Allows a private network to go through a public network
Our conversation about Cybersecurity Awareness Month with the panel of David Ginsburg, Jim Rea, Patrice Brend'amour, Brittany Smith, and Kelly Guimont wraps up as we discuss how your security and privacy practices can affect this around you, VPN use, and how to safely answer security questions. We also talk about how debit cards are different in the U.S. and elsewhere, and why you need to keep your software up to date, no matter how small the upgrade. (Part 3) MacVoices is supported by quip. Better oral health made simple. Get your first refill free at getquip.com/macvoices. Show Notes: Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Links: Privacy.com Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Facebook had a horrible, no-good, very bad week. Not only did Facebook, Instagram and WhatsApp go completely offline for about six hours, a whistleblower came forward to show the world what most of us already knew: Facebook values money over its users' well being. And I have another story that backs that up, as well - one that you almost surely did not hear about. In other news: the FTC tells app makers to fess up when users private data gets loose; the governor of Missouri wants to sue a newspaper for revealing a horrible security flaw that exposed teachers' social security numbers; Apple's attempts to prevent user tracking on iOS are being undermined by unscrupulous apps; a company that you've never heard of with access to almost all cellular text messages was hacked over the course of five years; the VPN maker and VPN review industries are awash in conflicts of interest; Windows 11 is finally out, but it's not clear if and whether you should upgrade to it; and Firefox is searching for more ways to make money and stay alive, including adding more sponsored search suggestions for you to consider. Article Links FTC says health apps must notify consumers about data breaches — or face fines https://techcrunch.com/2021/09/16/ftc-says-health-apps-must-notify-consumers-if-their-data-is-breached-or-face-fines/ Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/ Investigation Finds Apple App Tracking Rules May Be Ineffective; IDFA Blocked, but Apps Frequently Access Other Identifiers https://www.cpomagazine.com/data-privacy/investigation-finds-apple-app-tracking-rules-may-be-ineffective-idfa-blocked-but-apps-frequently-access-other-identifiers/ Company That Routes Billions of Text Messages Quietly Says It Was Hacked https://www.vice.com/en/article/z3xpm8/company-that-routes-billions-of-text-messages-quietly-says-it-was-hacked Consolidation of the VPN industry spells trouble for the consumer, https://blog.windscribe.com/consolidation-of-the-vpn-industry-spells-trouble-for-the-consumer-57e638634cf0/Facebook has finally given a reason for the six-hour outage Monday https://www.theverge.com/2021/10/4/22709806/facebook-says-the-six-hour-outage Understanding How Facebook Disappeared from the Internet: https://blog.cloudflare.com/october-2021-facebook-outage/ Facebook bans developer behind Unfollow Everything tool https://www.theverge.com/2021/10/8/22716044/facebook-unfollow-everything-tool-louis-barclay-banned-for-lifeFacebook whistleblower Frances Haugen tells lawmakers that meaningful reform is necessary ‘for our common good' https://www.washingtonpost.com/technology/2021/10/05/facebook-senate-hearing-frances-haugen/ Windows 11 compatibility: Check if your PC meets Microsoft's requirements https://www.cnet.com/tech/computing/windows-11-compatibility-check-if-your-pc-meets-microsofts-requirements/ Firefox Now Sends Your Address Bar Keystrokes to Mozilla https://www.howtogeek.com/760425/firefox-now-sends-your-address-bar-keystrokes-to-mozilla/ BONUS: Trust, but verify: An in-depth analysis of ExpressVPN's terrible, horrible, no good, very bad week https://www.zdnet.com/article/trust-but-verify-an-in-depth-analysis-of-expressvpns-terrible-horrible-no-good-very-bad-week/ Further Info National Cybersecurity Awareness Month resources: https://www.cisa.gov/cybersecurity-awareness-month-resources Only two weeks left to snag a challenge coin!! https://firewallsdontstopdragons.com/my-challenge-coins-are-back/ Become a Patron! https://www.patreon.com/FirewallsDontStopDragons Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGenerate secure passphrases! https://d20key.com/#/
Kris & David are joined by Beau James (@kingofkingsport) to discuss the week that was October 13-19, 1985. We start off by talking about the beginning of the hype for Starrcade 1985, as we have a major title change, plus Ric Flair turns up the heelishness on TV. We also talk about AJPW moving to prime time on Saturday nights on Nippon TV, Vince McMahon pulling WWF talent from NJPW tours, Satoru Sayama retiring for the second time in just over two years, the WWF going head-to-head with WWC in Puerto Rico, the Windham family reuniting in Florida, the future Lex Luger joining them in the Sunshine State as THE LUGAR, and Bill Dundee does a mega heel turn on Jerry Lawler in Memphis. All that and much, much more on a awesomely fun episode of BTS!!!!Timestamps:0:00:00 Jim Crockett Promotions1:23:58 Int'l: AJPW, NJPW, UWF, AJW, Stampede, EMLL, UWA, & WWF vs. WWC in Puerto Rico2:01:22 Classic Commercial Break2:05:21 Halftime2:16:13 USA East: CWF, IWA (FL), Continental, & Memphis/CWA4:01:52 USA West: Mid-South, WCCW, TASW, Central States, AWA, Masa Saito, & Portland4:50:42 WWF5:35:26 Patreon Preview: Vince McMahon's initial public response to the nWo/Outsiders angleTo support the show and get access to exclusive rewards like special members-only monthly themed shows, go to our Patreon page at Patreon.com/BetweenTheSheets and become an ongoing Patron. Becoming a Between the Sheets Patron will also get you exclusive access to not only the monthly themed episode of Between the Sheets, but also access to our new mailbag segment, a Patron-only chat room on Slack, and anything else we do outside of the main shows!If you're looking for the best deal on a VPN service—short for Virtual Private Network, it helps you get around regional restrictions as well as browse the internet more securely—then VyprVPN is what you've been looking for. Not only will using our link help support Between The Sheets, but you'll get a special discount, with prices as low as $1.67/month if you go with a three year subscription. With numerous great features and even a TV-specific Android app to make streaming easier, there is no better choice if you're looking to subscribe to WWE Network, AEW Plus, and other region-locked services.For the best in both current and classic indie wrestling streaming, make sure to check out IndependentWrestling.tv and use coupon code BTSPOD for a free 5 day trial! (You can also go directly to TinyURL.com/IWTVsheets to sign up that way.) If you convert to a paid subscriber, we get a kickback for referring you, allowing you to support both the show and the indie scene.To subscribe, you can find us on iTunes, Google Play, and just about every other podcast app's directory, or you can also paste Feeds.FeedBurner.com/BTSheets into your favorite podcast app using whatever “add feed manually” option it has.Support this podcast at — https://redcircle.com/between-the-sheets/donationsAdvertising Inquiries: https://redcircle.com/brands
October is Cybersecurity Awareness month, but being cyber aware is something we must be every day. Cybersecurity subject matter expert Max Greene is back to give us the latest on the threat environment, plus give us the latest tips on remaining cyber diligent at home and on all of our devices. Do I really need a strong password? What about two-factor authentication? Did I really win a $100 gift card like the text I just received indicates? Find out on Episode 39 of the Tyler Tech Podcast. Here's Jeff's notes from Max on staying cyber diligent at home:Designate certain devices for certain activities (ex: business use vs. personal use)Use your VPN (virtual private network)Use a strong passwordsUse two-factor authenticationHover over links and use the "first forward slash, two dots back" rule to see where the link is taking youFor more information, go to Tylertech.com
On today's episode we hash out everything that went wrong for the Chargers in their loss to the Baltimore Ravens. Does this change our overall expectations for the team? How do they fix the defense? Will they bounce back against the Patriots? All that and more. Patreon: https://www.patreon.com/guiltyascharged Tick Pick is the official ticketing partner of the Guilty As Charged Podcast. Use the code CHARGED for a $10 discount on your first purchase. https://www.tickpick.com/ Go to https://www.expressvpn.com/guilty to start your free trial of a VPN network today! Use the code “GAC” for 10% off your order at https://www.backroomcollection.net/! Use the code GUILTY10 for 10% off your order at https://www.qwest360.com/! Chiki Chiki Wings And Sports is the official sports bar of the Guilty As Charged Podcast. Use the code GUILTY for 10% off your next visit! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Depuis un mois, le pays connaît un net ralentissement du débit internet, ce qui a provoqué des critiques sur les réseaux sociaux et dans la presse modérée et réformatrice. Avant même ces problèmes, l'Iran était placé au 118e rang parmi les pays du monde où l'internet est le plus lent. De notre correpsondant à Téhéran, Le ralentissement de la vitesse affecte tous ceux qui utilisent l'internet pour leur travail ou comme les écoliers et les lycéens qui suivent des cours en ligne. En effet, en raison de la pandémie du coronavirus, les écoles sont toujours fermées et les cours ont lieu par internet, ce qui augmente considérablement le nombre des utilisateurs, en particulier à certaines heures de la journée. Pour Alireza, un écolier de 10 ans, qui suit ses cours à la maison, le ralentissement du réseau est agaçant : « L'internet est très lent. Par exemple, lorsque la prof fait une dictée, il nous faut une heure et demie pour la lui envoyer. L'enseignante nous le reproche et baisse notre note. Et lorsqu'on veut utiliser l'application Shad créée par les autorités pour les cours, il faut plusieurs tentatives avant de pouvoir s'y connecter. Nous avons pris du retard dans les cours. Avant, il fallait une heure pour envoyer un devoir à la prof, maintenant il en faut deux, voire plus. L'internet est vraiment très lent. » Le pays compte 14,5 millions d'élèves, ce qui augmente considérablement le nombre des utilisateurs à certaines heures de la journée. Des VPN pour contourner le filtrage Selon les médias, la bande passante n'a pas augmenté depuis deux mois, c'est-à-dire depuis l'arrivée au pouvoir du nouveau gouvernement. Pourtant, le président Ebrahim Raïssi avait affirmé, avant son élection, qu'il n'était pas question de limiter l'internet. Il a même affirmé qu'il fallait en faciliter l'accès car beaucoup de gens utilisent la toile pour leur travail. Pour Mahyar, un jeune programmeur informatique qui travaille aussi chez lui, le ralentissement est particulièrement perceptible depuis un mois : « À cause des sanctions, de nombreuses adresses IP iraniennes sont fermées et nous devons utiliser des VPN pour travailler, ce qui ralentit la vitesse et lorsque le trafic international remonte comme ces dernières semaines, nous avons vraiment des problèmes. La bande passante doit augmenter chaque mois pour répondre aux besoins, ce qui ne s'est pas produit ces derniers temps, d'où les problèmes actuels. » L'accès à la toile est largement filtré ou restreint par les autorités. Les utilisateurs doivent installer des logiciels anti-censure de type VPN [un réseau privé, qui permet de contourner le filtrage, NDLR] pour accéder à de nombreuses pages étrangères mais aussi accéder aux réseaux sociaux comme Telegram ou Twitter. Ce qui n'empêche pas de nombreux responsables d'utiliser ces mêmes réseaux sociaux pour des communications officielles. Dans le même temps, l'examen d'une proposition de loi a été présenté par des députés ultra-conservateurs pour contrôler encore davantage l'internet et cela inquiète beaucoup de monde. Une campagne avec des centaines de milliers de signatures a été lancée sur internet contre cette proposition de loi. Mais pour le moment, les députés ne veulent rien céder.
