a doorbell camera tries to find a solution that will work with the camera at lower Internet speeds without having to upgrade his speed with his Internet provider.

Ruin a Bad Guy's Day Radio - Fraud Prevention Podcast
How Fraudsters Exploit Malware and Phishing for Financial Gain

Ruin a Bad Guy's Day Radio - Fraud Prevention Podcast

Play Episode Listen Later Apr 29, 2019 29:24


How Fraudsters Exploit Malware and Phishing for Financial Gain Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn Welcome to Ruin a Bad Guy's Day Radio. We are growing by leaps and bounds because of listeners just like YOU! If you like the podcast, please go to Apple Podcasts to leave a comment and give us a 5 Star rating...Thank You! Apple Podcast https://podcasts.apple.com/us/podcast/ruin-a-bad-guys-day-radio-fraud-prevention-podcast/id1437720527?mt=2 In this episode we discuss how fraudsters exploit malware and phishing for financial gain. A recent conviction of international cybercriminals in federal court reveals how these fraudsters operate and target their victims. Learn how protect yourself from malware and phishing schemes. Source: Department of Justicehttps://www.justice.gov/opa/pr/two-romanian-cybercriminals-convicted-all-21-counts-relating-infecting-over-400000-victim Romanian Cybercriminals Convicted of All 21 Counts Relating to Infecting Over 400,000 Victim Computers with Malware and Stealing Millions of DollarsA federal jury convicted two Bucharest, Romania residents of 21 counts related to their scheme to infect victim computers with malware in order to steal credit card and other information to sell on dark market websites, mine cryptocurrency and engage in online auction fraud, announced Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney Justin E. Herdman of the Northern District of Ohio Two Romanians were convicted after a 12-day trial of conspiracy to commit wire fraud, conspiracy to traffic in counterfeit service marks, aggravated identity theft, conspiracy to commit money laundering and 12 counts each of wire fraud. Sentencing has been set for Aug. 14, 2019 before Chief Judge Patricia A. Gaughan of the Northern District of Ohio. According to testimony at trial and court documents, the defendants who pleaded guilty collectively operated a criminal conspiracy from Bucharest, Romania. It began in 2007 with the development of proprietary malware, which they disseminated through malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS. When recipients clicked on an attached file, the malware was surreptitiously installed onto their computer. This malware harvested email addresses from the infected computer, such as from contact lists or email accounts, and then sent malicious emails to these harvested email addresses. The defendants infected and controlled more than 400,000 individual computers, primarily in the United States. Listen to the podcast for more information! Malware:https://en.wikipedia.org/wiki/Malware Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts, active content, and other software. The code is described as computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware, among other terms. Malware has a malicious intent, acting against the interest of the computer user—and so does not include software that causes unintentional harm due to some deficiency, which is typically described as a software bug. Phishinghttps://en.wikipedia.org/wiki/Phishing Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site. Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators. Contact Ruin a Bad Guy's Day Radio:https://www.ruinabadguysday.com/contact Donate: Help Ruin a Bad Guy's Day Radio fight fraud!https://donorbox.org/support-ruin-a-bad-guy-s-day-radio Ruin a Bad Guy’s Day Radio Merchandise:-Coffee Mugs, T-Shirts, Hoodies Sale! Get 15% Off - Use Coupon Code: THANKYOUhttps://teespring.com/stores/ruin-a-bad-guys-day-radio Who Should Listen? Fraud Managers and Investigators, Cybersecurity, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, and IT/Operations. Disclaimer: Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs. Ruin a Bad Guy’s Day® is a registered trademark.Visit: https://www.ruinabadguysday.com More Podcasts:  https://ruinabadguysday.podbean.com/ Sponsor a Podcast: https://ruinabadguysday.podbean.com/p/sponsor-us/  

Craig Peterson's Tech Talk
New Privacy Concerns with Ring Doorbell Camera, Smart TVs Collecting Your Data, Rumors about new Russian Bitcoin Today on TTWCP Radio Show

