The ladies and Durag Daddy are joined by Barbie from Let Me Touch You podcast and they take an inquisitive turn in this episode as Haydee Baby put the gang through an eight question gauntlet. S/O to Cyber Shots for the love! Check out his latest EP. 534 Brown Sugar the lyrics exposed Intro song: Big Pun feat Tony Sunshine “My Dick” Follow the hosts on social media Haydee Baby @haydee.baby_ & Lexi @lexigee & Durag Daddy @nycmuddafukka Follow our guest Barbie @let_me_touch_you Use the hashtag #ladiespitch or @ us to let us know what you think of this week's episode! Instagram: @ladiespitch https://instagram.com/ladiespitch?utm_medium=copy_link Facebook: ladiespitch_ Twitter: https://twitter.com/pitch718?s=21 @pitch718 Email: email@example.com Interested in merch? Click the link below and show your support for Ladies Pitch. https://teespring.com/stores/ladies-pitch-online-store-3 --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
Welcome to Episode 73 of the Different Animals Podcast and this week we talk about Ratchet & Clank, The Thing, Y the Last man, some quick NBA news and Jon Gruden catching (deservedly) the ultimate stray This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
AWWW SHIT the business brand himself Zaystone dropped by for a dope live interview!! He was year pre covid where he interviewed me, now I had the chance to really pick his brain and get to the backbone of "ZAY STONE". First off, his growth is so inspiring from initially dominating the independent music scene to launching and running 2 business within a few years. His experience growing up and feeling that he always deserved more, to the love and mentorship of his mother ( S/O the mommy's out there), to what's to come in the near future for him. Now he did BOMB the trivia lol, but with all the knowledge he dropped I can't even be mad. Tap in now!!! Follow him on IG @realzaystone now !!! --- Send in a voice message: https://anchor.fm/robin-evette/message
Patreon: patreon.com/deadendhiphop To conclude The Weeknd Week, we discuss the song everyone has heard at least once - "Blinding Lights" by The Weeknd. S/O to Myke C-Town and Nick for joining us this week. Also, shoutout to Sunny for editing the Kissland, Beauty Behind the Madness, Starboy, and Blinding Lights videos on Patreon. Learn more about your ad choices. Visit megaphone.fm/adchoices
We discuss the Mercury/Sky WNBA Finals matchup and who we think will win it all! S/O to Darrin on the BOLD prediction on both teams making it to the finals. we discuss Tyson/Fury III, and how Wilder couldn't execute and got KO'd. We also briefly discuss the MLB playoffs thus far. Lastly, we go thru wk 6 of College football and it was a damn good weekend! Ole Miss/Arkansas put on a scorcher, but being greedy cost Arkansas the game. Iowa and Kentucky continue to have awesome seasons. Oklahoma overcomes 21pt deficit to beat Texas in the Red river Rivalry in a thriller with backup Caleb Williams leading the charge after a Rattler injury. BYU are frauds. And lets give it up to the Aggies and Jimbo fisher, dethroning Sabah and #1 Alabama, as Fisher is the 1st former Saban assistant to defeat the sensei. Tune in when you can! #collegefootball #alabama #oklahoma #aggies #iowahawkeyes #nicksaban #mlb #football #baseball #basketball #wnba #chicagosky #phoenixmercury #brittneygriner #dianataurasi #candaceparker #vandersloot #kahleahcopper #redsox #astros #giants #tysonfury #deontaywilder --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email firstname.lastname@example.org email@example.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1
On this week's episode of Guys We Fucked, Corinne and Krystyna gift us a rare solo episode. Krystyna tells us about an intimate moment with her own underwear, and Corinne delves into some memories from her birthday vacation in Costa Rica. Then, C and K read emails from three Fuckers regarding uninvited advances from a woman as a married man, the classic slut-shaming from an S/O over body count, and whether or not it's “OK” to become a stripper as a mother. Follow Corinne on Twitter/IG/TikTok: @PhilanthropyGal Follow Krystyna on Twitter/IG/TikTok: @KrystynaHutch Follow Guys We Fucked everywhere: @guyswefcked LISTEN TO OUR NEW PODCAST MINI-SERIES, DON'T GET F****D (BY MONEY) only on Luminary https://luminary.link/G8CwYMpmAfb Email Us: SorryAboutLastNightShow@gmail.com Subscribe to the Guys We Fucked YouTube Channel: youtube.com/guyswefcked LISTEN TO KRYSTYNA'S SELF-HELP SOLO PODCAST, The Voices In Our Heads, on Krystyna's Patreon! LISTEN TO CORINNE'S NEWS & POLITICS PODCAST with comedian SHAYNE SMITH, WITHOUT A COUNTRY, Saturdays on all podcasting platforms including full video on YouTube. https://m.youtube.com/channel/UCjP3oJVS_BEgGXOPcVzlpVw COME SEE US LIVE // EXCLUSIVE MERCH Washington DC - DC Improv → Oct. 14-17 Houston TX - Skank Fest South → Nov. 5-7 Ticket Links on sorryaboutlastnightcomedy.com For live duo touring schedule, please visit www.sorryaboutlastnightcomedy.com/tours Do you think your music should be featured on an episode of GWF? E-mail a streaming link to Mike Coscarelli: GWFPodcastMusic@gmail.com Featured music: Lady Frank - “Let Loose” https://open.spotify.com/artist/4n2Tkyb26CSf2xwglFWEMd?si=hPrbJmZ4SDiuJPTW3D4F7g
Welcome to Episode 72 of the Different Animals Podcast and this week we talk about Street Fighter, Venom, Titane, No Time to Die and lastly, Andrew Wiggins and Kyrie Irving being opposite sides of the same worthless coin. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Back at it with Season 1 / Episode 11 of the Need it Podcast! A business episode has been highly requested and it was the perfect time for my good friend Lennard to drop some gems on how he started his businesses and how he's continued to thrive despite the pandemic. S/O to all small business owners!
♥ Welcome back to another episode of Coffee & Canoodles! ♥ This week the ladies are back tackling a juicy yet touchy subject, moving in with your significant other! Tune in to hear Laura spill all the tea on what it has been like living with her boyfriend for the very first time. It has only been a month, however there is already plenty of tea to go around. Get both their perspectives on the good, the bad, and the ugly of living with an S/O. Got a topic to suggest or a story you'd like to share? Send us an email! Coffeeandcanoodles@gmail.com ♥ ☻ Don't forget to rate, review & smash that subscribe button! ☻ Instagram handles: • Coffee & Canoodles: www.instagram.com/coffeeandcanoodles/ • Holly: www.instagram.com/planningandpolish/ • Laura: www.instagram.com/lauraannnatoli/ Follow us on Tik Tok! www.tiktok.com/@choresandmore?lang=en ♥ Intro Music: ♥ FlashBack by ZAYFALL | @zayfallmusic Music promoted by www.free-stock-music.com Creative Commons Attribution 3.0 Unported License creativecommons.org/licenses/by/3.0/deed.en_US
Welcome to Episode 71 of the Different Animals Podcast and this week we talk about Hades, Fantasy Football and Gambling addictions, The History of the Atlanta Falcons, Dear Evan Hansen, and our favorite samples in rap. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to Episode 70 of the Different Animals Podcast and this week we talk about Malignant, Reservation Dogs, Days Gone, Hades, the new Super Mario movie, and who may have been snubbed at the Emmys. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to Episode 69 of the Different Animals Podcast and this week we talk about Candyman, Dave season 2, Neon Genesis Evangelion, The Playstation Showcase and some big trailers that dropped. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
"I was born black and that's the best thing that could've ever happened to me." - a.ray +Real Topics (6:20) Value People (11:00) S/O to Black Business (15:45) Humanizing the Black Man w/Jason Gray (56:30) Russell Westbrook In A Dress (1:04:20) Fatherhood Soft Skills (1:30:35) My Shell Got Cracked w/OT Musical Intellect: Dreamville, Jay-Z, The O'Jays & Jill Scott Recorded in Dallas, TX @ MZ Studios 'Tha Reality Is' is powered by Roberts Media Group. For more programming and advertisement opportunities, please visit www.robertsmediagroup.co. If you would like to be a guest on the show or would like us to answer one of your questions from our perspective, email us at firstname.lastname@example.org or leave a message here and we'll be sure to answer it on an upcoming episode. Please leave us a rating or review. We don't care if it's a good review, we don't care if it's a bad review, we just want to hear from you! Follow us on social media @ThaRealityIs. --- Support this podcast: https://anchor.fm/tharealityis/support
In this episode, I give my week two predictions. I also discuss the Thursday Night Football game, Kyrie Irving, Lamar Jackson v. Mahomes and so much more! Intro: Childish Gambino- Sober 0:00 Washington defeats NY on TNF 19:13 Week Two Predictions 38:48 Kyrie Irving threatens to retire if traded Outro: Sevyn Streeter- Guilty Click here to Subscribe! https://www.youtube.com/user/jalenhunter72094?sub_confirmation=1 Social Media: IG: https://www.instagram.com/the_unpopular_pod/ Twitter: https://twitter.com/imsayinthou FB: https://www.facebook.com/TheUnpopularPodcast1 Podcast Store: https://teespring.com/stores/the-unpopular-podcast?page=1 Promotion Request: https://docs.google.com/forms/d/e/1FAIpQLSd0dwGtU5PXBfWYdObutkRtXyeY93ZX0eCEGZGAW23RxG-eUg/viewform?usp=sf_link THANK YOU FOR THE SUPPORT!!! S/O to Brittany for naming this episode!
As they do every Friday this time of year, Tony & Ronn break down what NFL games you need to watch this weekend and the ones you can skip to get to that "honey-do" list that the S/O has been nagging about.
As they do every Friday this time of year, Tony & Ronn break down what NFL games you need to watch this weekend and the ones you can skip to get to that "honey-do" list that the S/O has been nagging about. Who knew there was more than one "Game of the Century" in #collegefootball; in fact there's around 10 "Game of the Century" contests since the first in 1935.
