Podcasts about Petya

  • 133PODCASTS
  • 185EPISODES
  • 42mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Apr 19, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Petya

Latest podcast episodes about Petya

The Bitcoin Cash Podcast
#147: BCHata & Endless Inflation feat. Alex & Petya

The Bitcoin Cash Podcast

Play Episode Listen Later Apr 19, 2025 113:10


Alex and Petya, our BLISS bachata dance teachers, talk about dancing, BCH, the pressure of cost of living, and many other topics. Enjoy the chat and please share your thoughts in the comments section. Links:Petya on Instagram: https://www.instagram.com/petya.nova.dance/Selene wallet: https://selene.cash/BCH BLISS 2025: https://bliss.cash/2025BLISS 2025 Velma NFT on Tapswap: https://tapswap.cash/trade/5a4f6b25243c1a2dabb2434e3d9e574f65c31764ce0e7eb4127a46fa74657691Episode slides: https://docs.google.com/presentation/d/1oc8SKML62yUg7xVto5XfQy_A0q00k1oy/edit?usp=sharing&ouid=100290143879929950045Donations:bitcoincash:qp9vvvj6696652v4mgewp4aasl4mtugp2c7lszu0deSponsors:Thank you very much to our FundMe.Cash contributors. New FundMe campaign is LIVE: https://fundme.cash/campaign/25General Protocols: https://generalprotocols.com and https://bchbull.com Socials:Website: https://www.bitcoincashpodcast.comTimestamps:00:00 Podcast starts00:38 Intro & market update01:25 Alex & Petya08:29 Bachata39:46 Why is bachata the best dance style?47:42 BLISS 2025 / BCHata lessons!57:00 Economic uncertainty1:04:15 Debanking underway1:19:11 Community comment of the week1:26:22 Other news1:30:55 Meme of the week1:31:36 Message to the community1:36:02 Ramping up BCH adoption1:46:54 Podcast supporter appreciation1:47:50 Final shoutouts1:49:52 Outro song: Insomnio#bitcoin #bitcoincash #bch #btc #crypto #cryptocurrency #cbdc ▪️

War & Peace Podnotes, A Study Guide
Bk. 1, Pt. 3, Ch. 6: A Mother's Love

War & Peace Podnotes, A Study Guide

Play Episode Listen Later Mar 10, 2025 9:50


Though always in their hearts, it had been months since the Rostovs received news of Nicholas. When Count Ilya finally received a letter from his son, he ran his study with it. Anna Drubetskaya, Boris' mother, was living with the family and aimed to be useful. She found Ilya sobbing and laughing. His darling boy suffered a small wound but was promoted. He found this reason to thank God. Still, he wonders how to tell his wife of the injury. Anna therefore took the rest of the day preparing the Countess. Young Natasha convinced Anna to reveal the nature of the letter and promised to keep it secret. She broke her word right away, telling Sonya (who is devoted to Nicholas) as well as her little brother, Petya. Sonya cried and Natasha comforted her -- noting it was just “a little wound.” Petya takes the missive with resolve and adds how he would have “killed many Frenchmen.” Natasha asks Sonya, “Do you remember Nicholas?” She means in the sense of holding the same feelings. Sonya reveals, “I am in love with your brother and whatever may happen, shall never cease to love him.” Natasha no longer feels the same about Boris.  Her childlike love has faded. Natasha knew there was such love as Sonya was describing, but never experienced it. They discuss whether it would be proper for Sonya to write Nicholas and reference his commitment. Sonya decides that if she is mentioned in the letter, she will write. Natasha does not have any compulsion to write Boris as she feels it would just come out awkward. Pétya reveals Natasha has developed affections for the new Count Bezúkhov as well as her Italian singing coach.  After dinner, the Countess was in her room focused on a portrait of Nicholas. Anna arrived with the letter while Ilya listened through a keyhole. There was crying, silence, then voices in happy intonation. Anna opened the door and exhibited a proud expression. Anna embraced her husband and in came Véra, Natasha, Sonya and Pétya. All went over the letter. There was a description of the campaign, battles and the promotion. Nicholas sent his love and asked for his parents' blessings. He sent a special greeting to “dear Sónya, whom he loved and thought of just the same as ever.” When Sonya heard this, she blushed, cried and ran to the dancing hall, where she whirled around at full speed.The practical Vera asked, “Why are you crying, Mamma? One should be glad and not cry.” This was true but not wise to express. She was reproached by the family while her mother thought, “and who is it she takes after?”The letter was read over among tutors, nurses and servants. Each time the Countess did so with fresh pleasure.  She contemplated how incredible it was that her son, once a scarcely perceptible motion under her heart, who had learned to say little words, was now away in a foreign land doing warrior's work as a model officer. It was the universal experience - showing how children imperceptibly grow from the cradle to manhood. Yet it does not exist for a mother. Her boy's growth, at each stage, seemed as extraordinary to her as if it never existed in others. She thought, “What style! and “what a heart and soul!” She noticed how Nicholas barely wrote of his exploits and sufferings, but mentions Denísov and others.A bountiful response would come from the family, as a new officer needs supplies which are NOT paid for by the army. Preparations were being made, along drafts of letters.  6,000 rubles was collected. There was a question of how to reach Nicholas as he was on the move and the postal system was notoriously ill-managed.Anna would prove her worth yet again in conveying the material. She had curried favor with authorities (couriers for Grand Duke Constantine Pávlovich, a historic figure and elder brother of Alexander I) to secure a means of communication to reach Boris, who would convey any package to Nicholas. 

Karizma Podcast
WOW #40. „Minden siker előtt ott van a pofonokkal teli kudarc” – Balogh Petya befektető szerint nincs olyan, hogy csak simit kapunk az élettől

Karizma Podcast

Play Episode Listen Later Feb 12, 2025 12:32


Balogh Petya befektető szerint önbizalom nélkül nem lehet sikert elérni. Nem a tervben, hanem önmagunkban érdemes hinni. A célhoz vezető úton pedig elengedhetetlen a rugalmasság, vagyis el kell elengedni, ami nem működik. A teljes beszélgetést itt éred el:https://karizma.hu/podcast/balogh-petya-23-fajo-igazsag/

New Books Network
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books Network

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

New Books in East Asian Studies
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books in East Asian Studies

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/east-asian-studies

New Books in Central Asian Studies
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books in Central Asian Studies

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/central-asian-studies

New Books in Ancient History
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books in Ancient History

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices

New Books in Art
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books in Art

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/art

New Books in Animal Studies
Petya Andreeva, "Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE" (Edinburgh UP, 2024)

New Books in Animal Studies

Play Episode Listen Later Jan 25, 2025 80:54


Across Iron Age Central Eurasia, non-sedentary people created, viewed, and considered animal-style imagery, creating designs replete with feline bodies with horse hooves, deer-birds, animals in combat, and other fantastic creatures. Fantastic Fauna from China to Crimea: Image-Making in Eurasian Nomadic Societies, 700 BCE-500 CE (Edinburgh University Press, 2023) focuses on this animal-style imagery, examining the dissemination of this image system.  Filled with fascinating images carefully chosen from an enormous geographical scope, Petya Andreeva's vivid book explores how communities used animal-style design to create and define status, to bond alliances together, and to showcase steppe know-how and worldliness in sedentary communities. Fantastic Fauna should appeal to those in Eurasian history, East Asian history, art and archeology, and those interested in thinking about steppe art.  Interested listeners should also check out Petya's chapter on the Golden Hoard (available here), part of an Open-Access UNESCO volume on the Silk Roads.    Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/animal-studies

TẠP CHÍ VIỆT NAM
Việt Nam có sẵn sàng mua thiết bị quân sự hạng nặng của Pháp ?

TẠP CHÍ VIỆT NAM

Play Episode Listen Later Dec 9, 2024 10:49


Lần thứ hai liên tiếp, Pháp tham gia Triển lãm Quốc phòng quốc tế Việt Nam (từ 19-22/12/2024). Trong chuyến thăm Paris tháng 10/2024 của tổng bí thư Tô Lâm, kiêm chủ tịch nước lúc đó, Việt Nam và Pháp đã nâng quan hệ lên cấp cao nhất Đối tác chiến lược toàn diện và nhất trí "tăng cường hợp tác quốc phòng và an ninh". Để đạt được mục đích này, "hai bên quyết định tạo động lực mới cho hợp tác trong lĩnh vực công nghiệp quốc phòng" với "các dự án mang tính cơ cấu". Có thể thấy mối quan hệ song phương trong lĩnh vực quốc phòng, được thiết lập từ thập niên 1990, không ngừng được củng cố. Hiện tại, Pháp - nước thứ 8 trên thế giới và là thành viên đầu tiên trong Liên Hiệp Châu Âu có mối quan hệ Đối tác chiến lược toàn diện với Việt Nam - tỏ thiện chí cung cấp cho Hà Nội trang thiết bị quốc phòng tân tiến, nhưng liệu Hà Nội đã sẵn sàng chưa ? Việt Nam và Pháp có thể tính đến những dự án có quy mô lớn hơn không ? Nhà nghiên cứu Laurent Gédéon, giảng viên Trường Sư phạm Lyon, Pháp trả lời phỏng vấn RFI Tiếng Việt.RFI : Ngày 07/10, trong chuyến công du Paris, tổng bí thư, chủ tịch nước Việt Nam Tô Lâm và tổng thống Pháp Emmanuel Macron thông báo thiết lập quan hệ đối tác chiến lược toàn diện Pháp-Việt Nam. Tuyên bố chung nhấn mạnh đến ngành công nghiệp quốc phòng. Vậy đâu là cơ hội cho cả hai nước ?Laurent Gédéon : Cơ hội có nhiều. Trước tiên tôi xin nhắc lại rằng Việt Nam hiện dành 8 tỷ đô la cho ngân sách quốc phòng, tương đương với 2% GDP của đất nước. Hà Nội có ý định tăng ngân sách quốc phòng hàng năm lên trung bình 5,5% để đạt đến 10,2 tỷ đô la vào năm 2029. Có thể thấy nỗ lực đó rất lớn và Việt Nam tự tạo phương tiện để tăng cường khả năng phòng thủ.Nhưng hiện giờ, chúng ta thấy các nhà cung cấp quân sự chính cho Việt Nam vẫn là Nga, Mỹ và trong chừng mực nào đó là Israel. Việt Nam cũng sản xuất một số vũ khí và trang thiết bị quân sự (chủ yếu do Viettel sản xuất, trong đó có một số thiết bị được cấp phép). Ngoài ra, quân đội Việt Nam vẫn được trang bị một phần thiết bị của Liên Xô có từ thập niên 1970 và 1980. Đọc thêm : Pháp khó “chen chân” vào thị trường vũ khí Việt NamTrên thực tế, chúng ta thấy rằng Pháp gần như không bán vũ khí cho Việt Nam nếu loại trừ một số máy bay trực thăng Puma và radar giám sát ven biển do Thales sản xuất (loại SCORE 3000 và Coast Watcher 100) hiện được Hải quân Việt Nam sử dụng. Dường như cũng không có bất kỳ thiết bị nào có nguồn gốc từ Pháp trong bộ binh Việt Nam và không quân cũng không có máy bay Pháp. Do đó, có thể có những cơ hội hấp dẫn cho ngành công nghiệp quân sự về mặt hợp tác và trao đổi công nghệ.Nhưng phải nhắc đến vấn đề các mối ưu tiên. Rõ ràng là trong bối cảnh địa-chiến lược của Việt Nam, Hà Nội tập trung chú ý vào không gian biển, dù là bảo vệ khu vực ven biển hay các đảo, đặc biệt là quần đảo Trường Sa, nơi quân đội Việt Nam hiện diện. Do đó, có thể giả định rằng việc hợp tác và mua sắm thiết bị quân sự sẽ chủ yếu tập trung vào các thiết bị đáp ứng các yêu cầu trong khuôn khổ chiến lược đó. Về điểm này, một số công ty Pháp có thể đáp ứng được kỳ vọng của Việt Nam, đặc biệt là Thales, Safran và Airbus.​​Nếu lấy ví dụ trường hợp Thales - tập đoàn rất chú ý vào xuất khẩu, người ta thấy rằng doanh nghiệp này cung cấp giải pháp trong ba lĩnh vực mà Hà Nội quan tâm : giám sát trên không và trên biển, tác chiến chống tàu ngầm và drone.Trong trường hợp giám sát trên không và trên biển, Thales có nhiều loại radar có thể rất phù hợp với nhu cầu của quân đội Việt Nam, bởi vì việc giám sát không phận và dự đoán các hành động của đối phương mang lại một lợi thế nhất định cho Việt Nam. Các mẫu được cung cấp, dù là radar tầm xa như GM 400α (Ground Master 400α), radar tầm trung như GM 200, hệ thống giám sát quang học như Artemis, hoặc hệ thống pháo chống drone trên biển và trên không (loại RapidFire), có thể được quân đội Việt Nam quan tâm. Đọc thêm : Tàu ngầm lớp Kilo của Việt Nam và tương quan hải quân trong khu vực Trong lĩnh vực tác chiến chống tàu ngầm cũng vậy. Đây là lĩnh vực rất nhạy cảm, đã được Việt Nam xác định thông qua việc mua 6 tàu ngầm lớp Kilo của Nga vào những năm 2010. Việc mua tàu ngầm đã giúp Hà Nội tái lập cân bằng với quân đội Trung Quốc cũng được trang bị tàu ngầm. Đây lại cũng là lĩnh vực mà công ty Pháp có thể đáp ứng qua việc cung cấp các thiết bị chuyên dụng, như máy đo sóng âm và phao thủy âm, và rộng hơn là các hệ thống công nghệ cao dành riêng cho giám sát điện tử.Ngoài ra, còn có những cơ hội hợp tác liên quan đến drone, nhất là những loại drone có sức bền dành cho hoạt động tình báo và giám sát hàng hải như Watch Keeper của Thales và cả Patroller của Safran.Như chúng ta thấy, cơ hội phát triển liên kết trong lĩnh vực công nghiệp quân sự là không thiếu. Tuy nhiên các đối tác Pháp phải tính đến những nhu cầu và hạn chế cụ thể của Việt Nam. Đây cũng là một quyết định mang tính chính trị rõ ràng, nếu xét đến những hậu quả có thể xảy ra với Trung Quốc.RFI : Như ông đề cập một chút ở trên, khả năng bán tàu hộ vệ và drone Patroller cho Việt Nam cũng được một số chuyên gia nêu lên sau chuyến thăm Paris của tổng bí thư Tô Lâm. Liệu điều này có thể thực hiện được không nếu nhìn vào bối cảnh trong vùng hiện nay, cũng như mối quan hệ song phương Pháp-Việt ?Laurent Gédéon : Tôi đã đề cập đến drone Patroller, nhưng đúng, vấn đề tàu hộ vệ cũng rất đáng quan tâm bởi vì đây là một trường hợp mang đầy tính biểu tượng. Chúng ta biết hiện giờ Việt Nam có hai loại tàu hộ vệ, có nguồn gốc Liên Xô và Nga. Loại gần đây nhất có nguồn gốc từ Nga là tàu hộ vệ loại Gepard 3.9. Đây là những con tàu được thiết kế để tìm kiếm và chiến đấu với kẻ thù trên mặt nước, dưới nước và trên không. Nhiệm vụ chung của chúng là giám sát và bảo vệ lãnh hải và vùng đặc quyền kinh tế của Việt Nam.Xin nhắc lại, vào tháng 03 và tháng 08/2011, Hải quân Việt Nam đã tiếp nhận 2 tàu hộ vệ Gepard 3.9 (đặt mua năm 2006, đóng tại Nga). Cuối năm 2011, Việt Nam ký hợp đồng đóng thêm hai tàu chuyên chống tàu ngầm. Hai tàu khác cũng được lên kế hoạch, nâng tổng số đơn đặt hàng lên thành 6tàu. Tuy nhiên, hai tàu cuối này hiện bị trì hoãn do các lệnh trừng phạt Nga do cuộc xung đột Ukraina. Ngoài tàu hộ tống Gepard 3.9, Việt Nam còn có 5 tàu hộ tống lớp Petya. Đây là những chiến hạm cũ, được đóng từ thời Liên Xô, có vai trò tác chiến chống tầu ngầm ở vùng nước nông. Đọc thêm : Biển Đông: Vụ tàu hộ vệ Quang Trung ở Bãi Tư Chính chỉ là kế nghi binh?Pháp có kinh nghiệm không thể phủ nhận được trong lĩnh vực thiết kế và sản xuất tàu khu trục nhỏ, bằng chứng là những tàu trong biên chế của Hải quân Pháp. Chúng được chia thành hai loại, tàu khu trục hạng nhất (lớp Horizon và Aquitaine) và tàu khu trục hạng hai (lớp Floréal và Lafayette). Hai loại này có chức năng khác và giá cũng khác nhau.Nhiệm vụ chính của tàu khu trục hạng nhất là tham gia phòng không cho đội tàu tác chiến, hoặc bảo vệ một khu vực hoặc một đoàn tàu khỏi các cuộc không kích hoặc tấn công bằng tên lửa. Tàu khu trục hạng hai là tàu giám sát, chủ yếu là tham gia tác chiến chống tàu.Cũng cần lưu ý rằng các tàu khu trục hàng hai sắp không còn được sử dụng, thay vào đó là một mẫu tàu tàng hình mới, được gọi là tàu khu trục phòng thủ và can thiệp (hoặc khinh hạm cỡ trung bình). Loại tàu này sẽ do tập đoàn Naval Group chế tạo.RFI : Giả sử Việt Nam có ý định mua tàu khu trục Pháp, đâu sẽ là trở ngại chính ?  Laurent Gédéon : Đặt giả thuyết Việt Nam mua một tàu khu trục, vấn đề đặt ra sẽ là Việt Nam muốn đầu tư ngân sách bao nhiêu, bởi vì giá tàu khu trục hạng hai đời mới của Pháp chuyên phòng thủ và can thiệp có giá dao động từ 760 đến 800 triệu euro, còn tàu hạng nhất dao động trong khoảng 800 đến 950 triệu euro. Đó là số tiền rất lớn và sẽ được đem so sánh với tàu hộ tống Gepard 3.9 của Nga, có giá khoảng 350 triệu euro.Thêm vào đó là chi phí bảo dưỡng và chi phí cho thủy thủ đoàn, tổng chi phí dao động từ 500 đến khoảng 700 triệu euro trong 30 năm. Do đó, đây là một khoản đầu tư đáng kể khi biết rằng ngân sách quân sự của Việt Nam hiện vào khoảng 8 tỷ đô la và sẽ đạt 10 tỷ đô la vào năm 2029.Để khoản đầu tư được xứng đáng, những tàu khu trục này sẽ phải mang lại giá trị thặng dư chắc chắn về mặt chiến lược và đáp ứng những nhu cầu về khả năng mà các tàu Gepard 3.9 hiện tại không thể hoặc không còn đáp ứng được. Về vấn đề này, chúng ta vẫn chưa có câu trả lời để đánh giá xem liệu Việt Nam có quan tâm đến một thỏa thuận mua bán đắt đỏ như vậy với Pháp hay không. Đọc thêm : Pháp bán vũ khí cho Đài Loan: Paris bác bỏ phản đối của Bắc KinhNgoài ra, tàu khu trục vẫn là một vấn đề nhạy cảm đối với Pháp, cả về mặt địa-chính trị và biểu tượng trong khu vực, bởi vì người ta chưa quên những căng thẳng gay gắt nảy sinh giữa Paris và Bắc Kinh sau thương vụ bán sáu tàu khu trục lớp Lafayette cho Đài Loan vào năm 1991. Dĩ nhiên trường hợp của Việt Nam khác với Đài Loan. Nhưng trong bối cảnh và mối quan hệ hiện vẫn tế nhị giữa Hà Nội và Bắc Kinh, việc Pháp bán tàu khu trục cho Việt Nam có thể sẽ gợi lại cho Trung Quốc những kỉ niệm không tốt đẹp cho lắm và có thể sẽ khiến Bắc Kinh phản ứng về vấn đề này.RFI : Người ta cũng nhắc đến việc Paris nhấn mạnh đến hợp tác hàng hải, với việc tàu Pháp tăng số lần ghé thăm cảng Việt Nam trong những năm gần đây. Liệu đây có phải là một mảng hợp tác, trao đổi chuyên môn để hỗ trợ Hải quân và Cảnh sát biển Việt Nam trong tương lai không ?Laurent Gédéon : Cần phải nhớ rằng trong bối cảnh địa chính trị khu vực, được đánh dấu bằng sự cạnh tranh Trung-Việt đối với các quần đảo ở Biển Đông, câu hỏi được đặt ra đối với bất kỳ hoạt động bán vũ khí nào cho Việt Nam hoặc bất kỳ sáng kiến ​​quân sự nào của Pháp, hoặc từ bên ngoài, đó là Bắc Kinh có thể diễn giải việc đó theo cách nào. Bất kỳ chuyến hải hành nào của Hải quân Pháp qua Biển Đông đều khiến Trung Quốc có phản ứng ít nhiều tiêu cực và kịch liệt, tùy theo hoàn cảnh. Chắc chắn các nhà lãnh đạo chính trị và quân sự của cả Pháp và Việt Nam đều chú ý đến điều này. Đọc thêm : Lần đầu tiên, Pháp và Philippines cùng diễn tập không quân ở Ấn Độ-Thái Bình DươngTuy nhiên, tàu chiến Pháp vẫn thường xuyên tổ chức hoạt động lưu thông trong khuôn khổ chiến dịch FONOP nhằm khẳng định sự tôn trọng luật hàng hải quốc tế và thách thức các yêu sách lãnh thổ bị coi là quá đáng của Trung Quốc. Chúng ta nhớ lại rằng vào năm 2021, tàu khu trục Vendémiaire của Pháp đã tuần tra gần quần đảo Trường Sa ; năm 2022, Pháp cũng tham gia cuộc tập trận hải quân đa phương La Pérouse, phối hợp với Mỹ, Úc, Nhật Bản và Ấn Độ ở Ấn Độ Dương và Biển Đông ; và vào tháng 04/2024, lần đầu tiên Pháp tham gia cuộc tập trận Balitakan của Philippines.Do đó, sự hiện diện của Pháp trong khu vực không hề mang tính trung lập và bản thân việc các tàu Pháp cập cảng Việt Nam đã thể hiện một hành động chính trị. Cho nên có thể coi tần suất thăm cảng có tăng hay không còn phụ thuộc vào những cân nhắc ngoại giao về yếu tố Trung Quốc.Tóm lại, để trả lời câu hỏi trên, thì đúng, việc tàu Pháp tăng cường ghé thăm cảng Việt Nam sẽ thể hiện niềm tin song phương ngày càng cao và có thể dẫn đến hợp tác và trao đổi chuyên môn nhằm phát triển năng lực và kinh nghiệm của Hải quân, và đặc biệt là của Cảnh sát biển Việt Nam.RFI Tiếng Việt xin chân thành cảm ơn nhà nghiên cứu Laurent Gédéon, giảng viên Trường Sư phạm Lyon, Pháp.