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email firstname.lastname@example.org email@example.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1
This week on The Chrome Cast, we're still stuck in Pixel 6 land. We warned you that it would be a Pixel party until the 19th and here we sit, just days out from the final unveiling. In the last week, more leaks came up, more specs were verified, and more hype was generated on the way. There were new landing pages discovered and Google has put their live event on YouTube for you to bookmark and get notified of, too. As much as Pixel fever dominates the podcast, there were other things to talk about as well. Most notably, our coverage of Acer's latest press conference along with an exclusive interview with Acer COO Jerry Kao. There are some interesting things brewing at Acer and with 4 new Chromebooks on the way, the Chrome OS train is still running strong. NOTABLE LINKS Google's Pixel Fall Launch live stream is already up on YouTube if you know where to look Just-announced Acer Chromebook 515 hands-on and initial impressions [VIDEO] Acer unwraps four Chromebooks and new Works with Chromebook accessories Where to watch the next@acer Global Press Event: Made For Humanity With so many Pixel 6 leaks, the Pixel Watch silence is deafening New leak suggests the Pixel 6 and Pixel 6 camera setups aren't as similar as we thought Complete Pixel 6 details outed in full-blown landing page, including performance numbers ------- This episode is sponsored by VIZOR for Chromebooks. Is your school district going 1:1? Do you manage thousands of Chromebooks and other IT assets like projectors and Smartboards? VIZOR is a Chromebook management solution that seamlessly integrates with the Google Admin Console and your student information system, now including PowerSchool. With VIZOR for Chromebooks, you can easily see which student has which Chromebook, manage repairs, and even automate disabling lost or stolen devices while notifying parents, all in one click. CLICK HERE to learn more about VIZOR. This episode is also brought to you by NordVPN. Get a VPN that takes your privacy seriously. NordVPN is our VPN of choice and will secure your browsing on your Chromebook or on any device. Use NordVPN to keep your private data to yourself whether you are at home or on the go! CLICK HERE to get 69% off and 3 months for free. --- Support this podcast: https://anchor.fm/chromeunboxed/support
In today's episode, we preview the Chargers monumental matchup with the Baltimore Ravens: Can the Chargers slow Lamar Jackson? Will the good special teams unit please stand up? What kind of production will the Bolts pass rush present? Injury Updates Key Matchups and X-Factors Bolt Predictions League Wide Picks FInal Predictions Patreon: https://www.patreon.com/guiltyascharged Tick Pick is the official ticketing partner of the Guilty As Charged Podcast. Use the code CHARGED for a $10 discount on your first purchase. https://www.tickpick.com/ Go to https://www.expressvpn.com/guilty to start your free trial of a VPN network today! Use the code “GAC” for 10% off your order at https://www.backroomcollection.net/! Use the code GUILTY10 for 10% off your order at https://www.qwest360.com/! Chiki Chiki Wings And Sports is the official sports bar of the Guilty As Charged Podcast. Use the code GUILTY for 10% off your next visit! Learn more about your ad choices. Visit podcastchoices.com/adchoices
New high-end MacBook Pro models and AirPods are expected at the Oct. 18 “Unleashed” Apple event, initial reviews of Apple Watch Series 7 are out, iPhone 13 Pro case options, and more. Follow Our Hosts @stephenrobles on Twitter @WGallagher on Twitter Sponsored by: SuperBeets: Join over 1 million customers, get FREE shipping, and right now get a free THIRTY DAY supply with your first purchase at: superbeets.com/appleinsider Masterclass: Get 15% off an annual membership to Masterclass when you visit: masterclass.com/appleinsider ExpressVPN: AppleInsider listeners can get three extra months when you sign up for a year of service! Get the most secure and fastest VPN service today by visiting: expressvpn.com/appleinsider Support the show Support the show on Patreon or Apple Podcasts to get ad-free episodes every week, access to our private Discord channel, and early release of the show! We would also appreciate a 5-star rating and review in Apple Podcasts Links from the show Apple Silicon MacBook Pro and AirPods event is on October 18 Mini LED in new MacBook Pro is '100% confirmed,' claims analyst New 'M1X' MacBook Pros to feature 1080p cameras, similar pricing, leaker claims Apple Watch Series 7 review roundup: the best, but not a compelling upgrade AppleCare+ Express Replacement now available in the Apple Support app iPhone 13 Pro Leather Case with MagSafe - Golden Brown iPhone 13 Pro Max Silicone Case with MagSafe - Marigold Thin V3 Case - Sky Blue - iPhone 13 Pro Apple working with Florida to bring state digital ID support to Wallet mophie - powerstation XXL - Portable Charger More AppleInsider podcasts Subscribe and listen to our AppleInsider Daily podcast for the latest Apple news Monday through Friday. You can find it on Apple Podcasts, Overcast, or anywhere you listen to podcasts. Tune in to our HomeKit Insider podcast covering the latest news, products, apps and everything HomeKit related. Subscribe in Apple Podcasts, Overcast, or just search for HomeKit Insider wherever you get your podcasts. Podcast artwork from Basic Apple Guy. Download the free wallpaper pack here. Those interested in sponsoring the show can reach out to us at: firstname.lastname@example.org
This episode the homies discuss the most anticipated anime for the fall 2021 season!!!We discuss the newest demon slayer as well an array of anime and manga discussions."I apologize for any poor edits and the delays but we love you guys and will continue to make the best content possible"Sign Up for LootCrate https://loot.cr/3f2IDei Get a 15% off your purchase when you use the code - geekgiant For more awesome monthly boxes that have merch from some of your favorite series or games and use the discount code, it'll help support the podcast! Continue to Support Geek Giant Podcast!!! Follow us on our Social Media and Patreon!!! Twitter: https://twitter.com/podcast_giant Instagram: https://www.instagram.com/geekgiantpo... Tik Tok: https://www.tiktok.com/@geekgiant704?... Patreon: https://www.patreon.com/geekgiant Looking for Anime on Netflix that isn't available in your Region or Country?! Wanna watch
Culture appropriation is still a NO-NO in 2021, and the latest victim is singer Adele. In 2020, Adele was seen wearing a full-bore Jamaican flag-print bikini and bantu knots in her hair. How dare a white person wear a Jamaican flag? Senator Sinema is in the trust-but-verify category, but even as a liberal she doesn't deserve to be followed into the bathroom and harassed. When did we get to the point where anyone could say that's normal? California has a new law, and this new law BANS small off-road gas engines and includes lawn mowers and chain saws. Someone would say that this is a racist law if the state was a red state. This new law will affect about 50,000 small businesses, and if they want to remain in business, they must comply. Will this green agenda work? Minnesota father is concerned after a gender therapist coerced his autistic son into identifying as a “transgender lesbian.” Parents, are you paying attention? Today's Sponsors Your food will be shipped FAST, and it will arrive discreetly at your door in unmarked boxes for your privacy. Go to http://PrepareWithChad.com SAVE $100 on a 3-Month Emergency Food Kit. So if, like me, you believe that your data is your business, secure yourself with the number-one-rated VPN on the market. Visit http://ExpressVPN.com/watchchad, and get three extra months for free. Order NOW and get 50% off ALL Genucel Packages during the final days of their end of Summer Clearance Sale at http://lovegenucel.com/WATCHCHAD. Learn more about your ad choices. Visit megaphone.fm/adchoices
On September 14, the US Department of Justice announced that it had resolved an earlier investigation into an international cyber hacking campaign coming from the United Arab Emirates, called Project Raven, that has reportedly impacted hundreds of journalists, activists, and human rights defenders in Yemen, Iran, Turkey, and Qatar. But in a bizarre twist, this tale of surveillance abroad tapered inwards into a tale of privacy at home, as one of the three men named by the DOJ is Daniel Gericke, the chief information officer at ExpressVPN. Which, as it just so happens, is the preferred VPN vendor of our host David Ruiz, who, as it just so happens, has spent much of his career explicitly fighting against government surveillance. And he has some thoughts on the whole thing.
Topics: -We welcome Jon Brown of Grove Technologies. Jon is a long time VIP supporter of the show. -Jon recalls attending a WWE even with the CCP crew, thanks to Joe's sister. -Starting a new business proved to be challenging initially. He talks about his learning curve and experiences building his current business. -Jon has a concept like Uber for Tech Support. -Grove Technologies is going to offer its internal SaaS based tool for other businesses and industries. There are integrations built for other tools like Addigy, Watchman, Jamf, etc. -Working with others as a sub contractor can help broaden your area of expertise as a company. -Hiring remote technicians has proven to be useful to Jon's business model. -Should you increase your onsite rate vs remote? -Do your clients care if you or your staff make onsite visits to their offices? -Grove Technologies has put their stake in the ground about being a remote only support company. -People still don't seem to grasp the concept of password management or Multi-Factor Authentication. -Cybersecurity training for end users can be incredibly useful. It can also provide some discounts with insurance. -Malwarebytes for Mac proves to be less powerful than the Windows version. -Hook Security and Breach Secure Now are two big services to help with employee training. -Jerry has some recommended security methods for his clients. -Customers have a tendency to conflate security terms like VPN vs firewall. -Jon wants you to become a sponsor of the show!
On today's episode, we recap the Chargers Week Five victory over the Cleveland Browns. Justin Herbert's MVP Statement Mike Williams Dominates AFC Hierarchy Special Teams And Run Defense Struggles Studs And Duds And Much More! Patreon: https://www.patreon.com/guiltyascharged Tick Pick is the official ticketing partner of the Guilty As Charged Podcast. Use the code CHARGED for a $10 discount on your first purchase. https://www.tickpick.com/ Go to https://www.expressvpn.com/guilty to start your free trial of a VPN network today! Use the code “GAC” for 10% off your order at https://www.backroomcollection.net/! Use the code GUILTY10 for 10% off your order at https://www.qwest360.com/! Chiki Chiki Wings And Sports is the official sports bar of the Guilty As Charged Podcast. Use the code GUILTY for 10% off your next visit! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Kris & David are joined by Dave Prazak (@DavePrazak) to discuss the almost-week that was October 6-10, 1999 as we covered the 11th & 12th on a previous episode. This show starts with a fantastic discussion of the infamous Heroes of Wrestling PPV—the reason Kyle Rieger asked for this week as a $25 Patreon pick—and folks, if you haven't watched this show, you need to, as it's one for the ages. Of course, we talk about Jake Roberts, but there is so much other stuff that was crazy as well, both on camera and behind the scenes, so this is a can't miss segment. We also talk about the death of Gorilla Monsoon and the tragic career ending injury suffered by Darren Drozdov, including how the WWF really dropped the ball in many ways with how they handled the injury publicly on SmackDown two days later. Other things discussed are the pro debuts of Wataru Inoue, Katsuyori Shibata, and Hiroshi Tanahashi in New Japan, Ray Gonzalez becoming “Mr. Raytings” in WWC, Tammy Sytch's infamous sit-down interview on ECW's TNN show, Jerry Lawler coming up short in the Memphis mayoral election, Jesse Ventura's Playboy interview, then, finally, World Championship Wrestling. There, the top story is the immediate aftermath of Vince Russo & Ed Ferrara joining the promotion, including all of the details as to how it went down. This is a fantastic show, as it always is when Prazak is on with us, so LISTEN NOW!!!!!Timestamps:0:00:00 Heroes of Wrestling1:55:19 WWF3:09:22 Eurasia: AJPW, NJPW, BattlARTS, FMW, NOW, Osaka Pro, SPWF, Toryumon, RINGS, Arsion, GAEA, VDB Top Catch, & BWF3:32:34 Classic Commercial Break3:37:24 Halftime3:51:30 Other North America: Stampede, AAA, CMLL, IWRG, WWC, & MMA4:07:27 Other USA: CZW, UCW, NWA Wildside, IPW, OVW, HWA, Jerry Lawler's failed mayoral bid, Power Pro, KAW, Dale Gagner's AWA, APW, & Jesse Ventura5:20:45 WCW6:25:32 Patreon Preview: Vince McMahon's initial public response to the nWo/Outsiders angleTo support the show and get access to exclusive rewards like special members-only monthly themed shows, go to our Patreon page at Patreon.com/BetweenTheSheets and become an ongoing Patron. Becoming a Between the Sheets Patron will also get you exclusive access to not only the monthly themed episode of Between the Sheets, but also access to our new mailbag segment, a Patron-only chat room on Slack, and anything else we do outside of the main shows!If you're looking for the best deal on a VPN service—short for Virtual Private Network, it helps you get around regional restrictions as well as browse the internet more securely—then VyprVPN is what you've been looking for. Not only will using our link help support Between The Sheets, but you'll get a special discount, with prices as low as $1.67/month if you go with a three year subscription. With numerous great features and even a TV-specific Android app to make streaming easier, there is no better choice if you're looking to subscribe to WWE Network, AEW Plus, and other region-locked services.For the best in both current and classic indie wrestling streaming, make sure to check out IndependentWrestling.tv and use coupon code BTSPOD for a free 5 day trial! (You can also go directly to TinyURL.com/IWTVsheets to sign up that way.) If you convert to a paid subscriber, we get a kickback for referring you, allowing you to support both the show and the indie scene.To subscribe, you can find us on iTunes, Google Play, and just about every other podcast app's directory, or you can also paste Feeds.FeedBurner.com/BTSheets into your favorite podcast app using whatever “add feed manually” option it has.Support this podcast at — https://redcircle.com/between-the-sheets/donationsAdvertising Inquiries: https://redcircle.com/brands
Kris Zellner is joined once again by Jeff G. Bailey (@JeffGBailey1) and Dan "The Dragon" Wilson (@revdanwilson) as we take yet another Walk on the Wildside, discussing the months of August and September 2001 in the history of NWA Wildside. We talk about how the promotion changed in those two months as the power structure changes and talent shifts in and out, with various guys getting pushed higher and the overall roster getting younger. We also go over the awesomeness of the extremely deep tag team division, the artistry of the A.J. Styles/Jason Cross feud, and the violence that went down at every taping at the NCW Arena in Cornelia, Georgia. All that plus talk about Jeff having incidents with fans, how the promotion handled the aftermath of September 11th, the TV show becoming more organized, and so much more. This was a fantastic show and always, a treat to be a part of, so LISTEN NOW!!!!!!To support the show and get access to exclusive rewards like special members-only monthly themed shows, go to our Patreon page at Patreon.com/BetweenTheSheets and become an ongoing Patron. Becoming a Between the Sheets Patron will also get you exclusive access to not only the monthly themed episode of Between the Sheets, but also access to our new mailbag segment, a Patron-only chat room on Slack, and anything else we do outside of the main shows!If you're looking for the best deal on a VPN service—short for Virtual Private Network, it helps you get around regional restrictions as well as browse the internet more securely—then VyprVPN is what you've been looking for. Not only will using our link help support Between The Sheets, but you'll get a special discount, with prices as low as $1.67/month if you go with a three year subscription. With numerous great features and even a TV-specific Android app to make streaming easier, there is no better choice if you're looking to subscribe to WWE Network, AEW Plus, and other region-locked services.For the best in both current and classic indie wrestling streaming, make sure to check out IndependentWrestling.tv and use coupon code BTSPOD for a free 5 day trial! (You can also go directly to TinyURL.com/IWTVsheets to sign up that way.) If you convert to a paid subscriber, we get a kickback for referring you, allowing you to support both the show and the indie scene.To subscribe, you can find us on iTunes, Google Play, and just about every other podcast app's directory, or you can also paste Feeds.FeedBurner.com/BTSheets into your favorite podcast app using whatever “add feed manually” option it has.Support this podcast at — https://redcircle.com/between-the-sheets/donationsAdvertising Inquiries: https://redcircle.com/brands
This week on The Chrome Cast, we begin the show discussing the major outage that struck Facebook this week, bringing down all their services along with it. For most of the work day Monday, users were unable to send messages via Messenger or WhatsApp, post on Facebook or Instagram, or access Oculus VR services. It was a big deal that affected a ton of people and raises some interesting questions about the pervasiveness of mega companies in our daily lives: both at work and play. In a much lighter second half, we delve into Pixel 6 leaks that have come about and talk through the interesting situation that Google is in where even a treasure trove of leaked photos and info don't really seem to cause much of a stir. With their marketing strategy for Pixel 6, it really does feel like Google has stemmed the leaker tide and taken full control of the narrative surrounding their new phones. Finally, we take a bit of time to discuss some important movement in the Chrome OS gaming scene. Anti-cheat is a big hurdle for Linux gaming (what ‘Borealis' – A.K.A. Steam for Chromebooks will leverage) and it looks like all the major players are on board to get their anti-cheat protocols up and running for Steam on Linux in the near future. NOTABLE LINKS Why I'm excited to be returning to #teamPixel with Pixel 6 and Pixel 6 Pro [VIDEO] Online games with Anti-Cheat will soon be playable on Chromebooks New Pixel 6 leaks show new Pixel Stand, prove Google won the leaker wars this time around We need to talk about the sheer awesomeness that is Google's Pixel 6 event launch page Save the Date: Pixel Fall Launch is officially Oct. 19 It's not your Chromebook: Facebook, Instagram and WhatsApp are all completely down ------ This episode is also brought to you by NordVPN. Get a VPN that takes your privacy seriously. NordVPN is our VPN of choice and will secure your browsing on your Chromebook or on any device. Use NordVPN to keep your private data to yourself whether you are at home or on the go! CLICK HERE to try it out and get a 3-year deal for $3.49/month. Join our Patreon community and get access to things like behind-the-scenes footage, early access to videos, private Discord server access, an ad-free experience on the mobile and desktop versions of the website, your name listed on all our YouTube videos, and monthly live stream Q&A. CLICK HERE to be a part of our community. --- Support this podcast: https://anchor.fm/chromeunboxed/support
Click Subscribe to keep up to date on the world of fintech! Reach us at email@example.com or at @fintechnewscast on Twitter Will a VPN keep you safe? What can you really do on the Dark Web? What will keep me safe online? We talk to cybersecurity expert and CEO of Secure Anchor Dr. Eric Cole on … Continue reading Ep 153- Cybersecurity Expert Dr. Eric Cole