Welcome to Episode 68 of the Different Animals Podcast and this week we talk about Shang Chi, Certified Lover Boy, the passing of Michael K Williams and lastly some, hopefully, big gaming news. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to Episode 67 of the Different Animals Podcast and this week we talk about Total Recall, Donda, The History of the Atlanta Falcons, and our NFL preview. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to Episode 66 of the Different Animals Podcast and this week we talk about Disney's "What If...?," CODA, White Lotus, Our Favorite Song Covers and the new Spider-Man Trailer This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Rob and Jerry give their thoughts on the boxing fight between Jake Paul & Tyron Woodley, Paul moves to 4-0 & Woodley begins his boxing career with a loss, S/O to the Paul brothers for inspiring millions of people including Rob! Follow Rob @robcao on IG; Follow us on Apple Podcasts, Spotify, Amazon Music, or wherever you listen; Rate & Review on Apple; Follow Jerry @fansidehoopsig on IG; Follow the fansidehoops podcast on Spotify; Follow us on IG @theflame_es & on Twitter @theflame__es; Use code tfes on Goli.com
Episode title says is all! though this is directed at students going to college/uni, the points are just as applicable to life as a certified adult. Hit that subscribe button to not miss an episode. S/O to royaltyfree-music.com for the new intro/outro music Follow on Instagram & Facebook (@helpiamanadult) and send any questions, thoughts and feedback to email@example.com
Welcome to Episode 65 of the Different Animals Podcast and this week we talk about Babe, The Terminal, Free Guy, New Star Wars, and lastly, the Prince of Florida being cut down in his prime. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
School's either back in session or nearing being back. For a lot of people keeping up/staying/holding on to your faith might prove easy for some and difficult for others. No matter which category you are in this episode gives you come easy to follow tips backed by real life experience on how to stay in faith. Hit that subscribe button to not miss an episode. S/O to royaltyfree-music.com for the new intro/outro music Follow on Instagram & Facebook (@helpiamanadult) and send any questions, thoughts and feedback to firstname.lastname@example.org
The final episode for a month and a half so we had to had to end it with the hosts of this podcast giving a transparent look into our lives and our personal mental health goings-on. This was just us chopping it up on some round table talk shit about what's going on in our personal mental health and some contributors as to why the break is needed and necessary. We will be back and in full form for y'all on October 8th! We appreciate and love you all for being understanding and still rocking with us to this day. RIP Mario Zopata and condolences to his family and friends grieving right now. S/O my man Godwin Wambua for reaching out and definitely will be looking forward to working with him in the near future. Wisco people, our boy Damon Campbell needs y'all to check on him let's come together and support black fathers who are doing what they can to survive the pandemic and all the twists and turns that it has brought. Sending love and positive energy to each and every single one of you, we will be back soon
Welcome to Episode 64 of the Different Animals Podcast and this week we talk about The Suicide Squad, Hard Knocks, Fantasy Football top picks, Scarlett johansson chasing the bag, and Dennis Schröder just absolutely fumbling one. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Lil Mouse talks about being one of the very first drill rapper in 2012, establishing his legacy despite his young age, Drake S/O, Meek using his bar without the S/O, relationships with Lil Durk and more! https://www.instagram.com/tdgmouse/ ----- NO JUMPER PATREON http://www.patreon.com/nojumper CHECK OUT OUR NEW SPOTIFY PLAYLIST https://open.spotify.com/playlist/5tesvmDS8h50LkjnSAWMOs?si=j6sJD6DkR4mk5NZZWnlK7g FOLLOW US ON SNAPCHAT FOR THE LATEST NEWS & UPDATES https://www.snapchat.com/discover/No_Jumper/4874336901 CHECK OUT OUR ONLINE STORE!!! http://www.nojumper.com/ SUBSCRIBE for new interviews (and more) weekly: http://bit.ly/nastymondayz Follow us on Soundcloud: https://soundcloud.com/nojumper iTunes: https://itunes.apple.com/us/podcast/no-jumper/id1001659715?mt=2 Follow us on Social Media: https://www.snapchat.com/discover/No_Jumper/4874336901 http://www.twitter.com/nojumper http://www.instagram.com/nojumper https://www.facebook.com/NOJUMPEROFFICIAL http://www.reddit.com/r/nojumper JOIN THE DISCORD: https://discord.gg/Q3XPfBm Follow Adam22: https://www.tiktok.com/@adam22 http://www.twitter.com/adam22 http://www.instagram.com/adam22 adam22hoe on Snapchat
My testimony, A Journey to faith. Sharing my Christian journey. Note there are lessons to be learnt by everyone not just christians. Hit that subscribe button to not miss an episode. S/O to royaltyfree-music.com for the new intro/outro music Follow on Instagram & Facebook (@helpiamanadult) and send any questions, thoughts and feedback to email@example.com
Prentice Powell is an East Bay poet whose been working from home a lot lately. This has caused some confusion for his kids, "They were just like, 'So dad, do you have a job?'" Powell does have a job, and does big things: he's performed his poems on The Arsenio Hall Show, Verses and Flow, and in the upcoming Nick Cannon movie, She Ball. And just this week, Powell concluded a residency at The Kennedy Center in Washington DC with Fiveology, a poetry group of his longtime friends and collaborators. For Powell, poetry is his work, his passion, a way to express what he feels and work out what he thinks. And while he puts a lot of his life into his poems, he's decided there are certain topics to keep off the page and the stage, and certain poems he'd like to leave in the past. This week on Rightnowish, Prentice Powell talks about fatherhood and poetry: how sometimes they mix and sometimes they don't.
In Episode 104 Cam and Craig talk about rappers going to Albuquerque on tour, taking your S/O back after cheating, Future's continued drama and more! Follow the Trio on Social Media: DJ Cupid- IG and Twitter @djcupid36 Camden Marz- @CamMarz Faith- IG @faitha_
Lil Mouse talks about being one of the very first drill rapper in 2012, establishing his legacy despite his young age, Drake S/O, Meek using his bar without the S/O, relationships with Lil Durk and more! https://www.instagram.com/tdgmouse/ ----- NO JUMPER PATREON http://www.patreon.com/nojumper CHECK OUT OUR NEW SPOTIFY PLAYLIST https://open.spotify.com/playlist/5te... FOLLOW US ON SNAPCHAT FOR THE LATEST NEWS & UPDATES https://www.snapchat.com/discover/No_... CHECK OUT OUR ONLINE STORE!!! http://www.nojumper.com/ SUBSCRIBE for new interviews (and more) weekly: http://bit.ly/nastymondayz Follow us on Soundcloud: https://soundcloud.com/nojumper iTunes: https://itunes.apple.com/us/podcast/n... Follow us on Social Media: https://www.snapchat.com/discover/No_... http://www.twitter.com/nojumper http://www.instagram.com/nojumper https://www.facebook.com/NOJUMPEROFFI... http://www.reddit.com/r/nojumper JOIN THE DISCORD: https://discord.gg/Q3XPfBm Follow Adam22: https://www.tiktok.com/@adam22 http://www.twitter.com/adam22 http://www.instagram.com/adam22 adam22hoe on Snapchat
Welcome to Episode 63 of the Different Animals Podcast and this week we talk about Top Gun, Jungle Cruise, Rick and Morty, a game gets a 10/10, the NBA draft, Kevin Durant stans, and some really terrible gaming-adjacent news. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to Episode 62 of the Different Animals Podcast and this week we talk about GI Joe, Pickle Rick, Vindicators 3, Returnal, Days Gone, Donda not dropping, and of course the insane ramblings of Cole Beasley This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Dam Internet, You Scary! hosts Patrick Cloud and Tahir Moore break down the disturbing but interesting stories on the internet! S/O to our Sponsors Better Help betterhelp.com/DIYS Raycon buyraycon.com/DIYS Hello Fresh hellofresh.com/DIYS14 code: DIYS14 Join our Patreon now!! https://www.patreon.com/DamInternetYouScary
Welcome to Episode 61 of the Different Animals Podcast and this week we talk about Space Jam, Dave Season 2, Rick and Morty, The NBA finals, all rings not being created equal, and lastly a huge bombshell of an album drop that may or may not have actually happened. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
SEASON 4 is officially LIVE! (and yes... we know. It has been a while.) We are back and super excited for this next season of the Hide it in a Book podcast. We have so many updates to share with you from our journey since August 2019 and our last live podcast event hosted with the lovely ladies of BlackGrlThings. Join us for a few updates, unheard stories, and insight on what's to come for the rest of the year. It's Onward & Upward from here on out! If you have any suggestions, questions, or critiques please feel free to reach out to us via Instagram at @NoMoreInterviews777 or on Facebook by searching No More Interviews. S|O to our mixer Heedy for contributing towards our journey. Copyright Disclaimer under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is permitted by copyright statutes that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use." - NO COPYRIGHT Intended.