Tạp chí Việt Nam
Việt Nam có sẵn sàng mua thiết bị quân sự hạng nặng của Pháp ?

Tạp chí Việt Nam

Play Episode Listen Later Dec 9, 2024 10:49


Lần thứ hai liên tiếp, Pháp tham gia Triển lãm Quốc phòng quốc tế Việt Nam (từ 19-22/12/2024). Trong chuyến thăm Paris tháng 10/2024 của tổng bí thư Tô Lâm, kiêm chủ tịch nước lúc đó, Việt Nam và Pháp đã nâng quan hệ lên cấp cao nhất Đối tác chiến lược toàn diện và nhất trí "tăng cường hợp tác quốc phòng và an ninh". Để đạt được mục đích này, "hai bên quyết định tạo động lực mới cho hợp tác trong lĩnh vực công nghiệp quốc phòng" với "các dự án mang tính cơ cấu". Có thể thấy mối quan hệ song phương trong lĩnh vực quốc phòng, được thiết lập từ thập niên 1990, không ngừng được củng cố. Hiện tại, Pháp - nước thứ 8 trên thế giới và là thành viên đầu tiên trong Liên Hiệp Châu Âu có mối quan hệ Đối tác chiến lược toàn diện với Việt Nam - tỏ thiện chí cung cấp cho Hà Nội trang thiết bị quốc phòng tân tiến, nhưng liệu Hà Nội đã sẵn sàng chưa ? Việt Nam và Pháp có thể tính đến những dự án có quy mô lớn hơn không ? Nhà nghiên cứu Laurent Gédéon, giảng viên Trường Sư phạm Lyon, Pháp trả lời phỏng vấn RFI Tiếng Việt.RFI : Ngày 07/10, trong chuyến công du Paris, tổng bí thư, chủ tịch nước Việt Nam Tô Lâm và tổng thống Pháp Emmanuel Macron thông báo thiết lập quan hệ đối tác chiến lược toàn diện Pháp-Việt Nam. Tuyên bố chung nhấn mạnh đến ngành công nghiệp quốc phòng. Vậy đâu là cơ hội cho cả hai nước ?Laurent Gédéon : Cơ hội có nhiều. Trước tiên tôi xin nhắc lại rằng Việt Nam hiện dành 8 tỷ đô la cho ngân sách quốc phòng, tương đương với 2% GDP của đất nước. Hà Nội có ý định tăng ngân sách quốc phòng hàng năm lên trung bình 5,5% để đạt đến 10,2 tỷ đô la vào năm 2029. Có thể thấy nỗ lực đó rất lớn và Việt Nam tự tạo phương tiện để tăng cường khả năng phòng thủ.Nhưng hiện giờ, chúng ta thấy các nhà cung cấp quân sự chính cho Việt Nam vẫn là Nga, Mỹ và trong chừng mực nào đó là Israel. Việt Nam cũng sản xuất một số vũ khí và trang thiết bị quân sự (chủ yếu do Viettel sản xuất, trong đó có một số thiết bị được cấp phép). Ngoài ra, quân đội Việt Nam vẫn được trang bị một phần thiết bị của Liên Xô có từ thập niên 1970 và 1980. Đọc thêm : Pháp khó “chen chân” vào thị trường vũ khí Việt NamTrên thực tế, chúng ta thấy rằng Pháp gần như không bán vũ khí cho Việt Nam nếu loại trừ một số máy bay trực thăng Puma và radar giám sát ven biển do Thales sản xuất (loại SCORE 3000 và Coast Watcher 100) hiện được Hải quân Việt Nam sử dụng. Dường như cũng không có bất kỳ thiết bị nào có nguồn gốc từ Pháp trong bộ binh Việt Nam và không quân cũng không có máy bay Pháp. Do đó, có thể có những cơ hội hấp dẫn cho ngành công nghiệp quân sự về mặt hợp tác và trao đổi công nghệ.Nhưng phải nhắc đến vấn đề các mối ưu tiên. Rõ ràng là trong bối cảnh địa-chiến lược của Việt Nam, Hà Nội tập trung chú ý vào không gian biển, dù là bảo vệ khu vực ven biển hay các đảo, đặc biệt là quần đảo Trường Sa, nơi quân đội Việt Nam hiện diện. Do đó, có thể giả định rằng việc hợp tác và mua sắm thiết bị quân sự sẽ chủ yếu tập trung vào các thiết bị đáp ứng các yêu cầu trong khuôn khổ chiến lược đó. Về điểm này, một số công ty Pháp có thể đáp ứng được kỳ vọng của Việt Nam, đặc biệt là Thales, Safran và Airbus.​​Nếu lấy ví dụ trường hợp Thales - tập đoàn rất chú ý vào xuất khẩu, người ta thấy rằng doanh nghiệp này cung cấp giải pháp trong ba lĩnh vực mà Hà Nội quan tâm : giám sát trên không và trên biển, tác chiến chống tàu ngầm và drone.Trong trường hợp giám sát trên không và trên biển, Thales có nhiều loại radar có thể rất phù hợp với nhu cầu của quân đội Việt Nam, bởi vì việc giám sát không phận và dự đoán các hành động của đối phương mang lại một lợi thế nhất định cho Việt Nam. Các mẫu được cung cấp, dù là radar tầm xa như GM 400α (Ground Master 400α), radar tầm trung như GM 200, hệ thống giám sát quang học như Artemis, hoặc hệ thống pháo chống drone trên biển và trên không (loại RapidFire), có thể được quân đội Việt Nam quan tâm. Đọc thêm : Tàu ngầm lớp Kilo của Việt Nam và tương quan hải quân trong khu vực Trong lĩnh vực tác chiến chống tàu ngầm cũng vậy. Đây là lĩnh vực rất nhạy cảm, đã được Việt Nam xác định thông qua việc mua 6 tàu ngầm lớp Kilo của Nga vào những năm 2010. Việc mua tàu ngầm đã giúp Hà Nội tái lập cân bằng với quân đội Trung Quốc cũng được trang bị tàu ngầm. Đây lại cũng là lĩnh vực mà công ty Pháp có thể đáp ứng qua việc cung cấp các thiết bị chuyên dụng, như máy đo sóng âm và phao thủy âm, và rộng hơn là các hệ thống công nghệ cao dành riêng cho giám sát điện tử.Ngoài ra, còn có những cơ hội hợp tác liên quan đến drone, nhất là những loại drone có sức bền dành cho hoạt động tình báo và giám sát hàng hải như Watch Keeper của Thales và cả Patroller của Safran.Như chúng ta thấy, cơ hội phát triển liên kết trong lĩnh vực công nghiệp quân sự là không thiếu. Tuy nhiên các đối tác Pháp phải tính đến những nhu cầu và hạn chế cụ thể của Việt Nam. Đây cũng là một quyết định mang tính chính trị rõ ràng, nếu xét đến những hậu quả có thể xảy ra với Trung Quốc.RFI : Như ông đề cập một chút ở trên, khả năng bán tàu hộ vệ và drone Patroller cho Việt Nam cũng được một số chuyên gia nêu lên sau chuyến thăm Paris của tổng bí thư Tô Lâm. Liệu điều này có thể thực hiện được không nếu nhìn vào bối cảnh trong vùng hiện nay, cũng như mối quan hệ song phương Pháp-Việt ?Laurent Gédéon : Tôi đã đề cập đến drone Patroller, nhưng đúng, vấn đề tàu hộ vệ cũng rất đáng quan tâm bởi vì đây là một trường hợp mang đầy tính biểu tượng. Chúng ta biết hiện giờ Việt Nam có hai loại tàu hộ vệ, có nguồn gốc Liên Xô và Nga. Loại gần đây nhất có nguồn gốc từ Nga là tàu hộ vệ loại Gepard 3.9. Đây là những con tàu được thiết kế để tìm kiếm và chiến đấu với kẻ thù trên mặt nước, dưới nước và trên không. Nhiệm vụ chung của chúng là giám sát và bảo vệ lãnh hải và vùng đặc quyền kinh tế của Việt Nam.Xin nhắc lại, vào tháng 03 và tháng 08/2011, Hải quân Việt Nam đã tiếp nhận 2 tàu hộ vệ Gepard 3.9 (đặt mua năm 2006, đóng tại Nga). Cuối năm 2011, Việt Nam ký hợp đồng đóng thêm hai tàu chuyên chống tàu ngầm. Hai tàu khác cũng được lên kế hoạch, nâng tổng số đơn đặt hàng lên thành 6tàu. Tuy nhiên, hai tàu cuối này hiện bị trì hoãn do các lệnh trừng phạt Nga do cuộc xung đột Ukraina. Ngoài tàu hộ tống Gepard 3.9, Việt Nam còn có 5 tàu hộ tống lớp Petya. Đây là những chiến hạm cũ, được đóng từ thời Liên Xô, có vai trò tác chiến chống tầu ngầm ở vùng nước nông. Đọc thêm : Biển Đông: Vụ tàu hộ vệ Quang Trung ở Bãi Tư Chính chỉ là kế nghi binh?Pháp có kinh nghiệm không thể phủ nhận được trong lĩnh vực thiết kế và sản xuất tàu khu trục nhỏ, bằng chứng là những tàu trong biên chế của Hải quân Pháp. Chúng được chia thành hai loại, tàu khu trục hạng nhất (lớp Horizon và Aquitaine) và tàu khu trục hạng hai (lớp Floréal và Lafayette). Hai loại này có chức năng khác và giá cũng khác nhau.Nhiệm vụ chính của tàu khu trục hạng nhất là tham gia phòng không cho đội tàu tác chiến, hoặc bảo vệ một khu vực hoặc một đoàn tàu khỏi các cuộc không kích hoặc tấn công bằng tên lửa. Tàu khu trục hạng hai là tàu giám sát, chủ yếu là tham gia tác chiến chống tàu.Cũng cần lưu ý rằng các tàu khu trục hàng hai sắp không còn được sử dụng, thay vào đó là một mẫu tàu tàng hình mới, được gọi là tàu khu trục phòng thủ và can thiệp (hoặc khinh hạm cỡ trung bình). Loại tàu này sẽ do tập đoàn Naval Group chế tạo.RFI : Giả sử Việt Nam có ý định mua tàu khu trục Pháp, đâu sẽ là trở ngại chính ?  Laurent Gédéon : Đặt giả thuyết Việt Nam mua một tàu khu trục, vấn đề đặt ra sẽ là Việt Nam muốn đầu tư ngân sách bao nhiêu, bởi vì giá tàu khu trục hạng hai đời mới của Pháp chuyên phòng thủ và can thiệp có giá dao động từ 760 đến 800 triệu euro, còn tàu hạng nhất dao động trong khoảng 800 đến 950 triệu euro. Đó là số tiền rất lớn và sẽ được đem so sánh với tàu hộ tống Gepard 3.9 của Nga, có giá khoảng 350 triệu euro.Thêm vào đó là chi phí bảo dưỡng và chi phí cho thủy thủ đoàn, tổng chi phí dao động từ 500 đến khoảng 700 triệu euro trong 30 năm. Do đó, đây là một khoản đầu tư đáng kể khi biết rằng ngân sách quân sự của Việt Nam hiện vào khoảng 8 tỷ đô la và sẽ đạt 10 tỷ đô la vào năm 2029.Để khoản đầu tư được xứng đáng, những tàu khu trục này sẽ phải mang lại giá trị thặng dư chắc chắn về mặt chiến lược và đáp ứng những nhu cầu về khả năng mà các tàu Gepard 3.9 hiện tại không thể hoặc không còn đáp ứng được. Về vấn đề này, chúng ta vẫn chưa có câu trả lời để đánh giá xem liệu Việt Nam có quan tâm đến một thỏa thuận mua bán đắt đỏ như vậy với Pháp hay không. Đọc thêm : Pháp bán vũ khí cho Đài Loan: Paris bác bỏ phản đối của Bắc KinhNgoài ra, tàu khu trục vẫn là một vấn đề nhạy cảm đối với Pháp, cả về mặt địa-chính trị và biểu tượng trong khu vực, bởi vì người ta chưa quên những căng thẳng gay gắt nảy sinh giữa Paris và Bắc Kinh sau thương vụ bán sáu tàu khu trục lớp Lafayette cho Đài Loan vào năm 1991. Dĩ nhiên trường hợp của Việt Nam khác với Đài Loan. Nhưng trong bối cảnh và mối quan hệ hiện vẫn tế nhị giữa Hà Nội và Bắc Kinh, việc Pháp bán tàu khu trục cho Việt Nam có thể sẽ gợi lại cho Trung Quốc những kỉ niệm không tốt đẹp cho lắm và có thể sẽ khiến Bắc Kinh phản ứng về vấn đề này.RFI : Người ta cũng nhắc đến việc Paris nhấn mạnh đến hợp tác hàng hải, với việc tàu Pháp tăng số lần ghé thăm cảng Việt Nam trong những năm gần đây. Liệu đây có phải là một mảng hợp tác, trao đổi chuyên môn để hỗ trợ Hải quân và Cảnh sát biển Việt Nam trong tương lai không ?Laurent Gédéon : Cần phải nhớ rằng trong bối cảnh địa chính trị khu vực, được đánh dấu bằng sự cạnh tranh Trung-Việt đối với các quần đảo ở Biển Đông, câu hỏi được đặt ra đối với bất kỳ hoạt động bán vũ khí nào cho Việt Nam hoặc bất kỳ sáng kiến ​​quân sự nào của Pháp, hoặc từ bên ngoài, đó là Bắc Kinh có thể diễn giải việc đó theo cách nào. Bất kỳ chuyến hải hành nào của Hải quân Pháp qua Biển Đông đều khiến Trung Quốc có phản ứng ít nhiều tiêu cực và kịch liệt, tùy theo hoàn cảnh. Chắc chắn các nhà lãnh đạo chính trị và quân sự của cả Pháp và Việt Nam đều chú ý đến điều này. Đọc thêm : Lần đầu tiên, Pháp và Philippines cùng diễn tập không quân ở Ấn Độ-Thái Bình DươngTuy nhiên, tàu chiến Pháp vẫn thường xuyên tổ chức hoạt động lưu thông trong khuôn khổ chiến dịch FONOP nhằm khẳng định sự tôn trọng luật hàng hải quốc tế và thách thức các yêu sách lãnh thổ bị coi là quá đáng của Trung Quốc. Chúng ta nhớ lại rằng vào năm 2021, tàu khu trục Vendémiaire của Pháp đã tuần tra gần quần đảo Trường Sa ; năm 2022, Pháp cũng tham gia cuộc tập trận hải quân đa phương La Pérouse, phối hợp với Mỹ, Úc, Nhật Bản và Ấn Độ ở Ấn Độ Dương và Biển Đông ; và vào tháng 04/2024, lần đầu tiên Pháp tham gia cuộc tập trận Balitakan của Philippines.Do đó, sự hiện diện của Pháp trong khu vực không hề mang tính trung lập và bản thân việc các tàu Pháp cập cảng Việt Nam đã thể hiện một hành động chính trị. Cho nên có thể coi tần suất thăm cảng có tăng hay không còn phụ thuộc vào những cân nhắc ngoại giao về yếu tố Trung Quốc.Tóm lại, để trả lời câu hỏi trên, thì đúng, việc tàu Pháp tăng cường ghé thăm cảng Việt Nam sẽ thể hiện niềm tin song phương ngày càng cao và có thể dẫn đến hợp tác và trao đổi chuyên môn nhằm phát triển năng lực và kinh nghiệm của Hải quân, và đặc biệt là của Cảnh sát biển Việt Nam.RFI Tiếng Việt xin chân thành cảm ơn nhà nghiên cứu Laurent Gédéon, giảng viên Trường Sư phạm Lyon, Pháp.

Biznisz Boyz: A magyar vállalkozói podcast show
Balogh Petya: Ezt másold le a startupokról, hogy gyorsabban növeld a vállalkozásod!

Biznisz Boyz: A magyar vállalkozói podcast show

Play Episode Listen Later Nov 15, 2024 101:01


Balogh Petya: Ezt másold le a startupokról, hogy gyorsabban növeld a vállalkozásod! by BROCASTERZ

24.hu podcastok
DELLA - Balogh Petya: ellopták a pénzt, de tanultunk belőle

24.hu podcastok

Play Episode Listen Later Nov 6, 2024 47:08


Kiszáradt a startup-finanszírozási piac, az uniós pénzek hiánya, az állami források elapadása mellett a befektetők hajlandósága is elfonnyadt az invesztícióra. Utóbbit egyértelműen az elmúlt évek kimagasló magyar inflációjával magyarázza a Della vendége, Balogh Petya startuper befektető, mentor. Ilyen állampapír hozamkörnyezet mellett, amit az infláció lekövetése eredményezett, csak nagyon kevesen akarják kockáztatni a pénzüket egy hosszabb távon megtérülő befektetéssel.

Her Drive
From Scarcity to Abundance in Entrepreneurship with Petia Kolibova Burns

Her Drive

Play Episode Listen Later Oct 30, 2024 38:14


Petia Kolibova-Burns is an intuitive business mentor for female entrepreneurs. Petia shares her transformative journey from struggling with self-worth and mental health to becoming a successful entrepreneur. She emphasizes the importance of intuition in business, advocating for a mindset shift from scarcity to gratitude and abundance. Petya discusses "soulful success," the value of co-creating with the universe, and the significance of self-acceptance. The episode inspires female entrepreneurs to trust their intuition, embrace their unique paths, and recognize their inherent worthiness for a fulfilling life and business. Petia's Website Her Drive

Rock Lomtár - Fáklya Rádió

A mai Lomtár adása ezen a néven jelenleg az utolsó is volt, mivel az a bizonyos mikrofon szögre akad. De az adás teljesen nosztalgiás volt! Az elmúlt, több mint 4 év adott nekünk jó zenéket, eseményeket, vendégeket, találkozókat. Pex, Petya és Rolcsi is nosztalgiázott Mókkal egy kicsit, bár az elején felmerült egy szondáztatás, majd Petya bevallotta, hogy ő sem volt jófiú, de csak egyszer. Itt Mók is kiemelte, hogy a vesszőpacija, hogy az eltiltás hatálya alatti vezetést nem ejnyebejnyével díjazná. De a hangulat jó volt, hisz Pex, a főtroll is itt volt! Mók köszöni nektek! Áginak, Katának, Petyának, Pexnek, Benjinek, Rolcsinak! Meg a technikának!

A Year of War and Peace

Volume 1, Part 1, Chapter 8. The Rostov children and their acquaintances are introduced: Natasha, Sonya, Nikolay, Boris, and Petya. Hosted on Acast. See acast.com/privacy for more information.

IDM Podcast
EP 49 Gender EquiCEEty: Representation, inclusion and intersectionality in Central and Eastern Europe

IDM Podcast

Play Episode Listen Later Nov 29, 2023 37:00


EP 49 Gender EquiCEEty: Representation, inclusion and intersectionality in Central and Eastern Europe Taking a brief look at statistics, it may seem that in many regards women in Central and Eastern Europe enjoy more (economic) equality and independence, especially if we consider the gender-pay gap, the percentage of female professionals in STEM fields, and female managers. But if we dig deeper will this image still hold? In the new episode “Gender EquiCEEty: Representation, inclusion and intersectionality in CEE” of our podcast “Central Europe Explained”, Malwina Talik together with her guests Vladislava Gubalova (GLOBSEC) and Joanna Talewicz (Fundacja w Strong Dialogu) take a closer look at two specific issues: 1) the position of female professionals working in media and start-ups, and 2) the standing of women from the Romani community. Tune in! Recommendations: Vladislava Gubalova A Bulgarian movie ‘Petya of my Petya' (2022) Joanna Talewicz Art by Małgorzata Mirga-Tas and Krzysztof Gil A Swedish movie Taikon A Polish Netflix series “Infamy” Reports mentioned in the episode: Women's Voices in the Media: A Look at Central Europe Women in the Innovation Ecosystem Zooming in on Austria, the Czech Republic and Slovakia CEEHer Initiative Fundacja w Stronę Dialogu Host: Malwina TalikEdition: Gloria Becerril Hosted on Acast. See acast.com/privacy for more information.