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 18, 2019 29:30


Have you heard of Ring?  Well they make some pretty cool video doorbells.  But today we are going to tell you about some things they did not get right. Bitcoin is in the news but so is Russia.  We are going to talk about how huge this is and what Russia is up to. And we have to talk about Alexa? Did you know there are 100 million of them out there?  We will talk about what that means. We've got these huge corporate websites and not just any website getting hit but other sites hacking going on an unprecedented scale. Did you get a Smart TV for the holidays? Did you ever stop to think why was it so affordable?  Well, we will discuss spying and your privacy as it relates to you TV.  These and more tech tips, news, and updates visit - CraigPeterson.com --- Transcript: Below is a rush transcript of this segment, it might contain errors. Airing date: 01/19/2019 New Privacy Concerns with Ring Doorbell Camera, Smart TVs Collecting Your Data, Rumors about new Russian Bitcoin Craig Peterson: 0:00 Hey everybody. I love this beat. This is Craig Peterson. This is show number 990. Isn't that just amazing? We get right down to it. That's a lot of weeks because 990 is one per week. Okay, we're not talking about these guys that are doing dailies, although I have done dailies, that's not part of this. That means we are a matter of what a couple of months out from show number 1000. Wow. That's a lot of show. So anyways, welcome everybody. Hope you're having a good day and hope you like this bumper music. I don't know I kind of like this. It was between this and a kind of a Beatles-ey type rock song. I really like them, right? These songs I think you got to choose it's got to be whoever the host is that decides that But I'd love to hear from you too. And what you think I I think Sheryll who does most of our show transcriptions might not like having a lot of music in the background. But I'm kind of liking this, I don't know, I never played the guitar. I played a lot of instruments over the years, you know, back when I was a kid, right? I kind of stopped when I had a family That's really nice. It's got a nice beat to it. Anyhow, we're going to talk about tech as we always do. And of course, a lot of that tech has to do with security, as it always does. And we've had a few shows this year so far. But it's been a busy year. And I haven't really been trying to keep up on all the latest latest latest stuff. So that's what this week is all about. And I want to start by talking about some of this Bitcoin stuff because I think this is absolutely huge, and what Russia is doing, and this is going to drive up the price of bitcoin. We've got now 100 million Alexa devices that have been sold. So what's next for us out there after they've got 100 million of them? What does that mean to us? We've got this huge corporate website and not just website but other sites hacking going on an unprecedented scale. So what's happening there? What does it mean to your business? Do you think your websites been acting strangely, maybe this has been going on, particularly if it's been acting badly, the top tech trends of 2019 according to the tech experts out there. And the simple reason, by the way, if you got a new Smart TV for the holidays, why was it so affordable? Well, you will believe this, I think, hey, it's kind of scary, frankly. And if you've been worried about your TV spying on you, while Ben Gilbert from Business Insider has some news for you, and we'll start out with Amazon's Ring. Now, this is a pretty cool device. In fact, my wife wants one of these for our house. And I've thought a lot about it that the Ring started with just kind of a doorbell with a built-in security camera. You've probably seen these before, right and you can have the strangers come up to your door and ring the doorbell and that I think the commercial shows someone on a beach in an in a tropical area and just sitting there answering the door on their phone and seeing who it is and what's going on which is really cool. But this article from the Intercept is talking about excuse me talk Rings frankly abysmal privacy practices. And there have been a number of reports about that in the news over the last little while, but they've got cameras all around. Now it's not just the doorbell. These devices are providing high definition feeds from all around the house. We're talking about the doorbells, but also in garages and on bookshelves. And it's not just for keeping tabs on your home while you're away. But a lot of people are using them kind of like nanny cams to find out also when their kids are home when they get home from school, that they bring some friends with them. Maybe some friends, Mom and Dad don't like it. There's all kinds of things are used for neighborhood watches. People are putting together boards where all of the cameras in their neighborhood are on one website you can go to, and you can see what's happening in the neighborhood. You know, that can be really good. I know my wife helped to found a kind of a neighborhood watch thing here in our neighborhood. And everyone kind of keeps tabs on what's going on. And the founder of Ring his name is, or she I'm not sure, Jamie Siminoff, he said that our mission to reduce crime and neighborhoods has been at the core of everything we do at Ring. And you know, that marketing message has really hit with consumers. Frankly, they got a $1 billion acquisition from Amazon, who now owns Ring. And that's kind of nice if you have the Alexa as we mentioned a little bit earlier, 100 million of them out there right now. So that that Ring device ties into all of that. So despite this mission that they have talked about to keep people a d their property secure, the company's treatment of video feeds has been anything but secure. And this is according to people who have been talking to the Intercept to say they're pretty darn familiar with what's going on. According to one source, starting in 2016, Ring provided its Ukraine based research and development team, virtually unfettered access to a folder on Amazon S3 cloud storage that contained every video created by every Ring camera everywhere around the world. Now, this is just if this is true, this