Apple announced pre-orders for Apple Watch Series 7 begin October 8 with availability on October 15, we test AppleCare+ for the new iPad mini, and we remember Steve Jobs on the 10th anniversary of his death. Follow our Hosts @stephenrobles on Twitter @Hillitech on Twitter Sponsored by: Truebill: Save $100s a year by tracking and cancelling your subscriptions with Truebill! Visit truebill.com/appleinsider to get started. Gabi Insurance: Start saving on your auto insurance today! Visit gabi.com/appleinsider to find the best rates on car insurance with your current coverage in mind. Nebia by Moen: The first 50 people to use code appleInsider at checkout will save 10% off Nebia products! Visit nebia.com/appleinsider to learn more. ExpressVPN: AppleInsider listeners can get three extra months when you sign up for a year of service! Get the most secure and fastest VPN service today by visiting: expressvpn.com/appleinsider Support the show Support the show on Patreon or Apple Podcasts to get ad-free episodes every week, access to our private Discord channel, and early release of the show! We would also appreciate a 5-star rating and review in Apple Podcasts Links from the Show Flying with iPad mini - A Pilot's Review - YouTube iPad mini 2021 Review: Delightfully Small Austin Mann reviews iPhone 13 Pro cameras on the AppleInsider Podcast Flying with iPad mini: A pilot's review Users complain of iPad mini 6 screen distortions Apple Watch Series 7 preorders start on October 8 Zen Pinball Party iPhone 13 Pro getting automatic macro mode toggle in iOS 15.1 Halide 2.5 now available, boasting an all-new macro photography mode AirPods Pro and AirPods Max get Find My integration with latest firmware update The Tragedy of Safari 15 for Mac's ‘Tabs' ActiveTab Safari Extension Google launching new Pixel 6, Pixel 6 Pro smartphones on Oct. 19 Foundation Main Theme [Official Music Video] - YouTube Apple commemorates Steve Jobs on the 10th anniversary of his death Jony Ive remembers, reflects on his relationship with Steve Jobs More AppleInsider podcasts Subscribe and listen to our AppleInsider Daily podcast for the latest Apple news Monday through Friday. You can find it on Apple Podcasts, Overcast, or anywhere you listen to podcasts. Tune in to our HomeKit Insider podcast covering the latest news, products, apps and everything HomeKit related. Subscribe in Apple Podcasts, Overcast, or just search for HomeKit Insider wherever you get your podcasts. Podcast artwork from Basic Apple Guy. Download the free wallpaper pack here. Those interested in sponsoring the show can reach out to us at: firstname.lastname@example.org
Tyranny is crawling quickly and today's show will highlight the recent increase of “School Board Tyranny.” The latest story comes out of the great state of Texas and parents are waking up. Two men were arrested after, according to the Round Rock ISD, “disputing” a school board meeting. Jeremy Story, father of six and one of the men who was arrested, joins the program. Jeremy was arrested in the middle of the night and held in the Williamson County Jail overnight. This story not only should educate you on what's happening around the country, but it should OPEN your eyes against big government. The government doesn't love you and it's time for us to push back on tyranny, or our kids will be ones who will pay the price. Are you ready to push back? Enough with the 2 + 2 = 5. We need to lead with truth and liberty principles. Today's Sponsors You can maintain and protect your credit score with 24/7 credit monitoring and $1 Million Fraud Insurance. It only takes minutes to enroll. See your points, get more points, and qualify for the lowest loan rates. Visit http://SCOREMASTER.com/CHAD So if, like me, you believe that your data is your business, secure yourself with the number-one-rated VPN on the market. Visit http://ExpressVPN.com/watchchad, and get three extra months for free. Go to http://iTargetPro.com, right now, and SAVE 10% PLUS, GET FREE SHIPPING with the offer code CHAD. Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we're discussing the Facebook whistleblower situation with journalist & Senior Director of Policy for the Conservative Partnership Institute, Rachel Bovard. Recently, former Facebook employee Frances Haugen shares at a Senate hearing that Facebook knows their platforms are harmful to teenagers, but they don't care. However, conveniently for the Democrats, this whistleblower is suggesting that the solution is more government censorship. While this is definitely not the answer, the information she's made public should still be acted upon, and Rachel provides some free-market solutions to Facebook that don't restrict free speech. Timestamps: (00:00) Intro: Problems With Big Tech (08:25) Interview: Facebook Whistleblower & How to Fight Big Tech (13:02) Interview: What is 'Section 230' & Why Does it Matter? (19:53) Interview: Is the Facebook Whistleblower Working With Dems? (22:14) Interview: Why Big Tech Doesn't Care That They Hurt Kids (27:47) Interview: Maybe The GOP Will Actually Do Something (33:19) Outro: Week in Review --- Today's Sponsors: Good Ranchers travel the U.S. & meet with the actual farmers that raise the livestock to ensure the product they send you is the very best. Go to GoodRanchers.com/ALLIE to place a one-time order or subscribe today & save 20% on each box of mouth-watering meats. Use promo code 'ALLIE' at checkout to get an additional $20 off & FREE express shipping! ExpressVPN is the best VPN on the market because they don't log your activity online, their speed, & how easy it is to use. Protect yourself with the VPN that Allie trusts — go to ExpressVPN.com/ALLIE & get an extra 3 months free on a 1-yr package! Dwell has built a beautiful listening & reading experience for the Scriptures, also featuring a read along experience which lets you read big, bold text accompanied by beautiful background art while you're listening to it being read at the same time. Get started at DwellApp.io/RELATABLE to get 10% off a yearly subscription, or 33% off Dwell for life! --- Past Episodes Mentioned: Ep 499 | NBA Star on the Vaccine, BLM & Following Jesus | Guest: Jonathan Isaac https://apple.co/3oVwqPx Ep 500 | 500th Episode! You're In for a Treat https://apple.co/3mx4qPl --- Buy Allie's book, You're Not Enough (& That's Okay): Escaping the Toxic Culture of Self-Love: https://alliebethstuckey.com/book Relatable merchandise: https://shop.blazemedia.com/collections/allie-stuckey Learn more about your ad choices. Visit megaphone.fm/adchoices
Hot on the heels of episode 47, where I talk about why I decided to take a job, this episode is all about tools and methods you can use to get writing done while still grinding for the man (or lady). //One MAJOR tool I neglected to mention during the recording is Chrome Remote Desktop (remotedesktop.google.com). If you're allowed to use Chrome at work, and VPN (remote connections) are allowed, this is a great tool to allow access to your home computer while away. You need to download a client to your home machine, but once it's running you can connect from just about anywhere.//
Kris & David are joined by John McAdam (@CCMilani) to discuss the week that was September 29th-October 5th, 1984. We talk about some major happenings going down in Japan, as Riki Choshu's entire Ishingundan/Restoration Army group leaves New Japan to hook up up with former NJPW local promoter Naoki Otsuka and this All Japan by proxy. We have LOTS of major details about what happened and how the landscape was shaken up by this going on. John then joins us for the television debut of Pro Wrestling USA and how that changed wrestling in many ways, the sad state of Georgia wrestling after Black Saturday, why Jim Cornette's best work was in Mid-South, Chris Adams turning heel in World Class and how that all went down, and George Scott shaking up the WWF for the right reasons as he gets more control as Vince McMahon's official booker of record. All that and so much more on a 80's-riffic episode of Between the Sheets!!!!Timestamps:0:00:00 Int'l: AJPW, NJPW, UWF, AJW, CWA, Joint Promotions, Montreal, EMLL, UWA, & WWC0:56:48 Classic Commercial Break1:01:54 Halftime1:05:57 USA East: PWUSA, JCP, Georgia, CWF, SECW, & Memphis2:03:10 USA West: Mid-South, Southwest, St. Louis, AWA, Portland, & Hawaii2:30:14 WCCW3:01:04 WWF3:53:38 Patreon Preview: Vince McMahon's initial public response to the nWo/Outsiders angleTo support the show and get access to exclusive rewards like special members-only monthly themed shows, go to our Patreon page at Patreon.com/BetweenTheSheets and become an ongoing Patron. Becoming a Between the Sheets Patron will also get you exclusive access to not only the monthly themed episode of Between the Sheets, but also access to our new mailbag segment, a Patron-only chat room on Slack, and anything else we do outside of the main shows!If you're looking for the best deal on a VPN service—short for Virtual Private Network, it helps you get around regional restrictions as well as browse the internet more securely—then VyprVPN is what you've been looking for. Not only will using our link help support Between The Sheets, but you'll get a special discount, with prices as low as $1.67/month if you go with a three year subscription. With numerous great features and even a TV-specific Android app to make streaming easier, there is no better choice if you're looking to subscribe to WWE Network, AEW Plus, and other region-locked services.For the best in both current and classic indie wrestling streaming, make sure to check out IndependentWrestling.tv and use coupon code BTSPOD for a free 5 day trial! (You can also go directly to TinyURL.com/IWTVsheets to sign up that way.) If you convert to a paid subscriber, we get a kickback for referring you, allowing you to support both the show and the indie scene.To subscribe, you can find us on iTunes, Google Play, and just about every other podcast app's directory, or you can also paste Feeds.FeedBurner.com/BTSheets into your favorite podcast app using whatever “add feed manually” option it has.Support this podcast at — https://redcircle.com/between-the-sheets/donationsAdvertising Inquiries: https://redcircle.com/brands
Could Using the Right Multi-Factor Authentication Save You? I had a good friend who, this week, had his life's work stolen from him. Yeah. And you know what caused it? It was his password. Now, you know what you're supposed to be doing? I'm going to tell you exactly what to do right now. Let's get right down to the whole problem with passwords. I'm going to tell you a little bit about my friend this week. He has been building a business for. Maybe going on 10 years now, and this business relies on advertising. Most companies do so in some way; we need to have new customers. There's always some attrition. Some customers go away. So how do we keep them? We do what we can. How do we get new customers? For him, it was. Advertising, primarily on Facebook. He did some Google ads as well, but Facebook is really where he was focused. So how did he do all of that? Here's the bottom line you have to, if you are going to be advertising on Facebook, you have to have an advertising account. The same thing's true. Google. And then, on that account, you tie in either your bank account or your credit card. I recommend a credit card so that those transactions can be backed up. And on top of all of that now, of course, you have to use a pixel. So the way the tracking works is there are pixels on websites, about those already. And the bottom line with the pixels. Those are also. Cookies are about the pixels are used to set a cookie so that Facebook knows what sites you've gone to. So he uses those. I use those. In fact, if you go to my website, I have a Facebook pixel that gets set. And the reason for all of that is so that we know with. I'd be interested in something on the site. So I know that there are many people interested in this page or that page. And so I could, I have not ever, but I could now do some advertising. I could send ads to you so that if you were looking at something particular, you'd see ads related to that, which I've always said. It is the right way to go. If I'm looking to buy a pickup truck, I love to see ads for different pickup trucks, but if I don't want a car or truck, I don't want to see the ads. It isn't like TV where it sometimes seems every other ad is about. Car or a pickup truck. It drives me crazy because it's a waste of their money in advertising to me. After all, I don't want those things. And it's also not only just annoying in money-wasting. There are better ways to do targeting. And that's what the whole online thing is. Anyways, I told you about that because he had set up this pixel years ago. Basically, the Facebook pixel gets to know you. All of the people who like you that might've bought from you. Cause you can have that pixel track people through your site, your purchase site, they know what you purchase on the shopping cart, et cetera. And you can identify these people over on Facebook and their ads because they abandoned the cart or whatever it is you want to do there. So there's just a whole ton of stuff that you can do for these people. And it's so bad. It is so valuable. It takes years to build up that account. Years to put that pixel in place. And our friend here, he had done precisely that. Then he found that his account had been compromised. And that is a terrible thing in this case because the bad guy used his account to place ads. So now there are really two or three problems here. We'll talk about one of them. Why was the bad guy going after him? He has been running ads on Facebook for a long time. So as far as Facebook is concerned, his account is credible. All of the ads he runs don't have to be reviewed by a human being. They can go up almost immediately. He doesn't have to wait days for some of these things to go up. So our bad guy can get an account like his that has years' worth of advertising credibility and now start advertising things that are not correct. So there again is part of the value of having one of these older accounts for advertising. And so the bad guy did that use his credibility. And then secondly, he used 25 grand worth of my friend's money to run ads. Also, of course, very bad, very bad. So I sat down with him. In fact, it was this last week, and I was out on a trip with just a vacation trip. It was absolutely fantastic. I never just do vacation. It's always business plus work whenever I do anything like this, but I was on a trip last week. And so my eldest son who works closely with me, and he's also part of the FBI InfraGard program. So I had him reach out to my friend, and he helped them out, and they talked back and forth. So here's the problem that he has. And I'm trying to figure out a perfect way to solve this. And I haven't figured that out yet. And if you guys have an idea because you are the best and brightest, you really are. So go ahead and drop me an email at email@example.com if a good way around this particular problem, which is he has. This Facebook could count and many other accounts, including his website, hosting account, email account, et cetera. And. He has people who manage his ads for him. Who operates his website for him, who put up some promotions, advertising, and everything else. So these are third-party. This is what we generically call a supply chain, risk people who are not him have access to his stuff, his private property. And how does he do it, or how did he do it? Is he went ahead and gave them. Access by giving them accounts or passwords. How well were they guarding their passwords and their accounts? So the first thing I had my friend do was going to haveIbeenpwned.com. I had him put in his email address, the one he uses the most, and it showed up in five different. Hacks data dumps. So these are five various sites where he had used that same email address in this case. And he found out that in those five cases, the bad guy's got his passwords and personal information. All bad. And he went ahead and cleaned it up. So I said put in the password because have I been, pwned also let you check your password, just see if it has been used by someone else and then stolen. So there are billions of passwords in this database. It's incredible of all of these known passwords. So he put in his password, and no, it had not been stolen, but the problem is how about the people that were managing his ads on Facebook and managing his Facebook ad. We're the usernames, which are typically the email addresses and the passwords kept securely. That's a supply chain thing I'm talking about, and that's where I'd love to get him. But from you guys, firstname.lastname@example.org. If you think you have a good answer, What we've been doing. And our advice to him was use one password. That's the only one to use. I don't trust last pass anymore. After their last big hack where they got hacked one password, the digit one password. And go ahead. And set it up. And in a business scenario, you can have multiple vaults. So have a vault. That's just for people that are dealing with your Facebook ad account, maybe have another vault for people who are posting for you on Facebook. Or better yet when it comes to Facebook, go ahead and have an intermediary that is trusted the, if this, then that, or there's a few of them out there that can see that you put the post up on the website and automatically posted on Facebook. So you don't have to get. All of these people, your passwords, but again, it's up to you. You got to figure out if that makes sense to you that those are the types of things that I think you can do. And that is what we do as well. Now, one of the beauties of using one password like that, where you're not sharing all of your passwords to everything you're sharing, the minimum amount of login information that you possibly can share is that if they leave your employees, All you have to do is remove their access to the appropriate vault or vaults, or maybe all of your vaults. And this is what I've done with people that worked for me in the US and people would work for me overseas, and there have been a lot of them and it has worked quite well for me. So with one pass, We can enforce password integrity. We can make sure the passwords on stolen. One password ties automatically into have I been postponed. If a password has been exposed, if it's been stolen online, it's a great way to go. Now I've got an offer for you guys who are listening. I have a special report that I've sold before on passwords, and it goes through talks about one password. He talks about the last pass, which I'm no longer really recommending, but give some comparisons and how you can use these things. Make sure you go and email me right now. Me, Me@craigpeterson.com. That's ME at Craig Peterson dot com and just ask me for the password special report, and I'll be glad to get that on-off to you. There is a lot of good detail in there and helps you, whether you're a home user or a business. So the next step in your security is multi-factor authentication. Interesting study out saying that about 75% of people say that they've used it for work or for business, but the hard numbers, I don't think they agree One of the things that you have to do is use good passwords. And the best way to do that is to use a password manager. I was talking about a friend of mine who had been hacked this last week and his account was hacked. His Facebook ad account was hacked. We asked him if we could reach out to. BI and he said, sure. So we checked with the FBI and they're looking to turn this into a case, a real case, because they've never seen this type of thing, the hijacking of an advertising account who hijacked it. And why did they hide jacket? Was this in preparation maybe for. Playing around with manipulating our next election cycle coming up. There could be a lot of things that they're planning on doing and taking over my friend's account would be a great way to have done it. So maybe they're going to do other things here. And our friends at the FBI are looking into it. How now do you also keep your data safe? Easily simply. When we're talking about these types of accounts, the thing to look at is known as two factor authentication or multifactor authentication. You see my friend, if he had been using multi-factor authentication. I