Karizma Podcast
#78. Balogh Petya: 23 fájó igazság, amit minden vállalkozónak hallania kell

Karizma Podcast

Play Episode Listen Later Oct 20, 2023 111:41


Balogh Petya az ország egyik legismertebb angyalbefektetője 23 fájó igazságot oszt meg, amely minden vállalkozó és cégvezető számára sok tíz- vagy akár százmillió forintot hozhat a konyhára. Petya ezeket a saját bőrén tanulta meg, hogy neked már ne kelljen. Bónuszként kérd a 90%-os kedvezményt a VOIZ-hoz, és hallgass több mint 1500 hangoskönyvet korlátlanul: https://voiz.hu/karizma Jegyzetek az adáshoz: https://karizma.hu/podcast/balogh-petya-23-fajo-igazsag/

Fülke: a HVG Online közéleti podcastja
Mérlegen - Balogh Petya: Van, hogy valakit az első kudarchoz segítünk hozzá

Fülke: a HVG Online közéleti podcastja

Play Episode Listen Later Sep 5, 2023 54:44


A legtöbbeknek csak "Petya a cápás műsorból", a szakmában viszont Magyarország vezéralakja: Balogh Péter "Petya" hazánk egyik legsikeresebb angyalbefektetője, akit a Mérlegen második évadjának nyitóepizódjában Csatári Flóra Dóra és Dzindzisz Sztefan nemcsak arról faggatott, hogy mibe fektet ma egy angyal és miért éri ez meg neki, hanem arról is, hogy mikor keressen befektetést egy friss vállalkozó és milyen lemaradásai vannak a magyar startup-szektornak a régióhoz képest. A kötelező körök pedig ezen kívül sem maradnak el: Flóra és Sztefó is hozott magával híreket, és már-már hagyományszerűen a burgerek is szóba kerültek. Iratkozzon fel a HVG Podcastok csatornájára Spotify-on, Apple Podcasts-on, Google Podcasts-on vagy hallgassa adásainkat YouTube-csatornánkon! Spotify: http://tiny.cc/HVGpodcastokSpotify Apple Podcasts: http://tiny.cc/HVGpodcastokApple Google Podcasts: http://tiny.cc/HVGpodcastokGoogle YouTube: https://www.youtube.com/@HVGonline A HVG podcastjait most már külön-külön is megtalálja: Fülke • Spotify: http://tiny.cc/FulkeSpotify • Apple Podcasts: http://tiny.cc/FulkeApple • Google Podcasts: http://tiny.cc/FulkeGoogle Mérlegen • Spotify: http://tiny.cc/MerlegenSpotify • Apple Podcasts: http://tiny.cc/MerlegenApple • Google Podcasts: http://tiny.cc/MerlegenGoogle zCast • Spotify: http://tiny.cc/zCastSpotify • Apple Podcasts: http://tiny.cc/zCastApple • Google Podcasts: http://tiny.cc/zCastGoogle Elvitelre • Spotify: http://tiny.cc/ElvitelreSpotify • Apple Podcasts: http://tiny.cc/ElvitelreApple • Google Podcasts: http://tiny.cc/ElvitelreGoogle Vasfüggöny • Spotify: http://tiny.cc/VasfuggonySpotify • Apple Podcasts: http://tiny.cc/VasfuggonyApple • Google Podcasts: http://tiny.cc/VasfuggonyGoogle Kösz, jól • Spotify: http://tiny.cc/KoszJolSpotify • Apple Podcasts: http://tiny.cc/KoszJolApple Tartalomjegyzék: • 0:00: Tartalomjegyzék • 0:42: Évadspoilerek • 2:30: Te mit tennél, ha az AI írna egy könyvet a nevedben? • 6:19: Burgerhírpercek a Mérlegen második évadjában is • 11:38: Promó promó hátán • 13:24: Balogh Petya – Mibe fektet ma egy angyalbefektető? • 14:24: Mi most egy szexi terület befektetői szemmel? • 14:49: Kockázatosabb-e AI-ba fektetni? • 16:02: Mibe fektetett volna 10 éve? • 17:30: Van adrenaline-junkie-ság a befektetői életben? • 17:51: Mit csinál egy angyalbefektető napról napra? • 19:22: 1000 céget akarna Balogh Péter az inkubátorában látni – ez reális? • 20:35: Mik voltak a legtanulságosabb befektetői bukásai? • 24:15: Milyen tipikus hibákat vétenek az elbukó startupok Magyarországon? • 25:39: Mi az a cég, amiből a legjobban fáj, hogy kimaradt? • 27:03: Hogyan lehet elengedni egy bukást? • 29:05: Mi a fontosabb egy befektetőnek – az alapító vagy az ötlete? • 30:18: Hogyan lehet felmérni, hogy egy cégvezető képes-e a sikerre? • 31:48: Volt, hogy valaki elbukott, de még egyszer adott neki pénzt? • 33:34: Sok fiatal fordul hozzá, hogy vállalkozni akar? • 35:34: Mi a helye az egyetemi tudásnak a mai vállalkozói életben? Van egyáltalán szerepe? • 37:53: Miben változtatta meg a magán- és szakmai életét, hogy a Cápák Közöttben szerepel? • 40:10: Mennyi megkeresést kap naponta? • 42:03: Gyakorlatban hogyan működik a vállalkozói mentorálás? Hol tart a magyar vállalkozói tudás? • 45:30: Való mindenkinek a vállalkozói lét? • 46:34: Mikor és hova érdemes fordulni befektetésért? • 49:53: Mennyivel szokott beszállni egy cégbe és az meddig elég? • 51:23: Mi az a vállalkozástípus, ami már lejárt lemez itthon? Mi az, ahol még van tér? Milyen jövőt lát a magyar vállalkozásoknak nemzetközi porondon?

KAPod
Balogh Petya & Késmárki László - Cápák között

KAPod

Play Episode Listen Later Jun 13, 2023 46:19


Balogh Petya és Késmárki László egyetemi jóbarátok. Együtt fetktették le az iGo nevű fejlesztésükkel a mai navigációs rendszerek alapjait, az ezzel szerzett busás vagyonukból pedig manapság start-upokat támogatnak, és vallják, hogy sosem a pénz motiválta őket, hanem mindig a hülyeség.

Paranormálistól a spiritualitásig - Fáklya Rádió
Ősi asztronauták a magyar sajtóban

Paranormálistól a spiritualitásig - Fáklya Rádió

Play Episode Listen Later Apr 4, 2023 61:31


Vajon a magyarok ősei is láttak különös égi jelenségeket, amik ma UFO-knak feleltethetők meg? Mik voltak azok, amiket megtudtak magyarázni és melyek azok a konkrét észlelések, amelyek még ma sem magyarázhatók meg? Petya és Laci ennek néz utána ebben az adásban.

Francisco #fromcoach2coach #wetalkonmondays
Petya Wienand - Want to know what is beyond

Francisco #fromcoach2coach #wetalkonmondays

Play Episode Listen Later Mar 12, 2023 30:34


Petya Doneva-Wienand, born in Sofia, Bulgaria, currently also residing there.   ACC accredited by the International Coaching Federation, currently working to obtain the PCC level accreditation.  MA in English Language and Literature from the Sofia University, MSc in Organisational Psychology from the University of Liverpool.  My coaching has evolved from a background in linguistics, psychology and teaching, with experience in international organisations (mining) and living in multicultural environments (Denmark, Spain, Namibia) in roles such as: interpreter/translator; community relations; editor; teacher; coach. I form part of an international family (my husband is South African) and we very much see ourselves as citizens of the world. Contact details:  Email: petyaw@perow.eu; petyaw@gmail.com LinkedIn profile: https://www.linkedin.com/in/petya-wienand-3ab67114/

Simple Swedish Podcast
#171 - Vad betyder det att prata flytande?

Simple Swedish Podcast

Play Episode Listen Later Feb 11, 2023 13:48


Vad betyder det egentligen att prata ett språk flytande? Det är inte helt tydligt för dom flesta! I det här avsnittet ska jag försöka bringa klarhet i detta :) Länk till Language Lock-in - klicka här - och klicka på "join the free training" för att registrera dig för webinariet! (Webinariet är den 22:a februari!) -------------------- For English, scroll down! -------------------- För att stödja podden och få transkript till avsnitten - bli patron för bara 5€ per månad – klicka här! Vill du ha en GRATIS PDF med de 20 vanligaste misstagen folk gör i svenska? Klicka här och prenumerera på nyhetsbrevet – alltid på lätt svenska :) -------------------- To support the podcast and get transcripts to the weekly episodes – become a patron for only 5€ per month - click here! Would you like a FREE PDF with the 20 most common mistakes people make in Swedish, and how to correct them? Click here and subscribe to the newsletter – always in easy Swedish! ------------------- Instagram: swedish.linguist YouTube: Swedish Linguist Facebook: Swedish Linguist Website: www.swedishlinguist.com ------------------- Ett smakprov (sample) på transkriptet: Hallå där, välkommen till Simple Swedish Podcast. Ah, jag är lite sjuk, igen. Jag var sjuk nästan hela december, och nu har jag varit sjuk i, ah, typ fyra dagar. Hoppas att det inte kommer vara 3-4 veckor igen, men, ah.   Och det är tråkigt att vara sjuk, för att man så lite energi. Och jag har liksom ont i halsen också, så att jag pratar inte lika bra, märker jag, så att, ja. Jag hoppas att det här blir ett bra poddavsnitt ändå!   Så ja, idag ska vi prata om vad det betyder att prata flytande. Väldigt intressant ämne. Först ska jag tacka några nya patrons. Det är Anna, Carina, Luciano, Tamerlane, Raquel, Matt, Petya och Trish. Tack tack till er för att ni stödjer den här podden. Alla som stödjer podden får då transkript till alla avsnitt. Ja, länk i beskrivningen.   Så vad betyder det då att prata flytande? Är det att du säger allting grammatiskt rätt hela tiden? Är det att du har en C2-nivå i språket? Är det att du pratar utan brytning? “Brytning” är alltså en utländsk accent. Så är det att du pratar utan brytning? Är det att du kan ett visst antal ord? Är det att du pratar som en modersmålstalare?   För folk tänker ofta på det här med att prata flytande som nånting som är liksom perfekt, eller att man pratar lika bra som en modersmålstalare. Men så tänker verkligen inte jag, och om du frågar människor som, ja, jobbar mycket med språk, som lär sig språk som hobby eller liknande. Det här är inte deras definition, och det här är inte min definition.   Så, att prata flytande, det skulle jag säga är att du kan kommunicera effektivt om dom flesta ämnen, med dom flesta personer, i dom flesta situationer. Alltså att du och jag kan prata, vi kan kommunicera effektivt, konversationen flödar, alltså, flyter, flödar. Och vi kan uttrycka oss utan problem, vi förstår varandra utan problem, och så vidare.   ....för att läsa hela transkriptet till detta och alla andra avsnitt, klicka här!  

The Cybersecurity Defenders Podcast
#16 - Hacker History: NotPetya

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jan 26, 2023 19:22


In this episode of the Cybersecurity Defenders podcast, we recount some hacker history and tell the story of Amit Serper, a hacker and reverse engineer, who was instrumental in stopping the most devastating cyber attack in history: NotPetya.On 27 June 2017, a major global cyberattack began (Ukrainian companies were among the first to state they were being attacked), utilizing a new variant of Petya. On that day, Kaspersky Lab reported infections in France, Germany, Italy, Poland, the United Kingdom, and the United States, but that the majority of infections targeted Russia and Ukraine, where more than 80 companies were initially attacked, including the National Bank of Ukraine. ESET estimated on 28 June 2017 that 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%.Russian president Vladimir Putin's press secretary, Dmitry Peskov, stated that the attack had caused no serious damage in Russia. Experts believed this was a politically-motivated attack against Ukraine, since it occurred on the eve of the Ukrainian holiday Constitution Day.Kaspersky dubbed this variant "NotPetya", as it has major differences in its operations in comparison to earlier variants. McAfee engineer Christiaan Beek stated that this variant was designed to spread quickly, and that it had been targeting "complete energy companies, the power grid, bus stations, gas stations, the airport, and banks".This episode was written by Nathaniel Nelson, narrated by Christopher Luft and produced by the team at LimaCharlie.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.

PLAZA PÚBLICA
PLAZA PÚBLICA T04C077 Talento emprendedor: José Carlos García de CEEIC y Petya Yaneva de Nivimu (20/12/2022)

PLAZA PÚBLICA

Play Episode Listen Later Dec 20, 2022 12:22


Venture on the Road, que se celebrará por en Cartagena, es un roadshow concebido para proporcionar acceso a inversores y networking en diferentes ciudades. El 19 de enero se realizará el evento en la sede del CEEIC."Nivimu", es un proyecto que gestiona los Recursos Humanos de una empresa a través de una única aplicación ahorrando tiempo y dinero.

On The Frontlines
Walk For Freedom 2022

On The Frontlines

Play Episode Listen Later Oct 11, 2022 29:15


On October 15, 2022, Join thousands of people in hundreds of cities across the globe to walk in a single file line–holding posters and handing out flyers–to reach their city with information about human trafficking and how to end it.Introduction (0:00)Understanding Human Trafficking (2:35)Why Walk For Freedom (8:52)Rebecca Bender - Awareness (11:22)Petya's Story (14:23)Our Work (19:50)Christine Caine (21:25)Closing (27:18)To learn more visit A21.org/WalkFollow us on Instagram | Facebook | TwitterDon't forget to share your Walk For Freedom experience on social media using the #WalkForFreedom hashtag, and tag us @A21.

Paranormálistól a spiritualitásig - Fáklya Rádió

Bob Lazar azzal hívta fel magára a figyelmet az 1980-as évek végén, hogy állítása szerint az amerikai 51-es körzetben dolgozott egy földönkívüli űrhajó meghajtásán. Lazarra felfigyelt a média, így számos támadás, pro-kontra vita és fenyegetés is érte. Vajon igazat mondott?

War & Peace Podnotes, A Study Guide
Bk. 1, Pt. 1, Ch. 16: Bonaparte Stopped Austria's "Cackle" and Russia is Next

War & Peace Podnotes, A Study Guide

Play Episode Listen Later Sep 12, 2022 5:28


The extravagant Rostov feast is winding down and the political talk is reaching a zenith.Shinshin asks why Russia should be thrown into a war with Napoleon. He notes Bonaparte already stopped Austria's cackle and Russia's turn is likely next. The ethnically German colonel (in the Russian Army) who is within earshot gets irritated and announces his fealty to the Emperor. The colonel quotes Alexander's Declaration of War, which has the refrain -- to establish a lasting peace; the country must mobilize for War. Shinshin responds that Russian stands little chance, especially considering General Suvorov was "hacked to pieces" by the French in the Alps and is now deceased. Shinshin notes there is nobody like Suvorov to mount a realistic challenge to Napoleon. Suvorov was a military leader ranked high on historical lists of top generals. He is known for success during the Russo-Polish conflict, two successful descents on Turtukai (a city on the Danube), his defense of the Black Sea fort 'Hirsov' (1773), as well as his direction of the Battle of Kozludji (1774). During the Russo-Turkish War of 1787–91, he aptly defended territory on the north shore of the Black Sea. He attained the rare title, Generalissimo, which means commander of all units of the military, near the end of his life. Various military schools bear his name. He is also famous for a retreat in 1799 when his 23,000 men were pursued by 80,000 French.  He never surrendered, though thousands died of the elements, sickness, or falling from cliffs. About 18,000 made it through the Alps. Suvorov became worn out and died within the year.The Colonel continues with his Ra Ra speech and asks Nikolai Rostov what he thinks of going to war. Nikolai responds: we must die or conquer! Julie Kuragina is impressed -- as is everyone else within earshot. Sonya, who loves Nikolai dearly, is in the pangs of jealousy over Julie's closeness to Nikolai . The Colonel proclaims the young man to be a true hussar and is thumping the table in excitement. Marya Dmitrievna, remarks that with such bravado, the Colonel must think the French are at the table. Marya and the Colonel discuss how their sons are going to war and Marya notes how their fate is in God's hands..The younger people, especially the Rostov kids, are bored with political talk. They have their mind on something more important to them – namely, what is for dessert. Natasha asks aloud, which is considered a breach of decorum. Marya (Le Terrible Dragon) eventually replies 'ice cream,' but jokingly says none will be given to Natasha. The youth persists and finds out pineapple ice cream will be served. Natasha's boldness reduces her younger bother Petya to joyous laughter. The adults joined in the gaiety, including Natasha's generally stoic mother.The dessert is accompanied by live orchestra music, then a toast from the Host, Ilya Rostov, to his wife's health. The dinner is now over and the guests retreat to Ilya's study or the drawing room. 

Obehi Podcast: In-depth interviews
Petya Torbova Talks About The Impact Of Storytelling On Her Early Life

Obehi Podcast: In-depth interviews

Play Episode Listen Later Aug 10, 2022 57:59


Petya Torbova is a Storyteller, English Expert, and Trainer. (My relationship with story-telling, its impact on my early life, and its presence in different shapes in my later life and work) ____________________________ For more about Obehi Podcast, visit our YouTube channel - ObehiPodcast. Check out also our official website Obehiewanfoh.com. Join our Content Membership for content creation strategy and digital entrepreneurship --- Send in a voice message: https://anchor.fm/obehi-podcast/message

Vakfolt podcast
Moszkva tér (2001, Török Ferenc) - vendégünk Földi Gábor

Vakfolt podcast

Play Episode Listen Later Jul 6, 2022 70:11


A magyar filmes évadunk végéhez közeledve átlépjük az ezredfordulót, és Török Ferenc vizsgafilmjeként megírt, 2000-ben forgatott, 2001-ben bemutatott Moszkva tér című filmet nézzük meg. Adásunk vendége Földi Gábor. Mi történt a magyar filmben az 1991-es Csapd le csacsi! és a 2001-es Moszkva tér között eltelt tíz évben? Mitől különleges Török Ferenc filmművészetis évfolyama? Mennyire másként ragadja meg Török Ferenc a rendszerváltás évét, mint Tímár Péter? Miért választotta Petya karakterét a főszereplőjének Török Ferenc? Beszélünk a Moszkva tér legjobb karaktereiről, a legemlékezetesebb mondatokról, és próbálunk hibát is keresni a filmben, mindhiába.  Linkek A Vakfolt podcast Facebook oldala A Vakfolt podcast a Twitteren A Vakfolt Patreon-oldala Vakfolt címke a Letterboxdon A Vakfolt podcast a YouTube-on A Vakfolt podcast a Spotify-on A Vakfolt podcast a Google podcasts oldalán A Vakfolt az Apple podcasts oldalán A főcímzenéért köszönet az Artur zenekarnak Gábor a Twitteren: @_fega_ András a Twitteren: @gaines_ Péter a Twitteren: @freevo Emailen is elértek bennünket: feedback@vakfoltpodcast.hu

Modem Mischief
NotPetya

Modem Mischief

Play Episode Listen Later Jun 29, 2022 52:15


A disastrous cyberattack on the country of Ukraine that had worldwide ramifications. NotPetya was something far more sinister than a case of ransomware. This was an act of war perpetrated by Russia. Support us on Patreon! Start your own podcast today with LibSyn. Use the code “FRIEND” for your first month free! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed & Mastered by Greg Bernhard Theme Song You Are Digital by Computerbandit Listen to True Crime Guys podcast

Media Monarchy
#MorningMonarchy: June 27, 2022

Media Monarchy

Play Episode Listen Later Jun 27, 2022 67:15


Bench-clearing brawls, the Dobbs decision and psywar compensation + this day in history w/Petya malware attack and our song of the day by Social Raygun Music on your #MorningMonarchy for June 27, 2022.

Craig Peterson's Tech Talk
Did You Hear About the Latest Rip-Off? Non-Fungible Tokens! How Law Enforcement Tracks Bitcoin!