Welcome to Episode 60 of the Different Animals Podcast and this week we talk about Black Widow, Vince Staples album, what makes an album great, Shohei Ohtani and of course, Loki. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Predictions About Olympic Cyberattacks We're all excited about the upcoming Olympic games. And so are the hackers. Oh my goodness. I just finished reading a report by the cyber threat Alliance about what they're expecting to happen at these Olympic Games in Tokyo. The Olympics have always been a huge target when it comes to the bad guys. [00:00:23] You might remember there have been abductions at the Olympics before where some of the Olympic competitors were held at gunpoint. Of course, we're not going to forget that one anytime soon. And looking back through the last few Olympics, there have been many different types of attacks, some more successful than others, frankly, but looking at this report, they were talking about the 2008 Beijing Olympic. [00:00:51] The attacks then were relatively limited. There were about a 12 million cyber alerts per day. Now this is part of the problem with cyber security. You get so many alerts. What do you do? How do you. Bond and none of those 12 million cyber alerts per day resulted in a successful attack. Now that was back in 2008, there were some scams like ticket scams are always are, but nothing big. [00:01:23] The next one was the London Olympic. In 2012 and the London Olympic, they had pretty much low level attacks and they didn't result in any real high impact cyber security event. And the most significant event back in 2012 was evidence. Credible cyber threat against electrical infrastructure. That was of course in place for those Olympic games. [00:01:50] There was a distributed denial of service attack on the power systems. Nothing much really happened, no real impact. Then 2016 Rio de Janeiro. They were starting to pay more attention to cyber security for very good reasons. Frankly, there was a large scale denial of service attack that was carried out by this bot net. [00:02:16] Let me explain what that is. A denial of service attack is where you might have a website for instance. Providing service to your customers that might be going there to look at your catalog, maybe buy some things. It might be a government agency. It might be an important part of the Olympics in this case and their critical infrastructure. [00:02:37] So denied service means you either knock it off the air or so people can't get it. Or there's also the distributed denial of service attack. Now D dos are the distributed ones are where you have hundreds or thousands of computers out on the internet, all over the place that are trying to get to maybe the home page, maybe the purchase page. [00:03:04] And because the coming from all over the internet, they're very hard to shut. And that's where we have the botnets coming in, too. Botnets are groups of computers that have been compromised by the hackers. So what they do now is they command, for instance, you're a home computer that you don't even know is under the control of one of these bad guys, your home computer now, issues or requests. [00:03:33] Hey, yeah, give me the home page of Olympics 2020. And off it'll go dutifly and try and get the homepage. That's all well, and good. If the load on the server is what they're expecting. You've been to sites, right? You hear something mentioned on the radio and like Craig peterson.com. Now, because I mentioned my website, Craig Peterson, S O n.com. [00:03:58] And there are people listening. Some of you guys are going to go to my website. Now the normal traffic of having dozens of new people go to my website is not going to bring the site down. However, here's the other side of this? What happens if maybe two or three times as much traffic as I expect is going to come to the site? [00:04:22]I've compensated for that. We should be able to handle that just fine. But what happens if all of a sudden it's a thousand times what we're expecting because there's 20, 30, 40,000 cases. Peter is out there that are trying to get my homepage or in this case, the Olympic. Homepage. Obviously the server's not going to be able to respond and it's either going to crash or and I'm sure they set this up the right way. [00:04:49] It's going to deliver a message saying the servers over loaded right now. Try again a little bit. And by the way, if you get that message on a website saying, Hey, try it in a few minutes, please try it in a few minutes. Don't just hit reload because that's going to put even more load on that poor little overloaded server. [00:05:10] Now what they had here coming in 2016 at the Rio de Janeiro Olympics was a staggering 540 gigabytes. Per second worth of people requesting homepages. That is insane. That is a lot of bandwidth. And the fact that they apparently had that much bandwidth available coming in is also amazing, but also remember people are looking at videos. [00:05:41] Am I. To get the insider scoop, add some stuff happening behind the scenes. Now, many of the attacks in 2016 started before the Olympic games, even. And what they were doing is attacking different parts of the Olympics infrastructure operationally. So it's a problem. It's a very big problem. They survived that whole thing. [00:06:09] And by the way, the Brazilian government ended up trying to protect the world cup back in 2014 as well by spending a whole lot of money and time on this. But remember, Even back in 2008, we were talking about 12 million cyber alerts per day. How can you staff up for that back then? It was back then. [00:06:32] We're seeing some of our clients being hit with hundreds of cyber attacks a minute and multiple per second, sometimes 10 20, 30. Per second. It's just incredible. What happens? In fact, divide those numbers out 12 million divided by how many seconds in a day. It just shows you how amazingly huge it is. [00:06:56] Now we have seen time. Past where a country like North Korea, for instance, doesn't like what Sony pictures is doing. So North Korea then attacks Sony pictures. And in the case of Sony, they downloaded a bunch of confidential information. They released it. They embarrassed some people now, hardly anybody got fired. [00:07:16] It's absolutely amazing. But anyway, What's happening right now is Russia. Think about all of the Russian attacks against our businesses and our critical infrastructure as a country, they have been huge, massive attacks. We have now Russia at a point where they are getting massive amounts of. built up. [00:07:45] Why? Because they submitted doped samples in 2019 to the Olympic committee. Yeah. So this was a, the McLaren report released by the world anti-doping agency. Describe what we're really systematic effort by the Russian government to really undermine the drug testing process. We've also seen the Russians in the past because they've been caught doing this. [00:08:14] And the Chinese as well, putting in some of the competitors, particularly into things like gymnastics that were too young to compete based on the Olympic rules that were in place. So we had all of this happen during, and after the 2014 Sochi winter Olympics. Guess what those restrictions on their athletes are still in place and in place in a very big way, they will not play the Russian national Anthem at the ceremonies at the Olympics. [00:08:48] And they will not allow the Russian flag to be carried. In fact, their athletes have to carry a neutral. Flag. So expect some serious attacks from Russia against the Olympics. And remember the Olympics. There are no spectators. Everybody's going to be watching this thing on a line. So it's going to be interesting. [00:09:14] We'll keep an eye and let you know how things go. Stick around. Visit me online. CraigPeterson.com.
2021-07-17 1122 Craig Peterson (2): Reporting on your neighbors is something you would expect from a socialist government, right? A communist government, a fascist government, any form of a socialist government. Now Facebook is doing exactly that, and it's going to interfere with our lives. [00:00:16] Facebook has now confirmed what it's calling a test of its "do-you-know" an extremist prompt, and that's got me really rather worried. [00:00:28] And it has a lot of other people worried as well. I was talking to a friend of mine who was also in the media biz, who was saying just over the last couple of weeks. He's received this a bunch of times. And I mentioned this to another friend of mine who is not in the media business. And he said that he got it as well. [00:00:48] And he said it was: are YOU an extremist? Which I think is interesting. First of all, an extremist is not defined. And of course, with these people who are monitoring accounts on Facebook, announce where their definition of extremist is going to be. The definition of an extremist by the government going to very political parties is going to Berry very, and we're talking about this anti-extremist prom, not just asking you if you are an extremist, like my friend said he got, but it's asking if you know someone else who is an extremist or who may become an extremist. [00:01:28] That is absolutely amazing to me. Amazing. It's bad enough that the government has picked winners. It has this whole section to 10, you've heard about before in the FCC rules that say we know if you're Facebook or Google, no one can Sue you for anything that you do. That is absolutely insane as far as I'm concerned, but there will be lawsuits on this they've already been filed. [00:01:58] Why would Facebook block thought that it didn't think was appropriate? The whole idea behind the first amendment? It isn't just that it applies to the federal government. It is a code of conduct for all of us. It's a code of conduct for these massive multimedia platforms. We should be allowing all kinds of speech, and we should not allow people to hide because what they've done now is they've moved to other platforms. [00:02:29] They don't do this kind of monitoring, and they are currently carrying on their speed. If someone comes out and says something that is racist, that is violent, that is, is threatening to commit a crime. We know about it. If it's out there in the open, we all have the crazy neighbor that everybody in the neighborhood knows about because they are, and they're saying it, Facebook is starting to block it. [00:02:55]We're just not going to know. And then what do they do? If you report someone who is saying some things that you think might be extreme, things like you should check voter ID at the voting booth. There are people that think that's extreme, and they report to you what's likely to happen. We know already that one of the things that many people who have been doing online is reporting people. [00:03:22] They don't like someone who is posting things that are violent or extreme and getting their stuff blocked and demonetized in some cases, but just plain old blocked. It's a great little tool for people to shut up. Other people, just shut them down, shut them up. They can't say it anymore just because they disagree with the content that's already in place. [00:03:48] Now, what's going to happen. If someone is reported as being not an extremist or on the road to extremism, what liability is there on Facebook's side? What liability is there with, for instance, the FBI or local one force. There are obvious things that should be reported to law enforcement. If someone's saying they're going to harm themselves or harm someone else, then we need to have a closer look at that. [00:04:14] If you actually have the belief that they will and can do that. I was a mandated reporter for 10 years because I was in emergency medical services. If I thought someone was trying to commit harm to themselves or someone else, I was mandated to report, but I have to think that I can't just use the reporting tools as a way to shut up my political opponents. [00:04:43] So someone reports another person as being an extremist of Facebook; Facebook then sends it to who are they going to send it to the FBI? What's the FBI going to do well. The FBI is mandated to report again in their reports and investigate. So what are they going to do for the investigation? It needs to rise to a level of the FBI thinks that this might be an illegal activity so that they can investigate it. [00:05:11] They can hopefully stop something before it happens. Something violent, something nasty. But what does the investigation take ground? I'm taking you all the way down the road here. The investigation is going to include them having a look at what you said, looking at the people who are within your social network. [00:05:32] So who do you. Two. Who do you follow? Who follows you? They may start looking at your phone. Who are you calling? What SMS messages are you receiving? Where are you hanging out? Where's your phone going every day? Who goes to that bar that you like to hang out at? Oh my goodness. You went to a gun range. [00:05:50] Who's at that gun range and so very quick. The investigation is all of a sudden roping everybody and all of your family members, all of your closest friends, anybody that might've liked something that you had said recently, even though it might not have been extremist. And so now, by having Facebook looking for extremists and people who might be on the road to extremism and counting on you to report them, they have opened up a can of