would not have been vulnerable. Even if the bad guys had his username, email address and his password, they still would not be able to log in without having that little six-digit code. That's the best way to do multi-factor authentication. When we're talking about this code, whether it's four or 5, 6, 8 digits long, we should not be using our cell phones to receive those. At least not as text messages, those have a problem because our phone numbers can be stolen from us and they are stolen from us. So if we're a real target, in other words, they're going after you. Joe Smith and they know you have some, $2 million in your account. So they're going after you while they can, in most cases, take control of your phone. Now you might not know it and it doesn't have to be hacked. All they have to do is have the phone company move your phone number to a new phone. Once. So that means one of the things you need to do is contact your telephone vendor, whoever it is, who's providing new that service. That's a company like Verizon sprint T-Mobile a T and Tone of those companies that are giving you cell service, you have to contact them and set up a pass. So that if they have a phone call coming in and that phone call can be faked. So it looks like it's coming from your phone, even if there was a phone call coming in, whether it's coming from your phone or not, they have to get that password or passcode that you gave them. And once they have that passcode now, and that's great, but if you don't have that in there targeting you specifically, then you're in trouble. So for many of us really it may not make a huge difference. But I would do it anyways. I have done it with every one of my cell phone carriers now. A couple of decades set up a password. So the next step is this multifactor authentication. If I'm not supposed to get it via text message to my phone, how do I get it? There are a couple of apps out there. There's a free one called Google authentic. And Google authenticator runs on your phone. And once it's there on your phone and you are setting it up on a website, so Facebook, for instance, your bank, most websites out there, the bigger ones, all you have to do is say, I want to set up multi-factor authentication, and then it'll ask you a case. So how do you want to do it? And you can say, I want an app and they will display. A Q R code. That's one of those square codes with a bunch of little lines inside of it. You're seeing QR codes before they become very common. And you take your phone with the Google authenticator app. Take a picture. Of that little QR code on the screen, and now it will start sinking up so that every 30 seconds Google authenticator on your phone will change that number. So when you need to log back into that website, it's going to ask you for the code. You just pull up Google authenticator and there's the code. So that's the freeway to do it. And not necessarily the easiest way to. Again, going back to one password. I use this thing exclusively. It is phenomenal for keeping my passwords, keeping them all straight and then encrypted vault, actually in multiple encrypted vault it's so that I can share some of them. Some of them are just strictly private, but it also has that same authenticator functionality built right into it. Microsoft has its own authenticator, but you can tell Microsoft that you want to use the standard authenticator. Of course, Microsoft has to do everything differently. But you can tell it. And I do tell it, I want to use a regular authenticator app, not Microsoft authenticator. By the way. That's why I advise you to don't use the Microsoft authenticator, just use one authenticator for all of the sites, and then Microsoft will give you that same QR code. And then you can take that picture and you're off and running. Next time you log in, it asks you for the code and instead of texting it to you to your phone smarter, otherwise it will not. That require you to open up your authenticator. So for me, for instance, when I'm logging into a website, it comes up and asks for the username, asked for the password. Both of those are filled out automatically by one password for me. And then it asks for that code identification code and. One password automatically puts it into my pace to buffer copy-paste, buffer, and I just paste it in and they've got the code. So I don't have to remember the codes. I don't remember passwords. I don't have to remember usernames or email addresses. One password remembers them all for me. Plus it'll remember notes and other things. So you can tell, I really one password. We use it with all of our clients. That's what we have for them. And it does meet even a lot of these DOD requirement on top of. Depending again, how much security you need. We will use duo D U O and it also has this authenticator functionality and we will also use UBI keys. These are those hardware key. They do oh, can provide you with hardware tokens. Those are those little tokens that can go onto your key ring. That show a changing six-digit number every 30 seconds. And that's the same number that would be there in your smartphone app. Your one password or Google authenticator smartphone. Hopefully, I didn't confuse you too much. I think most of the reason we're not using the security we should is because we're not sure how to, and we don't know what we're going to be. And I can see that being a big problem. So if you have questions about any of this, if you would like a copy of my password security, special report, just send an email to me. M email@example.com. That's me M firstname.lastname@example.org. That's S O N.com. I'll be glad to send it to you. Also, if you sign up for my newsletter there on my email@example.com, you are going to get. I was hold little series of the special reports to help you out, get you going. And then every week I send out a little bit of training and all of my articles for the week. It's usually six to 10 articles that I consider to be important so that, what's going on in the cybersecurity world. So you can. With it for yourself, for your family, for your business. Craig peterson.com. According to researchers. 32% of teen girls said that when they felt bad about their bodies, Instagram made them feel worse. And you know what Facebook knew and knows Instagram is toxic for teen girls. There's a great article that came out in the Wall Street Journal. And I'm going to read just a little bit here from some of the quotes first. When I went on Instagram, all I saw were images of chiseled bodies, perfect. Abs and women doing 100 burpees in 10 minutes, said, Ms. Now 18, who lives in Western Virginia. Amazing. Isn't it. The one that I opened now with 32% of teen girls said that when they felt bad about their bodies, Instagram, I made them feel worse. So that is studies again, that looks like yeah, these were researchers inside Instagram and they said this in a March, 2020 slide presentation that was posted to Facebook's internal message board that was reviewed by the wall street journal quote comparisons on Instagram can change how young women view and describe themselves. Apparently, for the past three years, Facebook has been conducting studies into how Instagram is affecting its millions of young users. Now, for those of you who don't know what Instagram is, it allows these users to create little stories, to have. Pictures videos of things that they're doing, and it's a lifestyle type thing you might've heard, of course, of how this I don't know what it is. Kidnapping murder plot. These, this young couple and the body I think was found up in Wyoming. I'm trying to remember, but of her and it's yeah, there it is. It wasn't my OMI. And I'm looking up right now, Gabby potato. That's who it is. She was what they called a micro influence. And I know a lot of people who can loom, that's what they want to be. There's a young lady that stayed with us for a few months. She had no other place to live. And so we invited her in here and we got some interesting stories to tell about that experience. And it's, a little sad, but anyhow, she got back up on her feet and then she decided she was going to become an influence. And what an influencer is someone that has a lot of followers. And of course, a lot means different numbers. You get these massive influencers that have tens of millions of people that quote, follow unquote them. And of course, just think of the Kardashians they're famous for. Being famous, nothing else. They have subsequently done some pretty amazing things. At least a few of them have. We've got one of those daughters who now was the first earliest billionaire. I think it was ever youngest. So they have accomplished some amazing things after the fact, but they got started. By just becoming famous by posting on these social media sites. So you get a micro-influencer, like Gabby Petito, who is out there posting things and pictures. And you look at all of these pictures and, oh my gosh, they're up at this national park. Oh, isn't she so cute. I'll look at her boyfriend. They'll look so good together and people. Fall for that image, right? It's just like Photoshopping these pictures of models, changing them. There've been some real complaints about those over the years. So Instagram sets these kids up with these pictures of people that are just totally unrealistic. One of the slides from a 2019 presentation says, quote, we make body. Excuse me. We make body image issues worse for one in three teenage girls teams, blame Instagram for increases in the rate of anxiety. And depression said another slide. This reaction was unprompted and consistent across. Groups among teens is this according to the wall street journal who reported suicidal thoughts, 13% of British users, and 6% of American users trace the desire to kill themselves to Instagram. Again, according to one of these presentations, isn't this just absolutely amazing. And you might've heard it discussed a little bit. I saw some articles about it, obviously in the news wall street journal had it, but this is a $100 billion company, Instagram. That's what their annual revenues. More than 40% of Instagram users are 22 years old and younger. And about 22 million teens log into Instagram in the US each day, compared with 5 million that log into Facebook, the younger users have been declining. Facebook it's getting the population there is getting older and older on Facebook. In average teens in the us spend 50% more time on Instagram than they do on Facebook. And also tick-tock, by the way I took talk has now surpassed YouTube in some of these metrics. Quote, Instagram is well-positioned to resonate and win with young people said a researcher's slide posted internally. Inside Facebook. Another post said there is a path to growth. If Instagram can continue their trajectory. Amazing. So Facebook's public phase has really tried to downplay all of these negative effects that the Instagram app has on teens, particularly girls, and hasn't made its research public or available to academics or lawmakers who have asked for it. Quote, the research that we've seen is that using social apps to connect with other people. Positive mental health benefits said Mark Zuckerberg. He's the CEO of course of Facebook. Now this was 2020. In March one at a congressional hearing, he was asked about children and mental health. So you see how he really lawyered the words that they can have positive mental health benefits, but Facebook's own internal research seems to show that they know it has a profound negative effect on a large percentage of their users. Instagram had Adam Moseri told reporters in may of this year, that research he had seen suggest the app's effect on team's wellbeing is likely quote quite small. So what the wall street journal seems to be pointing out here is that Facebook is not giving us the truth on any of this stuff. It's really sad. We've got to be careful. No, apparently Mr. Moseri also said that he's been pushing very hard for Facebook to really take their responsibilities more broadly. He says they're proud of this research. I'm just summarizing this before we run out of time here, but it shows the document. Internal documents on Facebook show that they are having a major impact on teen, mental health, political discourse, and even human trafficking. These, this internal research offers an unparalleled picture. Courtney told the wall street journal of how Facebook is acutely aware that the products and systems central to its business success routine. Fail great article. I've got it in this week's newsletter. You can just open it up and click through on the link to the wall street journal. They have a paywall and I hate to use payroll articles, but this one's well worth it. And they do give you some free articles every month. So if you're not on that newsletter, you can sign up right now. Craig peterson.com. You'll get the next one. If you miss a link today, if you want some, the special report on passwords, et cetera, just email me directly. Give me a few days to respond. But me M firstname.lastname@example.org. That's me M email@example.com. We've all worked from home from time to time. At least if we're somehow in the information it industry, I want to talk right now about why you need a personal laptop. Even if the business is providing you with a laptop. Laptops are something that was designed to be personal, but many of us are using them as our main computer. I know I often am using my laptop, a couple of my kids and my wife. It's really their main computer, even though they all have other computers that they could potentially be using, laptops are just handy and you have them with, you can take them with you. We've got workstation set up that are kind of. Workstations, if you will, where there are three screens set up and they're all hooked up into one central screen controller that then has a USBC connection that goes right into the, your laptop. So you can be sitting there with four screens on your Mac laptop on your mac pro if you need four screens, it's really handy. No question. Many of us have a laptop for home and a laptop for business. And many of us also look at it and say, oh wow, this is a great laptop I got from work. It's much better than my home laptop. And you start to use the business laptop for work. At home. Okay. That's what it's for. Right. But then we start to use that business laptop for personal stuff. That's where the problems start. We've seen surveys out there that are shown. Then half of workers are using work issue devices for personal tasks that might be doing it at home. They might be doing it at the office. Things like personal messages, shopping, online, social media, reading the news. So the prospect of using your work laptop as your only laptop, not just for work, but also for maybe watching some movies, group chat and messaging, reading, fan fiction, paying bills, emailing to family or friend. It just seems not. It's so tempting. It's just natural. I'm on it. I'm on it all day long. Why wouldn't I just use it? And this is particularly true for people who are working from home, but we have to be careful with that. It's really something that you shouldn't be doing for a couple of reasons. One that. Top that's a business. Laptop is the property of the business. It's just like walking home with boxes, full of pencils and paperback in the old days, it is not yours to use for personal use. We also have to assume, assume since it is the company's laptop that hopefully it's been secure. Hopefully they haven't set up. So it's going through a special VPN at the office and it's going through special filters, maybe snort filters or something else. That's doing some deeper inspection on what's coming through your laptop. Well, there are also likely on that laptop. Tools that are monitoring your device. Things like key loggers, biometric tracking, Jill location, software that tracks your web browser and social media behavior, screenshot, snapshot software, maybe even your cam. Is being used to keep track of you. I know a number of the websites that I've used in the past to hire temporary workers. Those workers have to agree to have you monitor what they're doing. These hourly workers, subtle take screenshots of their screen, unbeknownst to them. Pictures from the cameras at random intervals. Again, unbeknownst to them, it'll track what they're doing. And so I can now go in and say, okay, well he billed me five hours for doing this. And I look at his screen and guess what? He wasn't doing that for all of those five hours that he just billed me. Well, the same thing could be true for your company, even if you're not paid by the hour. Right now, we're looking at stats that show over half of the businesses that are providing laptops for the employees to use more than half of them are using monitoring software. And through this whole lockdown, the usage of these different types of monitoring systems has grown. Now there's some of the programs you're using. You might be VPN in, you might be using slack or G suite enterprise, all good little pieces of software. They can monitor that obviously, but it goes all the way through to the business. And using your slack access as paid for, by the businesses also idiotic to do things like send messages to your buddies, set up drinks after work, complain to other people about someone else in the business, your boss, or otherwise your it, people at the business can see all of that. They can see what you're doing with slack. Even if you have a separate personal account. It's still more likely that you'll end up mixing them up if you're logged into both on the same computer. So the bottom line is if you are on a work computer, whether it's a laptop or something else, you can reasonably assume that I T can see everything. That's not. They own it. Okay. And they have to do some of this stuff to protect themselves. We put software on laptops for companies not to spy on employees. That's none of our business, but we put software on computers for employees. To make sure they stay safe. Think of what happens when your computer, your laptop, whatever it might be, connects to the company's network. Now that can be through a VPN. It can be because you take your laptop home or on the road when you're traveling and you bring it back into the office. If that computer is infected, somehow now you've brought that infection into the office. And that's how a lot of the malware works. It goes from computer to computer. So once they get in that front door where there's through a website and email that you clicked on or in a computer that you're bringing into the office, they can start to move around. Now it's not just your activity. And this is an interesting article from the verge by Monica chin. It's not just your activity that they can see on your laptop, but in many cases, they're also able to look at anything you're downloading any of your photographs or videos that you might've sinked up from your smart. Laura loading these types of things, your text messages on your work device for safekeeping, or just because it's your primary device might seem harmless, right? Cause you're just going to remove them before you hand it in. But some companies such as Apple won't allow you to wipe your device before handing it in regardless of how personal the contents are. And that makes sense too, because many times an employee leaves. And they don't give the company all of the information that they have, that they're obliged to give back to their employer. Things that they've been working on, customer information, et cetera. So Manalive, there are plenty of other devices out there. Hopefully if you leave your company with plenty of notice, moving a bunch of things off your work device in the last few days, uh, might raise some eyebrows at the. And I'm saying hopefully, because they should notice that sort of thing, because it could be malicious activity. It could be an insider risk that maybe they're not even aware of. There's so much you could go wrong here. So bottom line don't use the work laptop for home. So what should you use? You know, my personal recommendation. Almost always is get a Mac. They are safer to use the patches that they get are usually not destructive. You know, sometimes you can install a patch for windows and now your machine just won't work anymore. Right. You've had