is just an enormous invasion of privacy. And we're talking about a list of highly sensitive files and could be browsed and viewed by these developers over in Ukraine, you know, could be wonderful people. But if it's out there on S3, if there are any security lapses, we know Ukraine got hit really badly last year, or actually a little more than a year ago now with some malware, some ransomware that was aimed specifically at Ukraine and companies, what's going on here? Well, apparently these files are also not just on S3, but they were left unencrypted. And they said that was it because of the expense of implementing encryption and lost revenue opportunities. Because of restricted access and you know, all the excuses you can think of. Now, you might be familiar with Uber's God Mode. We talked about it here on the show before Uber, of course, that ride-sharing service where people are taking their vehicles and are driving the streets and picking up strangers for money, right. It's not what mom said not to do when we were a kid. But Uber had this God Mode that let anyone in the company basically look at every ride that was currently occurring, where everyone was, who was getting a ride, they were watching celebrities. And just crazy what Uber was doing. This is vaguely familiar of that, isn't it? And in fact, I think it's kind of worse because now you've got the video. So who knows, right? reporters, competitors, email addresses, all of these people could view all of their cameras. That's all they needed in order to get at the data. And apparently, there were instances of Ring engineers teaching each other about who they brought home after romantic dates. In other words, they were watching each other as well. So this is something we have to be careful of. We know about some of the risks that we've heard for years, about nanny cams, baby cams being hacked. And believe me, they are. If you bought yourself a camera system for your office, and your little bit worried about it well, if you bought it, and it was just one of these lower-end camera systems that most of these video surveillance companies sell. Or if you bought it at Harbor Freight or the local big box door, almost all of those are a very high percentage. And I've seen numbers as high as 90% of them have been hacked by the Chinese, very hackable, let me put it that way by the Chinese and many of them have been hacked. And we have done that we've seen that we have come into a business who was having security problems, they thought maybe there were security problems, they thought maybe there were viruses on their machines. So they brought us in, we checked, Of course, the word viruses on their machines, but what did they come from, they were being hacked from the camera system that was installed. Some cases one case it was installed by a professional firm, but you know, people don't want to pay money for the good stuff from Cisco or some of these other resellers that really check this and keep tabs on this and so that's what happens so you know, it's going to happen. If you're using these types of devices hopefully like in the case of Ring, you've got Amazon buying them and Amazon kind of whip you into shape so I think it's important to keep that in mind. Right. Ring very big company they paid a billion dollars for it. You think they do a little bit better than that, don't you? Well, let's talk about TVs now. Smart TVs. You know smart TVs, have been all the rage. I who was I was at my one of my brother's houses, I think it was. Oh, it was my mom's house and they had just bought a smart TV over the holidays and they had set it up and I had to help them reconfigure some things because they just didn't have it configured right. And it was kind of interesting to ask some questions of her and her Smart TV because it has all of these features on it. She's got it hooked up to the internet so she can stream Hulu and Amazon and she can stream her CBC stuff that she wants to stream from Canada when she is down in the US. She was completely oblivious to the potential problems here but here's another one to add to your list and to seriously complain when you are going to buy a smart TV about these things spying on you right because you have a right to be upset It doesn't say anywhere on the label that they're spying on you but Have you wondered why that smart TV was so cheap right they remember how much they used to be Why are they cheap well here's a great story Ben Gilbert over the Business Insider and of course all of these articles I've mentioned today including the ones I'm going into more detail on are available at my website http://CraigPeterson.com hopefully you are a member of my insiders email and you got an email comes out every Saturday morning if you're not subscribed, just go to http://CraigPeterson.com/subscribe. You'll get all of this and more when there are big hacks or big things happening in the news that I think are worth you knowing about. And kind of jumping on top of I will let you know, and I let you know via that email list. So you will see these articles right there. You just click on the links, I'll take you right to my website. But here's what Business Insider had to say. The vast majority of televisions available today are smart TVs. We knew that right? You go into any store. That's what you see that they have internet connections, and they aren't connected to the internet. Sometimes it's via wireless because the Wi-Fi in our homes has gotten so good and sometimes as via hardwire, but they've gotten internet connections. I've got advertisement placement as part of the TV where the TV recognizes that maybe the channel you're watching has a commercial coming on right now. So the TV overlays a commercial or to overlay it in the corner. They also have streaming services built into them. So despite the all of this added functionality, think about what that all costs to put together right there. They aren't Roku that aren't making the hardware and then selling streaming services. They aren't Apple TV who is selling new or the Apple TVs set-top box and also making the real money off of streaming services, right. They're not a fire stick where Amazon can give it to you at a great discounted price. Because Amazon selling new video