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 22, 2022 82:43


Did You Hear About the Latest Rip-Off? Non-Fungible Tokens (NFTs) Are Already Losing Steam! [10:54] How Law Enforcement Tracks Bitcoin! It is Absolutely NOT Anonymous [20:05] The FBI Is Actively Removing Malware From Private Machines -- Without The Owner's Permission [29:10] Why and When You Shouldn't Trust QR Codes [41:08] Cybercrime in Russia Tracked to a Single Office Building in Moscow! [52:29] The Newest Phishing Scams [01:01:32] Using Wordpress? How Supply Chain Attacks are Hurting Your Business Website [01:10:43] Cybersecurity Tools You Should Be Using! Jam packed today. We're going to start with non fungible tokens. If you don't know what those are, this is a very big deal because so many people are investing in them right now. Are they really investments? I've got a bit of a blow back here. Most people think that Bitcoin is anonymous. We're going to talk about how it absolutely is not. [00:00:20] We're going to talk about anonymous. In fact, the Russians, Microsoft, what they're doing against the Russians and this little comedic thing about cars. [00:00:28] NFTs are very big deal. [00:00:31] I'm going to pull up here on my screen right now. This is a picture of Mr. Jack Dorsey. We'll go full screen, an article from a website called CoinDesk. CoinDesk is one of these sites that really tries to track what's happening out there in the Bitcoin community. Of course, nowadays it's much more than Bitcoin. [00:00:53] Isn't it? We're talking about all kinds of. Different currencies that have a blockchain backend. They're called cryptocurrencies basically. But the big one was of course, Bitcoin. And there is a whole concept. Now, when we're talking about things like cryptocurrencies and these non fungible tokens. People have been investing them in them. [00:01:19] Like crazy people are making millions of dollars every week. Now, remember, I am not an investment advisor and particularly I'm not your investment advisor. So take all the. To your investment advisor. I'm not telling you to buy them. I am telling you to be cautious here though, because these non fungible tokens are designed to give you the ability to be able to just, own something in the digital world. [00:01:48] What might you own in the digital world? We've had a lot of different stuff. We've seen some just crazy monkey things. Have you seen those? These little pictures of monkeys are. Graphic designed and it's all animated. If you will. It's like cartoons and people pay money for them. One of the things that people paid money for was the rights to the first tweet ever on Twitter. [00:02:16] So that's what you're getting. When we're talking about an NFT on a non fungible transaction, it is now yours. So this particular NFT we're talking about was of our friend here, Jack Dorsey. We'll pull it up again, this article, and he had a tweet that was sold last year for $48 million. That is a lot of money. [00:02:43] So people look at this as an investment, but it's not the same as hanging art on the wall. You've got a Picasso that has some intrinsic value. It's a painting. It has all the oil paint on that, it was designed by and painted by a crazy man years ago. And you can take that Picasso and you can. [00:03:07] Turn it around and sell it. It has some real value. If you own the rights to something, let's say it's one of these monkey pictures. It reminds me of a postage stamp and you paid real money for it. Some of these things are going, as I said, for over a million dollars and this Jack Dorsey first tweet went for $48 million. [00:03:27] So let's say that's what you did, right? You bought this thing for $48 million. Really? What do you have? Because anybody can go online and look at that tweet. Anybody can print it up and stick it on a wall. Anybody can go out and get that picture of the monkeys right there. The guy drew, and you can look at it. [00:03:51] In fact, I can pull it up right now, if you want to do. But people paid real money for that. So they've got what really? What do they have? You can't take it off the wall, like you're Picasso and salad, right? Or Banksy, if you're into the more modern art, it's just not. What is doable? How do you make this work? [00:04:12] Only the NFT only gives you bragging rights in reality. That's what it does. You have bragging rights because you could take that digital picture and make a hundred quadrillion copies. Yeah, you'd still own the NFT you would still have in the blockchain for whatever NFT company you're using the rights to it. [00:04:37] They would say this, you owned it. So let's talk about the blockchain behind it. There are a lot of companies that are trying to give you that. Okay. All right. I get it. Yeah, I get to to own it. But who's running the blockchain behind it. Who's validating that you own it with Bitcoin and many of these other blockchain currencies that are out there. [00:05:04] There are various. Companies and individuals who are registered, who have all of the paperwork, if you will saying who owns, how much of what, and who paid, who and everything. And that by the way, is why it takes so long for some of these Bitcoin and other transactions to occur. But how about the NFT? There are tons of companies out there that say they will certify the NFT. [00:05:34] So it gets to be real problem. And when we get into this Jack Dorsey tweet and this article about it, which are will, let me pull it up again here for you guys. This guy, Sina S bought the very first tweet ever from Twitter founder, Jack Dorsey for $2.9 million last year. And he decided that he wanted to sell it. [00:06:03] So he listed it for sale again at $48 million last week. Real. He put it up for open bid and this article and CoinDesk is talking about that. And you can see that if you're watching me on rumble or YouTube, I'm showing you my screen here right now. But this Iranian born crypto entrepreneur named of again. [00:06:28] As TAVI purchased it for $2.9 million in March, 2021. Last Thursday, he announced on Twitter where out, that he wanted to sell this and Ft. And he said, Hey, listen, I'm going to put 50% of the proceeds to charity. The auction closed, this was an open auction. People could go and bid on it and head auction closed. [00:06:55] With an offer of basically $288, $277 at current prices when this article was written $277 and the lowest bid was $6. And as I recall, this is not in this article, but there were only. I handful of bids. Like when I say handful, I mean a half a dozen beds. Crazy. This is a real problem because the deadline is over. [00:07:27] He paid how much for it, right? How much did he pay? Pull that up again. $2.9 million last year. And his highest bid was in the neighborhood of $280. Isn't that crazy. So did he get money on this? Did he win money on this? I don't know. I'm looking at those saying is it worth it to buy something like that? [00:07:54] That you might think, oh, the very first apple computer, an apple. While that's going to be worth some serious money. Yeah, it is. It's something, you can grab onto, you can hold onto it, it's something and you can sell it. You can trade it. You can take a picture of it. You can't make digital copies of it. [00:08:15] You, you, it's a physical thing. That's worth something. Same thing with that Picasso on the wall, it's really worth something that has some basic intrinsic value. Jack's true tweet. The very first tweet. How much is that thing worth? It basically nothing. So the tweet is showing he'll pull it up on the screen again that he's selling ad Jack 2000 6 0 3 21 at eight 50 14:00 PM. [00:08:46] Just setting up my Twitter. So there you go. There's Jack is very first to. And it's absolutely amazing. Is it worth it? Let me pull up some other stuff here for you guys. I'm going to pull this up here is Coinbase launching an NFT marketplace in hopes of appealing to crypto on mainstream users. So here's some examples from a man and FTEs. [00:09:11] I'm going to zoom in on this for those of you guys watching on rumble or on Twitter. All right. Mean. Yeah actually you can see it on Twitter too, but YouTube, here you go. Here's some NFTs it's artwork and it's a creature. So you can buy creature number 7, 8 0 6 right now for six Eve. So let me see. [00:09:34] Value of six. Ethereum is what ether, M two us dollars. So for 3000. And $84. As of right now, you can get a crappy picture that even I could have draw okay. Of this guy and look at all of the work this artist has put in. There's how many of these up here? 1, 2, 3, 4, or five, 10 of them. And it's the same head. [00:10:03] Each time it looks like this almost the same eyes. He changes colors and he's got different background. It's absolutely not. So that's what they're trying to do right now, trying to sell these NFT. So who's going to buy that. Who's going to pay $3,000 for artwork that hunter Biden could have done with a straw. [00:10:25] Anchored around. Here's another one. This is from ledger insights. NBA's launching dynamic NFTs for fans, baseball cards for the NBA that are basically just worthless. They're NF. Non fungible tokens. It has taken the crypto world by storm and people are losing millions as you look, but it really is changing the e-commerce world. [00:10:54] Bitcoin blockchain. All of the rage, a lot of people are talking about it, but I got to say most people who are talking. I don't know much about it. And when it comes to anonymity, Bitcoin is probably the worst thing you could possibly do. It's amazing. [00:11:12] There are a lot of misconceptions out there when it comes to technology, you have almost any kind of technology and blockchain and Bitcoin are examples of a very misunderstood technology. [00:11:25] Now I'm not talking about how does it work? How are these ledgers maintained? How does this whole mining thing work? Why has Chan. Bandit. Why are a lot of countries going away from it, one country. Now the dictator said, yeah, we're going to use Bitcoin as our we're official currency. In addition to the U S dollar what's going on. [00:11:48] It is complicated behind the scenes. It's complicated to use. Although there are some entrepreneurs that have made some great strides there. I saw a documentary on what has been happening in that one country. I mentioned. They are able to pay in us dollars using Bitcoin. So they'll go up to a vendor on the street. [00:12:13] Quite literally they'll have their smartphone with them. The vendor has their smartphone. They type in 15 cents for the taco and a hit send. It goes to the other person and they have 15 cents worth of Bitcoin. By the way, these types of micro-transactions with the way Bitcoin is structured behind the scenes, make things even less manageable in the Bitcoin world than they have been in the past. [00:12:40] And that's why in case you didn't know, Bitcoin is making some major changes here fairly soon. They've got to change the way all of this ledger stuff works because it takes too long. To record and authorized transactions. And these ledgers just get way too long when it comes to all of these kinds of microtransaction. [00:13:04] So there's stuff going on, Bitcoin, there, there are many of these types of currencies out there. Theories comes one. You've heard about doge coin because of course that's Elon Musk has been talking about and many others and they're all different somewhat, but the main concepts are the. One of the big concepts, I'm going to pull an article up here on the screen for those watching on YouTube or also on rumble. [00:13:30] But this is an article from our friends at wired magazine. And now you have subscribed to wired for many years. This particular one is about what wired is calling the crypto. Trap now that's a very big deal. It is a trap and it's a trap and a lot of different ways. And that's what we're going to talk about right now. [00:13:56] Crypto is not what its name implies. A lot of people look at it and say, oh, crypto that's cryptography. That's like the German enigma machine in world war two and all of this new, great crypto that we have nowadays. And there are some pretty amazing new cryptographic technologies that we've been using, but no, that's not. [00:14:17] What's really going on. You see the basic premise behind all of these technologies is the concept of having a. And this wallet has a unique identifier. It has a number assigned to it. So if I'm sending money to you, I'm going to have your wallet, ID, your wallet number, and I'm going to now send you some amount of fraction, most likely of a cryptocurrency and it's certainly if it's Bitcoin, it's almost certainly a fraction. [00:14:49] And so I'm going to send you $100 worth of, let's say. What ends up happening now is these ledgers, which are public, are all going to record the Craig's sent you a hundred dollars worth of Bitcoin. Of course, it's going to be in a fraction of a Bitcoin. So sometimes there's rounding errors is not going to be really exactly a hundred dollars. [00:15:12] Plus there's the amazing amount of. Tivoli volatility in the cyber currencies. So even though I meant just hitting a hundred dollars, mine ended up being 110 of it goes up. It might be 90. If it goes down you get that. You don't understand how that works. So the problem now is I have sent you a hundred dollars. [00:15:33] And public ledgers that anyone can gain access to now say wallet number 1, 2, 3, 4 cent, a hundred dollars, two wallet, number 5, 6, 7, 8. Obviously the wallet, our bruises, a lot longer than that. So then it's fine. And there's a degree of anonymity there it's really called pseudo anonymity because in reality, it's not completely anonymous because people know the transaction occurred and they know the wallet numbers. [00:16:03] Correct. It's like a bank account, and if I'm putting money into your bank account, that bank account number knows that the money came from a check that I wrote. Can you imagine that someone writing a check and that check I had a number on it, a bank account number, right? So it can all be tracked while much. [00:16:19] The same thing is true when it comes to cryptocurrencies, these cryptocurrencies are in public ledgers and those public ledgers can be used with a little bit of work to figure out. Who you are. So this article here from our friends at wired gets really hairy. And it might be of interest to you to read, but this is talking about a take-down that happened, and this is a massive take down. [00:16:51] This take down was of a whole group of people who were involved in some really nasty stuff. In this particular case, what it was kitty. Just a terrible thing and the abuse surrounding it. So this logical goes into not a lot of detail. I'm not going to read it because here on the air, because I don't want to upset too many people. [00:17:15] Cause it's some of the details of this evening to think about them are incredible. But. This the police broke into this middle-class suburb home in the outskirts of Atlanta. And he there was Homeland security. It was a guy from the IRS and they came in, they took all of their electronic devices. [00:17:38] They separated the family, putting the father who is an assistant principal at the local high school assistant printers. And he was the target of this investigation. So they had him in one room, they had his wife and another room and they put the two kids into a third room and they started questioning him. [00:18:00] Now, this is part of a takedown of a, as I said, a whole ring of these people, including this assistant. Principal at a school. Can you believe that? So this IRS guy had flown in from Washington DC to have a look over what was going on, but this agent from the IRS and his partner whose name is let's see, his name was Jenn S Scouts. [00:18:26] I probably got that wrong. And Tigran GAM bar Yan, Cambodian, and they had a small group of investigators and they were at a whole bunch of different federal agencies, not just the IRS. What once seemed to be. Untraceable was no longer untraceable. Now I've talked on this show before about a lecture I went to by the secret service about how they had tracked down and shut down the world's largest website that was being used to sell illegal materials online. [00:19:01] And it's fascinating what they did. But frankly, they're calling this particular boss to proof of concept and that's why they are IRS was in on this as well, but it was huge. Here's a quote from the IRS agent in this wired magazine article. He's saying he remembers how the gravity of this whole thing. [00:19:21] Let me pull this up on the screen too. So you can read along here, but this was a high school administrator, a husband, and a father of two, whether he was guilty or innocent. The accusations, this team of law enforcement agents were leveling against. There are mere presence in the home would almost certainly ruin his life. [00:19:44] And he, as well as these other people were counting on anonymity from Bitcoin. Now, obviously I'm glad they got taken down, but listen, folks, if you think that it's safe, that it's anonymous, it ain't Bitcoin just ain't there. Craig peterson.com stick around. [00:20:05] I've been blamed for really complaining about people not updating their software. And that includes things like firewalls. The FBI has stepped in and they are going ahead and doing updates for you. [00:20:21] What should we be doing as a country? [00:20:26] People are. Updating their software. They're not updating their hardware. And particularly our hardware take a look at what's been happening with the firewalls and the firewall concerns. Everybody has some sort of firewall will almost everybody, but enough people that we can say, everybody has a firewall, you get your internet from you, name it. [00:20:50] And because of the fact they're using something called Nat network address translation, they've got some sort of firewall in front of you. So for instance, You've got your phone, right? You're using your phone and it's got internet on it. You're going through whoever your carrier is. And that carrier is giving you internet access, right? [00:21:14] They don't have enough IP addresses, particularly IPV four, in order for you to get your very own unique little address out on the. No they do. When it comes to V6 things a little bit different, but your device is not completely exposed on the internet. Windows comes to the fire. And by default, the windows firewall is turned on. [00:21:35] Now this gets more than a little concerning because that firewall that's turned on. Isn't really doing anything because I've got a firewall turned on and yet every service is accessible from outside, which is defeating the purpose of the firewall. Again, it's a complaint I've had about Microsoft now for. [00:21:55] Decades, which is they have features that are just check boxes. Yes. Yes. It's got a firewall. Yeah, it's turned on, but the features don't work. So having a firewall and having everything open defeats the purpose of a firewall max do not have a firewall turned on by default, but they do have their services to say. [00:22:18] Which is just as effective if not more effective. So one of the things we advise people to do is go into your windows system, into the firewalls and your security settings, and turn off any services that you're not using. If you're not sharing file systems, then turn that off. In other words, You're mounting the G drive or whatever you might call it from another computer, then you don't need it. [00:22:44] If you're not as server for what's called SMB, then you don't need to share it. So turn off everything that you don't need. That's going to happen is one of your programs isn't going to work, right? And the, what you did last year, you're going to turn it back on and you can do a lot of research online to find out what they are. [00:23:04] We have over 200 settings that we change in windows. When we get a customer. Now on the Mac side, you can turn it on. I liked turning it on. I liked turning off the ability to see my machine. So in other words, the ability to be able to. So I turned it on and I enable specific services. And again, you can do some research on that. [00:23:30] I've got an improving windows security course that people have taken, and we should probably do that again, if not just have some free webinars on how to do this. So you guys can learn how to do it, but not that hard to do. Anyhow, bottom line is. People aren't updating their computers, even the Macs and windows. [00:23:51] We have a client that would just started a new client and we're tightening things up and we've been finding Mac computers that are major multiple major revisions behind. And that to me is shocking. Apple Macs are just so easy to update. It is extremely rare that an apple update will make your computer break unlike in the windows world, where it's pretty common. [00:24:17] So windows guys, I can understand, but your even more exposed, your bigger target, you need to keep up to date. So how about all of the other equipment that we. I've had warnings again and again, with you guys about what's happening with our smart devices that are out there, right? Our security cameras we have up in the corner, right? [00:24:41] We have these smart thermostats, people are using the list goes on and on of all of this equipment that we're using that is exposing us because when was the last time you have. How about the firmware in your router or your wifi, right? Some of the devices that I recommend to people, and if you have any questions, just email me and e@craigpeterson.com. [00:25:05] I can give you recommendations, even if you're a home user. Although my business obviously is working with businesses on what kind of wifi to buy, what you should get, what you should do. I don't charge for any of that stuff. Okay. You get it. But you have to ask. Me@craigpeterson.com. So you get this information and you go ahead and you buy whatever it is, but you don't keep it up to date, which is why I tend to only recommend stuff that automatically updates. [00:25:33] But that also means every few years you're going to have to replace it because unless you're using the good Cisco equipment where you can get a seven year life out of it you're not going to find that in consumer grid. So what's happened here. I'm going to pull this up on my screen for people watching this on YouTube or on rumble. [00:25:52] But here is a thing that came straight out of our friends here from the FBI. This is from CSO. This is a a magazine that I do follow. But they're talking about what they call psych clock. Blink. So the article says for the second time in a year, the FBI has used search and seizure warrant to clean malware from devices owned by private businesses and users without their explicit approval. [00:26:25] The FBI used this approach to disrupt a botnet, believed to be the creation of right. Government hackers. So the calling this SYEP clock cycle clubs, blink malware discovered earlier this year. So here's the problem. What do you do if you're the federal government, how do you try and keep your country safe? [00:26:51] Now we know. We've got these military contractors. They make missiles that take out missiles, right? The provide defensive systems. You've heard of iron dome from years ago, all the way through all of the current stuff. That's what they do, but what do they do? What can they do when there's a botnet? A botnet is where there are multiple computers in this case, probably tens of thousands of computers located in the United States that are acting like sleeper. [00:27:21] They sit there and they wait for commands as to what they should do. Should they try and attack a machine? Should they try and spread more? Malware, what should they be doing? And the, these things are vicious. They are absolutely nasty. And in this case, we're looking at Russian malware. So Russia effectively like the Americans. [00:27:44] You might remember that TV show. It was great show, but that. Computers that are owned by you and me and our businesses and government agencies that are under the control of the Russians. Now you don't even know it. You're using your computer. You're playing games. You're going to Facebook, whatever it is you do on your computer. [00:28:06] Your computer is under command and control of the Russians. So the FBI goes to a court and says, Hey, we've got to go ahead and shut this down. We need a warrant. They get the warrant and the search and seizure warrant lets them now. Get on to these machines that are part of the bot net or the controlling machines for the bot net, and either remove the malware or go ahead and take control of the botnet themselves. [00:28:34] So it can't be used. And by the way, our friends at Microsoft they've gotten involved in this too, which is really frankly, cool in shutting down some of these botnets, Hey, I want to encourage everyone. Take a couple of minutes, go to Craig peterson.com/subscribe. That's Craig Peterson. CREI G P T R S O N. [00:28:57] And subscribe, and I'll be sending you a special report on passwords. Plus two more. I send out the most popular special reports that anybody has ever asked for. [00:29:10] Hey, I've got a little bit more to discuss on what's happening with Russia and Microsoft and more, but I'm also going to talk about QR codes. There is a great explanation. That's in your newsletter from Monday about why you shouldn't trust 'em. [00:29:26] Let's finish up this Russian thing. And then we're going to get into why you cannot trust QR codes and a brand new way. [00:29:36] The bad guys are using QR codes to really mess with us. Now, if you're watching over on either YouTube or on rumble, you'll see this. Let me pull up my screen for you. But here we go. Okay. This is very interesting. Then the last segment, we talked a little bit about what our friends over at the FBI had been doing, which is they have been removing malware from people's computers because people haven't been keeping their computers up-to-date right. [00:30:11] Part of the botnets. So we explained. At the FBI, isn't the only one out there trying to stop these Russians and the hackers anonymous has been very big at it. In fact, let me pull up this other article. This is from security affairs. And here we go. And it's talking about this whole army of these anonymous hackers. [00:30:35] Now none of us have been a nightmare for many businesses that they didn't like. I had an anonymous we'll go ahead and they'll do usually pretty basic stuff. They'll do denial of service attacks and some other things, so they don't like you because of. The don't say gay bill in Florida, and, without bothering to do any research, they'll just start attacking organizations that support it, or organizations that don't support it depending on how they want to do it. So this is an interesting article here, because it's talking about these various. Websites that they've hacked. Now, some of them are government site and some of them are private industries. Now, one of the cool things, bad things about hacking private industry and releasing the emails is now the competitors to these businesses know what they're doing. [00:31:31] And in some cases there's proprietary technology that's being released. Now, when it comes to Russian proprietary technology. The Western world doesn't care a whole lot about some of it, but here's some examples of what these hacktivists of GoDaddy. This is a company called forest 37,000 emails stolen from the company, Russian logging and wood manufacturing firm. [00:31:55] Again, it would give a little bit of an idea into the whole Russian, what are they doing? In the forest industry. This one, I think is a little more concerning for the Russians Aero gap. This is an engineering company that focuses in the oil and gas industry. Their clients include a whole bunch of Russian companies. [00:32:15] They've leaked approximately 100,000 emails from Aero gas. That is a huge deal because so much of the country's revenue, the number one industry in Russia is oil and gas. Petro Fort one of the largest office space and business centers in St. Petersburg, the hackers have leaked approximately 300,000 emails from Petro fork. [00:32:41] Again, you can use that to find out what's happening in your economy. What. Doing how are businesses doing? Are they going to go under so you can see some tweets here. I've got them up on my screen on YouTube and rumble anonymous. What they're saying that they've done and you can follow anonymous directly on Twitter. [00:32:59] Particularly fond of them. They've done a lot of things that I disagree with. This is really telling us about a whole new approach to warfare, right back in the day, you and I couldn't get involved, we could potentially take up arms and go and fight right there and think about the Spanish American war. [00:33:18] Think about what's happening now in Ukraine, where Americans have just gone over there. Taken up firearms in order to help them defend Ukraine. People who are maybe of Ukrainian descent, maybe not right. We have never seen this type of involvement by average citizens because anonymous is not like some big fancy company or government agency anonymous is a bunch of people who are trying to be anonymous and do something. [00:33:50] So they stole 145 gigabytes. Look at this. It's just crazy. So he. The anonymous Twitter thread itself, right? Talking about what. It's absolutely incredible. Incredible. So that's what anonymous is up to. They are hacking Russia and they're hacking Russia in a big way. Now, next stop. We have our friends at Microsoft. [00:34:15] Microsoft has been seizing Russian domains that they are accusing of having been linked to these Russian hackers that have been going after think tanks and government agencies in the U S and the. He knew, I shouldn't say which I'm sure includes the UK cause UK has gotten involved. So this article from the verge is talking about how Microsoft has seized seven domains, belonging to fancy bear apt 28 which is we've seen them active in a number of companies here, right in the Northeast United States. [00:34:57] These companies who are. Trying to provide materials, software, hardware for government contracts, right? So they're not even direct government contractors for the feds. They are just a sub contractors. And then we've seen fancy bear in there. We've seen the Chinese in these companies. It's incredible. [00:35:19] They have no. DIA that all of their intellectual property is being stolen, which is why the federal government has started cracking down on contractors and subcontractors and the, this whole paragraph 70 12 thing. We're getting geeky here, but companies that have to protect even unclassified information, confidential, classified, and they haven't been so Microsoft. [00:35:46] Obtained a court order. You can see this on my screen, over at YouTube and at rumble to take control of each domain on April six, that then started redirecting them to a sinkhole. So what they do is they take control of the DNS for the domain. So the root name servers, now, point to a Microsoft name server, and then send them to a sinkhole. [00:36:09] A sinkhole is basically nowhere you go there. There's nothing on the site, right? Or in this case also servers used by cybersecurity experts to capture and analyze malicious connections. And they'll do this. Oftentimes, when we're talking about these botnets, like we talked about a little earlier today, so apparently they're trying to establish long-term access to the system. [00:36:33] So the targets, what did we just talk about? Long-term acts. But net, right? That's what button that saw. So Microsoft has gotten involved. They've been doing this now for a little while. It's obviously not their normal business model, but it is something that they've been doing. They were also, by the way, the fancy bear link to these cyber attacks on the DNC in 2016. [00:36:57] And they also targeted the UFC election in 2020, which is why, part of the reason why anyways, don't use electronic equipment for our elections, have paper ballot, have people count those ballots yet it takes longer. You can't have the instant thing on TV, which is why all of these new services, they all don't do that. [00:37:18] That's ridiculous. But it's the only thing we can guarantee that these guys, like I got it up on the screen again. Fancy bear the Chinese et cetera. It's the only way they can get in. And if we were doing paper ballots and we had bipartisan people counting the ballots and independence, counting