that happen. I know every last one of us out there that are tried to install Microsoft patches for a while have had that happen to them. All of a sudden the patch has completely messed up your computer and you are so out of luck, it's ridiculous. Right? So don't, you know, hopefully don't do that, but I like the max because they are basically safer than windows. And also because the patches just work on them, apple tends to get them out in plenty of time to try and protect us the next level. If he can't afford an apple and. Apple laptops really are not expensive when you consider how long they last and the quality that components, they are not expensive at all. But if you can't afford that, the next thing I would look at is getting a Chromebook. There are a lot of companies that make Chromebooks Chrome is an operating system from Google. It's similar to Android. Google keeps the Chromebooks up-to-date. They patch them quite regularly and make sure that there aren't nastiness is going on. You just have some of the same issues and Android has patches might take a while to get to you because it has to go through the vendor that made the Chromebook. You might have a Chromebook for Sam from Samsung, for instance, it's not Google's even though it's called a Google Chromebook. Now Chromebooks rely heavily on the cloud services that Google provides, but they can also run just locally. So with a Chromebook and you can get them for as little as 150 bucks, but remember you get what you pay for. Or as much as I've seen them in the $2,000 price range with fancy GPU's, local storage and other things, but at 150 bucks, it could be well worth it for you. It lets you do the regular word processing. Just think of what you can do with Google docs, spreadsheets against Google docs, spreadsheets, all of those types of things are built into it. You can. Cruz the web, obviously using Google Chrome on your Chromebook. And send and receive email, which is what most people do. That's really kind of all, most people do at home. So consider that as well. I also like iPad. They are quite safe again, but they tend to be more expensive and they can do pretty much everything. And now with Android support built right into Google Chromebooks, you can even run Android apps. So there you go. Keep safe and be safe out there. Right. Have a hack free life. Make sure you get my newsletter. Craig peterson.com/subscribe. Craig peterson.com/subscribe. The national cyber director, Chris Inglis said that we need cyber bullets, that cyber bullets are part of the war on hacks. And it makes sense on one level. But when you get into the reality, it's a much different story.. I had an interesting email this week from a listener. Actually he sent it about two weeks ago when I finally was able to get to it this week and responded, and he was pointing out how there are some things that I talk about on the show that I put into my newsletter that are really good. And. I'm paraphrasing here but theoretical to so many people, there's some things that you can figure out pretty easily yourself. Some things you can do yourselves and other things that are just different. To do still. And a lot of that has to do with the websites you go to in order to maintain your passwords. And he was complaining specifically about bank of America and how you can, according to what he has found here in the real world, you can come up with a. Password a 20 character long password that is going to keep everything nice and safe at trend to be generated. You're using one password and great. So you set your password up in bank of America's account, and then you try and log in later, and it doesn't work because it lets you put 20 character passwords and when you're creating it, yeah. But the login screen only takes the first 16. So of course they'd home match. You see it's things like that really are pushing us back, holding us back. But I'd say pushing us back from being secure as a country, there, there just aren't enough people paying enough attention to make sure this cyber security, even the basic stuff like passwords and two factor authentication are being done properly. So one of the things I wanted to make sure you guys were aware of is I need to know when you're having these problems, because what I want to do is put together some trainings to show you exactly how to do it. Because on some websites you were saying, it's pretty hard to use one password he's paying for it, but it's kinda difficult for him. And I think in some ways, a lack of understanding. Then, it can be difficult to spend a bunch of time trying to watch some training videos for some of the software. And so I want to hear when you're having problems so I can do what I did for him this week and spend a little time, write some stuff up, and I even am reaching out to some of this website. People like bank of America who are really messing up cyber security for people who are trying to do the right thing and writing them and saying, Hey, listen, I'm part of the FBI InfraGard program. I'm a member of it. I paid a lot of attention to cybersecurity. Heck I ran the training for the FBI InfraGard program for a couple of years, and there are some real things lacking. In the login anyways, and this one particular case of the cybersecurity, but I don't know all of this stuff. I'm not using all of these things and I have a disadvantage over you guys, and that is that I've been doing this for so long. I've forgotten what it's like to not know it. Does that make sense? So if you have something that I've talked about on the show, that's appeared in my newsletter and you're having some confusion over, let me know. Just email me M firstname.lastname@example.org. What he did is he just hit reply to my newsletter. And of course, that goes to me and email@example.com and it tracks it. So I know I need to reply, so I can sit down and go through and answer people's questions. I sent out a lot of the copies of my password, special report to people you guys had requested specifically some of the. People out there had requested a little bit of help. And I had sent out an email to most of the people that I could identify as being business people. I sent out a little thing saying, Hey, listen, if you could use half-hour my help, let me know myself or my team. And then, again, you can just send me an E Craig. So I answered a lot of those questions this week. And in fact, that's how I come up with much of what I cover here on the show. You guys ask the questions and that's how I know that it's a real problem. If I understand it, that's one thing. But for the people who don't do cybersecurity as their primary job or a strategy, I get it. I can get why you guys are confused. So make sure you get my weekly newsletter. So you can find out about all of the trainings, the free stuff, the paid courses, and. It's easy. Just go to Craig peterson.com/subscribe. That's Craig Peterson, P E T E R S O N. Craig peterson.com/subscribe. And I'm more than glad. Add you to that list. And there are now thousands of people on that list to get my email pretty much every week. If you miss it one week, it's probably, cause I just got too busy, but I put out all my show notes. I put it all a little bit of training notes, all. The us government is supposedly getting ready to fire what they're calling cyber bullets in response to these significant hacking attacks. This is what they're calling a comprehensive strategy to dissuade. Adversaries. And this is all from the national cyber security director, Chris Inglis. This is from an article in American military news.com by Chris Strome. That was out this week. And of course I included that in my newsletter this week as well, coming out. Today or tomorrow, depends on how this all goes right with the weekend. I got to help a buddy out today, but president Joe Biden has been really talking about how do we use cyber weapons to retaliate. For instance, he gave a list of industries that Russia should not be. As though Putin himself is running all of these hacks or come out of Russia. Yeah, certainly there are some that are part of their military, but there many of them that are just bad guys that are trying to make some money, we should feel sorry for them. So Biden gives him this list and says, Hey, listen, if you attack any of these various industries or actually portions of our economy, We are going to retaliate. We have seen the us retaliate under President Trump and the retaliation. Of course he did all kinds of economic stuff to stop it. And much of which has been reversed by president Biden's administration, but also he attacked them directly in. Down some power systems there in the Moscow area, which I thought was really kinda cool. So kudos to President Trump for doing that and for president and Biden now to say, Hey, we are going to attack back. Of course. The biggest question is. What would we be attacking? How would we be attacking it? And for what reason, for instance, the red Chinese have gone after our office of personnel management, OPM records and got them all back in 2015. So they now know everything about everybody that had a secret security clearance or the took a paycheck from the federal government. All of those records, they would get their hands on them and get them on all of the records a lot. So Inglis was in front of the let's see here, the, yeah, he was a former director of the national security agency. He's the first to hold his Senate-confirmed position at the white house, this national cyber director position. And he says there is a sense that we can perhaps fire some cyber bullets and shoot our way out of this English set at the conference. It was hosted by the way, by the national security agency and a nonprofit group, he said that will be useful in certain circumstances. If you had a clear shot at a cyber aggressor and I can take them offline, I would advise that we do so as long as the collateral effects are acceptable. Yeah. What we have done here under president Biden administration is we have shut down some people who were operating illegally, we have shut down some cyber actors that were attacking us. So we've been doing that, but it isn't exactly. Wow. We just saw a muzzle flash over there. And so we are returning fire to the area of that muzzle flash, because as I've said many times before, we just don't know. Where in fact that bullet is coming from, it makes it a lot more difficult. English went on to say there's a larger set of initiatives that have to be undertaken. Not one of those elements is going to be sufficient to take this. Out let's see here, the us should make clear to Russia now their adversaries, what kinds of attacks would prompt a response, which is what president Biden did when he was talking with, of course, President Putin over there, red lines of both good and bad red lines are clear and crisp. Although I got to say many of our administrations have. Really done anything about it. It's the red line in the sand and Syria president Obama didn't do anything when they stepped over that red line. So yeah. And then with what we just finished doing in Afghanistan, where we drew a red line and said, we're going to protect all of you who helped us. And then we not only abandoned them, but we abandoned Americans behind there. I don't think a lot of people aren't going to believe us. So here's the last statement here. And again, this is an article in American military news from our cyber chief is the government actions. Aren't always going to be broadcast. In some cases, it's not helpful to broadcast those for all of mankind to see another one. We are doing some things behind the scenes. And I have certainly seen some of the results of those over the last few years. Stick around. You're listening to Craig Peterson firstname.lastname@example.org. You've got a smartphone and there are some new versions out, right? New hardware, new software, Android iOS. How long should you keep that device? How long can you stay safe with that older device? Apple has now done something. Different something they've never done before. One of the reasons that apple equipment tends to be safer than almost anything else out there is that they have, what's known as a closed ecosystem. There's arguments both directions here on whether that's safer or not. But the real advantage when it comes to cybersecurity is there are only. So many versions of the iPhone out there. What are we now in a couple of dozen versions of the hardware platform that makes it easier for apple to be able to support older versions of the software and multiple pieces of hardware, much easier than for, let's say Microsoft windows. It doesn't even have a single. Platform or Android, where there are hundreds of hardware platforms out there and tens of thousands of versions of the hardware, because one model phone can contain many. Changes different types of hardware to talk to the cell towers or the screen you name it. So it's very hard to keep up. Android has for quite a while now supported three versions of their operating system. Of course, we're talking about Google, but Android operating system. So they support the current release. Of Android and the Breviary release is two previous releases in fact of Android. Now that is frankly a pretty good thing to know, but there's over a billion Android devices out there that are no longer supported by security updates. We've got Android 10, nine, and eight that are fairly supported right now. We're actually up to Android 12. So here's how it works. If you've got Android version 10 out, if that's the main one, then you can continue to do. Eight and nine and get updates, security updates. But then here's the problem, everybody, those security updates are coming out of Google, but that does not mean that they are making it all the way to you. So there you go. It's one thing for Google to provide updates, but if you can't get them because your phone manufacturer is not supporting them, you've got trouble Samsung. Is probably the best company other than maybe Google and the Google Pixel phone. Samsung's the best company to go to. If you want some longer-term support. Many of these other companies just don't provide support past the current version. So keep that in mind as well. Android 12 was the 12th major version of Android announced by Google, February, 2021. And it is starting to roll out a Android. The 11th, 11 is the one that was out in February of last year. At least it was announced then. And we're, they're coming out, they're getting pushed out. So basically Google is saying the current version plus two prior versions. And that usually gives you about a four or maybe even a five year window. So if you're. An Android device from a major manufacturer, particularly Samsung on the Android side, your device is going to be good for at least four years, maybe five years now on the, and by the way, you don't necessarily have to upgrade the. You could be continuing to run an older release saw, as I mentioned earlier, if it version 11 is the current one that's out there being supported, which it is right. 12 is early still, but version 11, that means two prior versions still get security updates. You don't get featured. Dates, you don't get the new stuff, but you get security updates. So Android 11, the current one that means 10 and nine get security updates. So you don't, you're not being forced to do an upgrade. Most people don't upgrade their phones from an older major release to a newer major release. In other words, they don't try and go from Android eight to Android 11. Because in fact, most of the time, the hardware manufacturer doesn't support it. That's why there's over a billion Android devices out there right now that cannot get security updates. So have a look at your phone and your vendors. See what you're running. You probably want to do an update because most phones cannot get any support on the, in the apple side. Things are a lot different with Apple iOS, which is the operating system used on the iPhone and the I pad apple has always forced you to move to the next major version. No, they only force you to do that. If they support the hardware. And I've got to say kudos to them, they're still supporting the iPhone six S which came out quite a while. The iPhone success is something that my wife has been using and that I had as well. In fact, she got my old iPhone success, but that's a six-year-old. Phone came out in September of 2015. So it is still getting security updates, and we'll probably continue to get them. Not only is it getting security update this six-year-old iPhone success is getting the latest and our iOS operating system. It's getting iOS 15. Isn't that just amazing? Yeah, exactly. And so not just security updates, like you might get from some of the other vendors out there, Android vendors. So the apple keeps their arms around you for quite a while. Here's, what's changed now with Apple and iOS, the, for the first time ever in the iOS world, Apple is not forcing you to upgrade. So you're not being forced to upgrade to iOS 15. You can continue to run iOS 14. And that's how apples got around the security patches in the past, because what happens is you get the updates and installs them. Basically. There's no reason for you not to upgrade your phone. And so you do so apple never had to worry about releasing some of these fixes for really old versions of iOS. Although they have done that from time to time. In the Mac iOS side, Apple has done a couple of good things. The, where they always have supported basically three releases, what Google's doing with Android. So you now have a new feature. If you will, with iOS, here's a PSA for everyone. Public service announcement. You don't have to take the iOS 15 upgrade. Now I did. I put it on my iPhone and I seem to have some sort of a problem with messages where it's telling people that my phone has notifications turned off, which it does not. So I haven't figured that one out yet. I'll have to look into that a little bit more, but. This is nice because that means you're not going to have to upgrade your iPhone to iOS 15. You'll still get security updates for iOS 14, something Apple's never done before. We'll see if they continue this. We will see if they match Google going back. Three releases in Android. It just never been done before over on the iOS. So good news for them. Also course in the windows world and the Mac world, you really should upgrade the operating system as much as you can. Windows 11 though, man, windows 11. And I said this to my newsletter. I warned you guys is going to be a nightmare. For many people. You are not going to be able to do an automatic upgrade unless you have the newest of hardware, with the highest end of features, Craig peterson.com. One of the very big ransomware operations is back online. And now we have some inside information from one of the contractors working for this ransomware organization and oh yeah, there's an FBI tie, too.. This organization, ransomware gang, almost business, whatever you might want to describe them as is known as revolt. They have a few other names, but that's the really big one. And they are basically the 800 pound gorilla in the ransom. Business, you might be using cloud services right now. Maybe you use Microsoft's email service. Their Microsoft 360, I think, is what they call it now and use it for email and various other things pretty handy. It's mostly in the cloud. Computers you own or operate or have to maintain. I think that makes some sense too, but here's the bottom line it's software as a service right now, salesforce.com software as a service, Oracle has their accounting stuff. QuickBooks online, all software as a service. It isn't just those legitimate businesses that I just mentioned. That are using the cloud that are providing software as a service where you're paying monthly or however frequently. And you're getting this software as a service. That's what that means. Typically it means it's in the cloud and you don't have any real control over it. That's what this ransomware gang has been doing. This gang known as rebill. They all appear to be in. And there's some interesting stuff. That's come out. A transcript was released of an interview with one of their contractors. Now the original interview was in Russian. So I read through a translation of the Russian. I have no