content, right. All of that stuff just plain adds up. We have to seriously consider what business these people are in. You know, you can go out right now you can buy a 65 inch 4K Smart TV with HDR capability for less than 500 bucks. That's a massive piece of technology. It's going to last you for years. Are you kidding 4K? I don't have 4K my house. My TV is half the size of this one. Right? How can you get it for that cheap? Well, there is a caveat. Some manufacturers that are selling these TVs are making their money on the back end. Now we understand the back end with your fire stick, you understand the back end with your Apple TV or your Roku because they're all making money off of the streaming. But how about the TV set? Well the TV manufacturer may also have deals with these you know Australian providers so that they get a little bit of a cut in the action just like you buy a Windows PCs especially if you buy it retail you know if you get a Windows PC from us it's going to be clean but these retail machines that you buy come pre-loaded with all kinds of crapware. Right? Right? They've got Norton Antivirus or Symantec can have viruses tho those are going to do you any good. And they've gone to these games that you can play, they've got all of this stuff that you can have, if only you pay them money, right. So you get a free 30-day trial or something. But you know, you have to go through all the trouble taking the software off of your machines. So they make an extra 10 bucks per machine. It's estimated by putting all that junk on your machine before you buy it. So how are the TV manufacturers going to make that extra money? Well, they are collecting data like the types of show you watch which ads you're watching when you're flipping channels, right? The eyeballs, that's what they want to know, and your approximate physical location. And we talked before on the show about how some of these people manufacturers are actually even using cameras to figure out who's watching the TV. Now, there is an interview on The Verge. They have a podcast, and they had Vizio chief technology officer on there. I think his name's Bill Baxter, and Vizio is a big TV company. I have one of their TVs. And he was talking about how this technology works. And he said this is a cutthroat industry. This is a direct quote. I've found it here. It's a 6% margin industry. The group greater strategy is I really don't need to make money off the TV. I need to cover my costs. So more specifically, companies like the Vizio, V-I-Z-I-O, don't need to make money from every TV they sell because they're making money on the back end. So there's the answer you can tell your friends if they're wondering why those TVs or smart TVs are so cheap now you know the answer. And we're going to talk about Russia here right now and the whole Bitcoin thing. Now we just had a Canadian sentenced to death over in China and we know that two Chinese executives we had, Huawei executives and that made the news was arrested in Vancouver, Canada when she was changing airplanes there. And another Huawei executive with just arrested last week as well I think that was in South Korea but I don't remember and Huawei courses in trouble I heard just I think it was the last couple of days that Huawei is up on some criminal charges, which you normally don't see for Corporation. But it's a real problem. Why was there a warrant for that Huawei executive to be arrested that caused her to be arrested in Vancouver? Well, there was a warrant because the United States is accused, Huawei of violence, this sanctions against Iran. So Canada honored that warrant and arrested her and you know, the aftermath is still kind of kind of me trying to figure out there. So what does this all mean? Why did I bring this up? And when I'm mentioning Russia? Well, there are also sanctions against Russia. And there is a lot of fake news out there as well. Right? But the big fake news started with was Dan Rather, right, who was who made up completely made up this story about George Bush, President Bush and his lack of service and what he did in the Texas National Guard, completely fabricated, right. And then he lost his job over the whole thing and got defensive about it, and you know, it, it was the wrong thing to do. And that was really, really the beginning of the fake news that we have today. So fake news. We've been seeing I'm going to put this up on my website. Hopefully, that'll be up by the time the show's over here. We got my people working on it, but hopefully what we find is that this is fake news as well. So here's what's been going on. If you listen to me before, you know I am not a fan of cryptocurrencies, not because of the fact that cryptocurrencies can help you maintain a degree of anonymity And believe me, it's only degree people can be tracked down, they have been tracked down and they have been arrested, okay, criminals doing evil things with Bitcoin. Now, there's nothing wrong with Bitcoin or these other things, you know, cryptocurrencies, as far as you're using them for legal purposes. And of course, if you make a profit in selling any of these cryptocurrencies, you have to report that to the Internal Revenue Service, right? Pretty straightforward, pretty simple. Well, how does this tie into Russia and Iran and China? Here's how it ties in. There's rumors that Russia is looking to buy bitcoin and the rumors are that it's going to invest about $10 billion in Bitcoin. Now, this is an economist that's saying that the guy's name is Vladislav Ginko, and we'll see what happens because he's saying hey, this could start as early as February 2019. Well, first thing why would Russia buy bitcoin? Well, according to this economist Russia wants to get away from the US dollar as being the world's currency and when you buy and sell oil it's always done in US dollars right so he's saying that we've got our wonderful president or prime minister the president of Russia Putin over there saying hey listen we want to get away from the US dollar so let's make Bitcoin be the reserve currency for the world now uh. How would that be something? What do you think that would do the price of bitcoin? Bitcoin that struggling to get back up to $4,000. Remember it at one point in some markets it was