worms. [00:06:22] Huge can of worms and remember too, with the FBI and with others, including the NSA and the CIA, they have this multi-hop rule. I think it's three hops now. So if they suspect you of something and what is suspect you, is it the fact that someone reported you as being an extremist, just because they disagree with you politically, they disagree with your religion. [00:06:48] Is that enough for them to suspect it. So now they can monitor not just your stuff, but anyone that has talked to you or liked you and anyone that has talked to them or It doesn't take long. I think that whole Kevin bacon thing, right? Everybody in Hollywood's within five degrees of Kevin bacon. In fact, I think everybody in the United States is within five degrees of Kevin bacon. [00:07:12] In other words, they can hop through opt to five people and connect to anyone in the country. That is absolutely huge. Absolutely huge. According to the verge. Facebook is doing this in response to the Christ church call for action campaign Christchurch. Remember in New Zealand, and there was an atrocity that was committed there. [00:07:41] These hate and dangerous organizations. That's what they're up to. They're trying to stop all of this. And it went back to March 2019. I think it was this attacking Christchurch. Obviously a terrible thing. People knew about this person and their radical approaches. The police have been informed, but nothing happened. [00:08:05] So now we want even more monitoring to go on. At least Facebook does. This is really a problem. There are all kinds of bad behavior online. We hide behind our supposed anonymity. Look at the terrible thing. Some people say online about you name it, right? Different people, kids in high school, either people in other walks of life. [00:08:33] It is terrible. So Facebook has this support page titled what I can do to prevent rattling? Radek radicalization. There we go. I knew I could say it. It's a really good question. Yeah. They've got links on that page to the life after hate exit USA program, which Facebook says help people find a way out of hate and violence. [00:08:57] I'm all great with that. I think that's a good thing. It's not a bad thing, but now having them report people that someone. In their non-inferior wisdom, decides might be hate speech or might be on the road to extremism because remember anybody that voted for Donald Trump is considered to be someone who's on the road to extremism or is an extremist. [00:09:22] For voting for him, the worst president ever. How many times have you heard that sort of thing? It has happened all of the time. And so we've got to be very careful about these open reporting things that are online. We have to be careful about reporting. Other people, it brings to mind two things. [00:09:41] One is two TV shows. One is one. That apple produced and you can watch, and it's all about this guy. You were a reporter, a news anchor, and he was supposedly sexually harassing someone, and yeah, he was to a degree, but the crime and the punishment were just totally out of whack. And one of my wife's favorite shows It was the good wife, and now it's a good fight. [00:10:12] That's what it is in season five, episode three. It is delving into this in a very big way. What happens when you report someone? Should they be reported? You've got to think twice about that. Even when, again, I was in EMS, what happens if I report someone potential neglect potential child abuse here, they can go through hell. [00:10:37] So be very careful. I don't like this move by. But you probably figured that out already, right? Hey, you stick around. We've got a lot more to talk about today, and I also want to encourage you. If you haven't already, go to my website, sign up for the newsletter. Craig peterson.com/subscribe and get all of the latest and most important technology news in your mailbox. [00:11:04]Craig Peterson: We're all excited about the upcoming Olympic games. And so are the hackers. Oh my goodness. I just finished reading a report by the cyber threat Alliance about what they're expecting to happen at these Olympic Games in Tokyo. [00:11:22] The Olympics have always been a huge target when it comes to the bad guys. [00:11:28] You might remember there have been abductions at the Olympics before where some of the Olympic competitors were held at gunpoint. Of course, we're not going to forget that one anytime soon. And looking back through the last few Olympics, there have been many different types of attacks, some more successful than others, frankly, but looking at this report, they were talking about the 2008 Beijing Olympic. [00:11:56] The attacks then were relatively limited. There were about 12 million cyber alerts per day. Now, this is part of the problem with cybersecurity. You get so many alerts. What do you do? How do you? Bond and none of those 12 million cyber alerts per day resulted in a successful attack. Now that was back in 2008; there were some scams like ticket scams are always are, but nothing big. [00:12:27] The next one was the London Olympics. In 2012 and the London Olympics, they had pretty much low-level attacks, and they didn't result in any real high-impact cybersecurity event. And the most significant event back in 2012 was evidence. The credible cyber threat against electrical infrastructure. That was, of course, in place for those Olympic games. [00:12:55] There was a distributed denial-of service attack on the power systems. Nothing much really happened, no real impact. Then 2016 Rio de Janeiro. They were starting to pay more attention to cybersecurity for very good reasons. Frankly, there was a large-scale denial of service attack that was carried out by this botnet. [00:13:21] Let me explain what that is. A denial of service attack is where you might have a website, for instance. Providing service to your customers that might be going there to look at your catalog, maybe buy some things. It might be a government agency. It might be an important part of the Olympics in this case and their critical infrastructure. [00:13:42] So denied service means you either knock it off the air, or so people can't get it. Or there's also the distributed denial of service attack. Now DDOS are the distributed ones where you have hundreds or thousands of computers out on the internet, all over the place that are trying to get to maybe the home page, maybe the purchase page. [00:14:09] And because they coming from all over the internet, they're very hard to shut. And that's where we have the botnets coming in, too. Botnets are groups of computers that have been compromised by hackers. So what they do now is they command, for instance, you're a home computer that you don't even know is under the control of one of these bad guys, your home computer now, issues or requests. [00:14:37] Hey, yeah, give me the home page of Olympics 2020. And off it'll go dutifully and try and get the homepage. That's all well and good. Suppose the load on the server is what they're expecting. You've been to sites, right? You hear something mentioned on the radio and like Craig peterson.com now, because I mentioned my website, Craig Peterson, S O n.com. [00:15:03] And there are people listening. Some of you guys are going to go to my website. Now the normal traffic of having dozens of new people go to my website is not going to bring the site down. However, here's the other side of this? What happens if maybe two or three times as much traffic as I expect is going to come to the site? [00:15:27]I've compensated for that. We should be able to handle that just fine. But what happens if all of a sudden it's a thousand times what we're expecting because there are 20, 30, 40,000 cases. Peter is out there that are trying to get my homepage or, in this case, the Olympic. Homepage. Obviously, the server's not going to be able to respond, and it's either going to crash or and I'm sure they set this up the right way. [00:15:53] It's going to deliver a message saying the servers overloaded right now. Try a little bit again. And by the way, if you get that message on a website saying, Hey, try it in a few minutes, please try it in a few minutes. Don't just hit reload because that's going to put even more load on that poor little overloaded server. [00:16:15] Now what they had here coming in 2016 at the Rio de Janeiro Olympics was a staggering 540 gigabytes. Per second worth of people requesting homepages. That is insane. That is a lot of bandwidth. And the fact that they apparently had that much bandwidth available coming in is also amazing, but also remember people are looking at videos. [00:16:46] Am I. To get the insider scoop, add some stuff happening behind the scenes. Now, many of the attacks in 2016 started before the Olympic games even. And what they were doing is attacking different parts of the Olympics infrastructure operationally. So it's a problem. It's a very big problem. They survived that whole thing. [00:17:14] And by the way, the Brazilian government ended up trying to protect the world cup back in 2014 as well by spending a whole lot of money and time on this. But remember, Even back in 2008, we were talking about 12 million cyber alerts per day. How can you staff up for that back then? It was back then. [00:17:37] We're seeing some of our clients being hit with hundreds of cyber attacks a minute and multiple per second, sometimes 10, 20, 30 per second. It's just incredible. What happens? In fact, divide those numbers out 12 million divided by how many seconds in a day. It just shows you how amazingly huge it is. [00:18:01] Now we have seen time. Past where a country like North Korea, for instance, doesn't like what Sony pictures are doing. So North Korea then attacks Sony pictures. And in the case of Sony, they downloaded a bunch of confidential information. They released it. They embarrassed some people now; hardly anybody got fired. [00:18:21] It's absolutely amazing. But anyway, What's happening right now is Russia. Think about all of the Russian attacks against our businesses and our critical infrastructure as a country; they have been huge, massive attacks. We have now Russia at a point where they are getting massive amounts of. built up. [00:18:50] Why? Because they submitted doped samples in 2019 to the Olympic committee. Yeah. So this was a the McLaren report released by the world anti-doping agency. Describe what we're really systematic effort by the Russian government to really undermine the drug testing process. We've also seen the Russians in the past because they've been caught doing this. [00:19:19] And the Chinese as well, putting in some of the competitors, particularly into things like gymnastics that were too young to compete based on the Olympic rules that were in place. So we had all of this happen during and after the 2014 Sochi winter Olympics. Guess what? Those restrictions on their athletes are still in place, and in place in a very big way; they will not play the Russian national Anthem at the ceremonies at the Olympics. [00:19:53] And they will not allow the Russian flag to be carried. In fact, their athletes have to carry a neutral. Flag. So expect some serious attacks from Russia against the Olympics. And remember the Olympics. There are no spectators. Everybody's going to be watching this thing on a line. So it's going to be interesting. [00:20:19] We'll keep an eye and let you know how things go. Stick around. Visit me online. Craig peterson.com. [00:20:27]We have really in front of us a critical warning. We're trying to figure out what we should do or to stop people from attacking us. That's a problem. What should we do? Many of us have gone out to managed services providers, and now they have let us down. Did you hear about the Kaseya hack? [00:20:47] It has been a huge impact on people. It's absolutely crazy. Or you heard about a thousand companies that got together, and they have hired a negotiator in order to negotiate the ransom with the bad guys that have ransom there. It is huge. It's huge. But let's talk about why this happened, because I think there are many things that you and I have overlooked here over the years; this ransomware God guy, gang called REvil, R E V I L has targeted cause say, or customers through. [00:21:32] Say, but it isn't just kissy customers. It's really cause, say, it is customers for the most part. Now your head might be spinning a little bit, but here's what's happening. I'm a business owner. You guys know that right now. Let's say that I don't do cybersecurity for businesses. That's what I do. [00:21:52] But let's say I make a widget. I was a widget maker, do not have enough knowledge about computers, to really do it myself. So let's say I've grown and I've got 20 employees. The odds are very good that my office manager is the one in charge of the computer. The office manager probably orders. [00:22:17] Computers probably tries to figure out what's going wrong. By the time of it at 50 computers or 50 employees, I've probably got a full-time it person who goes around and tries to take care of things. But before I've got that full-time IT person I'm probably going to outsource it. And by the way, a lot of companies, it's more like a hundred to 200 employees before they get someone who's really dedicated to it. [00:22:46] So then that awkward teenage stage between where the office managers trying to do it. And finally the office manager can try and hire an it