idea how good it is, but it is being quoted by a bank. Insider magazine that you might be familiar with bank info, security. That's one of the places that I follow. And there's a few interesting things that he talked about that I want to get into, but these are the people who have been behind things like the colonial pipeline attack and some of the other very large attacks, the way they work, their business model is. You can license their software, their ransomware software, and you go after a business or a government agency, whatever it might be, you get that ransomware software inside. And the reveal gang will take a percentage of the money that you have in rent. Now, how is that for a, an interesting business model, right? Taking something that the rest of the world has been using, and then take that model and put it into the legal side of the world. For three weeks, during this whole reveal ransomware attack, this summer turns out that the FBI secretly withheld the key that could have been used to decrypt. And computers that reveal had infected with ransomware and looks like kids up to maybe 1500 networks. Now those are networks, not just computers. That includes networks run by hospitals, schools, and businesses, including critical infrastructure businesses. The way the FBI got their hands on this decryption game. Is by penetrating reveal gangs servers. So they got into it. They were able to grab the keys and then the FBI waited before. Did anything with it. See, what they were trying to do is catch the people behind reveal. And so they didn't want to release information, get information out there to the press that might tip off those bad guys over there in Russia. And then shut down their operations. But as you might know, because I mentioned it here before the reveal gang went offline on July 13th, before the FBI could really track them down. And then the FBI didn't release the key until July 21st. And then I think it was Malwarebytes released a decryption tool. So if you had been hacked by the gang, you could. Now, remember it isn't reveal itself. That's doing most of them. Ransomware hacking if you will or a placement it's small guys. And that's why some people, including this contractor that apparently worked for the reveal gang itself says, people think that it's the Russian government, that it's Putin, that's doing this. He said, in fact, it's not it's small guys. And people like me are getting four or five hours a night. Because we're working so hard trying to make a whole of this work, come up with the new software approaches. We have to provide code tech support unquote to our affiliates, as well as tech support to the people who have had their computers and their data ransomed. So it a real interesting mix. Absolutely. Interesting mix. Now Christopher Ray here a couple of weeks ago, he's the FBI director told Congress that cool. We make these decisions as a group, not unilaterally. To the FBI and working with other government agencies, these are complex decisions designed to create maximum impact. And that takes time and going against adversaries, where we have to marshal resources, not just around the. But all over the world. So this Russian based gang first appeared in 2019, they've been around, they've been exporting large amounts of money from businesses for a very long time. One of the interest he'd things I think about all of this is that this reveal gang has their software as a service, and they provide it to quote affiliates, quote that, go ahead and then install the software, get you to install it on your computers in order to ransom you a double whammy ransom you, but there's now reports out there that there's a secret back door in the ransomwares code that allow. Rebill to go around their affiliates and steal the proceeds. How's that for hilarious, you've got a bad guy who goes in and gets the software from revolt, pays them a commission, and then reveal apparently has been jumping in on these customer support chats. In other words, you just got nailed and because you got nailed with ransomware, you have to go to. Chat room. And so you go in there and you're getting customer support on how to buy Bitcoin and how to transfer to their wallet. And apparently revival is getting right in the middle and is extorting money from these people directly instead of having the affiliates do it pretty amazing. So here's this part of this interview? It was aired on the Russian news outlet, London. And was trans translated by yeah. Flashpoint. Here are the guys that got the full transcript of the interview. He says in the normal world, I was called a contractor, doing some tasks for many ransomware collectives that journalists considered to be famous. Money is stolen or extorted with my hands, but I'm not ashamed of it. I do. And again, this goes into the thinking of many of these bad guys of Americans are all rich and they don't deserve what they have. He said, let's put it this way. This is a very time consuming job. And if you've earned enough, then you can quit the game. But chronic fatigue, burnout, deadline. All of these words from the life of ordinary office workers are also relevant for malware developers. So there you go. You should feel sorry for these malware developers who are developing software to steal millions from you and. Down our critical infrastructure. Hey, join me online. Craig peterson.com. And if you subscribe to my weekly newsletter right there on the site, I'll send you a few of my special reports. The most popular ones will come to you right there in your email box. Craig peterson.com/subscribe. We all pretty much have some form of insurance. And we're going to talk right now about the types of cyber insurance you may have. Now this might be through your homeowners policy or perhaps a rider on a business policy. Many of our homeowners policies have started coming with cyber insurance. So we're going to talk about that. What is it? Businesses as well are also using cyber insurance and I'm sure you've heard of insurance basically called LifeLock and what that's all about. So let's kind of start. When we have a breach in a business, usually what happens is information about our customers is stolen. Look at some of the biggest breaches in history where we. Hundreds of millions of our personal records stolen Equifax breach is an example of a huge breach where we had all kinds of personal information that was stolen by the bad guys. Now, some of this information gets stale pretty quickly, but of course, other parts of it like our address, our social security number, they are probably not going to change for years. If for. No, of course our social security number will never change the social security administration. Just doesn't reissue them for very many reasons at all. And they do not reissue a social security number was stolen online because. Just about everybody's has, so what does a company like LifeLock do? They keep an eye on your credit report for you. And they're looking at what's going on new accounts that are open. They look at various other things, just related to that. And they, at that point say, wait a minute, something weird is happening. Now my credit cards, for instance, I have a credit card that if let's say I buy two of the same thing, one after the other and the, both the same price that credit card company pops a message right up on my phone saying, Hey, did you just buy two? Of these $15 things from and I can say yes or no, if I'm out on the road and I am purchasing gas, the credit card can pop up on my phone and it does and say, Hey, will you just trying to buy gas at this gas station? Because what'll happen as you use the credit card at the pump. And the pump says it was denied and then up at pops and yeah. Okay. No, that was me. And they said, okay, we'll try the transaction. Okay. And we'll approve it next time. And that's all automated. And that has nothing to do with LifeLock. LifeLock is there to more or less detect that something happened and if something happened and it was a bad guy and basically your identity was stolen. So they might be trying to buy a Ferrari in your name or maybe a 10 year old, four Ford focus, whatever it might be. And. They will help you try and clean it. That's what they do. So that's why it's cheap. And I don't know that it's terribly useful to you if you're really concerned. Go ahead and do that, but do keep an eye on your credit report. I do as well. My bank has free credit reporting for me, my credit card. Same thing. Free credit reporting that lets me know everything that's going on. So that's an easy way to tell WhatsApp. And there are different types of cyber insurance beyond this sort of thing, beyond the LifeLocks of the world. And many of us just get our cyber insurance through our homeowner's policy. It's a little rider. And businesses can buy cyber insurance as well. We have cyber insurance, that's underwritten by Lloyd's of London and we provide a $500,000 or million-dollar policy to our clients. As well, because that's what we do is cyber security, right? So the idea is if one of our clients gets hit, we have some insurance to back us up, but of course we go a lot further. It's almost like the LifeLock where if you do get hit by ransomware or something else, we will help you get back in business. We'll help restore your data. We'll help you with providing you. The information you need in order to do press releases, which agencies you need to contact, which of your customers you need to contact. And we've got scripts for all of that. So you can send it all out and just take care of it. So the idea is you don't want ransomware. So you hire us. We are extremely likely to keep ransomware out of your systems. And on top of that, if you are hit with ransomware, we restore everything. LifeLock does not do that. Obviously they all, I'll only do stuff after the fact and the cyber insurance you buy from an insurance agency is much the same, and there's a huge caveat with these policies that we're buying for our businesses and for our homes. And that is. They have a checklist at the insurance companies. Did you do this and this? And if you did, then they might payout if you did not, they may not payout. In fact, pay outs on cyber insurance policies are not known because. Bottom line. They really don't payout. Okay. I'm looking at some numbers right now and about paying ransoms and everything else. You may or may not. You got to have a look at it. Many of these policies are never paid out by the cyber insurance covers. They usually just regular insurance companies, but it's a special rider. And what they do is they say, Hey, listen, you did not follow the rules, so we're not going to payout. And there are many cases. If you go online and do a search, just use duck, go and say cyber insurance, payout. Lawsuits I'm doing that right now is. And it'll come up and show. Oh, okay. Does it cover lawsuits? Why are liability claims so costly? Yeah, exactly. A 2% payouts is talking about here. I'm invoicing, the most common cyber insurance claim denial. Yeah, it goes on and on. There are a lot is an act of war clause could nix cyber insurance payouts. That's another big one that they've tried to use. So the cyber insurance company will say, Hey, that was China attacking you. Therefore it was an act of. And you can bet if there is a big hack, they will use that. Think of what happens with the hurricanes coming onshore. How much do they push back on payouts? Especially with the real big one, it would bankrupt them. So we gotta be very careful. There are some different types of cyber insurance. Policies do which have different types of coverages. You've got the first party lost loss, I should say. So that's you to covering you and your loss, your first-party expenses, third party liability. Each one of those has specific parameters. So sub-limit retention and others. First-party losses are usually including the loss of revenue due to business interruption. First party expenses would include all of the services and resources that you needed to use to recover from attack like forensic or system rebuilding services. These third-party liabilities. May cover expenses and legal fees related to potential damage caused by the incident to third parties like partners, customers, or employees whose sensitive information may have been compromised. So read them carefully. Be very careful. There are next-generation, cyber insurance policies are going even further and make these types of services. Prior to any incident to reduce exposures and prevent incidents in the first place. Now we don't provide insurance. We are not an insurance company, but that's basically what we're trying to do here. Not become an insurance company, but to make sure. The businesses have the right services so that the likelihood of anything happening or is extremely low. And then following up after the fact it's different obviously than insurers in and insurance, the guardians, Jessica Crispin had a great article about a couple of weeks ago that I've been hanging on. And it's talking about this tattle where that's been incorporated into the computers we're using at home. Now we're specifically talking about employers that are putting this. The software on computers, they belong to the companies. A lot of businesses are worried. If workers are at home or where we can't see them, how do we know that they're actually working, not watching Netflix or something else on. They have, of course, come up with software that can reassure your boss. It does things like take snapshots of what you're doing. Record your keystrokes grabs photos from. Picture from your camera. There's a new program called sneak, which makes your webcam take a photo of you about once a minute and makes available to the supervisor to prove you're not away from your desk. There's no warning in advance. It just takes that photograph catches your doom. Pretty much anything can be absolutely anything. Then, it's the type of thing you'd expect the national security agency to do. So there are some good reasons for this lack of trust because sometimes employees have not been doi
This episode is also brought to you by NordVPN. Get a VPN that takes your privacy seriously. NordVPN is our VPN of choice and will secure your browsing on your Chromebook or on any device. Use NordVPN to keep your private data to yourself whether you are at home or on the go! CLICK HERE to try it out and get a 3-year deal for $3.49/month. Join our Patreon community and get access to things like behind-the-scenes footage, early access to videos, private Discord server access, an ad-free experience on the mobile and desktop versions of the website, your name listed on all our YouTube videos, and monthly live stream Q&A. CLICK HERE to be a part of our community. Notable Links: Pro case in my hand and here's what it's taught me about the phone Hands-on with HP's awesome new Chromebase with the rotating screen HP Chromebook x2 11 review: tablet dreams, Chromebook realities Google TV app adds in-built remote but there's a catch for some A few reasons why the Lenovo Duet 5 should outperform other Snapdragon Chromebooks --- Support this podcast: https://anchor.fm/chromeunboxed/support
How do you meld passion with purpose? What makes you committed to your cause? And most importantly, what does your podcast do?In addition to philosophizing these questions and more, in today's edition of ‘Roll On,' Adam Skolnick and I trade fitness updates, engage in typical ribald banter, indulge you with a cameo from environmental activist, UN Patron of the Oceans, and arctic swimmer, Lewis Pugh.And that's just the tip of the iceberg.Aside from being my fortnightly sidekick hype beast and favorite edgelord of words literary, Adam is a waterman, writer, and veteran journalist best known as David Goggins' Can't Hurt Me, co-author. He writes about adventure sports, environmental issues, and civil rights for outlets such as The New York Times, Outside, ESPN, BBC, and Men's Health. He is the author of One Breath and is currently recycling the ‘new dad' excuse to avoid working on his novel.Specific topics covered in this episode include:RRP Staff wins + a debrief on Rich's experience in the Malibu Triathlon;Lewis Pugh's unique relationship with environmentalism & swimming; Rich's reflection on his upcoming 9 year anniversary of podcasting; andthoughts on curiosity, purpose, and why conversation matters.In addition, we answer the following questions:What advice do you have for those new to multi-sport endurance events?How do you balance your commitment to social justice with your career? How do you remain hopeful while living through the chaos of the climate crisis?Thank you to Hadar from San Francisco, Tyler from Florida, and Jason from Pasadena for your questions. If you want your query discussed, drop it on our Facebook Page or better yet leave a voicemail at (424) 235-4626.To read more and listen click here. You can also watch on YouTube. And as always, the podcast streams wild and free on Apple Podcasts and Spotify.Peace + Plants,Listen, Watch & SubscribeApple Podcasts | YouTube | Spotify | Stitcher | Google PodcastsThanks to this week's sponsors:Four Sigmatic: Nutritious and delicious organic, Fair-Trade, single-origin Arabica mushroom coffee made with only the highest quality adaptogens like Lion's Mane and Chaga. Visit foursigmatic.com/roll and get up to 40% off + Free Shipping on Mushroom Coffee bundles.Ritual: Ritual is the multivitamin, reimagined. I take it every morning, and I love that its clean, vegan-friendly formula is made with key nutrients in forms your body can actually use—no GMOs, synthetic fillers, or other shady extras. You deserve to know what's in your multivitamin. That's why Ritual is offering my listeners 10% off during their first 3 months. Visit ritual.com/RICHROLL to start your Ritual today.Whoop: The world's most powerful fitness tracker is now waterproof. Designed to be worn 24/7, the advanced WHOOP 4.0 is lightweight and minimal so nothing gets in the way of a snatch, swing, or stride. Upgrade now and get the WHOOP 4.Oat WHOOP.com and use the code Richroll at checkout to get 15% off a membership.ExpressVPN defeats content restrictions and censorship to deliver unlimited access to video, music, social media, and more, from anywhere in the world. Express VPN is the VPN service rated #1 by TechRadar and comes with a 30-day money-back guarantee. Protect your online activity and find out how you can get 3 months FREE at expressvpn.com/richrollFor a complete list of all RRP sponsors, vanity URLs & discount codes, visit Our Sponsors.SHOW NOTES:Connect With Adam: Website | Instagram | TwitterTikTok: @iamrichrollYouTube: Rich Roll Podcast Clips Channel60 Minutes: Alexey Molchanov on diving more than 39 stories deep while holding his breath for four and a half minutesThe Independent: Lewis Pugh completes multi-day icy Greenland swim to highlight climate crisisSustainable Standard: Meet Lewis Pugh – the UN Patron of the Oceans who swam through Arctic ice to warn us about climate crisisBBC Sport: The endurance swimmer dodging icebergs in GreenlandThe Times: The last stand of Lewis Pugh, the human polar bearHOW CAN I SUPPORT THE PODCAST?Tell Your Friends & Share Online!Subscribe & Review: Please make sure to review, share comments and subscribe to the show on the various platforms (Apple Podcasts, YouTube & Spotify). This helps tremendously!Patronize Our Sponsors: Supporting the companies that support the show! For a complete list of all RRP sponsors and their respective vanity URLs and discount codes, click the ‘Sponsors' tab in the ‘Shop' menu.Spread The Word: Help grow our reach by sharing your enthusiasm for the podcast and/or your favorite episodes by posting about it on social media.Thank The Team: I do not do this alone. Send your love to Jason Camiolo for audio engineering, production, show notes and interstitial music; Blake Curtis & Dan Drake for video, & editing; graphics by Jessica Miranda & Daniel Solis; portraits by Davy Greenberg & Grayson Wilder; copywriting by Georgia Whaley; and theme music by Tyler Piatt, Trapper Piatt & Hari Mathis.Amazon Disclosure: Books and products denoted with an asterisk are hyperlinked to the Amazon affiliate program. We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. See acast.com/privacy for privacy and opt-out information.