as much as $40,000 but generally speaking was about 18,000, 20,000 at its peak. So it's a lost a lot as have pretty much every other cryptocurrency and these initial coin offerings that were happening every day, last year, they're pretty much dead now. Because the cryptocurrency boom has faded. It's faded in a very big way. So what do you think that starting a rumor that Russia was going to put $10 billion into bitcoin? What do you think that would do to the value of Bitcoin? So we're looking at this saying, okay, maybe that's legitimate. We've got the Trump administration, adding some more Russians to the list of sanction entities that US companies and persons cannot trade with. And the sanctions, of course, are this aggressive stance that the Trump administration has had against Russia, although Trump's been colluding with Russia. So he, you know, the Trump administration has been much tougher on Russia than any previous modern administration. So maybe they would, maybe they wouldn't, but I'm looking at all of this same, you know, maybe really, what we're looking at here is not that Russia is looking to buy bitcoin, and maybe they are, maybe they've considered it, but no one except Ginko was saying that they're seriously considering that is this another fake news and that may be what it is if it's not fake news I don't know maybe Bitcoin to be something to put money into this is not investment advice you know I've never bought any of this stuff I don't want any of this stuff because it's it's frankly way too volatile but I thought I'd bring it up because it's an interesting angle and from what I've been able to tell online doing research on all of these various cryptocurrency websites this is not a legitimate story well we were not going to have time to get to all of the articles today. As I mentioned before you can get them by just going to my website at http://CraigPeterson.com. Read my newsletter that hopefully you get every week my little insider newsletter letter and you get that by going to http://CraigPeterson.com/subscribe. And hey I want to shout out here and a big thanks to everybody who's left comments we got a few comments on my podcast the more of those we get you know the more coverage we get the more people that are going to hear about the podcast well I've been doing this for a very long time huge labor of love here for everybody I really am trying to help you out so please share but also leave a comment go to http://CraigPeterson.com/iTunes. http://CraigPeterson.com/iTunes and that'll take you to a place where you can subscribe right there on iTunes. They are the 800-pound gorilla. I would really love it if you subscribe there because that's where the numbers come from. that the show is rated on and leave some five-star comments. Hopefully, I've earned five stars from you. But do it right there. subscribe and leave a comment. I so appreciate it. http://CraigPeter son.com/iTunes. Okay, so we got a couple more minutes. Let's talk about the biggest tech trends of 2019. This is a FastCompany article FastCompany still seems to be a pretty good magazine, I have a subscription to it. And I enjoy a lot of the articles. But they're saying that this might be more of a quiet year, 2019 more about laying the groundwork than any historic breakthroughs. And what is the groundwork? Well, number one, the growth of AI. Artificial intelligence is really going to grow. It's frankly, most of its still really machine learning. But IBM is actually now selling quantum computers, how's that for amazing? And these things are going to change the whole world of cryptology for prediction for weather, a prediction for earthquakes at a kind of everything. Okay, so that's kind of rolling out right now. I think they've only sold one of those quantum computers. They had one on the floor at CES this year, and they may be putting more of them out there. We're also going to see technology that is really going to kind of blur some of the boundaries between what's real and what's synthetic. When it comes to the reporting you're reading. You might have noticed this already articles that the English kinda is terrible in right? Have you noticed that? So we're gonna have more synthetic media This year, we're going to have more ethical questions. As we have these autonomous vehicles rolling out an AI rolling out. Consumers may start adopting some more these are you know AR glasses, really, we'll see what happened. 5G is going to really start rolling out this year, it's going to start showing up in some phones, we're going to have new user interfaces available because of the virtual reality an augmented reality, we're going to see more on the wireless side, you might have heard me a few months ago, talking about how Wi-Fi is about to change again, we're going to seem more the slow death of cable TV is has become to be known. It's going to move over to frankly, our wireless devices, voice platforms, you know, you've seen Alexa, Google Home rise up, we've seen Siri kind of plod along but that's going to be improving as well. So keep an eye on your mailbox. You should have gotten an email from me this week. yesterday. Yeah, Friday. And I made a note of it too, in this morning's newsletter. I have something going on right now. This is my first in a series of special reports. It's absolutely free. All you do is make sure you are on my email list and you can sign up for but this is why you should not be buying some of this so-called insurance for identity theft and what you can do for free. So I'm writing that absolutely free. I have a special I actually have like four or five special surprise bonuses that are part of that everything there is for free. And if you want to attend some of my master classes, there's information about all of that there. So check your email for an email from me@CraigPeterson.com and have a great week. Take care, everybody. Bye-bye. --- Related articles: Airdrop Assaults On The Rise As Criminals Cyber Flash Strangers Are Your Holiday Gifts Safe? Apple Watch Can Now Detect Your Irregular Heart Rhythms And Other Problems: Here’s How It Works Facebook Never Really Cared About Connecting The WorldHow To Stop Apps From Tracking Your Location --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