professional. Is where they go and outsource it. You talk to various types of companies. What are in the industry called break, fix shops. That's usually the first stop which is calling them up saying I've got a broken computer. [00:23:12] Can you fix it? And maybe they can, maybe they can't. And then a lot of break fix shops have tried to level out their income so that they have predictable monthly income so that they can hire the right number of people for the number of customers that they have. Although I've got to say most of them are badly overbooked. [00:23:32]Now that they've hired those people, they this outsource break fix shop. They come in and say, okay here's what we can do for X amount per month per computer or employee, we will take care of those computers for you. One of the things that they'll promise to do is that they will take care of your cybersecurity for you. [00:23:53] Now, cybersecurity is frankly, a specialty. It is not something that everybody can do. Even if you're using some of the best stuff in the world, like what we do, we have Cisco hardware, we have Cisco software that we run advanced malware protection. So that's the best of the top of the line. [00:24:13] Most smaller businesses aren't going to want to pay for it, even though they might be able to afford it. Push those people out right now, because we're talking about, you were talking about a smaller business. So what does that outsourced it provider do for you? They might change their name and call themselves a managed services provider. [00:24:34] And that's all well and good, but they need help as well. So I'm making widgets. I have this break fix shop that came in and fixed my computers a few times. And now they're handling my cyber security. Isn't that wall well, and goods was wonderful. So now they're handling, supposedly my cybersecurity. But they know they can't do it themselves and it would be too expensive to do it because they went cheap. [00:25:01]You bought the least expensive option or, close to the least expensive option. So wait, and by the way, cheap in this case means that it's under $150 per. Person slash workstation per month. That's what it costs to get this stuff done. So you might be paying 25 or maybe even $50. They can't do it for that. [00:25:25] So what do they do? They go to a company like. Now they also have some others. They have what are called arm AMS that keep track of some basic stuff for you, but they go to Garcia and say, okay, Casia we want you to monitor the computers, keep them up to date, et cetera for. Now did I, the widget manufacturer go ahead and hire to take care of stuff. [00:25:51] Did Kasiah even do it themselves or did they outsource it? Do I even know the Kaseya exists because it's really Kaseya that is managing my computers doing. We have, there has a software that doing the upgrade on my computers. This is a real problem because the widget maker, Nope, I didn't hire KSA. I didn't even know they existed. [00:26:17] I trusted my local. Your local guy is not taking care of your cybersecurity. Almost completely guaranteed. There's very few companies like mine out there that we actually do it ourselves because we have looked at Kaseya. We've looked at all of these platforms. Every last one of them has had major problems. [00:26:40] So here comes Casia with over a hundred thousand customers that gets hacked and distributes the hack to all of its customers that are running some of these on-premise devices that are trying to manage the networks for not Cassias clients, but for KSA as clients, client. Okay. Do you see how this is the level of indirection? [00:27:03] You see how this is going to affect? This is a huge problem. And Casia not only have we warned some of these companies, like Kaseya about major design flaws in their software, but cause say his own engineers apparently about three years ago, warned Cacia about major design flaws in the software that they were using. [00:27:29] So they knew about this. They were warned months, if not years in advance about it. So what does it say you do? They're concerned about profit and features, so they just keep adding features as alleged by their former employees instead of fixing the security problems. Cause it would be too hard to fix, take too long cost too much, and it isn't going to increase our revenue. [00:27:54] Are you sitting down? Can you believe this is one of the major operators out there, major operators that is, is behind your manager services provider and your break fix shop that's who's doing it out there. So there are probably far more than that this thousand Kaseya clients that have gathered together to try and negotiate the ranch. [00:28:25] And I got to say, I, I would be extremely disappointed if Kaseya customers didn't gather together and Sue them in a very big way. Curly sins, people claiming to be former Cacia employees are saying they warned the company about major flaws in their software. And that is what hit all of Cassias customers. [00:28:52] Customers. This is incredible here. This is a much different style of relationship that companies have typically, right? Yeah. Okay. Law firms they'll outsource stuff, right? So let's say there's some maritime law. They'll go to a maritime law firm. They'll outsource it. So yeah, there are some models where this is done, but this is done routinely. [00:29:17] In the cybersecurity space. It's not something we do. We stuck our toe toes into that pond and we didn't like it. We didn't want our customers to be hurt by this sort of thing. But anyways, there you have it. Okay. There, you have it all about profit and not about you. And by the way, it's also about how much you're willing to pay. [00:29:41]Did you know that Amazon has a new CEO? I remember back in the nineties, I pledge that I would never use Amazon again because they filed and were awarded a patent on technology everybody was using. Jeff Bezos is out of a job. [00:30:00] This is a guy that grew a company that all they did initially really was book sales and they had a warehouse the size of the Amazon, right? Because they wanted to represent everybody. They had every book ever published and to a large degree. They did. They had a whole lot of bucks and then I've expanded of course, beyond that. [00:30:28]And beyond that, to the point today where they are doing some well, again, shady things I mentioned in the intro that I was concerned about what Amazon was doing with pat. They got a patent on this one click purchase. Now I have been a fan of patents for a long time. I do not like the patent law as it exists today. [00:30:55] And in fact, I haven't liked it for quite some time, but this patent law where you don't have to show that there was no prior art and frankly, the prior art does not matter at all. I think that's a huge. And I've had a number of patent attorneys on my show, talking about it and talking about what we may want to change. [00:31:18]Jeff Bezos grew it to today where it really is the number one provider of online services is. You might in fact, almost certainly are using Amazon's services, whether you realize it or not to go to most, any website, any of the big ones they're probably using Amazon's web services. They're probably using Amazon storage and Amazon has dozens and dozens of different services. [00:31:50] So it's a very big deal. And Jeff Bezos, who's the guy that started all of that sat down stepped on. I should say. Now it's rare that the founder of a company ends up taking the company public. Public, basically, that just doesn't really happen because all of a sudden, when you're public, your whole job changes and no longer can you make a decision, a snap decision about something, and then go ahead and do it. [00:32:18] You've got to be very careful about what you do when you do it, how you do it, you have to announce it and everything, but just an amazing man being able to take it. All of that. And by the way, have the largest settlement, a divorce settlement in history with his ex wife. It's amazing, but he is still the world's richest human. [00:32:40] Now he has this company called blue origin, which is his rocket company. He's got the Bezos earth fund and he's still chairman of Amazon's board. So he's not going anywhere. However, we've got this new guy, Andy Jassy, who has stepped in as the CEO of Amazon. He was the the head of Amazon's. [00:33:06] Online services, which is absolutely huge. It's their most profitable arm by far. So he's taking this whole thing over when Amazon frankly, is in a lot of trouble. Now they're basics of, Hey, there, the money that they're making, their profits and everything, that's all well and good, but there's ongoing antitrust investigations. [00:33:33] There's battle with labor. And we're talking about, of course, big labor here. The unions. There's increased competition in the cloud space. Just look at what happened with the us military in there. I think it was at least a billion dollar. I can't remember the exact number, a cloud contract because Amazon was battling Microsoft Azure and it was awarded. [00:34:01] And then just a couple of weeks ago it was pulled back again. They're also seeing increased competition in their online services from Google. And I use some of those Google services. In fact, if you go to Craig peterson.com, it's actually right now using some of those Google services. So they are really getting nailed from a whole bunch of different directions. [00:34:26] And this guy Jassy has worked there since 97. But he may be the perfect person to guide Amazon through. W really now we're talking about the middle-aged, that's the time when you're supposed to buy your convertible, buy your motorcycle, et cetera. The middle aged years. And in this case, there's some problems. [00:34:51] Here's a quote I want to read from this Yahoo article is actually I think AP yeah. Yahoo finance. This Yahoo article and it's from Harvard business school, because we've got regulators who are circling, and this may be the main reason Jeff stepped down. I don't know, but quote, you may want somebody who has the confidence of the chair. [00:35:16] And the board you want somebody who understands the strategy and was part of it and knows where the bodies are buried and the mistakes that have been made and how to move forward. This is from Harvard business school, professor of business administration. Rosabeth Moss Kanter, and I think she's right. [00:35:39] Absolutely because this road ahead for him is going to be tough. But the fact that he ran their most profitable division tells you something, it tells you a lot and he might be the exact right guy to be able to do that. Amazon's now got a market capitalization of about $2 trillion, which is huge. [00:36:01] And it's certainly enough to get some of these regulators. Paint a lot of attention to what's going on. We've got the Washington DC attorney general, who has accused them of violating the district of Columbia's antitrust act. And that has to do with, for bidding third-party resellers, from offering cheaper rates for their products on competing sites. [00:36:24] Cause remember what Amazon does. About half or more. In fact, I think now of their products are not actually sold by Amazon. They're certainly not Amazon products. They are products from resellers who are just selling on Amazon. They're using Amazon is their platform. And that way Amazon will manage the inventory. [00:36:47] It'll warehouse a little ship it out. It'll handle the returns. Yeah. What Amazon is doing is charging these sellers for the space in the warehouses, which is perfectly legitimate and taking a percentage of the deals. Are there other websites that might give these sellers or resellers or stuff they're importing from China or wherever. [00:37:12] Might there be other sites that give them better deals? Will you bet there are sites out there. So that's why she's suing them. Federal regulators look like they might be coming in as well. The federal trade commission's newly appointed chairman. She's a fierce critic of the. Amazon way of doing business and she made herself a name by publishing an article for Yale's law journal titled Amazon's antitrust paradox. [00:37:42] So before she was even appointed to the federal trade commission, she was already calling for changes in the current antitrust regulatory framework. And that might be widely invited administration has appointed her, but there's six antitrust bills. Targeting big tech right now that are working their way through the house of representatives. [00:38:05] And we've talked about some of those already, and, I do not like these huge tech companies that are making crazy profits and using those profits to keep other people out. And Amazon's one of the largest employers in the country. And after years of complaints from somewhere house workers, we've got the labor unions now in the mix trying to take action. [00:38:30] Now, I don't have a single problem with labor unions while at some of their tactics, I have problems with, I don't have a problem with the labor union. In the private space. I have a huge problem with I'm in government space. And we could talk about that at some point, but I don't have a problem with them trying to organize inside Amazon. [00:38:53] So the international brotherhood of Teamsters. Yeah. I remember the guys that drive the horses. They announced that they're going to begin working to organize Amazon workers. So