The Personal Computer Show Wednesday September 29th 2021 PRN.fm Streaming On the Internet 6:00 PM Eastern Time IN THE NEWS o Apple Releases iOS 12.5.5 for Older iPhones and iPads o iOS 15 Bring FaceTime to Android o Is VPN Safe to Use? o Comments on VPN by Joe King o Feds Considering to Act on the Chip Shortage o EU Proposes Mandatory USB-C on All Devices, Including iPhones IT Pro Series with Benjamin Rockwell o Ageism Ponderings From the Tech Corner o The Computer Chip Industry and Catch 22 Technology Chatter of Hits and Misses - with Benjamin Rockwell and Marty Winston o Miscellaneous Products
Zero-trust is the hot term in network security in 2021. But one reason it's so highly sought out is that many don't know exactly what it means. We called on Fortinet Senior Director of Product Marketing Peter Newton to shed some light on the subject. Peter discusses what makes a zero-trust network philosophy, what steps a company should take to plan for the shift, and what tools can make it easier. Plus, we talk about how the right zero-trust setup makes remote work both easier and more secure simultaneously.Read Peter's blog article on the subject: https://www.fortinet.com/blog/industry-trends/how-to-implement-a-zero-trust-security-strategy In the news, we cover some REvil drama, a new finger pointing at Russia, and states' troubles filling cybersecurity jobs.See the headlines:REvil Affiliates Confirm : Leadership Were Cheating Dirtbagshttps://threatpost.com/revil-affiliates-leadership-cheated-ransom-payments/174972/ EU 'denounces' Russian malicious cyber activity aimed at member states https://thehill.com/policy/cybersecurity/573867-eu-denounces-russian-malicious-cyber-activity-aimed-at-member-states States at disadvantage in race to recruit cybersecurity proshttps://apnews.com/article/business-technology-internships-0d7fc0ee18295585292b2e13b62e88f3Get info on all things network security through our blog, https://firewalls.com/blog.And please do reach out, as we want to hear from you. Suggest an episode topic, ask a question, or just say hi in a review, or by emailing email@example.com. New episodes are normally released every other Wednesday, so subscribe/follow to ensure you get the latest first - and again, please rate and review.Thanks for listening!
When it comes to moving abroad, there are many tasks to check off your to-do list, one of which is finding somewhere to live. But did you know that Airbnb is one of the more expensive places to look? Whether it be in France or the Philippines, a funky flat or a luxury villa, there are endless options that will suit your budget and lifestyle… but where does one even begin to search for a home in a foreign country? In today's podcast, we are searching far beyond Airbnb and getting creative with the housing search process. For travelers and remote workers alike, here are 27 unique ways to find a short- or long-term rental abroad. Helpful Housing Resources: Get $30 off AirBnb Download a Free PDF of these 27 Housing Strategies Badass Digital Nomads Episode 127: How To Find Housing Overseas Without Using Airbnb Intro: The best part of relocation is finding housing [00:30] But first… Kristin is speaking at the VidSummit YouTube Conference in Los Angeles + Come to her in-person meetup! [1:40] Sponsor: Ready to Relocate Relocation Course [2:58] Apply here Using Airbnb as housing inspiration [5:55] 27 Ways to Find Housing Abroad in 2021: Timestamps [6:57] Plum Guide - high-end, luxury short-term accommodations [7:01] Search for executive rentals or serviced apartments [8:37] Search for housing on Google and use Google Maps [10:26] Contact local real estate agencies [11:35] Search local, classified sites for great deals (and use the local language or a VPN) [12:30] Expat rental sites [14:04] Sublet.com [15:00] Nestpick - The largest platform for furnished apartments [15:33] Housing Anywhere - Renting rooms and apartments (lots of monthly housing options) [16:15] Flatio - Affordable fully furnished European rentals starting at a few hundred euro per month [16:37] Vrbo [17:38] 9flats.com [18:12] Tripping.com - Conglomerate housing website that shows you the best prices [19:04] Trivago - A mix of quotes on car rentals, lodging, and flights [19:43] The Inspirato Pass - Luxury subscription-based travel access pass [20:26] Try co-living [21:35] Sign up for remote work retreat groups [22:49] Facebook Groups and Facebook Marketplace [23:26] Tripadvisor [24:54] Use hotel booking websites to find longer-term housing [25:29] Hit the pavement and look for “for rent” signs! [26:01] Try a home exchange website [28:27] Become a housesitter [27:58] Rent an RV, van, or boat! [29:47] Go camping! [30:33] Search budget websites for affordable housing options and work exchange programs [31:15] Looking in the US and Canada? Use domestic travel websites [32:08] Would you like to move abroad in the next year? Enrollment is open in Kristin's new coaching program, Ready To Relocate!
Mercury isn't in retrograde but our computers are! But it's still a loosey-goosey bonus episode, Skype lag be damned! Bethany has some awful marriage advice, Kathleen is getting ready to infect her mom's TV with a VHS haunting disease, and there's a discussion on a new way to tell your weight: blackhead migration! Plus, Kathleen has great advice on how to get your way when calling a customer service line and why you should be using a VPN when you're shopping online. ------ Check out our merch! —> https://store.dftba.com/collections/an-acquired-taste-podcast ------ Join our Patreon! —> https://www.patreon.com/acquiredtaste ------ Please support the companies that support us! Apostrophe - Save $15 off your first visit with a board-certified dermatologist at Apostrophe.com/TASTE when you use our code:TASTE.
Kris & David are back as we discuss the (almost-)week that was September 23-28, 1994. We talk about WCW making the decision to retire Ric Flair at Halloween Havoc 94, why it's taking place, and who was most likely pushing that decision. We also talk about the power that Hulk Hogan had in the company at the time and how crazy that was since he was on a 6 month contract, plus all kinds of other WCW wackiness. We also go to New Japan and talk about Jushin Thunder Liger breaking his ankle and how that would affect NJPW coming off of Masahiro Chono's heel turn. We then talk about FMW running a death match in a swimming pool, AAA building towards the When Worlds Collide PPV and running some hot shows in general, ECW running shows in Florida for the first time, the Gangstas running wild in SMW, Scott Bowden giving the Florida State football team a pep talk, Herb Abrams running the iconic final UWF show that was the BLACKJACK BRAWL, Jerry Lawler destroying Dink's tricycle on WWF Superstars, and so much more. This is a wild and wacky show, so don't miss it!!!Timestamps:0:00:00 WCW1:11:14 Eurasia: NJPW, FMW, Takashi Ishikawa, IWA Japan, IWU, Michinoku Pro, NSPW, Pancrase, PWFG, AJW, JWP, LLPW, & CWA2:00:24 Classic Commercial Break2:04:29 Halftime2:40:16 Other North America: TCW, WestCoastCW, AAA, CMLL, & UWA3:03:06 Other USA: ASWF, ECW, All-Star (NC), Crockett/NWA, Peach State, SMW, USWA, PWA, Jesse Ventura, NWC, & UWF4:44:06 WWF5:08:22 Patreon Preview: Fallout of Hulk Hogan singling out Superstar Billy Graham on The Arsenio Hall ShowTo support the show and get access to exclusive rewards like special members-only monthly themed shows, go to our Patreon page at Patreon.com/BetweenTheSheets and become an ongoing Patron. Becoming a Between the Sheets Patron will also get you exclusive access to not only the monthly themed episode of Between the Sheets, but also access to our new mailbag segment, a Patron-only chat room on Slack, and anything else we do outside of the main shows!If you're looking for the best deal on a VPN service—short for Virtual Private Network, it helps you get around regional restrictions as well as browse the internet more securely—then VyprVPN is what you've been looking for. Not only will using our link help support Between The Sheets, but you'll get a special discount, with prices as low as $1.67/month if you go with a three year subscription. With numerous great features and even a TV-specific Android app to make streaming easier, there is no better choice if you're looking to subscribe to WWE Network, AEW Plus, and other region-locked services.For the best in both current and classic indie wrestling streaming, make sure to check out IndependentWrestling.tv and use coupon code BTSPOD for a free 5 day trial! (You can also go directly to TinyURL.com/IWTVsheets to sign up that way.) If you convert to a paid subscriber, we get a kickback for referring you, allowing you to support both the show and the indie scene.To subscribe, you can find us on iTunes, Google Play, and just about every other podcast app's directory, or you can also paste Feeds.FeedBurner.com/BTSheets into your favorite podcast app using whatever “add feed manually” option it has.Support this podcast at — https://redcircle.com/between-the-sheets/donationsAdvertising Inquiries: https://redcircle.com/brands
The 76th Session of the UN Assembly is underway, Diablo 2 Resurrected is dropping in stores soon, Linda Evangelista is suing “Cool Sclupting” for actually making her fatter, Tourists and children at the Bronx Zoo are horrified when a gorilla starts performing oral sex on another gorilla, Barney The Bull is captured on Long Island, A pedophile in Russia is given a deadly ultimatum, Indian man sentenced to clothes washing for attempted rape, KFC smuggling operation busted in Auckland, New Zealand, & Voicemails & reviews Cup Of Coffee in the Big Time 00:00:00 - Timestamps 00:06:35 – Fun Fact – Although Fun the band won the 2013 Grammy for best new artist for their breakout 2012 album Some Nights, they actually had a previous album Aim and Ignite which was released in 2009. 00:08:05 – Holidays: Native American Day, Kiss Day, National Horchata Day 00:09:45 – Today in History – 1890 The Church of Jesus Christ of Latter-day Saints officially renounces polygamy. Wink wink 00:13:10 – Honorable Mentions: There was a mass shooting at a Kroger in Collierville Tennessee and at the time of this recording two people are dead with 13 injured, our thoughts go out to the victims and families impacted. 00:15:05 - #3 – The 76th Session of UN General Assembly is going on right now actually the debate portion is going on now in New York City and via zoom 00:18:35 - #2 – Diablo 2 Resurrected, because that's what it is after 20 years, resurrected with a new face lift. 00:19:45 - #1 – Famous supermodel Linda Evangelista is trending because she has just come out and said that the “cool sculpting” she paid for went horribly wrong and instead of slimming her down fattened her up and disfigured her. 00:27:05 - Tourists and children at the Bronx Zoo were treated to a special show of a Gorilla performing oral sex on another Gorilla, & Barney The Bull from Long Island is finally captured. TTIM 00:42:10 – Russia - A man discovered his best friend was sexually abusing his daughter and gave him an ultimatum he couldn't refuse 00:47:00 – India – A man who attempted to rape another villager is set free on bail, but has to wash the clothes of all 2,000 women in the village for 6 months. 00:49:50 – New Zealand – Cops bust two men trying to smuggle buckets of KFC into Auckland, which is under strict lockdown so no restaurants are open. 01:00:50 - Voicemails & Reviews with Will These stories and more… brought to you by our fantastic sponsors. Laithwaites Wines - Now, get six amazing bottles of wine, plus two bonus bottles and two stemless wine glasses for $49.99 (plus tax) with free delivery. Just text HARD to 64-000! To get this special offer, text HARD to 64-000. That's HARD to 64-000. Terms apply, available at laithwaites.com/terms. Raycon Earbuds - Raycon exists to prove that premium audio doesn't have to price you out. We're here to defy the industry by tailoring our tech to the people– giving them booming audio and luxurious comfort. Get 15% off their Raycon order at buyraycon.com/hardfactor. Express VPN - Protect your online activity TODAY with the VPN rated #1 by CNET. Visit our exclusive link ExpressVPN.com/hardfactor and you can get an extra 3 months FREE on a one-year package. Leave us a Voicemail at 512-270-1480 or or send us a voicememo to firstname.lastname@example.org & leave a 5-Star review on Apple Pods to hear it on Friday's show Follow/Subscribe @HardFactorNews on Instagram, Twitter, TikTok, YouTube, Facebook, Apple Pods and Spotify to support the Show!