the ballots, observing this, we wouldn't have all of these problems that we had with the last election where people were saying it was stolen. [00:37:48] It was hacked. How do we know it was stolen? How do we know it? Wasn't stolen? How, go back to paper ballots, get rid of the scanning machines and particularly get rid of these electronic voting machines where you touch the screen to cast your vote. Those things are ridiculous. What if there's a software bug in it? [00:38:06] How can you go back and change the vote? People that complained about it again, and wait a minute. I voted for this guy and you had to record my vote for the other guy. It's ridiculous. Anyways. Back to QR codes. Okay. I'm going to pull this up on this screen because I think this is a cool article here. [00:38:25] This is from a, actually a site over in India. It's called scroll.in, and they're talking in here about how hazardous it can be. To use QR codes. Now they're not saying don't use QR codes, we've all had to use them. I've got up on my screen, this picture of being at a table. And you scan the QR code in order to get the menu. [00:38:48] In order to order, I did that. I was in Vermont and we were riding motorcycles or buddy, and I go into the little tiny. Restaurant, small restaurant and I had a half a dozen tables and they didn't have menus. You scanned it, the QR code that was there on the table and you placed your order. And off it goes a lot of places they've been doing that with menus. [00:39:11] You've seen that more and more saves them money as well and lets them change their prices more frequently. Yeah. Thanks for that inflation guys. Why shouldn't you use these QR codes? Why should you be extra careful? Here's the answer. QR codes are the URL of a webpage. That's the bottom line. Would you click a random URL that came in an email? [00:39:37] Would you click on a random URL in an ad or on a web page? We certainly know better than to cook URLs in our email. But that's exactly what the QR code is. And on top of it, the URL in a QR code tends to be what we call a shortened URL. So it might be Bitly, so might be bit.ally/and then some random characters. [00:40:04] How do you know where it's going to take? You don't all you know, is it's going to take you to Bitly, but that Bitly URL could be sending you to a malicious site. And now your phone could be hacked. It could be using your phone for Bitcoin mining for who knows what. So be very careful and the bad guys are using these in a different way that you might not have seen before, which is they are embedding QR code graphics. [00:40:34] Into emails. And they're thinking that people are going to hold up their phone to the email and what are they going to do? They're going to scan the QR code that was in their email. And now they're in trouble. Yeah, that's simple. Hey, visit me online. Craig peterson.com. Make sure you sign up for my newsletter. [00:40:53] Craig peterson.com/subscribe course, Craig Peterson, S O n.com. And I'm going to send you. Top three special reports, absolutely free. We got to take care of these bad guys. [00:41:08] This is a big deal, quite literally a big deal. Russian malware. We have been able to track it down now, track it down to a single site. Yeah. All of these bad guys are in one building in Moscow. [00:41:25] Hi everybody. Of course, you're listening to Craig Peterson. Thanks for taking a little bit out of your day today. As we continue to really talk about the stuff that's most important in the world, and there could be nothing more important, I think, than some of our cyber security, our lives, our fortunes, et cetera. [00:41:44] Last year we have to pay attention to well, This is a very big story and it's a bit of a scary one as well. We've had a lot of ransomware over the years and a lot of ransomware. Have you had it yourself? I bet you, if you haven't, someone who has had ransomware because frankly it is pervasive in every aspect of pretty much everybody's life out there. [00:42:12] So when you get hit with ransomware, Lately something a little different has happened. It's really gone through three phases. The first phase was the ransomware would get on to your system. Usually it came as an attachment, probably embedded in like a word file it's been embedded in PDFs, embedded in all kinds of stuff. [00:42:35] Even drive by downloads on websites, have brought malware. But in this case yeah, it was annoying. It was a problem. It would give you a red screen. You've probably seen it before warning about the ransomware and it told you, okay, here's what you can do to get your files back. And in order to get your files back, you usually. [00:42:57] To go to some exchange online, take dollars, buy of course, Bitcoin, or some other cryptocurrency. And then that cryptocurrency would be used in exchange now for you to get a key that would hopefully decrypt everything. And in reality, it often didn't encrypt hardly anything. So it's been a problem and a problem for a lot of people. [00:43:23] The FBI said that at the time. So this is a gen one of ransomware. You were lucky if 50% of the time you got all your data back, gen two of ransomware is when the bad guys started getting a little bit smarter. They didn't just take your files. Thumb and then say, Hey, pay up buddy. What they did at this point is that got onto your systems and they poked around. [00:43:46] They went we call in the industry, east west on the network. So they got onto you, maybe your kid's computer may, maybe you were hooked up via VPN to the office to do work. And it wasn't a great VPN. And the kid's computer had that virus and that virus weaseled his way all the way over the VPN, directly to the office, because remember. [00:44:09] VPNs are. A network private in that. Yeah. Okay. It's encrypted. And so someone who's got a wire tap isn't necessarily going to get anything, but it's a VPN, it's a tunnel. And that tunnel was used a many times for malware, like brand summer to creep over to the office network. That's an east west is going from. [00:44:30] One machine to another machine. And in businesses, man, you saw that one a lot as that ransomware moved around. So that was the second one. So the rents were going on the machine. It would then look for files that is. You might not want to have exposed. So it looked for files with bank account numbers in them, social security numbers, maybe intellectual property. [00:44:57] We saw a lot of that. Theft is continuing to go on primarily from the Chinese and then an intellectual property theft. And what happened next? While of course it ended up moving the data, the files, and then what they would do. It's encrypt your desk. So before they gripped your desk, they got copies of all of the stuff they thought might be important to you. [00:45:20] So now the threat was in version two of ransomware pay up, or if you don't pay up, you are going to have to pay us to not release your files. If you didn't want all of that client information online, if by law, you would get nailed for having that client information out online. And that's true in most states now, and the federal government's from putting some teeth on some of their laws as well, then what are you going to do? [00:45:49] Yeah, you paid the. So that was version two version three that we're seeing right now of ransomware is simply destructive. And if you go way back in history, you may remember I got hit with the Morris worm, which was one of the first pieces of nastiness out on the internet. And that was early nineties. [00:46:13] My business that I owned and was running, got hit with this thing. Even before that, There was ran. There was a nasty where viruses, if you will, that would get on the computer and destroy everything. It was just a malicious, as I remember, somebody at UC Berkeley, some researcher in it. And he didn't like what that of the researchers were saying about him. [00:46:35] So he put some floppy disk together and on them, he put. Erasing malware and shared all of the stats with anybody. And of course, you plugged that disc into your, that little floppy disc into your windows computer. And it says, okay, I'm going to go ahead and open it up. And, oh, look at this, a virus. [00:46:56] And so he then wiped out the computer of everybody else. That was a competitor of his out there in the industry. Yeah, a little bit of a problem if he asked me, so how did that end up getting around? What ended up happening while everybody got really upset with him, nobody really found out what was happening, who did it, et cetera. [00:47:19] That's what's happened. Now, so version three of malware is like some of the very first malware we ever saw version three of ransomware. So some, again, some of that very first ransomware was pretty nasty is not the sort of stuff you want to see running destroying files, but at least you could get back from a. [00:47:40] Nowadays, a lot of people are doing backups by attaching a disc directly to their machine, or they're backing up to another machine on the same network. Remember that whole east west thing, you didn't want the data going back and forth, it causes problems. Yeah. So what happens now? The Russians apparently are just trying to cause havoc with businesses, anybody who has decided that they're going to be anti-Russian in any way there they're attacking. [00:48:13] So they'll, reraise your desks. They'll erase all of your data. If you have backups on that thumb drive or that USB external. The good news erase that if you have backups on another machine, on the network, hopefully from their standpoint, there'll be able to get onto that machine and erase all of your backups, which is again, why we'd like 3, 2, 1 backups. [00:48:34] At the very least, there's some others that are even better. And if you're interested, send me an email me@craigpeterson.com. I'll send you a webinar that I did on this. I'm not charging you for. But it was a free webinar to begin with what a webinar on backup and how to backup properly and why to do it this way. [00:48:54] Again, me, M E Craig peterson.com. Be glad to do that. What we're seeing now is a huge problem. Let me see if this is going to work for us. Yeah. Okay. It is. I am, by the way, live here we go on my computer. So people who are watching. I can see my desktop. So here we go. This is Russian companies who are linked to this Russian malware. [00:49:24] Ransomware are hiding in plain sight is what they're calling it. So what does it mean. To hide in plain sight. While in this case, what it means is money that's been paid by American businesses to these Russian ransomware gangs, some of who by the way, are actively going after anyone that criticizes Russia found these American researchers. [00:49:50] Yeah. Led to one of Moscow's most prestigious addresses. You can see it up here on my screen. This is a New York times article. It's just a random actor, journalism people, sometimes even the New York times gets it. And they're saying millions of dollars have gone through this. So they've been tracing. [00:50:10] Where did they go? The Biden administration has also apparently zeroed in on the building is called Federation tower east. It's the tallest skyscraper in the Russian Capitol. How would that be to have a business and just this beautiful tall skyscraper and have a view that would be really cool. So they have targeted some companies in the tower. [00:50:32] As what it's trying to do is stop the ransomware guy gang. Maiden cryptocurrencies. Russian law enforcement usually has an answer to why don't you just shut down these bad guys that are out there trying to steal all of our money. They say there is no case open in Russian jurisdiction. There are no victims. [00:50:51] How do you expect us to prosecute these honorable people? That apparently is a quote from this Massachusetts based secure cybersecurity. Called recorded future, but I'm looking at a picture it's up on my screen right now. You guys can see it, but this is the Moscow financial district called Moscow city. [00:51:10] 97 floor Federation tower east. This is really pretty, you wouldn't know this isn't like London or any other major European capital. There's some cranes in the background building up new buildings. The cyber crime is really fueling some growth there in Moscow, which is, if you ask me the exact reason why lad is happy as a clam to just go ahead and have these Russian cyber crime guys. [00:51:43] Just go and bring money in right. Money is bringing in great money for them. The treasury department, by the way, it's estimated the Americans have paid $1.6 billion in ransom since 2011. Huge one ransomware strain called RIAA committed an estimated $162 million. Last year. It is really something. [00:52:07] So when we come back, we've got a lot more to talk about. We're going to talk about the cloud. If it's more secure or why is it calm, broken, give masks work. Why aren't they working right. Anyways, we'll talk about that. When we get back and visit me online, Craig Peter sohn.com. [00:52:26] Stick around. [00:52:29] I hate to say it, but there's another big scam out there right now. And it is hitting many of us, particularly the elderly quite hard. We're going to talk about that right now, what you can do about it and how you can recognize when it's happening. [00:52:45] Interesting article that came out this week in wired. [00:52:49] It's actually in Wired's. Let's see, what is a March 2022 issue. It wasn't this week. Nevermind. And it's talking about a serious problem. I'm going to show you guys who are watching I have this on rumble, YouTube, Facebook as well. So you guys can see along and of course, right here, too. [00:53:11] Now let's not forget about that, but this is an article that says we were calling or excuse me, they were calling for help. Then they stole. Thousands of dollars. I'm going to read parts of this article. It's just amazing. It's by Becca, Andrew's a back channel. What is that? Okay, so that's just a cat. [00:53:33] On December more one December morning, my mother's phone rang. She tugged the iPhone from the holster. She kept clipped to the waist, her blue jeans and wondered who might be calling perhaps somebody from the church who was checking in on her recovery from Corona virus. Hello. She said the voice that greeted her was masculine. [00:53:53] This is just great writing. The color sounded concerned and he told her something was. With her Amazon account, somebody has access to your bank accounts through Amazon and they can take all your money. I'm calling to it. Her mind raced or Lord, she prayed silently. The voice was warm and reassuring them. [00:54:15] My mom tried to focus closely on his words. My dad was driving to work in his truck and she was home alone. She'd been cooped up in the house for weeks with COVID isolated from her community and she missed the bomb. Friendly voice. I D I just love her language here. It's just phenomenal. She tried to steady herself. [00:54:36] The man said he needed to make sure the money was safe. He transferred her to a different male voice. Soothing reassuring, calm. She promised not to hang up a brain injury decades earlier, made it hard for her to follow his instructions, but she stuck with it. The voice explained slowly, carefully, how to swipe and tap her phone until she had installed an app that allowed him to see what was happening on her screen. [00:55:07] Now. You followed her every move. After some hour, she mentioned she had to relieve herself hours. It's okay. I'll stay on the line. He said she parked the phone, outside the bathroom and picked it back up. When she was done as Nooner approached, she told him I have to eat. I'll wait. It's okay. Don't hang up. [00:55:28] We'll lose all our progress. She set the phone down on the counter to make a sandwich, then pulled some chips from the cabinet and padded over to the kitchen. The phone buzz with the text. It was my father checking in. She typed back that there was a problem, but she was fixing it. She had it all taken care of. [00:55:48] She tapped the tiny white arrow next to the message field to send her reply. And then she heard the voice, its volume elevated as sounded angry. She frowned and brought the phone back up to her ear. Why would you do that? You can't tell anyone what if he's in. She felt confused that didn't make any sense, but she also didn't fully trust herself. [00:56:10] She was worn. From her slow recovery and the steroid, she was taken as a treatment, gave her a hollow buzz of energy. Now I want you guys to go have a look at this over on wired site. Read the whole article. It is a phenomenal. Absolutely phenomenal. But what it's doing is telling the story of this woman who was trying to, do the right thing, trusting other people, which many of us do? [00:56:40] I have a default trust with a little trepidation. I will admit that, but with the whole. Down the thing that happened, many of us have just been longing for a little bit of companionship and to hear a stranger who's trying to help out. That's a huge plus it goes on in this article and talks about how reassuring these guys were and what they did. [00:57:06] She installed this cash app and opened up PayPal downloaded. Coinbase set up Zelle so she could send money directly from her bank account. She doesn't know about any of these things. It's just incredible. So the afternoon wore on and the guy said Hey, we're almost done. And her husband of course, was on his way back. [00:57:30] And the sun was down. Father got home. He noticed right away that something was off. And she said she took care of it. And you said you took care of what I'm not supposed to tell you. It said, so the scammer had siphoned away. All of her personal information, the scammers had your social security number, date of birth driver's license number, and about $11,000. [00:57:55] These new financial apps like Zelle and others that are legitimate PayPal apps, right? Zell, you can use to send money legitimately to someone else. But it links into your bank account. That's why I don't like them. I have a friend that's been pushing me. Oh, this happens. Great. It saves you so much money on gas. [00:58:15] Look at how much money I've saved any. He sent a screenshot of it and I re I went online and had a look. And guess what? I read, reviews it again, like this tied into her bank account directly. And. What can happen? Like here, everything was emptied. So in the next few months this author of the story and her father tried to undo the damage. [00:58:40] Very frustrating, getting scanned of course, is really dehumanizing and it just breaks your trust and other people. How could someone do something like that? It's just incredible. Got to go through the stages of grief and everything. She got a, she talked to people, she said she got chili half replies, or just as often silence. [00:59:05] And she was calling around trying to find someone for some empathy. Okay. It's just incredible. Great article. If you can still find it, the March issue of wired, I'm sure it's available online. This goes on. And talks about her mother's seizures getting worse. And of course now they don't have the cash that they had been saving. [00:59:27] And it just very depressing. Now I have this, you might remember about a year ago, I talked about it. I had something like this happen to a friend of mine and I'm still not quite sure what happened, but it looks like it was a password sprain or password stuffing. And they got into his, the app that his company uses to pay people and sure enough, they got in and they directed his next two paychecks to their own account, which went right out of the country like that. [01:00:05] These are bad people. And how do you deal with this? It's incredible because if you've got someone like her mother who has mental problems due to no fault of her own and is a very trusting woman, what do you do? She's walking around all day with her phone on her hip. That's how we started this out. [01:00:27] Do you take that phone away from him? Th that would be dangerous, frankly. So this is a very problem. They had a USAA account was her bank account. USAA is usually good about this sort of stuff. In fact, my other friend had USAA as well. But they did help deactivate Zelle, but they didn't do anything about the $999 that were transferred through it. [01:00:51] Very bad. So they figured out maybe we should change our passwords. She had them change them. And if you would like information about password managers, again, I'm not selling anything. I'd be glad to send them to you. If you sign up for my email list, you're going to get them automatically. Craig peterson.com. [01:01:11] I've got a bunch of data information I want in your hands. It talks about the free stuff, talks about the paid stuff. None of which I'm selling you. Craig Peter sohn.com. Sign up right there on the top of the page. Thanks. Stick around. [01:01:32] We've had some serious supply chain attacks over the last couple of years. And they have caused all kinds of problems for tens of thousands of businesses. If you use WordPress, there was one of those this week. [01:01:47] We have had supply chain problems. Like you wouldn't believe. So let's start out by explaining what is a supply chain problem? [01:01:58] In this case, we're narrowing it down to cybersecurity because we've had supply chain problems from everything from our toilet paper to the food we eat. But what I'm talking about right now is. Supply chains when it comes to cyber security. And one of the biggest problems we had was a company that's supposedly providing cyber security for businesses, right? [01:02:29] Some of the biggest businesses in the world. And I'm looking at an article right now from security Boulevard, say saying how to protect the supply chain from vulnerable third party code. It can be a script that's downloaded online. It can be an open source library. We've seen big problems with get hub lately and pulling in libraries. [01:02:51] We've seen big problems with what are called containers lately, which are little mini versions of computers with all of the software. They're all ready to go. Ready and raring to go. All kinds of supply chain issues for a very long time now. And these supply chain, cyber attacks have been hitting some of our cybersecurity companies, really the hardest I'm pulling this up on my screen right now, if you're watching this on rumble or on YouTube, and you can see links to those, by the way, in my emails, I send out every week. [01:03:28] Craig peterson.com. Craig peterson.com. But you can see here, supply chain hits cybersecurity hard supply chain security is not a problem. It's a predicament. That's uninteresting look because we have to use some of the supply chain stuff. Seesaw the FBI or a sheer wean cybersecurity advisories because of the Russian attack over on Ukraine. [01:03:55] And then the U S the weakest link in supply chain security fears of rising fuel SISA FBI NSA and gestural partners. Issue is advisories Toyota stops production after possible cyber attack at a supplier. Isn't that something this goes on and on. What's a guy to do, right? Many of us are using websites to, in order to run our businesses. [01:04:24] Heck we got websites for our soccer team, for the kids, we got websites for pretty much everything that's out there today and those websites need software in order to run. So the basic idea of the website is nowadays. Content management system, they called CMS CMSs and there have been a lot over the years. [01:04:46] I've used quite a few myself off and on. This is very interesting though, because this particular piece of. Is code that runs a website. I'm going to show you this article from ARS Technica here on the screen, but it's talking about millions of WordPress sites that got a forced update to patch critical plugin flaws. [01:05:13] So when we're talking about supply chain, in this case, we're talking about something. WordPress right. And this WordPress software as good as it is, can have bugs. So WordPress is the content management system. So you load stuff up into, in fact, I'll bring up my site right now. So I'm going to bring up the Craig peterson.com. [01:05:37] And on my site, I have all kinds of stuff, which is why it's so slow to load. I've got to fix that one of these days, but this is an example of a WordPress site. So you can see right at the top of the site, I've got watch this week, show jobs, or top, of course, that was last week. You can watch it on rumble or a new tube, and then it's got my latest show. [01:05:59] So if you click on one of these, here you go. And you can listen to it. Starts right out here. C ta-da. So there, you can listen to my podcast right there on the site, and I've got an automated transcript of it. It's for you, depending on what you want. It's got links over here to take you to iTunes or YouTube or Spotify or SoundCloud or iHeart or Google player audible. [01:06:26] All of these links take you to different places. And this site in survey, Program a site in HTML. What we're doing is we're working. Putting some data in, so we say, okay, I want a default page. Somebody else has already set it up. Somebody else has already got an old program. It just works. And it's all right there for me. [01:06:49] Here's some related posts on the side. Here's the most popular ones that we have right now. This is a content management system. And specifically this of course is WordPress. So what happened. If I had a, yeah. And here's what it looks like over an audible, you can listen for free on. This is what happened this last week, WordPress, which has this great software that I use and tens of thousands of others use out there very popular. [01:07:27] And in order to make it easy for me to have my website, probably your business, probably your kids' soccer club, you name it is using WordPress. It's just over the top hop healer. It is using code that was written by other people. The reason we can make programs so quickly nowadays is we're relying on other programs. [01:07:51] So we'll go ahead and we'll grab this program that does this part of what we need to have done, and ta-da we're up and we're running. I just have to write the glue right? To put it together. The API calls, whatever it might be, because the idea is let's make it easier for programmers. So you've got something called get hub here. [01:08:11] Let me pull it up so you can see that you can go online if you're following along. To get hub.com. And as it says right there on their front page where the world builds software as a beautiful world, isn't it? That blue, you can see the air around it. And that's what it's doing is where the world builds software. [01:08:33] So let's say we want something. What do we want? What's a, let's say we want something to make a chess program. We can talk about chess and let's say, oh, you have to. I Dan didn't want to do this, so I'm just going to skip that for now. But it would come up and tell me, okay here's all of the chess programs that are out there and I find one, that's close to what I want to do. [01:08:54] So what do I do? Point while I go ahead and have a look at the license, a lot of the programs up there have a very open license, so I can just take that code, modify it. And I have a chess program without having to write a chess. It's really that simple that's part of the supply chain. If you bought my chest program, you would actually not just be getting the code that I wrote, which is typically just glue code with maybe some API APIs or application programming interfaces. [01:09:25] In other words, you're using someone else's code would now make it who's program. It's like the Pharaoh's barge. It would make it other people's programs. Not my. So you got to figure out what's in my supply chain. I've got a new client. I do work as a virtual chief information security officer. [01:09:46] Actually, it's a fractional Cecil. And as a fractional Cecil, one of the things I have to do is look at the whole supply chain. Who are they buying even physical things from. And could there be. Did it into their software, into their systems, something that might be coming from yet another supplier. Man, does this get complicated? [01:10:09] Very fast, but this week, our friends at WordPress, they went ahead and forced all WordPress sites to update. Very good. Okay. Otherwise, people could have downloaded a full backup of the sites that are out there, something you really just don't want to happen. Anyways. Go right now, Craig Peter sohn.com while the bits are still hot and sign up right there. [01:10:36] Craig peterson.com for the newsletter and get those special reports that are going to get you started. [01:10:43] This is the moment you've been waiting for. We're going to talk about free cybersecurity services and tools that you can use. Now you have to be a little bit of a cybersecurity expert to use them, but not much. This is from the government. [01:10:59] This is I think an amazing thing. This only came out within the last few weeks. [01:11:07] I have it up on my screen. There we go right now, for those of you who are watching on rumble or YouTube, you can see it right there, free cybersecurity services and tools from. The cybersecurity and infrastructure security agency SISA reminds me of Marvel was shield, that really long name that came up with an acronym for as though they weren't aiming for that acronym in the first place, but there are some tools that you can use there's tools that I use as a cybersecurity professional. [01:11:42] And some of them are obviously going to be pretty darn. Complex. And if you're looking at my screen right now, or if you want to go online at csun.gov/free-cybersecurity-services, dash, and the as tools, or just look it up online, you'll find this on my website as well. I'm going to try and make sure I get that up. [01:12:07] But what they have done is they're showing you what they call their key or the known exploited vulnerabilities. Okay. And this is where they are showing the CVEs, which are. The frankly, these are the ones that I use. It is published by nest, which is the national institutes of standard and Sanders and technology. [01:12:31] And this gives all of the details. So this is CVE 20 21, 27. Okay, and this is detail, and of course I would be using detail. And it's telling you, here's the advisories, there's one from get hub Excel. Leon has one. Here's the weaknesses, the SA the known soccer configurations. So you can find where they all are at and everything. [01:12:56] So all of the details. So they're telling you about that. These are the ones, this was in the vendor product. Project, I should say. So we'll look at the data added to catalog. Here are a few in Cisco right now. So this is their small business series of routers, which we do not use for anyone because they don't provide the type of security you want, but Cisco is taking care of the problems, right? [01:13:23] Many of these update themselves, here's Microsoft windows. And installer contains an unexpected unspecified vulnerability, which allows for privilege escalation, a lot of stuff this week, this is crazy Apache Tomcat, which I am never been a fan of and problems. So all of these came out. On March 3rd and more rights. [01:13:47] This is just page one. So let's look at page two here. Oh wow. More Microsoft Excel exchange server, some more Cisco vulnerabilities. Why Cisco? Why Microsoft? Because they are frankly. The big boys on the block, that why do you Rob the bank? Because that's where the money is. So they list all of those right here, as he said, does the warning you do use multifactor authentication? [01:14:16] I don't want to sound like a broken record, so I'm not going to say use multifactor authentication today. Okay. I just refuse to say use multi-factor authentication. And this one talks about what it is, right? Many names. Now they're trying to make this. But really a Fido key fast at any online considered the gold standard or multi-factor authentication Walt for online. [01:14:40] It is websites, but not for authors. So how would you know that if you weren't an expert? So yeah, this is the government talking, right? So they have the service. So what does, what do I do right? Me, Mr. Idiot. I click on this and they are talking about the service that they've got them showing it up on the screen. [01:15:02] It's called SISA insight. And they're talking about website, defacement, destructive malware, or not Petya want to cry, right? All these things. What can you do