that might succeed. There was another one in Alabama that had failed. So are you getting the hint here? This is huge. It's huge. [00:39:13]By the way, Amazon's offering warehouse workers starting pay at $15 per hour plus benefits. So that doesn't seem too bad. If you ask them. But again, with the pandemic, all of the stuff going on there been a lot of calls for Amazon to quote, treat its workers better. So we'll see. We'll see what happens. [00:39:34] Other problems with Amazon that we've talked about before are things like fake reviews. You and I, we look at the reviews, it's critical in us buying things. Isn't it. We look at the reviews and say, oh, wow. Jeepers. There's 500 reviews here and it's four and a half stars. Okay. So I can have confidence that this product is good. [00:39:58] It's going to work. And yet some of these sellers, what they're doing is bribing people to give a good review. So they'll say, Hey, you buy my product. And then they send the product in with, along with the product is a little note saying, Hey, if you give me a review and send me a link, I'll send you an extra battery or whatever it might be. [00:40:20] That has been a real problem for Amazon, even worse than that, because at least those people might give an honest review, right? Worse than that is that some of these reviews are paid for. So some of the sellers it's alleged are going out there. They are hiring. People and paying them to give reviews. Now, those ones are very obvious. [00:40:45] If you look at the reviews, so don't just look at there's 500 and the average is 4.5. Look at some of the reviews in the wording. So I've seen reviews where it was for a massager, and there was talking about what a great. A set of wheels that has on it. And they work really well. And it's very smooth when you're out, riding it on the trails. [00:41:08] Wait a minute wait, we're talking about a massager here. We're not talking about a bicycle, so that's one of the ways to tell if the reviews are fake, they're don't even talk about the product at all, or any of its real features. The other one is look at the wording because most of these fake reviews. [00:41:26] Don't use English, so good. All right. Okay. Thanks for being with me. I want to make sure you stick around and visit me online. In the meantime, go to Craig peterson.com. If you sign up for my free newsletter, you'll be getting that every week with all of the details. I'll try and catch you up and you can listen to my podcast, right from there. [00:41:50] Craig peterson.com. That's Peterson with an O. [00:41:56]If you look into buy a used Google pixel for a I got some news for you. The FBI has been very busy and they've conned the con man. I love this story. The FBI has, been trying to track bad guys for a very long time and there've been a number of ways they've done it. [00:42:19] We know obviously about phone taps, right? We've seen those before the old days. I don't know if you've ever been to one of the original. Telephone switching stations, all not even original, but the types they had in the late sixties, early seventies. I remember going to see one and all of these switches were just going [00:42:40] People were dialing the phones and everything. It was just so cool. And back then, in order to trace a phone call, what they had to do is find the original. Sore. So they would go to that row, that column, that exact little unit that was hooked up directly to your phone. And then they would see, okay, this is in position this, and then go to that next switch. [00:43:04] Okay. Position that next switch, position that and go all the way through. That's the really older days, not the old days where you had somebody that was at a switchboard doing it. Nowadays, of course, it's all done by computers. The telephone company turns your voice into a digital signal and it's usually done right in your local neighborhood. [00:43:26] It isn't even done at the central office anymore. So by the time your voice is outside the central office, it's digital it's hauled on nowadays, even partially an internet protocol. Network. They used to use different protocols back in the day. And so it makes it quite easy for them to tap your line. Now, of course, there's the legal side of this. [00:43:50] Do they have the legal right to do it to the need a court order or what kind of a court order? Do they need right. All of that stuff. But that is side. It's very easy to find out where call went, where it came from and to listen in because it's just digital. Data's completely completely copyable with absolutely no particular problems at all in copying it. [00:44:14]Last month. The FBI and the Australian federal police acknowledged that they had indeed been working on this encrypted device. And the company was called a nom, which is a fake company and a nom sole. 12,000 smartphones to criminal syndicates around the world. That's the wording that the police used. [00:44:42] So these were being sold as secure devices. They did things like they removed the cell leader, modem functionality they'd changed the boot ROMs. They removed the GPS. So the idea was, Hey, you missed your badge. You can use one of our Anom phones and it's using a special version of the Android operating system and you can send messages back and forth. [00:45:07] It's a completely secure messenger service end to end encryption, right? Like we're always being promised. And so what happened is bad guys started referring. Bad guys to this, right? Cause if they wanted to talk to the other guy, they both needed these Anom phones. Otherwise they wouldn't be able to talk to each other. [00:45:28]And so they were recommending the use of these phones, to their friends that were in the illegal businesses as well. So this I'm just chocolate is so great. So the FBI weaponized. Android phones, at least this particular model of it. And there's a whole community in the Android world. It doesn't exist in the iPhone world because this is much harder to do in the iPhone world, but they call themselves the model. [00:46:00] Community. And so they'll get a phone from some vendor. They'll make some changes to it that led to maybe change networks or do other fancy things. So they, after BI used some of this technology. The modding community and did some just amazing things with this custom rom. Now you're going to love this part. [00:46:21] Okay. So when you boot this phone up, this is according to ARS Technica. The phone will have of course, a little boot screen and. The highest custom rom here, which is the boot loader as well as other things, but it showed an arcane, oh, S boot screen that's the name, arcane O S and every place, the normal Android distribution that comes from Google with the. [00:46:48] B I's arcane. Oh, west green. It's just absolutely phenomenal that these guys would do this and would fall for it. So the FBI told the criminals, Hey alleged criminals, Hey, these are secure devices, the really focused on security and there is a pin scrambling fee. What would happen is on your phone? [00:47:11]You might enter pin some phones, you might use a fingerprint, or he might use a face ID. This was a security feature. And what happened is normally you've got what, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0. And you type in your pin and off you go, what this did, is it scrambled it? So it might be nine to. [00:47:31]Just the scramble of the digits up so that when you enter your pin, you're not always touching the screen in the same place so that people could not guess your code from the fingerprints you're leaving behind. Now, this is also interesting. It, this is a great way to do it. If you're doing it for real, having to run an anonymous phone, they had two different interfaces on the phone and it a different one would pop up depending on. Pin you typed into the lock screen. So the first pin would show a bunch of non-functional apps that are pretty popular in the app store, like Tinder, Instagram, Facebook, Netflix, candy crush games. [00:48:15] So if somebody is checking out your phone, forcing you to unlock it, they're not going to find budge. And by the way, none of those things work. But. I would have, if I had designed it, I would have made them so that they would work. So you can fool some of us trying to Rob you and steal your phone. [00:48:28] The second pin that you could enter in, tell you chose your pins, but it was supposed to be the secure section. She didn't have the phone. So it had a clock, a calculator, and the settings. But the calculator app actually opened a login screen to a nom as an anonymous. And that, again, the bad guys are told all that's a secure, encrypted way to chat. [00:48:54]This is just amazing. So they will do use that. So they go into the calculator app and now allowed them to chat with their friends. But what they did not realize. Is, it was actually sending all of the messages also un-encrypted to the FBI. Okay, absolutely amazing. Amazing. So now some of these bad guys are selling their phones online. [00:49:25] I remember I warned you at the very beginning. If you're going to buy a pixel for a you want to listen to this first because the bad guys are selling. Their phones online. And so a number of people have been trying to figure it out. Some posts on Reddit and elsewhere. You guys know how to deal with this arcane. [00:49:44] S how can I reset this? What should I do? Okay. A lot of confused people. How do I fix this thing? You're not going to be able to fix it. Okay. By the way, this thing I think is really cool because the guy who he bought it legit guy bought it use. You said the installed operating system is arcane O S 10. [00:50:03] The system updater says that Archana, YC 11 is available for download, but I don't want to do it in case it makes something even harder to fix. So maybe the FBI is bad. At sending out updates and fixes, then most of the Google Android vendors that are out there and I'm just laughing all the way through here. [00:50:24]So there are some things that a tech savvy user should know. So I want you guys to pay attention to this, particularly if you're using an Android device. So the first thing is when you start up a newer Android phone, when it's made in the last few years, The first thing that happened is that Google runs something called verified boot, and that makes sure the operating system has not been modified. [00:50:55] So the operating system from the manufacturer of the device will be signed using a cryptographically secured. What was happening here is these devices were failing verified boot of course, because FBI had modified the boot ROMs. And if your device fails, verified boot, your Android device either could be an unlocked boot loader or a relaunch boot loader with tampered software. [00:51:24] It's going to show a message. And in, in this case, the FDA FBI devices just have a message that says your device is loading a different operating system, complete with their yellow exclamation point icon and a link for Google support pages. Absolutely phenomenal. And by the way, the article I'm sending this out in my newsletter, but it says. [00:51:51] How resistance changes. Google has an order. So it sent them to the legitimate Google support. So there you go. There's a really good little piece of advice right now. The FBI changed a lot of the Android operating systems, tripped out a whole bunch of Android settings that might've revealed something about the fact that it really was a spy device system settings for app storage and accounts have been removed. [00:52:19] So pay attention, right? If the machine, if your machine boots up, plane's about the bootloader, you've got a problem and it isn't just Android. Obviously apple will do that. The newer versions of windows are starting to do that as well with TPMS and windows 11 is really going to bring a lot of that to the forum. [00:52:41] Hey, you're listening to Craig Peterson and you can find me online. Craig peterson.com. Check it out and stick around. [00:52:50]Work from home is a very big deal, especially for a couple of segments of our society. And I want to talk a little bit about that now, as employees are returning to work, should they be returning to the office? [00:53:06] There is a great article here this last week in Forbes magazine by Dana Brownley. And it was one of their editors pick and it was picked I think for very good reason. And that is so many of us have been working from home. And for many of us. [00:53:24] Bennett godsend. I've worked from home now for over 20 years. And for me, it's been a godsend because my priority was helping to raise our eight children. And it's hard to do that, and it's hard to homeschool to them if you are not at home. So that's what I had done. And I was very privileged to be able to do that. [00:53:45] And our kids have all turned out amazingly. Many people are caregivers and it isn't necessarily just of kids. But right now I'm looking at a survey that was conducted. It's called the Prudential May, 2021 pulse of the American worker survey. And they're showing the 2000 respondents that 38% identified themselves as caregivers with nearly 40% of those providing care. [00:54:16] For school, age children when you are starting to look at benefit packages, it is important for many families to be able to have some form of childcare. And what has snuck in because of the lockdown is that many of us actually can work from