A Politico article from Ben Schreckinger confirms that some of the Ukrainian business related emails talking about “the big man” in Hunter Bidens laptop were confirmed to be real and genuine. They went on to cover themselves saying "While the leak contains genuine files, it remains possible that fake material has been slipped in." Not to brag but Hard Factor was one of the few “media” sources that predicted the materials in Hunter Biden's stolen laptop were real, especially the sex stuff. Cup Of Coffee in the Big Time 00:00:00 - Timestamps 00:07:51 – Fun Fact – Space suits used to cost 12 million dollars in 1974 per spacesuit and NASA is going to pay 1 billion dollars for the new space suits 00:11:18 – Holidays: Celebrate bi sexuality, dogs in politics day, national checkers day 00:13:19 – Today in History – 1779 John Paul Jones, screamed “I have not yet begun to fight”, 1846 Neptune observed for first time, 1980 Bob Marley's last concert 00:17:08 – Honorable Mentions: NFL parlay better lost but paid 133k from MGM; Spaceforce uniforms causing a buzz; Tim Scott and Cory Booker stalemate on police reform bill, Michael Flynn thinks covid vaccines are being put in salad dressings 00:20:34 - #3 – Thanos – The new movie the Eternals has links to Thanos the main villain of the Avengers movies 00:22:40 - #2 – Federal Reserve Chairman Jerome Powell gave a speech about the economy with emphasis on inflation and interest rates 00:28:22 - #1 – Hunter Biden Laptop is real confirmed by independent sources in a new Politico article from Ben Schreckinger 00:38:22 - A couple of guys in Byram Mississippi saw a “free car” on the side of the road with the keys in it and took it but it turns out the owner was dead in the trunk TTIM - 00:46:53 – England - Boris Johnson – For the first time ever in an interview with Savannah Guthrie Boris admitted to having six kids with one on the way 00:50:11 – China – A giant moon got loose from the moon festival and rolled down the street 00:51:48 – Canary Islands – A major volcanic eruption is happening and homes are being destroyed with several thousand evacuations going on 00:56:20 - A man had a horrible and rare medical condition where he ejaculated from his rear end due to a hole from a catheter that crossed the lines These stories and more… brought to you by our fantastic sponsors. Laithwaites Wines - Now, get six amazing bottles of wine, plus two bonus bottles and two stemless wine glasses for $49.99 (plus tax) with free delivery. Just text HARD to 64-000! To get this special offer, text HARD to 64-000. That's HARD to 64-000. Terms apply, available at laithwaites.com/terms. Raycon Earbuds - Raycon exists to prove that premium audio doesn't have to price you out. We're here to defy the industry by tailoring our tech to the people– giving them booming audio and luxurious comfort. Get 15% off their Raycon order at buyraycon.com/hardfactor. Express VPN - Protect your online activity TODAY with the VPN rated #1 by CNET. Visit our exclusive link ExpressVPN.com/hardfactor and you can get an extra 3 months FREE on a one-year package. Leave us a Voicemail at 512-270-1480 or or send us a voicememo to email@example.com & leave a 5-Star review on Apple Pods to hear it on Friday's show Follow/Subscribe @HardFactorNews on Instagram, Twitter, TikTok, YouTube, Facebook, Apple Pods and Spotify to support the Show!
How much do you trust the people who work at your VPN provider? How are folks fighting facial recognition? And what on earth is Ray-Ban thinking getting into bed with Facebook? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley. Visit https://www.smashingsecurity.com/244 to check out this episode's show notes and episode links. Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our website for more episodes. Remember: Follow us on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Theme tune: "Vinyl Memories" by Mikael Manvelyan. Assorted sound effects: AudioBlocks. Special Guest: Mark Stockley.
Updates on the Gabby Petito murder: The Teton County Coroner has officially ruled the death of Gabby Petito a homicide and the search still continues for her fiancé Brian Laundrie. A man from Baker, Florida tweeted yesterday that his trial camera had picked up an image of a hiker that resembled Laundrie some 500 miles from his home in North Port, FL. That story here: (00:30:00) Also, Space Force, Mexican Border, and the return of Marc DirtyWhite. Cup of Coffee In the Big Time (00:06:43) - Fun Fact: What Trait is Exclusive to Humans? (00:09:24) - Today in History - Salem Witches & Abraham Lincoln (00:13:45) - Honorable Mentions - The Mexican Border Still a Mess (00:16:30) - #3 - Havana Syndrome Is a Bitch (00:20:05) - #2 - Space Force Got New Kits (00:24:26) - #1 - Canelo Alvarez Won the Pre-fight Fight (00:30:00) - The Latest in the Gaby Petito Murder Investigation - with Wes (00:50:02) - Bad Plastic Surgery Double - Mark runs down a woman who got deadly derriere implants + (00:56:12) The Russian Man with 24” MegaMan Biceps The TikTok International Moment (01:03:51) - Switzerland - Marc DitryWhite & His Erotic Choking Game/Murder (01:07:51) - Croatia - Liar Woman Wakes up In Croatia With No Memory But Speaks Perfect English (01:09:20) - Vatican City - The Pope Is Alive. Hurray. These stories and more… brought to you by our fantastic sponsors. Laithwaites Wines - Now, get six amazing bottles of wine, plus two bonus bottles and two stemless wine glasses for $49.99 (plus tax) with free delivery. Just text HARD to 64-000! To get this special offer, text HARD to 64-000. That's HARD to 64-000. Terms apply, available at laithwaites.com/terms. Raycon Earbuds - Raycon exists to prove that premium audio doesn't have to price you out. We're here to defy the industry by tailoring our tech to the people– giving them booming audio and luxurious comfort. Get 15% off their Raycon order at buyraycon.com/hardfactor. Express VPN - Protect your online activity TODAY with the VPN rated #1 by CNET. Visit our exclusive link ExpressVPN.com/hardfactor and you can get an extra 3 months FREE on a one-year package. Leave us a Voicemail at 512-270-1480 or or send us a voicememo to firstname.lastname@example.org & leave a 5-Star review on Apple Pods to hear it on Friday's show Follow/Subscribe @HardFactorNews on Instagram, Twitter, TikTok, YouTube, Facebook, Apple Pods and Spotify to support the Show!
Michael Geer is co-founder and CSO (Chief Strategy Officer) of Humanity Health, a London-based startup that's building an iPhone app and subscription service designed to help users slow or reverse their rate of aging. He was the founding team at Badoo - grew to the largest dating site in the world and spawned the Social Discovery sector. He then ran operations at AnchorFree which became the largest consumer VPN in the world with over 700 million users. Listen to this podcast and know Michael's amazing entrepreneurial journey. Please Enjoy! If you enjoy the podcast, would you please consider being 1% and leaving a short review on Apple Podcasts/ iTunes? It takes less than 30 seconds, and it really makes a world of difference in reaching new interesting guests! To sign up for Kevin's Podcast email Newsletter and to view the show notes & past guests please visit-https://officialkevindavid.com/podcast Follow Kevin: https://mmini.me/@FollowKD
Today the homie discusses some highly anticipated What IF moments that could happen in some of our favorite mangas and anime. Like what if Naruto became an Akatsuki member. or What if there was a traitor among the Straw Hats. All question and topic will be discussed in this highly anticipated episode.Spoiler @Mha Spoiler @ 27:00-51:00 JJk Spoiler @ 51:00 1:41:00What If's Begin at 1:41:00Sign Up for LootCrate https://loot.cr/3f2IDei Get a 15% off your purchase when you use the code - geekgiant For more awesome monthly boxes that have merch from some of your favorite series or games and use the discount code, it'll help support the podcast! Continue to Support Geek Giant Podcast!!! Follow us on our Social Media and Patreon!!! Twitter: https://twitter.com/podcast_giant Instagram: https://www.instagram.com/geekgiantpo... Tik Tok: https://www.tiktok.com/@geekgiant704?... Patreon: https://www.patreon.com/geekgiant Looking for Anime on Netflix that isn't available in your Region or Country?! Wanna watch
The southern border of the US is flooded with Haitian migrants and the situation is out of control, one of the best Money Line parlays of all time hangs in the balance of Monday Night Football, a teacher in Oregon goes in blackface as “Rosa Parks” at work for defying a vaccine mandate, Singapore is using all their durian trash to make new bandaids, and a town in New Mexico has something in the water… and much more… (Timestamps) - Timestamps Cup of Coffee in the Big Time (00:03:38) - Fun Facts about Human Bones (00:06:44) - September 21 Holidays (00:09:34) - Today in History: Moroni, The Hobbit, and Bill Murray (00:11:21) - Honorable Mentions: iOS15, Pfizer for Kids, Southern Border (00:18:59) - #3: RIP AJ Johnson (00:20:05) - #2: MGM Bettor has a $25 Parlay to win $726K, and it all came down to Monday Night Football (00:22:40) - #1: Halloween Kills Trailer is out, movie drops 10/15. Halloween Season is Upon Us TikTok International Moment (00:29:33) - England: Homeowner discovers psycho killer doll inside the drywall in his “flat” (00:35:39) - Singapore: Making New and Improved Bandaids with Durian Husks (00:39:04) - Singapore (x2): Creepy Clown Lures Kids to Speech School (00:46:29) - A teacher in Oregon goes in blackface to prove a point that she's like Rosa Parks for violating a vaccine mandate… and Justin Trudeau has a new angle of his Arabian Nights costume drop (01:00:10) - A town in New Mexico has something in the water, and it's NOT Fluoride (it's meth) These stories and more… brought to you by our fantastic sponsors. Laithwaites Wines - Now, get six amazing bottles of wine, plus two bonus bottles and two stemless wine glasses for $49.99 (plus tax) with free delivery. Just text HARD to 64-000! To get this special offer, text HARD to 64-000. That's HARD to 64-000. Terms apply, available at laithwaites.com/terms. Raycon Earbuds - Raycon exists to prove that premium audio doesn't have to price you out. We're here to defy the industry by tailoring our tech to the people– giving them booming audio and luxurious comfort. Get 15% off their Raycon order at buyraycon.com/hardfactor. Express VPN - Protect your online activity TODAY with the VPN rated #1 by CNET. Visit our exclusive link ExpressVPN.com/hardfactor and you can get an extra 3 months FREE on a one-year package. Leave us a Voicemail at 512-270-1480 or or send us a voice-memo to email@example.com & leave a 5-Star review on Apple Pods to hear it on Friday's show Follow/Subscribe @HardFactorNews on Instagram, Twitter, TikTok, YouTube, Facebook, Apple Pods and Spotify to support the Show!
It's a Manhunt! The horrific discovery of Gabby Petito's body in Wyoming means the manhunt for the suspected killer and former lover, Brian Laundrie, is heating up... this, and much more. (00:00:00) - Timestamps Cup of Coffee in the Big Time (00:03:40) - Fun Fact: What Earth is made of & Mark's handyman tale (00:07:00) - Holidays: Fried Rice Day, Gibberish Day, Rum Punch Day (00:07:40) - Today in History: Ferdinand Magellan departed Spain to circumvent the globe & Don't Ask Don't Tell ended (00:10:45) - Honorable mentions: Emmy's and some show discussions (00:13:25) - #3: A plethora of things President Joe Biden missed while on his 20th vacation in Delaware (00:21:25) - #2: All things football, college & NFL update (00:26:40) - #1: Gabby Petito case, which Wes will cover in more detail (00:30:05) - Sadly, the body of Gabby Petito has been found in Grand Teton National Park, and her suspected killer, Brian Laundrie, is still on the run, seemingly with the help of his parents. TikTok International Moment (00:46:30) - UK - A 15 year old boy puts a usb phone cord into his urethra (00:49:55) - Philippines - Update on who is running for President there, including Duterte, his daughter, and Manny Pacquiao (00:53:50) - Brazil - Brazilian soccer star known as “Hulk” has impregnated the niece of his ex-wife with his 4th child (00:56:25) - Uganda - Man beheads his ex in broad daylight, but is met with swift justice as he is then killed himself by citizens These stories and more… brought to you by our fantastic sponsors. Laithwaites Wines - Now, get six amazing bottles of wine, plus two bonus bottles and two stemless wine glasses for $49.99 (plus tax) with free delivery. Just text HARD to 64-000! To get this special offer, text HARD to 64-000. That's HARD to 64-000. Terms apply, available at laithwaites.com/terms. Raycon Earbuds - Raycon exists to prove that premium audio doesn't have to price you out. We're here to defy the industry by tailoring our tech to the people– giving them booming audio and luxurious comfort. Get 15% off their Raycon order at buyraycon.com/hardfactor. Express VPN - Protect your online activity TODAY with the VPN rated #1 by CNET. Visit our exclusive link ExpressVPN.com/hardfactor and you can get an extra 3 months FREE on a one-year package. Leave us a Voicemail at 512-270-1480 or or send us a voicememo to firstname.lastname@example.org & leave a 5-Star review on Apple Pods to hear it on Friday's show Follow/Subscribe @HardFactorNews on Instagram, Twitter, TikTok, YouTube, Facebook, Apple Pods and Spotify to support the Show!
Tim, Ian, and Lydia join Bill Ottman, CEO of Minds.com, and Libby Emmons, executive editor of The Post Millennial to discuss New Hampshire's potential plans to secede from the union, DeBlasio's big plans for New York City vaccination mandates, Nancy Pelosi's firm belief that the GOP is the party of the cult, Gavin Newsom touting remaining in office as reason to clamp down harder on California residents, and the VPN company that sided with Antifa against one of the companies they advertised with. Learn more about your ad choices. Visit megaphone.fm/adchoices