How to Eat an Elephant: A Little Book Club for Large Books

Delighted to find ourselves with Pierre once again, in this episode we explore his foil relationship with Petya and contemplate a new and exciting dimension to Denisov's character. Join the Facebook discussion group here!Follow along with our reading schedule: https://www.centerforlit.com/hee

Craig Peterson's Tech Talk
Did You Hear About the Latest Phishing Scams to Hit? Get the Latest Free Cybersecurity Tools

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 4, 2022 82:33


Did You Hear About the Latest Phishing Scams to Hit? Get the Latest Free Cybersecurity Tools This is a big deal, quite literally a big deal. Russian malware. We have been able to track it down now, track it down to a single site. All of these bad guys are in one building in Moscow. [Following is an automatic transcript] This is a very big story and it's a bit of a scary one as well. We've had a lot of ransomware over the years and a lot of ransomware. Have you had it yourself? I bet you, if you haven't, someone who has had ransomware because frankly it is pervasive in every aspect of pretty much everybody's life out there. [00:00:40] So when you get hit with ransomware, Lately something a little different has happened. It's really gone through three phases. The first phase was the ransomware would get on to your system. Usually it came as an attachment, probably embedded in like a word file it's been embedded in PDFs, embedded in all kinds of stuff. [00:01:03] Even drive by downloads on websites, have brought malware. But in this case yeah, it was annoying. It was a problem. It would give you a red screen. You've probably seen it before warning about the ransomware and it told you, okay, here's what you can do to get your files back. And in order to get your files back, you usually. [00:01:25] To go to some exchange online, take dollars, buy of course, Bitcoin, or some other cryptocurrency. And then that cryptocurrency would be used in exchange now for you to get a key that would hopefully decrypt everything. And in reality, it often didn't encrypt hardly anything. So it's been a problem and a problem for a lot of people. [00:01:51] The FBI said that at the time. So this is a gen one of ransomware. You were lucky if 50% of the time you got all your data back, gen two of ransomware is when the bad guys started getting a little bit smarter. They didn't just take your files. Thumb and then say, Hey, pay up buddy. What they did at this point is that got onto your systems and they poked around. [00:02:14] They went we call in the industry, east west on the network. So they got onto you, maybe your kid's computer may, maybe you were hooked up via VPN to the office to do work. And it wasn't a great VPN. And the kid's computer had that virus and that virus weaseled his way all the way over the VPN, directly to the office, because remember. [00:02:37] VPNs are. A network private in that. Yeah. Okay. It's encrypted. And so someone who's got a wire tap isn't necessarily going to get anything, but it's a VPN, it's a tunnel. And that tunnel was used a many times for malware, like brand summer to creep over to the office network. That's an east west is going from. [00:02:57] One machine to another machine. And in businesses, man, you saw that one a lot as that ransomware moved around. So that was the second one. So the rents were going on the machine. It would then look for files that is. You might not want to have exposed. So it looked for files with bank account numbers in them, social security numbers, maybe intellectual property. [00:03:25] We saw a lot of that. Theft is continuing to go on primarily from the Chinese and then an intellectual property theft. And what happened next? While of course it ended up moving the data, the files, and then what they would do. It's encrypt your desk. So before they gripped your desk, they got copies of all of the stuff they thought might be important to you. [00:03:48] So now the threat was in version two of ransomware pay up, or if you don't pay up, you are going to have to pay us to not release your files. If you didn't want all of that client information online, if by law, you would get nailed for having that client information out online. And that's true in most states now, and the federal government's from putting some teeth on some of their laws as well, then what are you going to do? [00:04:17] Yeah, you paid the. So that was version two version three that we're seeing right now of ransomware is simply destructive. And if you go way back in history, you may remember I got hit with the Morris worm, which was one of the first pieces of nastiness out on the internet. And that was early nineties. [00:04:41] My business that I owned and was running, got hit with this thing. Even before that, There was ran. There was a nasty where viruses, if you will, that would get on the computer and destroy everything. It was just a malicious, as I remember, somebody at UC Berkeley, some researcher in it. And he didn't like what that of the researchers were saying about him. [00:05:03] So he put some floppy disk together and on them, he put. Erasing malware and shared all of the stats with anybody. And of course, you plugged that disc into your, that little floppy disc into your windows computer. And it says, okay, I'm going to go ahead and open it up. And, oh, look at this, a virus. [00:05:24] And so he then wiped out the computer of everybody else. That was a competitor of his out there in the industry. Yeah, a little bit of a problem if he asked me, so how did that end up getting around? What ended up happening while everybody got really upset with him, nobody really found out what was happening, who did it, et cetera. [00:05:47] That's what's happened. Now, so version three of malware is like some of the very first malware we ever saw version three of ransomware. So some, again, some of that very first ransomware was pretty nasty is not the sort of stuff you want to see running destroying files, but at least you could get back from a. [00:06:08] Nowadays, a lot of people are doing backups by attaching a disc directly to their machine, or they're backing up to another machine on the same network. Remember that whole east west thing, you didn't want the data going back and forth, it causes problems. Yeah. So what happens now? The Russians apparently are just trying to cause havoc with businesses, anybody who has decided that they're going to be anti-Russian in any way there they're attacking. [00:06:41] So they'll, reraise your desks. They'll erase all of your data. If you have backups on that thumb drive or that USB external. The good news erase that if you have backups on another machine, on the network, hopefully from their standpoint, there'll be able to get onto that machine and erase all of your backups, which is again, why we'd like 3, 2, 1 backups. [00:07:02] At the very least, there's some others that are even better. And if you're interested, send me an email me@craigpeterson.com. I'll send you a webinar that I did on this. I'm not charging you for. But it was a free webinar to begin with what a webinar on backup and how to backup properly and why to do it this way. [00:07:22] Again, me, M E Craig peterson.com. Be glad to do that. What we're seeing now is a huge problem. Let me see if this is going to work for us. Yeah. Okay. It is. I am, by the way, live here we go on my computer. So people who are watching. I can see my desktop. So here we go. This is Russian companies who are linked to this Russian malware. [00:07:52] Ransomware are hiding in plain sight is what they're calling it. So what does it mean. To hide in plain sight. While in this case, what it means is money that's been paid by American businesses to these Russian ransomware gangs, some of who by the way, are actively going after anyone that criticizes Russia found these American researchers. [00:08:18] Yeah. Led to one of Moscow's most prestigious addresses. You can see it up here on my screen. This is a New York times article. It's just a random actor, journalism people, sometimes even the New York times gets it. And they're saying millions of dollars have gone through this. So they've been tracing. [00:08:38] Where did they go? The Biden administration has also apparently zeroed in on the building is called Federation tower east. It's the tallest skyscraper in the Russian Capitol. How would that be to have a business and just this beautiful tall skyscraper and have a view that would be really cool. So they have targeted some companies in the tower. [00:09:00] As what it's trying to do is stop the ransomware guy gang. Maiden cryptocurrencies. Russian law enforcement usually has an answer to why don't you just shut down these bad guys that are out there trying to steal all of our money. They say there is no case open in Russian jurisdiction. There are no victims. [00:09:19] How do you expect us to prosecute these honorable people? That apparently is a quote from this Massachusetts based secure cybersecurity. Called recorded future, but I'm looking at a picture it's up on my screen right now. You guys can see it, but this is the Moscow financial district called Moscow city. [00:09:38] 97 floor Federation tower east. This is really pretty, you wouldn't know this isn't like London or any other major European capital. There's some cranes in the background building up new buildings. Cyber crime is really fueling some growth there in Moscow, which is, if you ask me the exact reason why lad is happy as a clam to just go ahead and have these Russian cyber crime guys. [00:10:11] Just go and bring money in right. Money is bringing in great money for them. The treasury department, by the way, it's estimated the Americans have paid $1.6 billion in ransom since 2011. Huge one ransomware strain called RIAA committed an estimated $162 million. Last year. It is really something. [00:10:35] So when we come back, we've got a lot more to talk about. We're going to talk about the cloud. If it's more secure or why is it calm, broken, give masks work. Why aren't they working right. Anyways, we'll talk about that. When we get back and visit me online, Craig Peter sohn.com. [00:10:54] Stick around. [00:10:57] I hate to say it, but there's another big scam out there right now. And it is hitting many of us, particularly the elderly quite hard. We're going to talk about that right now, what you can do about it and how you can recognize when it's happening. [00:11:13] Interesting article that came out in Wired. [00:11:16] And it's talking about a serious problem. I'm going to show you guys who are watching I have this on Rumble, YouTube, Facebook as well. So you guys can see a long and of course, right here, a two. [00:11:30] Now let's not forget about that, but this is an article that says we were calling or excuse me, they were calling for help. Then they stole. Thousands of dollars. I'm going to read parts of this article. It's just amazing. It's by Becca, Andrew's a back channel. What is that? Okay, so that's just a cat. [00:11:52] On December more one December morning, my mother's phone rang. She tugged the iPhone from the holster. She kept clipped to the waist, her blue jeans and wondered who might be calling perhaps somebody from the church who was checking in on her recovery from coronavirus. Hello. She said the voice that greeted her was masculine. [00:12:12] This is just great writing. The color sounded concerned and he told her something was. With her Amazon account, somebody has access to your bank accounts through Amazon and they can take all your money. I'm calling to them. Her mind raced or Lord, she prayed silently. The voice was warm and reassuring them. [00:12:34] My mom tried to focus closely on his words. My dad was driving to work in his truck and she was home alone. She'd been cooped up in the house for weeks with COVID isolated from her community and she missed the bomb. Friendly voice. I just love her language here. It's just phenomenal. She tried to steady herself. [00:12:55] The man said he needed to make sure the money was safe. He transferred her to a different male voice. Soothing reassuring, calm. She promised not to hang up a brain injury decades earlier, made it hard for her to follow his instructions, but she stuck with it. The voice explained slowly, carefully, how to swipe and tap her phone until she had installed an app that allowed him to see what was happening on her screen. [00:13:26] Now. You followed her every move. After some hour, she mentioned she had to relieve herself hours. It's okay. I'll stay on the line. He said she parked the phone, outside the bathroom and picked it back up. When she was done, as noon approached, she told him I have to eat. I'll wait. It's okay. Don't hang up. [00:13:47] We'll lose all our progress. She set the phone down on the counter to make a sandwich, then pulled some chips from the cabinet and padded over to the kitchen. The phone buzz with the text. It was my father checking in. She typed back that there was a problem, but she was fixing it. She had it all taken care of. [00:14:07] She tapped the tiny white arrow next to the message field to send her reply. And then she heard the voice, its volume elevated as sounded angry. She frowned and brought the phone back up to her ear. Why would you do that? You can't tell anyone what if he's in. She felt confused that didn't make any sense, but she also didn't fully trust herself. [00:14:29] She was worn. From her slow recovery and the steroid, she was taken as a treatment, gave her a hollow buzz of energy. Now I want you guys to go have a look at this over on wired site. Read the whole article. It is a phenomenal. Absolutely phenomenal. But what it's doing is telling the story of this woman who was trying to, do the right thing, trusting other people, which many of us do? [00:14:59] I have a default trust with a little trepidation. I will admit that, but with the whole. Down the thing that happened, many of us have just been longing for a little bit of companionship and to hear a stranger who's trying to help out. That's a huge plus it goes on in this article and talks about how reassuring these guys were and what they did. [00:15:25] She installed this cash app and opened up PayPal downloaded. Coinbase set up Zelle so she could send money directly from her bank account. She doesn't know about any of these things. It's just incredible. So the afternoon wore on and the guy said Hey, we're almost done. And her husband of course, was on his way back. [00:15:49] And the sun was down. Father got home. He noticed right away that something was off. And she said she took care of it. And you said you took care of what I'm not supposed to tell you. It said, so this scammer had siphoned away. All of her personal information, the scammers had your social security number, date of birth driver's license number, and about $11,000. [00:16:14] These new financial apps like Zell and others that are legitimate PayPal apps, right? Zell, you can use to send money legitimately to someone else. But it links into your bank account. That's why I don't like them. I have a friend that's been pushing me. Oh, this happens. Great. It saves you so much money on gas. [00:16:34] Look at how much money I've saved any. He sent a screenshot of it and I re I went online and had a look. And guess what? I read, reviews it again, like this tied into her bank account directly. And. What can happen? Like here, everything was emptied. So in the next few months this author of the story and her father tried to undo the damage. [00:16:59] Very frustrating, getting scanned of course, is really dehumanizing and it just breaks your trust and other people. How could someone do something like that? It's just incredible. Got to go through the stages of grief and everything. She got a, she talked to people, she said she got chili half replies, or just as often silence. [00:17:24] And she was calling around trying to find someone with some empathy. Okay. It's just incredible. Great article. If you can still find it, the March issue of wired, I'm sure it's available online. This goes on. And talks about her mother's seizures getting worse. And of course now they don't have the cash that they had been saving. [00:17:46] And it just very depressing. Now I have this, you might remember about a year ago, I talked about it. I had something like this happen to a friend of mine and I'm still not quite sure what happened, but it looks like it was a password sprain or password stuffing. And they got into his, the app that his company uses to pay people and sure enough, they got in and they directed his next two paychecks to their own account, which went right out of the country like that. [00:18:24] These are bad people. And how do you deal with this? It's incredible because if you've got someone like her mother who has mental problems due to no fault of her own and is a very trusting woman, what do you do? She's walking around all day with her phone on her hip. That's how we started this out. [00:18:46] Do you take that phone away from him? Th that would be dangerous, frankly. So this is a very problem. They had a USAA account was her bank account. USAA is usually good about this sort of stuff. In fact, my other friend had USAA as well. But they did help deactivate Zelle, but they didn't do anything about the $999 that were transferred through it. [00:19:10] Very bad. So they figured out maybe we should change our passwords. She had them change them. And if you would like information about password managers, again, I'm not selling anything. I'd be glad to send them to you. If you sign up for my email list, you're going to get them automatically. Craig peterson.com. [00:19:30] I've got a bunch of data information I want in your hands. It talks about the free stuff, talks about the paid stuff. None of which I'm selling you. Craig Peter sohn.com. Sign up right there on the top of the page. Thanks. Stick around. [00:19:51] We've had some serious supply chain attacks over the last couple of years. And they have caused all kinds of problems for tens of thousands of businesses. If you use WordPress, there was one of those this week. [00:20:06] We have had supply chain problems. Like you wouldn't believe. So let's start out by explaining what is a supply chain problem? [00:20:17] In this case, we're narrowing it down to cybersecurity because we've had supply chain problems from everything from our toilet paper to the food we eat. But what I'm talking about right now is. Supply chains when it comes to cyber security. And one of the biggest problems we had was a company that's supposedly providing cyber security for businesses, right? [00:20:48] Some of the biggest businesses in the world. And I'm looking at an article right now from security Boulevard, say saying how to protect the supply chain from vulnerable third party code. It can be a script that's downloaded online. It can be an open source library. We've seen big problems with get hub lately and pulling in libraries. [00:21:10] We've seen big problems with what are called containers lately, which are little mini versions of computers with all of the software. They're all ready to go. Ready and raring to go. All kinds of supply chain issues for a very long time now. And these supply chain, cyber attacks have been hitting some of our cybersecurity companies, really the hardest I'm pulling this up on my screen right now, if you're watching this on rumble or on YouTube, and you can see links to those, by the way, in my emails, I send out every week. [00:21:47] Craig peterson.com. Craig peterson.com. But you can see here, supply chain hits cybersecurity hard supply chain security is not a problem. It's a predicament. That's uninteresting look because we have to use some of the supply chain stuff. Seesaw the FBI or a sheer wean cybersecurity advisories because of the Russian attack over on Ukraine. [00:22:14] And then the U S the weakest link in supply chain security fears of rising fuel SISA FBI NSA and gestural partners. Issue is advisories Toyota stops production after possible cyber attack at a supplier. Isn't that something this goes on and on. What's a guy to do, right? Many of us are using websites to, in order to run our businesses. [00:22:43] Heck we got websites for our soccer team, for the kids, we got websites for pretty much everything that's out there today and those websites need software in order to run. So the basic idea of the website is nowadays. Content management system, they called CMS CMSs and there have been a lot over the years. [00:23:05] I've used quite a few myself off and on. This is very interesting though, because this particular piece of. Is code that runs a website. I'm going to show you this article from ARS Technica here on the screen, but it's talking about millions of WordPress sites that got a forced update to patch critical plugin flaws. [00:23:32] So when we're talking about supply chain, in this case, we're talking about something. WordPress right. And this WordPress software as good as it is, can have bugs. So WordPress is the content management system. So you load stuff up into, in fact, I'll bring up my site right now. So I'm going to bring up the Craig peterson.com. [00:23:55] And on my site, I have all kinds of stuff, which is why it's so slow to load. I've got to fix that one of these days, but this is an example of a WordPress site. So you can see right at the top of the site, I've got watch this week, show jobs, or top, of course, that was last week. You can watch it on rumble or a new tube, and then it's got my latest show. [00:24:18] So if you click on one of these, here you go. And you can listen to it. Starts right out here. C ta-da. So there, you can listen to my podcast right there on the site, and I've got an automated transcript of it. It's for you, depending on what you want. It's got links over here to take you to iTunes or YouTube or Spotify or SoundCloud or iHeart or Google player audible. [00:24:45] All of these links take you to different places. And this site in survey, Program a site in HTML. What we're doing is we're working. Putting some data in, so we say, okay, I want a default page. Somebody else has already set it up. Somebody else has already got an old program. It just works. And it's all right there for me. [00:25:08] Here's some related posts on the side. Here's the most popular ones that we have right now. This is a content management system. And specifically this of course is WordPress. So what happened. If I had a, yeah. And here's what it looks like over an audible, you can listen for free on. This is what happened this last week, WordPress, which has this great software that I use and tens of thousands of others use out there very popular. [00:25:46] And in order to make it easy for me to have my website, probably your business, probably your kids' soccer club, you name it is using WordPress. It's just over the top hop healer. It is using code that was written by other people. The reason we can make programs so quickly nowadays is we're relying on other programs. [00:26:10] So we'll go ahead and we'll grab this program that does this part of what we need to have done, and ta-da we're up and we're running. I just have to write the glue right? To put it together. The API calls, whatever it might be, because the idea is let's make it easier for programmers. So you've got something called get hub here. [00:26:30] Let me pull it up so you can see that you can go online if you're following along. To get hub.com. And as it says right there on their front page where the world builds software as a beautiful world, isn't it? That blue, you can see the air around it. And that's what it's doing is where the world builds software. [00:26:51] So let's say we want something. What do we want? What's a, let's say we want something to make a chess program. We can talk about chess and let's say, oh, you have to. Dan didn't want to do this, so I'm just going to skip that for now. But it would come up and tell me, okay here's all of the chess programs that are out there and I find one, that's close to what I want to do. [00:27:13] So what do I do? Point while I go ahead and have a look at the license, a lot of the programs up there have a very open license, so I can just take that code, modify it. And I have a chess program without having to write a chess. It's really that simple that's part of the supply chain. If you bought my chest program, you would actually not just be getting the code that I wrote, which is typically just glue code with maybe some API APIs or application programming interfaces. [00:27:44] In other words, you're using someone else's code would now make it who's program. It's like the Pharaoh's barge. It would make it other people's programs. Not my. So you got to figure out what's in my supply chain. I've got a new client. I do work as a virtual chief information security officer. [00:28:05] Actually, it's a fractional Cecil. And as a fractional Cecil, one of the things I have to do is look at the whole supply chain. Who are they buying even physical things from. And could there be. Did it into their software, into their systems, something that might be coming from yet another supplier. Man, does this get complicated? [00:28:28] Very fast, but this week, our friends at WordPress, they went ahead and forced all WordPress sites to update. Very good. Okay. Otherwise, people could have downloaded a full backup of the sites that are out there, something you really just don't want to happen. Anyways. Go right now, Craig Peter sohn.com while the bits are still hot and sign up right there. [00:28:55] Craig peterson.com for the newsletter and get those special reports that are going to get you started. [00:29:02] This is the moment you've been waiting for. We're going to talk about free cybersecurity services and tools that you can use. Now you have to be a little bit of a cybersecurity expert to use them, but not much. This is from the government. [00:29:18] This is I think an amazing thing. This only came out within the last few weeks. [00:29:26] I have it up on my screen. There we go right now, for those of you who are watching on Rumble or YouTube, you can see it right there, free cybersecurity services and tools from. The cybersecurity and infrastructure security agency SISA reminds me of Marvel was shield, that really long name that came up with an acronym for as though they weren't aiming for that acronym in the first place, but there are some tools that you can use there's tools that I use as a cybersecurity professional. [00:30:01] And some of them are obviously going to be pretty darn. Complex. And if you're looking at my screen right now, or if you want to go online at csun.gov/free-cybersecurity-services, dash, and the as tools, or just look it up online, you'll find this on my website as well. I'm going to try and make sure I get that up. [00:30:26] But what they have done is they're showing you what they call their key or the known exploited vulnerabilities. Okay. And this is where they are showing the CVEs, which are. The frankly, these are the ones that I use. It is published by nest, which is the national institutes of standard and Sanders and technology. [00:30:50] And this gives all of the details. So this is CVE 20 21, 27. Okay, and this is detail, and of course I would be using detail. And it's telling you, here's the advisories, there's one from get hub Excel. Leon has one. Here's the weaknesses, the SA the known soccer configurations. So you can find where they all are at and everything. [00:31:15] So all of the details. So they're telling you about that. These are the ones, this was in the vendor product. Project, I should say. So we'll look at the data added to catalog. Here are a few in Cisco right now. So this is their small business series of routers, which we do not use for anyone because they don't provide the type of security you want, but Cisco is taking care of the problems, right? [00:31:41] Many of these update themselves, here's Microsoft windows. And installer contains an unexpected unspecified vulnerability, which allows for privilege escalation, a lot of stuff this week, this is crazy Apache Tomcat, which I am never been a fan of and problems. So all of these came out. On March 3rd and more rights. [00:32:05] This is just page one. So let's look at page two here. Oh wow. More Microsoft Excel exchange server, some more Cisco vulnerabilities. Why Cisco? Why Microsoft? Because they are frankly. The big boys on the block, that why do you Rob the bank? Because that's where the money is. So they list all of those right here, as he said, does the warning you do use multifactor authentication? [00:32:34] I don't want to sound like a broken record, so I'm not going to say use multifactor authentication today. Okay. I just refuse to say use multi-factor authentication. And this one talks about what it is, right? Many names. Now they're trying to make this. But really a Fido key, fast identity online considered the gold standard or multi-factor authentication Walt for online. [00:32:58] It is websites, but not for authors. So how would you know that if you weren't an expert? So yeah, this is the government talking, right? So they have the service. So what does, what do I do right? Me, Mr. Idiot. I click on this and they are talking about the service that they've got them showing it up on the screen. [00:33:20] It's called SISA insight. And they're talking about website, defacement, destructive malware, or not Petya want to cry, right? All these things. What can you do to prevent it? And. They make it sound easy. Now I want to say something here because I, I have a couple of mastermind groups and in one of my groups, I rescued a group member from a 40 something thousand dollar loss. [00:33:50] And so I was explaining it in our next mastermind meeting. Cause everyone wanted to know. What should I do? How should I do it? And they all tuned out and I thought I was trying to, I was being simple enough. I was trying to be simple, not like simple, like Kamala Harris explaining that Ukraine is a country beside right next to another country called Russia. [00:34:14] And that's why there's an invasion. Okay. I couldn't believe that. Did you guys hear that? It was just incredible, but I didn't get that simple. And I know you guys are the best and brightest, and you're trying to figure this, all this stuff all out, and that's why you need to make sure you sign up for my email list right now, because I do have simple step-by-step stuff. [00:34:36] And these tools that they're talking about and services are supposedly available. Now, I went to a bunch of these. And I tried to get some services. So they said they'll do a free scan over the network. So I filled it all out and according to their standards, my company, because I do cybersecurity for everything from government contractors, through dentists and manufacturers and distribution companies. [00:35:09] So I, I. The critical infrastructure definition. And I have never heard back from them. I check my spam box at least once a week looking for their reply. So I don't hold up a whole lot of hope, but there is some good information here that you can get email via social media via just all of these different types of things that you. [00:35:34] You could use for it. And again, I want you to look for it online. It's on csun.gov. If you go to their homepage, you'll see their tools, they've got a shields up a warning right now on their homepage because there have been so many attacks coming from China and coming from Russia, but particularly Russia. [00:35:54] And you can see there. Stop ransomware.gov, which has some great tips, particularly for home users and small businesses. The Seesaw culture, height, hygiene services. That they have doing business with CSUN and careers they're looking forward to is okay. It's part of Homeland security. So there's a whole lot that you can do and you can find, but I wanted to let you guys know that this is out there. [00:36:24] A lot of the stuff guaranteed is going to be. Above 98% of people's heads out there. Just in general, even it professionals. So look for information, that's going to help you. That's on your level. And to that end we have right now, three things. If you sign up for the email list, or if you're already on my email list, you can just email. [00:36:50] Me@craigpeterson.com or just hit reply to any of my emails and I'll see it and ask for them. But we've got stuff on your computer, keeping it secure, keeping your password secure comparison between using a one password manager or using last pass, which I am not advising to use right now, but that's in