home. Many of us have been more productive at home. And then on top of it, all we can take. [00:54:43] Of our family. So let's look at the stats. We told you about school age children. That's about 40%, 32% are taking care of young children. And this is the 40% of all workers. Okay. People 30% are caring for someone with a disability, some sort of a health issue. And 23% are taking care of an older adult. [00:55:10] That's 40% of the workforce. That is a lot of people. A lot of people, 38% is the exact number. So there, many of these care givers are returning. Really a traditional work environment where they're going to the office, but they have very unique needs. And I think every last one of us have to consider that and have to look at it and figure out how can we make things work. [00:55:41] And when we look at the numbers again for the caregivers, 45% say that they've considered leaving the workforce entirely. Due to personal demands. And 53% are saying that they would retrain for a career in a different field or industry. If they had the opportunity, we have some of our best people out there that are taking care of our kids of our loved ones. [00:56:12] Our parents. And again, look at mine, a situation here where I was at home helping to take care of our kids along with my wife. Neither one of us could have carried on a regular job and homeschooled, eight kids. Neither one of us could have done that. What kind of talent might we be losing? By squeezing these people out of our workforce, particularly when we've now proven that most businesses can allow their workers to work from home. [00:56:48] Now they found in the survey that there were three primary types of support caregivers and these types are looking for different types of flexibility. Number one, they're saying that 42% wanted increased workplace flexibility. No, that makes a whole lot of sense, right? So they can work from home. [00:57:11]Maybe some of your best employees or people who want to work in another part of the country. I have a friend, his brother-in-law is a real good programmer in this one particular type of programming. I think it's sales and he is living there now in a completely different country on the other side of the world. [00:57:33] And yet. He's still doing programming for these people here in the United States, talking about workplace flexibility. He is sitting over there not far from China and is enjoying himself. He loves it there. And of course his costs are much lower, et cetera, et cetera. So consider that, not just that there might be working from home, but maybe they want to take the kids over to Europe, live there for six weeks. [00:58:01] There's a lot of things people want. So that's 42% of our people that are working. Okay. Increased workplace place. Flexibility. The number two increased paid time off 38%. Again, something we got to seriously consider. Now I know how hard it is to be able to fill in for someone that's on vacation or. Maybe they're caring for a loved one. [00:58:28] Maybe they just had a baby, et cetera, but it's very important when you get right down to it. Because again, who's better for raising our children, us, or a stranger who's going to more or less warehouse them. You have to keep a look at that. There's a great article from the Harvard business school. [00:58:50] It's titled. COVID killed the traditional workplace. What should companies do now? That's a very good question because now the lockdown is mostly behind us. Executives can't expect the offices to run the same way they did people to come in and do the same things that they always did. But in reality, Harvard business school, faculty members are saying there are ways to keep our employees happy and productive. [00:59:22] And that is exactly what we're talking about. No for many caretaker takers caregivers, I should say paid time off is more valuable than a pay increase. And that's particularly true for those who are at the higher end of the pay scale. It gives them a lot more flexibility. They can get away sometimes from all of their responsibilities and obligations, which is just so important. [00:59:48] There's here's another one. This is a job list survey from CNBC. The articles entitled here's how much money workers would give up for better. Life balance. And they go in, in that particular article and say that the average worker who says they currently have work life balance, it would take an extra $10,000 in pay per year for them to give up their personal time. [01:00:11] I'm not sure that's right. I think it would be a lot more than that. And it also says just 30% of workers said, they'd give up part of their pay for better work-life balance. And the threshold varies by the type of worker that's where we, I think really get into it now. So those are the first two, the third one is 37%. [01:00:32] So these are all within 4% of each other. Greater commitment to health and wellbeing. Now I've seen studies before that are saying businesses that put in a gym and put in workout rooms, et cetera. They never actually see them use. The way they expect for them to be used. And I don't think that's what people are talking about here, but we really are thinking a lot more about health and wellbeing since so many of us have been scared because of the COVID outbreak, but maybe I should be paying more attention to our health. [01:01:07]But we also have the mental health look at all of the problems we've seen from so many mental health issues because of the. Down. So Harvard again, came out and said for employers, it means that we need to signal the health of facilities. It's crucial to attracting people back. So again, The right kinds of air filters, right? [01:01:30] Kinds of lighting, make sure people feel safe while they're in the office and maybe cut back the number of days that they have to be there. Hey, stick around. We'll be right back. We got a lot more to cover. You're listening to Craig Peterson, of course, and visit me online. Craig peterson.com. [01:01:50]Hey, we got another emergency patch out from our friends at Microsoft. And in this case, it has to do with printers and remote printer access. Do you have employees working from home? [01:02:05] Microsoft has their big monthly patches that they release. They also have weekly patches that they released that are for slightly more critical vulnerabilities. And then they have. Patches that are released because there is a severe problem going on right now while that's what we are staring down. [01:02:31] There is a vulnerability called print nightmare, and this is located in the windows print. Spooler serve. Now the windows print spooler services, what it sounds like. This is the service that handles all of your print jobs. So if you are using this service, Turns out there's a serious bug and Microsoft tried to patch it once and failed. [01:03:01] And they've got another patch out right now seems to be working, but organizations are really urged to deploy these patches as soon as possible or deceased. Inbound remote printing until they can be applied. So that's why I said, if you have people who are working from home, because many of us turned on remote desktop and you better make sure that's properly patched up so that people could. [01:03:28] Then and get a desktop. Although Microsoft has an interesting solution that is going to be announced in early August about having your own windows machine there in their cloud. So it looks like you'll be able to have windows machine for about 35 bucks a month. Microsoft will have to keep it up to date. [01:03:47] I think that's a very cool thing, but they're coming out with that here very shortly. Within the next month or so, we'll see what happens, but this is a problem because if it's exposed to the internet, We're expecting to actually already be seeing active exploit. Now here's the problem Microsoft's trying to solve. [01:04:10] We have three different types of patches. You have the monthly patches that they release. You have your, which of the patch Tuesday. You also have patches that are released every week, which are more critical. And then these types of patches, these are patches for what are called. Zero day attacks. There is nothing normal out there, a regular stuff that would catch this and stop it. [01:04:37] Now, the advanced malware protection that we use from Cisco, it will catch this sort of thing, but it'll only catch it after it's been seen a few times and then identified, obviously by now it's been identified. So it's pretty darn cool. So Microsoft's monthly updates. Last month included a patch for another vulnerability in the windows print spooler service. [01:05:02] And it was initially called a local privilege ex escalation issue. That means that you had to be on that computer in order to gain access to these advanced privileges and features. Turns out that it wasn't entirely just local. And now there is a new one where it can be exploited to get remote code execution and not just privileged privilege, escalation. [01:05:30] That means that they can now run programs on your computer. And with privilege escalation, they can run those programs as whomever they might want to do. So this is pretty big Blackhat USA conference coming right up and they are going to be hosting one of their talks called diving into spooler and what they did to discover these local and remote. [01:06:00] Vulnerabilities in the windows print spooler Hey, it's definitely a problem. There is a proof of concept exploit out there, and that means that the bad guys are not too long from coming up with their own. So there you go. Again, patch it up close and remote access, at least for the time being. To your print spooler because it could be a very big deal. [01:06:25] Another thing you could do is disable the prince Pooler service. You can just use stop service dash name spooler dash force, and that will. Pop it right on down. Okay. And then by the way, in case your machine reboots, you probably wouldn't do a set service dash named spooler dash start-up type disabled in order to make sure it doesn't restart, but there'll a lot to worry about right now, a whole lot, frankly, to worry about right now because of the Russians are coming. [01:06:57] Here's another one. This is Chevy bolt. Now, I have had some major complaints about Tesla and the way Tesla has these door handles that recess in entirely and how it has happened that during an accident, those door handles don't pop out and people cannot be extracted from cars. And the biggest problem you have in an accident with a car full of batteries is. [01:07:24] Of course the high voltage and current that's stored in the batteries that now when they, it out, it starts a toxic fire. Very nasty. Just this week, the national highway traffic safety administration issued an alert for all 2017 to 2019 Chevy. Owners now I know a lot of these bolt owners are actually government agencies. [01:07:50] They're not individuals, but I thought I'd bring it up. Anyways. There was a fire in a Vermont state representatives. Car's name's Timothy Brown. And his Chevy bolt decided it was going to catch on fire. Now, there was a recall by GM of these Chevy volts that had this problem, and apparently it doesn't entirely. [01:08:17] Fix it, they are still plaguing GM. And man, in this particular case this rep of course in Vermont being a I don't know, leftist, I have to assume, but a fan of electric cars, his car. Sad they're burning, which is pretty bad, ironic, but this happened when was this? Oh, it looks like this happened just a couple of weeks ago. [01:08:43] He's the state chairman in Vermont of the house committee on energy and technology. I've been supporting electric vehicles go sponsor bills relating to electric. And plug-in. So now his 2019 Chevy bolt course caught in fire, caught on fire, and there are others out there. 