High Risk/High Reward: Stories from my Life in Technology
Patents: Engineer/Inventor's role and basic patent strategy tips

High Risk/High Reward: Stories from my Life in Technology

Play Episode Listen Later Oct 19, 2018 29:35


Companies need to establish a strategy around the protection of their intellectual property. Patents are likely to be a viable element of such a strategy. Some information on how this impacts the inventor and basic information on the process, costs, and options. The image is a picture of Norton AntiVirus 2.0 for Windows. NAV 2.0 was the first product to include LiveUpdate which was the technology in my first patent.

Onward Nation
Episode 725: Democratized access to capital, with Rod Turner

Onward Nation

Play Episode Listen Later Apr 12, 2018 42:33


Rod Turner is the Founder, Chairman and CEO of Manhattan Street Capital — the #1 Growth Capital marketplace for mid-stage companies and mature startups. Throughout his career, he founded multiple startups, three of which were sold to public companies. He played a key role in building Symantec where he lead their most strategic acquisition of Norton Antivirus, which has been called the best merger in the tech industry. Rod is also a consultant to CEOs of large companies and startups and is an expert in crowd funding in businesses. What you'll learn about in this episode: What an initial coin offering (ICO) is Why bitcoin is a very high potential technology How companies are using bitcoins and in some cases actual tokens How blockchain technology can help track the history of what bitcoins were used for Why the SEC has stepped in to regulate initial coin offerings The size of the SEC compliant token offering market worldwide in 2017 and 2018 What size company would be best suited to do a token offering What types of companies are best suited for a Regulation A offering versus a token offering The importance of working with a firm that has experience and knowledge helping businesses navigate the Reg A+, IPO and ICO process How the ability to raise funds has advanced due to the new ways to gain access to capital Ways to contact Rod: Email: rodturner@manhattenstreetcapital.com Twitter: @IamRodTurner

No Contract
003

No Contract

Play Episode Listen Later Nov 29, 2017 27:53


1. Sing Sing by Shivering Timbers, Akron, Ohio 2. Biscuits and Gravy by Bud Melvin, Albuquerque, New Mexico 3. Here's to Noam Motherfuckin Chomsky by Norton Anti-Virus,  Ridgewood, NJ 4. Never Let Them Tame You by Naia Izumi, Los Angeles, CA 5. Hanging Hills by Canyon Spree, Berlin, Germany 6. The Scarecrow and the Shadow by Mike Desmond's Dead Horse, New Orleans, LA nocontractpodcast@gmail.com

The Cinema Psychos Show
Independence Day: Regurgitation – Movie Review – Episode 13

The Cinema Psychos Show

Play Episode Listen Later Jul 1, 2016 66:24


Happy Birthday America!  In the spirit of the Fourth of July weekend, we are diving head first into the proverbial puke pile that is Independence Day: Resurgence.  Some of the questions we try answer are how can a movie franchise go from having the best movie president (Bill Pulman) to having the absolute worst movie president (Sela Ward).  Also, did the aliens finally renew their subscription to Norton Anti Virus or will pornography laced with computer viruses be the hero for earth once again. We'll find out today!!  Movie News! Star Trek's Anton Yelchin passes away at 27 in freak auto accident. Independence Day: Resurgence (2016) Movie makes zero sense Supposedly peaceful society without war builds big intergalactic weapons of war Where was the resistance sphere alien 20 years ago during the first alien attack? Missing memorable characters ID4's major draw was an ensemble cast of memorable characters.  Resurgence features majority of the characters phoning in performances for 2 hours. Vivica A. Fox was literally brought back to die. CGI Overload CGI is reminiscent of the Sci Fi Channel Original Movies produced by The Asylum. ID4 had a slow burn approach to the effects, no alien explosions until 40 mins in.  Resurgence kicks it off right off the bat and leaves the audience feeling nothing. Worst Movie President.....EVER!! Sela Ward quite literally is the dumbest president ever. She ignores the advice from the one guy who destroyed the aliens the first time around and shoots a peaceful alien ship. Delays investigating the crashed ship instead to celebrate the 20 year anniversary of the first alien attack. No monument to Russell Case (Randy Quaid) Seriously, WHAT THE FUCK!?! Ending is terrible Major explosion of the alien queen's ship is cut out.  We get a shot of Jeff Goldblum instead.....Seriously, Fuck you Roland Emmerich.  You had one job and that was to show explosions and you can't even do that right. President Whitmore (Bill Pullman) sacrifices himself for nothing as the queen survives the explosion of her ship. Ending promises the movie that we should have had.  Why couldn't Independence Day: Resurgence be about taking the fight to the alien homeworld?  Would have been much more interesting than this pile of garbage. Subscribe / Rate / Review Subscribe today to never miss an episode.  If you like the show or want to leave a comment, please feel free to give us a quick review.  We are always looking to improve and add more to the show and your input is definitely appreciated.  Also, join our monthly newsletter to get exclusive content and previews of upcoming episodes. Calling all Indie filmmakers!  We Want Your Movies! As indie filmmakers, we can appreciate the value of a review of your work.  Film festivals, distribution companies, sales agents, etc. all look at reviews and press that a film can get when considering picking up a film.  If you are interested in submitting your indie film for review, contact us at the links below with a digital screener of your movie and we will do what we can to feature it on a future episode of The Cinema Psychos Show. Connect with us! Twitter @PsychosShow Facebook-PsychosShow Website-cinemapsychosshow.com Instagram-cinemapsychosshow Email- cinemapsychosshow@gmail.com Brian Cottington-@BrianCottington Elaine Wooliscroft-@La_Croft The post Independence Day: Regurgitation – Movie Review – Episode 13 appeared first on The Cinema Psychos Show.

Curmudgeon's Corner
2015-06-25: Trying to Draw the Line

Curmudgeon's Corner

Play Episode Listen Later Jun 26, 2015 104:30


Star Trek Monthly Monday
Episode 277 - Star Trek Monthly Monday 43 1701-D

Star Trek Monthly Monday

Play Episode Listen Later Aug 13, 2012 66:30


It's a short, sweet, and to the point episode as the Freaks examine two more episodes of Star Trek: The Next Generation, THE DAUPHIN and CONTAGION! In what seems to be a WORLD TURNED UPSIDE-DOWN, Scott actually LIKES a Wesley Crusher episode! Then - find out what happens when the Enterprise neglects to install NORTON ANTI-VIRUS on the ship's computer!Feedback for this show can be sent to: startrek@twotruefreaks.comTwo True Freaks! is a proud member of BOTH the Comics Podcast Network (http://www.comicspodcasts.com/) and the League of Comic Book Podcasts (http://www.comicbooknoise.com/league/)!! Follow the fun on Facebook at https://www.facebook.com/groups/113051642052970/ THANK YOU for listening to Two True Freaks!!

Star Trek Monthly Monday
Episode 277 - Star Trek Monthly Monday 43 1701-D

Star Trek Monthly Monday

Play Episode Listen Later Aug 13, 2012 66:30


It's a short, sweet, and to the point episode as the Freaks examine two more episodes of Star Trek: The Next Generation, THE DAUPHIN and CONTAGION! In what seems to be a WORLD TURNED UPSIDE-DOWN, Scott actually LIKES a Wesley Crusher episode! Then - find out what happens when the Enterprise neglects to install NORTON ANTI-VIRUS on the ship's computer!Feedback for this show can be sent to: startrek@twotruefreaks.comTwo True Freaks! is a proud member of BOTH the Comics Podcast Network (http://www.comicspodcasts.com/) and the League of Comic Book Podcasts (http://www.comicbooknoise.com/league/)!! Follow the fun on Facebook at https://www.facebook.com/groups/113051642052970/ THANK YOU for listening to Two True Freaks!!

Two True Freaks! 2
Episode 277 - Star Trek Monthly Monday 43 1701-D

Two True Freaks! 2

Play Episode Listen Later Aug 13, 2012 66:30


It's a short, sweet, and to the point episode as the Freaks examine two more episodes of Star Trek: The Next Generation, THE DAUPHIN and CONTAGION! In what seems to be a WORLD TURNED UPSIDE-DOWN, Scott actually LIKES a Wesley Crusher episode! Then - find out what happens when the Enterprise neglects to install NORTON ANTI-VIRUS on the ship's computer!Feedback for this show can be sent to: startrek@twotruefreaks.comTwo True Freaks! is a proud member of BOTH the Comics Podcast Network (http://www.comicspodcasts.com/) and the League of Comic Book Podcasts (http://www.comicbooknoise.com/league/)!! Follow the fun on Facebook at https://www.facebook.com/groups/113051642052970/ THANK YOU for listening to Two True Freaks!!

Two True Freaks! 2
Episode 277 - Star Trek Monthly Monday 43 1701-D

Two True Freaks! 2

Play Episode Listen Later Aug 13, 2012 66:30


It's a short, sweet, and to the point episode as the Freaks examine two more episodes of Star Trek: The Next Generation, THE DAUPHIN and CONTAGION! In what seems to be a WORLD TURNED UPSIDE-DOWN, Scott actually LIKES a Wesley Crusher episode! Then - find out what happens when the Enterprise neglects to install NORTON ANTI-VIRUS on the ship's computer!Feedback for this show can be sent to: startrek@twotruefreaks.comTwo True Freaks! is a proud member of BOTH the Comics Podcast Network (http://www.comicspodcasts.com/) and the League of Comic Book Podcasts (http://www.comicbooknoise.com/league/)!! Follow the fun on Facebook at https://www.facebook.com/groups/113051642052970/ THANK YOU for listening to Two True Freaks!!

Symantec: A Connected Social Media Showcase
Norton Consumer Product Launch: An Interview with Rowan Trollope

Symantec: A Connected Social Media Showcase

Play Episode Listen Later Sep 9, 2008


Senior Vice President of the Consumer Product Group, Rowan Trollope, provides an overview of the 2009 versions of Norton Internet Security and Norton AntiVirus. In addition, Trollope dicusses the emphasis on performance, security and quality in the development of the products and how users helped to drive product improvements. For more information, visit: www.norton.com/faster [...]