there. [00:37:14] There are a lot of different things that are there that are ready for you to get right away. And then if you have other questions, I've got dozens of little special reports that I've written in response to people's questions. Don't be afraid to send them to me. I'd you know me@craigpeterson.com and I'll make sure I get you an answer because it's that important. [00:37:39] Okay. I'm not here trying to sell you something. I am here because most of you guys can could never get my services. You don't need them. You can't afford them, whatever. I'm a fractional Cecil. I'm one of the guys that keep. It was a cyber security working in a live for businesses. Like it's not going to be everybody, but it's, it is there is, I shouldn't say a lot of information you guys need and need to understand that I want to help you. Okay. I think I've beaten that horse enough and it was probably past dead, but you'll find some of this stuff on my website@craigpeterson.com. [00:38:17] I've been working on some other changes to it. I would also ask you guys. If you're hearing part of the show today, I know a lot of people who are listening on the radio are tend to be out and about in their cars, listening, on the weekend, I listened to a lot of radio then, but go ahead and subscribe to either my podcast. [00:38:38] And there are a lot of ways to do that. And I showed those people who are watching on video, how to do that. And if you would give me a five star. On whatever platform you're using, hopefully I've earned that. And then also if you'd like video, I have my whole show up. It's like about an hour and a half long on multiple platforms. [00:39:04] So rumble.com rumble, R U M B L E. Is a competitor to YouTube. So if you don't like censorship, if you want a site that is trying to keep that information out there, get it out there for you. A rumble is your place. You'll find all kinds of interesting characters there other than myself, right? A lot of conservative people go there to rumble.com. [00:39:28] I have it up on YouTube. Because YouTube, isn't the worst platform in the world. They're also not the best, but they are the biggest. Did you know, YouTube is the second largest search engine in the world. Okay. They have a lot of people on YouTube and then on Facebook as well. You'll find me there on Facebook. [00:39:48] Of course, Craig Peterson, I had. I excuse me at facebook.com/craig Peterson. And I didn't use it for a long time cause I hated Facebook. Just, I looked at it as a time sink that I just didn't need. I got a lot of stuff. I got a lot of people help and so I didn't really do anything with it. And so somebody else got the slash Craig Peterson, but I do have a trick for you. [00:40:12] If you go online with your web browser to Craig peterson.com. That's my website slash. YouTube. It'll take you right to my YouTube page. Ores Craig peterson.com/facebook. Yes. What do your Facebook page? Craig peterson.com/itunes. Good slash sound cloud, et cetera. It'll take you right to my page on all of those sites and have a look at the video. [00:40:41] Let me know what you think. I would appreciate that feedback and make sure you tune in on the radio too. It's great. Don't watch this while you're driving to taking the kids to school, a lot of people listen to this while they're taking the kids to school on podcast. Anyways, take care. Thanks for being with us. [00:41:01] By now you've heard of tick talk. You might use Tik TOK. A lot of people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [00:41:17] This is a little bit on the scary side. We built our house some 25 years ago, we contacted a builder and I put together all of the specs and I made sure that the wood he used was better than average. [00:41:33] It's all plywood, it's not particle board or the composite boards. And I made sure they were thicker than need be that all of the rules. Struts were were closer together than code required. And we had bigger plumbing than what was required all the way through the house. And one of the things I did is I had him wire the house, actually the electrical contractor with a heavier gauge wire than usually. [00:42:05] So that I had 20 amp sockets at every socket in the house. Now we put the special 20 amp sockets on some of them, like in the kitchen, we have a commercial toaster, as a sort of thing you need, when you got eight kids and a half of our married life, we had other families living with us too, that we were helping out everything from training through just getting them through. [00:42:29] Bot. So there were times when we had 20 plus people living in my house, it got gotten it crowded, but I wanted to make sure everything was above code so that it would work well and work well for us and knowing how much juice we tend to use. Yeah, you don't want to see my electric bill. I decided yeah, let's do the heavier gauge wire and let's put the sockets in one of the things I had the electrician do in order to make the sockets a little bit safer. [00:42:59] This was back before you had these. I, frankly, I hate them, but these safety sockets where you push in the plug in Erie really gotta push it in order for something to get plugged in. There are ways to defeat those safety sockets and that's where this problem comes in. I had him install the sockets. [00:43:21] You might consider them to be upside down. So the top of the socket had the little grounding. And then underneath that you had the hot and the neutral lines. So the idea there was, while if something fell onto a plug that wasn't plugged in all the way, or if the kids decided they'd stick something on it, it would go to ground or made sense to be. [00:43:47] And apparently it's worked because none of my kids are dead yet. So that's a good thing, there's these challenges on Tik TOK. You've probably heard of them. In fact, that's how they really got themselves going. They had that, that ice bucket challenge and many others that people were doing and they continue to this day. [00:44:09] One of the tick tock challenges is very stupid and dangerous. And that's where this article from ARS Technica comes. Eric Bankman wrote. The when was this? Oh my gosh, this is right at the beginning of the year, apparently a 10 year old girl and her mother used Amazon Alexa. And what was happening is the kid wanted some challenges. [00:44:34] Mom wanted some challenges and they were doing a whole bunch of things. Physical challenges, like laying down. Rolling over a holding a shot on your foot from a phys ed teacher on YouTube. And the girl just wanted another one. So for those of you who are uninitiated, the plug challenge consists of. [00:44:57] Partially plugging a phone charger into an electrical outlet. Now the phone chargers usually do not have a grounding pin. So my little work around of mounting, all of the sockets upside down wouldn't matter. Cause if you look at that a little charger plug, it's usually just two pins and it actually usually doesn't care about the polarity. [00:45:19] It doesn't have the bigger the side and the smaller side, the. Yeah. I can't remember what they call now, but if they're both the same size, so you can put it in either direction, the spades that you put in. So if you put it in part way, you have defeated the safety mechanism, that's in all of these modern plus. [00:45:41] So you put it in part way, you have to push hard and in it goes, and then you pull it out part way. So that's part one. Can you plug this phone charger intellectual outlet part way so that those two conductors are exposed and then yeah. Then they ask you the challenge is to drop a penny onto the exposed prongs. [00:46:11] So you can get anything from a small spark. That little coin may jump off to a full-blown electrical fire. Now mom was there and she yelled. No Alexa, no. And the daughter said she's too smart to do something. Anyway, and I'm looking at a picture here that ARS Technica published of a wall socket, where a short had happened. [00:46:37] This wall socket is mounted sideways. I don't get that. And the hot side is up. So anything falling against the sock and by the way, the faceplate is metal. And grounded, obviously. So anything falling onto a plug that's only partially plugged in because the sock gets sideways. It falls onto it. It touches the metal face plate, and you've got a fire Bruin. [00:47:08] So they've got a picture of one of these in a house and you can see where the smoke went up. Now. I don't think the whole house caught on fire here, but it was a major zap. It reminds me of the days when we had. The fuses in the basement. And if a fuse blew, all you really needed to do is go down there and stick a quarter in it. [00:47:28] And you're fine, which means it's defeated the purpose. Anyways, you gotta be careful. At Amazon confirmed in a statement to the BBC that it has removed that particular challenge from Alex's database. Obviously these are computer generated and they're based on Tik TOK, idiots. You shouldn't be using Tik TOK for a lot of reasons. [00:47:55] One of them is it has been alleged that they have been spying for the Chinese. It is a Chinese company. It's part of 10 cent. And the, there's just a little stupid thing. So Amazon said, as soon as you became aware of this error, We took action to fix it. So again, you can't necessarily trust your kid at home with a, an Alexa doing challenges. [00:48:20] I just can't believe it. It's just incredible exactly what happened here. Hey, I want to give you a real quick tip. Last week, we went over how you can find out. If your computer has been hacked, basically. In fact, we were a little bit more specific. We said, okay, what I want to do here is know if not just the computers have been hacked, but as someone's stolen my. [00:48:50] Email and or my password. And we explained why and everything else. Then if you missed it last week, you can just go right ahead, online to to oh my I'm just having man's beginning of the year, right? That's what happened. Go online to Craig peterson.com/itunes or slash your favorite podcast player. [00:49:11] And you can listen to it there. So really good little article from. And make use of technology. And they're talking about what are some of the things you can do? You should do. You shouldn't do when it comes to external GPU's and now if you are a regular computer user, you don't even need one of these things and people might've tried to talk you into it. [00:49:38] Now, also that GPU is these graphical processing units are built into all of our computers nowadays. All of these new computers that our friends at apple have come up with, have some amazing GPS built into them. Those are great. They're used to update your actual windows screen that you're looking at hate Microsoft for stealing words like windows, mean things anyways. [00:50:05] But the external GPU is something I use on my main production workstation. So I've got GPU's they work great. And when I'm processing video and doing the edits, and then the final renders, that's when an external GPU comes in. So I can guarantee you if you don't know what I'm talking about here, I guarantee you. [00:50:31] I need an external GPU. Now the couple of other things to know, if you are looking for an, a GPO of any sort to build and put in your existing computer to build in somewhere else, the GPU's are difficult to get right now. And part of the reason for that is so many people have been using them for mining cryptocurrencies, because they're quite good at that. [00:50:57] Now there's special hardware that's being made. To mine, cryptocurrencies, but GPU's frankly are great little work around for anybody that just has a basic computer and wants to try and do a little crypto mining. So you're going to have a hard time getting a hold of these. GPU's just like many other chip sets out there and my own personal experiences. [00:51:21] I don't need the top end one because of it takes a few extra minutes to render something. When I'm making a video, it's not a big deal, cause I'm not making videos all day long. So a little tip for you on GPU's and external GPU's. And do you need them, what should do. Use them for, Hey, I am doing some training every week. [00:51:45] Kind what we just did just now, but about cybersecurity and other things in my weekly newsletter. So make sure you sign up Craig peterson.com AU. And if you could, and if you are a podcast listener, like to invite you to subscribe to my podcast, you can find it at Craig peterson.com/itunes. [00:52:08] We've got the end of a era for a device that was considered to be quite secure. In fact, some of our presidents, particularly the one that comes to mind is president Obama used it extensively, and it isn't what it was. [00:52:25] This device that I'm thinking of right now, and we'll see if you can guess what it is, but it was extremely popular. [00:52:33] It was for sending and receiving messages that even had some other functions, but it was mainly an email thing. I remember having a couple of those back in the day that was strictly email. They were, they actually nice. And then of course texting came along and they kept up with the times a little bit. [00:52:51] What we're talking about is the end of the line. This was a Canadian company, a company that was well-known worldwide by the name of rim. They were providing the Blackberry operating system. They had servers that were designed and built to be secure. So you could rest assured that all of your data was safe, no loud you to send and receive emails. [00:53:25] And it had that wonderful little click keyboard on it. Something that went the way of all the world. That keyboard is now gone and it's gone for good as has the ability to use some of those blackberries that you bought over the years to keep yourself. I just had to play taps underneath that, but it's just incredible. [00:53:53] It is the end of the day for the company, the once dominated the entire smartphone business. If you didn't have a Blackberry, you weren't cool and you weren't secure or secure. And you weren't able to communicate as easily. They were actually. Excellent little devices in their day. I want to add another note here when we're talking about secure, because Blackberry was very big and saying, Hey, listen, it's very secure. [00:54:23] It's all encrypted. We keep all your emails, encrypted, all your communications and gripped and what we found out by the way, is it turned out that the Canadian government, basically the equivalent of the FBI, CIA NSA had the master key for all Blackberry messages. And not only did it have the master key, it shared the master key with the United States secret agencies, the end of the. [00:54:55] CIA, et cetera. So if you were thinking you could use your Blackberry and keep your information safe, you are wrong. You remember when president Obama was elected? One of the first things they scrambled for in the tech business was how do we secure our. Mary. And of course all kinds are not our Blackberry, his Blackberry, all kinds of rumors erupted that, it was people controlling president Obama and they were using the Blackberry and they're using it because it was secure. [00:55:24] You, do you remember the whole uproar around. And the biggest problem was obviously our intelligence knew that they weren't secure and they could read any message they wanted to, as well as the Canadian government. And remember the whole five eyes thing back in the day, these five different governments that shared information on their own citizens. [00:55:47] So it was a real windfall for the United States because Canada was. EV all of this shop software was developed for the Blackberry. It's where all of the servers were located and data could easily be routed to Canadian servers away from us servers if they wanted to monitor somebody. And so Canada was the one spying on you, technically not your government. [00:56:10] They'd never do that. So it was an interesting time, frankly. As of January 4th, 2020, These Blackberry phones will no longer be provided with provisioning services, which means they are going to gradually lose the ability to join networks, including the cellular network, by the way. So it's man, it's something that many kids. [00:56:41] I have never even seen. And I look at it and just think, I remember envied some of the guys that had the blackberries at the time. And I had a couple of other little devices, keyboard driven that were from people who have been guests on my radio show. And I really liked those, but in the Blackberry was just crazy expensive as far as I was concerned. [00:57:04] But Blackberry's leadership really messed up. The guys who are developing Android at the time realized, oh, wait a minute. The iPhone is a pretty popular. It's going to be extremely popular. So Android then they mimic the Blackberry at first, made it look like a Blackberry. And then they switched over and made the Android operating system be like an iPad. [00:57:33] So they can pick, can beat with it, but Blackberry didn't see any of this coming. And it took over a year after the iPhone came out for Blackberry, for rim research and motion to come up with its own touchscreen phone. And the software was really quite a mass where they tried to. Basically crowbar in some new features and they had the old features. [00:57:58] They're still incorporate users during this whole time were falling into love with their apple phones and then eventually the Android phone. Told their IP department, it departments that they needed to support the iPhone and the Android phones. And so they did, and Blackberry eventually gave up on its own phones and they started releasing Android versions. [00:58:23] Do you remember those, the Android phones from. Mary, they got out of the hardware business entirely. And now what they're doing is they're trying to promote corporate security services. And that's really what they're trying to do. It's a new claim to fame. Yeah. Remember I just told you last time they were promoting that they were secure. [00:58:44] They weren't at all. No, they were to some extent, but so the last version of Blackberry opera and he said, The very last release that they had was in 2013. Yeah. 2013 year that hold. So the devices affected here by this shutdown are by all standards, extremely low old. And remember you got to get security updates. [00:59:09] So these machines, I can't even believe this still online when Blackberry hasn't given an update to them since 2013, that's almost a decade now, nine years. So if you're still using it stop, and if you're trying to figure out what to use, get an iPhone. And if you say, oh, Hey, films are too expensive. Don't get the latest, greatest iPhone. [00:59:33] Get a slightly older one because they are supported for five or more years out, unlike everything else out there now, although. We now have Samsung promising some longer support, like five-year support for some of the devices. So we'll see how that ends up going. But frankly, Blackberry, they're done for. [00:59:55] It's a shame. So there's a handful of software services that relied on the Blackberry servers to function. So if you were using Blackberry world or Blackberry link, those also stopped functioning on the 4th of January and the number of people still using it. I don't know. When was the last time you saw a Blackberry and have you used one I'd love to hear from you go ahead and drop me into the. [01:00:23] Craig. Yeah, exactly. me@craigpetersawn.com. Let me know, did you have a Blackberry or were you still using one? And did they bother telling you about the shutdown that was coming up, but this is it. This is the end of what was a very significant technology. So here's to blackberries. All right, stick around everybody. [01:00:52] Make sure you are on my email list. I'm going to do something new too, with the list. I'm going to start sending you my show notes. Now you can opt out of the show notes, just the show notes, if you want to, but expect to start seeing them show up in your email box. And this is the same show notes I send out to all of the radio and television stations I appear on because it's the most important news of the week. [01:01:20] Artificial intelligence is making its way into all kinds of aspects of our lives. And one of them that concerns me maybe the most, in some ways it's a benefit and others is AI in the criminal justice system. [01:01:36] China has developed what it's calls an AI. Or artificial intelligence prosecutor. [01:01:44] And they're saying that they can identify dissident and press charges for common crimes with 97% accurate. Now that is a very big claim. And the whole idea behind this is their servers services. If you will, in the court system are overloaded. We have the same problem. Most countries have the same problem. [01:02:11] I was just looking at India. They've got some 37 million backlog court cases. Absolutely. Phenomenal. So the system now in China can press charges for Shanghai's eight most common crimes. There runs on a standard PC and it takes part in the decision-making process. They say, although apparently it's actually making their decisions, but there are fears. [01:02:40] The machine could be weaponized by the state. Now it's interesting. Looking at the actual charges that it's designed to press right now, they're saying that it was trained using 17,000 real life cases. And it's able to identify and press charges for the eight most common crimes in Shanghai. These include provoking. [01:03:08] Now that's a term used to stifle dissent in China credit card, fraud, gambling crimes, dangerous driving theft, fraud, intentional injury, and obstructing official duties. In other words pretty much everything, right? You go against the government. It's just going to charge you. And that's what they say high prosecutor's going to do. [01:03:31] Now I'm looking to it. Some more details. From the management review journal. And they're saying that the system can replace prosecutors in the decision-making process to a certain extent. Now let's look at some other countries we've got, for instance, Germany, and they're using image recognition and digital forensics to help with their case loads. [01:03:58] China's using a system. No. System 2 0 6 to evaluate evidence a suspect's potential danger and conditions for arrest. Now, we've had some really weird things happening here in the U S with our criminal justice system. Some of them are absolutely idiotic. But things like just letting people out the same day that really should be held because they committed a moderately serious crime. [01:04:23] And we just had cases just at the end of 2021, where we had people. Who had been arrested and got out that same day and then went on to commit serious crimes, rape, murder, and other things. So what are we doing here in the U S unfortunately we have found out that in the us, we are monitoring the. [01:04:52] The funds that people need to put up that are called bail in order to be released from jail. So normally you'd go in front of a justice of the peace and maybe a court clerk, and they would look at what the charges are or what your background is, how sticky you are in the community, family, business ties, et cetera, and then set up. [01:05:18] So you now put up the bail cash or otherwise, and you are released on basically usually your own recognizance. They're very somewhat, so we are all ready in many areas using artificial intelligence for that entire. Process, there's no pleading with the computer's saying I can't afford a $200,000 bail. [01:05:42] There's no pleading with the computer saying, listen, I've been a member of the rotary club for 20 years and I own a business here. I have tight ties to the community that bail is just way too high because in many communities they are using artificial intelligence and relying on it a hundred percent. [01:06:00] That's one of the big problems with computers. People because they don't really understand them. Just say fine. Just yeah, go. The computers is almost always right. Yeah. The other problem is we don't know how it was programmed. Now in the case of this Chinese computer, that acts as a prosecutor for charging. [01:06:23] They fed it 17,000 cases. Do we know what those cases are? Do we know what the computer weighs when it's making its decisions? And we've seen this already, in some cases here in the U S where normally you can face your accuser. Normally you can go to the court and say, this decision by the justice of the peace was not quite right. [01:06:46] It needs to be fixed right now. They did and all well and good. And so if they had someone or they'd come in and testify to say, yeah, you're not a flight risk, et cetera, you're fine. But when it comes to the computers, people tend to just believe them. What were those 17,000 cases? Were they all nasty dissidents? [01:07:09] What did the computer learned from it? And some of these cases that we've had in the us we've found. That even the people that provided the software, that AI software, they don't know what the decision-making process actually was because the computer learned how to do it. And you need to understand AI models and how they're fed data and how they work. [01:07:35] But basically the computers come up with their own way of thinking through things. Just to make this simple. So it's not necessarily totally logic. It's not like back in the day, you'd write software that says, okay, if they have lived in that same home for over twenty-five years, they have kids in school, they own a business, et cetera, et cetera. [01:07:55] So you set up all of the explicit parameters. And from that, now you can say okay, fine. So you've got, went down this path based on. Person was and what their background was. Therefore, you came to this conclusion. That's not what's happening with this newer AI, not at all. And then you also have the question. [01:08:16] Okay. What does 97% accurate? Who's going to take responsibility when there is a mistake. Now I'm not talking about the 3% that they're admitting could be mistakes. I'm talking about the 97% of the time. And then if you now move up to the courts, who are they going to talk to? The prosecutor, the machine, the designer of the algorithm. [01:08:42] Are they going to examine all 17,000 cases that were fed into this? I goes back to what I said before about airplanes. People are not good at monitoring computers, but computers can be good at monitoring people. In other words, in this case, the artificial intelligence may help detect a mistake, but it really cannot replace humans in making a decision. [01:09:09] It's very true. China's relying more and more on AI to boost productivity. They're using AI with facial recognition systems for their social credit score that allows people to get on. Train you can't get on a train unless you have a high enough social credit score. And if you J rock walk, you have now lost points. [01:09:32] So it's it's really crazy. So I'm very concerned about this. I found some great information by the way, online from the justice department about what they are looking to have AI do. And it's basically everything making decisions and informing. What should happen? They're looking at using chat chatbox to provide legal advice for pro se litigants. [01:10:00] In other words, people that are trying to defend themselves can go to a chat box that will give them some direction. That's all in the works. I'm looking at the official documents right now, criminal justice testing and evaluation consortium, looking at artificial intelligence. Hey, make sure you subscribe to my podcast. [01:10:21] Craig peterson.com/itunes, and I hope I've earned a five star review. And if you could take a minute, just give it right there. [01:10:31] We all know the children online suffer some pretty serious consequences in certain cases. The federal trade commission has now won a case against Google. We're going to talk about what's going on. With ads. [01:10:47] The FTC has now been enforcing what's called CAPA, which is the children's online privacy protection rule. [01:10:58] And they have find. In fact they find them. What was it? Almost 200. Yeah, exactly. Let me just find it here. Sorry about that. They have find Google to the sum total of. 170 million. That's what I thought it was almost $200 million penalty. So what had happened here is YouTube. Now YouTube is owned by Google has been for quite a while. [01:11:28] And in fact, YouTube. Advertising to advertisers that quote YouTube is today's leader in reaching children age six to 11 against top TV channels. They also said that YouTube is the number one website regularly visited by kids. Now we know that they are not supposed to be directing any content to children under 13. [01:11:58] Now you could argue, all right, they're not directing content to them, but the facts are the facts of kids are on the site. They're on the site. Yeah. But why would you promote that to advertisers and. You were exactly promoting to children. And that's what the federal trade commission said. Hey, Google, here you are promoting your ability to target these kids by saying you are the number one platform for them. [01:12:30] So you shouldn't be doing that. So this settlement they came up with Google required you tube to pay $170 million penalty. They were also required to implement a system. That permits channel owners to identify content is child directed. So YouTube can ensure it's complying with the rule going forward. [01:12:53] So remember YouTube doesn't make the content that's up on their site. They steal it from you. They don't exact this dealer from you, but anything that you're uploading, they may try and monetize. If enough people watch it and stay on their site longer. Which is the goal, by the way, for your content. [01:13:11] If you put it up, really Facebook's the same way. LinkedIn, everybody, they want eyeballs. They want them to stay on the site so they can show them advertising. The people who are making the content are these content creators, just you and me uploading stuff to YouTube. As well as these people that have somehow become very popular that I just don't understand. [01:13:32] So here are also some things from our dark reading website here. Alison LeFrak, she's senior vice president of public policy. Ads privacy and children's online privacy protection act compliance at pixelate. So she's come up with five things she thinks should be adopted by the industry. First of all, improve transparency ad networks platforms should consider implementing their system that lets online services, identity. [01:14:05] To the ad network or platform that their content is child directed, which is something that the courts are demanding here now. The FTC settlement is I should say, number two, stop collecting children's data once an ad network or a platform like YouTube sets up a system where developers can signal that their app or their software or their. [01:14:30] Oh, the video is directed at children. That ad network needs to take steps to not collect personal information through those websites. Make sense apps or channels. Number three, involve parents when required, even if an ad network is not collecting precise geolocation information from children. If it collects wireless network identifiers to infer precise location, it is required to provide notice. [01:14:56] Teen consent from the parents. I'm loving all of these number four. Protect sensitive data. If an ad network decides to collect children's data, it must maintain the confidentiality, security and integrity of the information. It should only retain the data as long as necessary to fulfill the purpose for which it was collected. [01:15:19] And the ad networks should delete the data in a way that protects against its own authorized use. And number five remained stringent on protecting children. So I think all of those make quite a bit of sense. They're all things that ad networks and these platforms should be doing, but they're not required to do it. [01:15:38] And I, I go back and forth here. My dad and mumble both used to say there ought to be a law. No, that's not how my mom said it, you get the idea. And I'm at the point where I say, man, we got to get rid of most of these laws, rules and regulations, because they are hampering us something. [01:15:57] If you look at the Scandinavian countries, some people say, oh, there are socialists over that. No, they're not. They have very high taxes and they have a lot of community services, but Switz, they're not Switzerland, Sweden, for instance. They know that they have to keep their businesses healthy so that they can collect taxes. [01:16:18] So they stay out of the way versus here, where we already have a so