68,000 cars. All right. So two phases to the recall first phase is a temporary solution. [01:09:11] The second one is a more permanent one. Apparently this has to do with the batteries spontaneous. Catching fire. So this isn't something that's related to a car accident. It's a spontaneous combustion problem. That's not too good. It's a defect in the LG chem battery packs that are in these cars. So here you go. [01:09:34] If you drive to work every day and you charge your Chevy bolt every night, the United States, federal government is telling you to stop doing that. Yes. If you have a Chevy bolt, they're advising you to not charge it at night. I'm not sure when you're going to charge it. Cause the idea is you charge it at night. [01:09:54] You drive in the day, right? So they're saying there's, you can't do that. If you have to charge it at night, make sure you park the car away from any structures and definitely do not park your Chevy volt. That might be part of this. Recall inside a garage. How's that for bad, the original recall, by the way, came out in November, 2020 for potential fire hazard in the, again, the high voltage battery pack, those cells could possibly heat up and ignite internally. [01:10:26] Yeah. And if that fire spreads of the rest of the car and spreads to the building it's parked in or nearby building. Yeah. So keep an eye out. If you have a Chevy bolt, this is the type of problem in a phase as we start more and more to move into the electric vehicle realm. Yeah. Eventually it'll all get worked out, but it isn't perfect today. [01:10:48] Hey, visit me online Craig peterson.com and keep up with the latest in what you have to do with technology. [01:10:56]We talked earlier about Amazon and how much trouble they're in right now, Google apparently is in a similar boat. We had just this week, dozens of state attorneys, general suing Google on antitrust grounds. [01:11:13] You can reach me online. Just me. M E Craig peterson.com or what most people do is they just hit reply to my newsletter. [01:11:22] Hopefully you're on my newsletter, right? That goes out every week. If you're on that newsletter you can just hit reply and ask me questions. Any questions you want? I'm more than glad to answer them. I know most of you guys, you're not business people. I am still glad to answer your questions for you to keep you on the right track. [01:11:39] The whole idea here is it's to keep you going. Safer. And if you're a business person, what the heck, maybe I can help you out as well while the here is a problem. And it's a very big problem. We have these absolutely huge companies that are using their market position in order to really control the entire world. [01:12:06] Now it's a very big problem because you have companies that are sitting on billions of dollars in cash who can and do keep their competition out of the market. Now, one of the ways that keep them out, and I've mentioned this before, Microsoft has done this multiple times as lost lawsuits about it, particularly over in Europe, but they find somebody who might be a competitor and they basically squeeze them out of them. [01:12:35] Even though they're not necessarily even a direct competitor. One of the things Facebook does is they buy companies for 10, a hundred times sometimes more. Then they're actually worth, would you take 50 million for your company? That's worth 50 million? You might not. [01:12:53] Would you take 500 million for the company? How about a billion dollars? That's where it starts becoming very questionable about what they're doing. One of the things that Google is allegedly doing right now is preemptively squashing com competing app stores. When you look at Google and the Google Android ecosystem, who sells the most Android devices out there, right? [01:13:21] The high-end devices, the number one seller of Android phones is of course, Sam. And Samsung started to put a store too. An app store. So you could buy Samsung, Sam sung apps now, apple and Google, both charge about the same rates as a general rule. It's 30% for these bigger companies that they have to pay the app store, okay. I'm okay with that. They both spent the time to build the platform, to monitor it, to try and keep the app store clean and guides. That's definitely worth something. But what if Samsung came along and said, okay, we're only going to charge 10% royalty. In our app store and the apps will run on all of our Samsung Android phones. [01:14:10] So it's still using the Google operating system. It's still Android. It will probably run on other than Samsung phones as well. That's the whole nature of, but that hasn't happened. And why hasn't it happened? These state attorneys general are saying that what has happened is the Samsung galaxy store got squashed by Google. [01:14:38] So it could maintain its monopoly on Android app distribution. So it says that Google engaged in a bunch of different anti-competitive practices. They offered large app developers, profit share, and agree. In exchange for exclusive exclusivity. Okay. I can see that the apple iPhone came out. Do you remember this exclusively on ATN T's network? [01:15:05] Is that a problem? They're saying also the Google created unnecessary hurdles for what's called sideloading. So sideloading is where you might go to another app store in order to install something. Or maybe it's something that you want to put on your site. It's not fully approved by the Google play store. [01:15:26] So that's the basics of what the side loaning is all about. So saying that they made that even harder. Okay. From Google standpoint, do we really want to. Allow anything to run on our phones. And here's the question, here's why, right? What do I do for living cyber security? What is one of the things you have to do for cybersecurity? [01:15:48]You've got to put in special routers, special firewalls and software on servers and computers. Whoever touches a computer last owns the next problem. That's been my mantra forever. So if we installed some software on a computer or we had the customer installed some software on a computer, and there's a problem who they get. [01:16:11] They're going to call me, right? Because I was the last one to touch their computer. And at that point now I have to show, okay, it wasn't me. It was this other piece of software. QuickBooks is a piece of junk, you know what, whatever it is, I'm going to have to justify it. And frankly, I'm probably going to have to fix it. [01:16:30] So Google is saying. We don't want all of these app stores that might have apps that are not secure apps, that crash apps that might cause problems with the Android ecosystem. I think that's perfectly legitimate. Apparently these state attorneys general don't think it is. And here's the last one. This is a. [01:16:53] Attempting to buy off Samsung to limit competition from the Samsung galaxy app store. Now, Google is saying that this lawsuit is merit lesson. I can see a whole bunch of legitimate argument on their part. They also said, quote, and this is an article from ARS Technica. It's a strange, it's strange that a group of state attorneys general. [01:17:18] Chose to file a lawsuit, attacking a system that provides more openness and choice than the others. In other words, are taking a jab at apple because
Welcome to Episode 59 of the Different Animals Podcast and this week we talk about July 4th, What we've been watching and playing, the new Kurt Warner Biopic and sports movies in general and lastly, the correct way to enjoy food. This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Your favorite pod's favorite pod is back with another 1 for y'all. We immediately start off Episode 112 with Sha'Carri Richardson and the Olympics as a whole. The Rachel Nichols situation took us for a loop. S/O to Jimmy Butler lol. We finally got a chance to discuss the NBA Finals. We wrap it up with Hill's disgust with the NFL having the Dallas Cowboys on Hard Knocks. If you would like to join the live streams and chat with us in real time make sure to join the 3 Man Weave podcast group on Facebook or subscribe to our Youtube Channel at 3 Man Weave Podcast. Please tell a friend, to tell a friend about the 3 Man Weave Pod! We are a pod of the people and we would not be anything without you so lets grow this community and continue to have fun. Don't forget to Like, comment, and subscribe! Turn those notifications on! Follow us on Instagram: @3manweave_ @da_beast_nupe2 @d.hill_3 @mr_williams21 We can be contacted by email at Podcast.3.Man.Weave@gmail.com Check out www.fitness10x.com Mixologist: @Dymondstuddedevents All video inquiries check out https://www.intentional-productions.com/ Check out Au Wood's apparel http://www.edukatedmisfit.store/
Welcome to Episode 58 of the Different Animals Podcast and this week we talk about F9: The Fast Saga, Ep. 1 of Loki, Miles Morales on PS5, and of course, Tyler, The Creator's new album This podcast is available on Youtube, Spotify, Stitcher, Apple Podcasts and wherever else you catch your podcasts. You can catch us on IG and Twitter @DifAnimalsPod or email us directly at DifferentAnimalsPodcast@gmail.com with any feedback or suggestions. S/O to @Creative.Collin on IG for the dope Artwork. S/O to @EdERuger and @PhilliePhr3sh for the dope theme. Enjoy, and we'll see you in a week. PEACE. Find out more at https://different-animals-podcast.pinecast.co This podcast is powered by Pinecast.
Welcome to part three of a special three-part podcast series titled “Can I Live?” hosted by No More Interviews and BlackGrlThings. The third and final episode is sponsored by Lucent Swin. Looking to make a statement? Lucent Swim has you covered. They offer cute swimwear and glasses for the perfect summer day. Visit lucentswim.com and make your statement today. During this episode, we'll be discussing the idea of "identity crisis" and how it affects the overall development of the black community. As we reflect on our own personal childhood experiences, we also touch on the impact of social media and how it is affecting our youth. We hope that as we continue to grow as individuals that we can contribute to a better future for the children of our community. So, tune in for what we have to say for our last and final episode of the "Can I Live?" series! If you have any suggestions, questions, or critiques please feel free to reach out to us via Instagram at @NoMoreInterviews777 or on Facebook by searching No More Interviews. S|O to our mixer Heedy for contributing towards our journey. Copyright Disclaimer under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is permitted by copyright statutes that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use." - NO COPYRIGHT Intended
Welcome to part two of a special three-part podcast series titled “Can I Live?” hosted by No More Interviews and BlackGrlThings. This second episode is sponsored by Execution Muscle & Fitness. Looking to make your dream body a reality? Execution Muscle & Fitness specializes in meal planning, custom workouts, and accountability plans for men and women. Burn fat or build muscle simpler and more effectively. Check them out on Facebook by searching Execution Muscle & Fitness for more information! During this episode, we'll be discussing the relationships and interactions between black men and black women. With a variety of events taking place in our community, the need for support, emotional intelligence, and social awareness amongst both parties are at an all-time high. We tackle numerous tough topics regarding both the expectation and solutions for miscommunication that will allow us to spread love at a time when it is desperately needed. So, tune in for what we have to say and more during part two! If you have any suggestions, questions, or critiques please feel free to reach out to us via Instagram at @NoMoreInterviews777 or on Facebook by searching No More Interviews. S|O to our mixer Heedy for contributing towards our journey. Copyright Disclaimer under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is permitted by copyright statutes that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use." - NO COPYRIGHT Intended
Our team reads every personal note we get and we were very humbled to learn how many enjoy our mixes. We love all the support and want to know if you're listening, tag us on IG and we'll shout you out. S/O to our talented team of MAS DJs!!!DJ Kay Rich (@djkayrich)DJ Lunatiko (@djlunatiko)DJ R2O (@dj.r2o)DJ Palomo (@josemaciel)DJ Chacho (@djchacholsu)Don't miss future episodes every single Saturday on this platform. Follow was on Instagram @masentweddingsinstagram.com/masentweddings
HAPPY MONDAY! We try to come up with some small gestures that guys can do for their S/O without them being too creepy. What things happen here in Florida that make you say "That is SO Florida"?? We talk about supernatural things and how Brian doesn't believe the stories. We kick off the work week with something positive.. What's Good!? What do people think you do for a living and what do you actually do and When did you think someone was hitting on you BUT they weren't!
Another episode of the girl's favourite segment - Sabotage Advice! From conversation starters, your ex being in your BFF's wedding party, to your S/O following girls with OF accounts... Emma, Sophie and Nits give you their best advice! xxx
Well, we are in rare form today! Or are we? I don't really know what that means. We're here, no one is hungover today, and we've got that Ryan Leaf confidence! *Let's say someone opened a gym just for women. Then let's say that women really liked it because they didn't have to worry about guys hitting on them or stealing their dirty socks. Would that be such a bad thing? We don't think so either. *Doomscrolling! If you ever shoot someone and you find yourself facing a judge, just say you thought the gun was a tape dispenser. The supreme court will hear a case about abortion. The Cicadas are here and Slimfast has got recipes!! Did Bill Gates get horny twenty years ago? If you haven't been vaccinated, you're in luck. You can get vaccinated this weekend in Vegas....in a strip club. Florida at Walmart bends over to pick up a case of pop and shoots himself in the thigh. *Which Jonas Brother are you? Just kidding, Julia is in love with a Jonas brother or something. *What's your "thing" and how did you tell your S/O? *When and why did you give up your childhood passion? Did you ever have a passion? Is it too late to find one? *Can we just put an end to company emails? I'm tired of trying to find ways to send emails without sounding like a total corporate tool. *A new app lets you charge people for advice. You read that right. It might makes more sense once you listen but no promises. *Somebody worked up the courage to say that Shrek was a crappy movie. People lost their minds. *Well? What did you think? I thought it was a pretty nice little Tuesday. Let's hang out again tomorrow. -Everybody Wang Chung!!! See omnystudio.com/listener for privacy information.