Business is a Game
S2 EP. 2 Badass Boss Conversations with Petya James

Business is a Game

Play Episode Listen Later Mar 4, 2022 25:23


A beautiful conversation between two unapologetic female entrepreneurs. As always we talk mindset in business. Life with kids as entrepreneurs. Integrity in business and all kinds of other delightful topics!

Rethinking with Rosalba
Ep.9 The Wise Body Path: Inner Healing, Self Love and Emotional Mastery

Rethinking with Rosalba

Play Episode Play 22 sec Highlight Listen Later Feb 22, 2022 43:45


Joining us this week is… Petya is the founder of The Wise Body Path - a membership community where she gets to offer guidance and support. She teaches her signature somatic framework for healing the body, mind, and relationships by repairing generational trauma and becoming a more safe, confident, and connected parent/teacher/guardian  Petya is currently going through a process to be able to offer her work in schools and educational facilities. Connect with her for more details.In this week's episode, we discuss: What is the language of energy?Inner child work The misconception of resilienceGenerational traumaThe Wise Body Path Framework Connect with Petya:website: www.petyahjames.comGift: The Wise Body Scan - Discover how to ease body tension from stressful relationship dynamics (https://petyahjames.click/guide-1)FB group:  NURTURE YOUR BODY AND RELATIONSHIPS (https://www.facebook.com/groups/689122404808193)IG: @the.wisebody.coachtik tok: @the.wisebody.coach   Connect with Rosalba: Website: www.rosalbaserrano.comInstagram: https://www.instagram.com/rethinking_with_rosalba/

Roots Change
24. Using body wisdom to move through lifes challenges with Petya James

Roots Change

Play Episode Play 39 sec Highlight Listen Later Jul 8, 2021 42:25


Did you know that your body is the greatest guidance system you have at your disposal? Well up until recently, I didn't realize just how significant our body truly is.  Tune into today's episode and hear how Petya James, a mind-body expert, and spiritual mentor, has used her own body's wisdom to move through life's challenges. She shares her wisdom with us so that we can begin to do the same.  The icing on the cake... I got to choose the topic! So today's we're digging into some things. Including money. For the complete Resources and Mentions check out the show notes.https://amylinsmeyer.com/episode-24Learn more about Petya James and her body wisdom magic by going to https://www.petyahjames.com or clicking here!Grab the Body Scan.Find Petya on Intagram.Join the Nurture Your Body and Relationships Community! **************************Support the showTools for your journey! Book a Consult and experience the power of coaching. Did today's podcast hit home? Let me know how and I'll send you free resources: coach@amylinsmeyer.com

WIRED Security: News, Advice, and More
The Petya Plague Exposes the Threat of Evil Software Updates

WIRED Security: News, Advice, and More

Play Episode Listen Later Jul 12, 2017 8:09


On the list of computer security advice standbys, "update your software" ranks just below with "don't use the password 'password.'" But as the cybersecurity research community gets to the bottom of the malware outbreak that exploded out of Ukraine to paralyze thousands of networks around the world last week—shutting down banks, companies, transportation and electric utilities—it's become clear that software updates themselves were the carrier of that pathogen.

WIRED Security: News, Advice, and More
Security News This Week: How Shipping Giant Maersk Dealt With a Malware Meltdown

WIRED Security: News, Advice, and More

Play Episode Listen Later Jul 5, 2017 5:31


When a piece of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as Petya (or NotPetya or Nyetya) proved especially vicious. It paralyzed thousands of computers, including those of Ukrainian government agencies, transportation infrastructure, and companies, as well as international targets including Danish shipping firm Maersk and US pharmaceutical giant Merck.

WIRED Security: News, Advice, and More
Ukrainians Say Petya Ransomware Hides State-Sponsored Attacks

WIRED Security: News, Advice, and More

Play Episode Listen Later Jul 3, 2017 10:02


When a ransomware outbreak exploded from Ukraine across Europe yesterday, disrupting companies, government agencies, and critical infrastructure, it at first appeared to be just another profit-focused cybercriminal scheme---albeit a particularly vicious and damaging one. But its origins in Ukraine raised deeper questions: After all, shadowy hackers have waged a cyberwar there for years, likely at Russia's bidding.

The Drill Down
483: Bad Robot Caller

The Drill Down

Play Episode Listen Later Jun 30, 2017 57:07


This week, a mega robocaller gets hung up, Tesla dances to its own beats, Alexa checks in, Google gets slammed, beware more ransomware, and, much more.  Cold Open Nintendo SNES Mini launches in September Headlines Miami Man Fined $120 Million for Making 96 Million Robocalls in Three Months First Tesla Model 3 spotted outside the US Tesla is talking to the music labels about creating its own streaming service Amazon rolls out Alexa intercom function, letting users “drop in” on Echo speakers remotely Audible Book of the Week The One Device: The Secret History of the iPhone by Brian Merchant Sign up at AudibleTrial.com/TheDrillDown Music Break: Telephone by Pomplamoose Hot Topic Google hit with record £2.1bn EU fine for abusing internet search monopoly A new ransomware attack is infecting airlines, banks, and utilities across Europe Ransomware attack spreads to 64 countries including the Asia-Pacific region, is said to originate in software from a Ukrainian tax accountancy firm Music Break: Blister in the Sun by Violent Femmes Final Word: Kala-not More than 1,000 Uber employees ask for Travis Kalanick to return Uber CEO Travis Kalanick has resigned due to investor pressure, and a search for a new leader is on The Drill Down Video of the Week Solar-powered 3D glass printing from sand Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Box product manager Tosin Onafowokan.

Super Feed
Área de Transferência - 028: Você Virou Papai, Né?

Super Feed

Play Episode Listen Later Jun 30, 2017 65:33


O papo desta semana inclui a multa multibilionária que o Google levou na Europa, o ataque ransomware Petya, o anúncio do primeiro smartphone com o leitor de impressão digital sob a tela, e o possível encerramento da produção de iPhones na fábrica brasileira da Foxconn.

The Shipping Pod
Interview with 2 Babes Talk Supply Chain

The Shipping Pod

Play Episode Listen Later Jun 29, 2017 48:26


The Shipping Pod is back and we're bringing company. Tune in this week to hear our interview with 2 Babes Talk Supply Chain as we discuss: starting a podcast in the logistics industry, NAFTA, the future of supply chain, the Petya ransomware attack on Maersk Line, and so much more.  

The Edge of Innovation
Why You Should Be Afraid and Take Action About Ransomware!

The Edge of Innovation

Play Episode Listen Later Jun 29, 2017 16:18


In today's special edition, we are breaking our normal schedule to inform you about recent ransomware attacks known as WannaCry and Petya, and what you can do to protect yourself. Please listen and be informed. The worst is, unfortunately, probably yet to come. Don't get caught... For Full Transcript and Other Helpful Resources Click Here: https://www.saviorlabs.com/afraid-take-action-ransomware/ Many Thanks Our Sponsor - SaviorLabs – offering Managed IT Services, Application Development and Website Design and Marketing. Call them today at 978-223-2959 or visit https://www.saviorlabs.com

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Petya/Goldeneye Variant Makes the Rounds https://isc.sans.edu/forums/diary/Checking+out+the+new+Petya+variant/22562/

Women of Substance Music Podcast
#489 Music by Lauren Mann, Arielle, Heen Agnes D, Susan Cattaneo, Jill Detroit, Denise Glover, Petya Dankova

Women of Substance Music Podcast

Play Episode Listen Later Oct 4, 2016 29:07


To get live links to the music we play and resources we offer, visit This show includes the following songs: Lauren Mann - New Beginning Arielle - Splintered Helen Agnes D - Heading South Susan Cattaneo - Haunted Heart Jill Detroit - Hiding In Plain Sight Denise Glover - Pietracatella Petya Dankova - Sweet or Bitter For Music Biz Resources Visit Visit our Sponsor: Get music by Ditto Duo at: Visit our Sponsor: Get music by Petya Dankova at:

Women of Substance Music Podcast
#489 Music by Lauren Mann, Arielle, Heen Agnes D, Susan Cattaneo, Jill Detroit, Denise Glover, Petya Dankova

Women of Substance Music Podcast

Play Episode Listen Later Oct 4, 2016 29:08


To get live links to the music we play and resources we offer, visit This show includes the following songs: Lauren Mann - New Beginning Arielle - Splintered Helen Agnes D - Heading South Susan Cattaneo - Haunted Heart Jill Detroit - Hiding In Plain Sight Denise Glover - Pietracatella Petya Dankova - Sweet or Bitter For Music Biz Resources Visit Visit our Sponsor: Get music by Ditto Duo at: Visit our Sponsor: Get music by Petya Dankova at: