loader from loading.io

Welcome and Businesses Beware Email Compromises Are Up Exponentially and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show [10-12-19]

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 10/11/2019

Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
The Mobile Malware Menace: Protecting Against Evolving Threats show art The Mobile Malware Menace: Protecting Against Evolving Threats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In today's fast-paced digital age, staying ahead of the curve is not just an advantage; it's a necessity. From the electrifying world of electric vehicles to the intricate web of mobile security, and the visionary influence of Elon Musk, there's a lot to unpack. Join us on this insightful journey as we explore key topics that are shaping the future of technology. 1. Electric Vehicles (EVs): Paving the Way for a Green Future The surge in popularity of electric vehicles is undeniable. We delve into the latest advancements, innovations, and the environmental impact of EVs, providing you with a...

info_outline
Scan Smart, Stay Safe: Mastering the Art of QR Code Defense show art Scan Smart, Stay Safe: Mastering the Art of QR Code Defense

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In a world dominated by QR codes, the risk of falling prey to digital tricksters is on the rise. Fear not, fellow entrepreneurs, for we've decoded the secrets to outsmarting these cyber hosers and keeping your digital fortress secure! QR Code Unveiled: Understanding the Basics Let's kick things off with a deep dive into the world of QR codes. Learn what makes them tick and how scammers exploit these seemingly innocent codes to compromise your cybersecurity. The Rise of AI and Its Role in QR Code Shenanigans Artificial Intelligence (AI) has ushered in a new era, and unfortunately,...

info_outline
 
More Episodes

Welcome!  

Today we are going to discuss a top tactic preferred by cybercriminals and that is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is especially hard for traditional security software to catch them. Listen in to find out more.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Sophisticated Email Attacks Against Businesses Are Up Exponentially

---

Automated Machine-Generated Transcript:

Hey, here we go Craig Peterson here. And shout out to everybody who is watching this live on video up on YouTube and on Facebook, which is kind of cool. Actually, we're going to be doing some hopefully some cool stuff here over the next little while as we get some of the newer technologies into the studio going to be doing live interviews and, and putting the videos up and everything else. So you can you can see me if you just go to Craig Peterson comm slash YouTube, for instance, you can see the video will make sure it gets saved up there, in case you're listening, and you want to go back and see what my little studio was like. So this is part of it. One of these days, maybe we'll give you a tour of the studio and all the equipment that we have here. But anyways, it is primarily an audio show a lot of people getting on podcast, we've been thinking about maybe putting up some of the podcast as video podcasts as well. But that's a whole separate thing. So for now, YouTube and Facebook. And you can find all of those just by going to Craig Peterson comm slash Facebook. And for those of you who are watching this, you'll see at the bottom, we've got a special offer for this week. Last week, we gave out this quick start guide. And the Quick Start Guide is really designed for people who wanted to get their businesses going. And this is it here I printed it up. I've got it in my hand, you can see it on the cameras if you're watching live or the replays. But we I go through a whole ton of stuff in here never given this away for free. So that was last week, we got a house flying here. And this week, we are doing something a little bit different. We have our password cheat sheet. And we're going to be making some more of these things. Hold fully, you got all the security summer stuff, if you had signed up for the security summer. And you know, I've sent out 28 of these cheat sheets, almost 100 pages of information about what you should be doing as a home user, as a business user, as someone who's retired etc. If you missed any of them, let me know when I'll be glad to get those out to you. And the easiest way to get ahold of me is just email me at Craig Peterson calm. If you're the type of person who really loves to use texting, you just pick up your phone, and you can text me directly at 855-385-5553. So let's get started. Today we've got a number of articles, we're going to talk about this massive spike that is costing businesses here in the US and around the world, over $12 billion dollars in the last couple of years. It is really, really, really huge. And what I'm going to do, as we through this, if you're watching live or watching in the replay, I'm going to put up the article up on the screen that I'm talking about. So you can kind of see it, and you can follow along a little bit at home. But business email compromise. This is something where the bad guys are going and sending typically phishing emails. And nowadays, it's not just regular phishing, we're talking about spear phishing emails. And spear phishing emails are when someone does a little bit of research on you. So they find the name of your company, they find out what kind of business you're in, they go to your web play website, and they find out who the CFO is who the CEO is who the bookkeeper is, right? So many of us put all of that stuff up on the website. And now they have enough information to do a very targeted marketing campaign. Right? It you want to talk two people as individuals. And what better way to do that than to switch from Hey, jury in print, I need to get out of jail. So I'll send you some money. And you just send some of it back to the point of today where it is a lot more complicated because they know about you. Now I gotta talk about a friend of a friend here. Her name is Laura. I'm sure she's still around. She might even be listening. Hi, Laura, wave to her there on the camera. But here's what's happened with Laura. She had a great little business doing photography, and she got an invite to do some photography for somebody out west. And that was she lived in the East Coast at the time. No, actually, she lived in the mountains, the Midwest, Colorado, I think maybe. And they the person wanted her to do a photoshoot for her on this beach in California. So this person says, Okay, so here's what I'm going to do, how much you're going to charge and you set it all up, basically. And she says, Well, I'm going to charge whatever was three grand, I can't remember the number. And so the other guy on the phone said, Man, I already got a check written out here. For five grand Would it be okay? If you just refunded me the difference? Do you see where we're going? Yeah, the difference is the Prophet the bad guy was going to make because that check that they were going to send Laura wasn't any good. And it takes a week or two for checks to clear when you're talking about international tech checks. It takes even longer. So they'll often ask you, as they did with Laura, what can just wire me the difference. Now they're playing these games with cars as well, I was looking for cards. In fact, I was looking for another Ford truck. And we found a great deal on a Ford truck. So we thought, Oh, hey, this is going to be good. We're going to make you know this deal. And, man, this is such a cheap price. What I did and what I would advise you to do if you're kind of stuck in this same thing is I took the pictures from the ad, I think it was on eBay, if I remember right. So the pictures from the ad on eBay. And I took them to Google. Now Google has an image search feature, you've probably used it before to look for images of celebrities or other people. But you can also upload a photo. And you can ask Google, where else does this photo appear? Now one of my son's was doing some volunteer work for this dating site. And what he was doing is taking pictures that people were posting for their profiles. He was running them through the Google image search search and seeing if it was really them. And much of the time, it wasn't it was some celebrity or some other person who knows what these people looked like. In many cases, these accounts were fake accounts that they were using for these types of scams. Now, when this scams are for end users like you and me, and that's one thing and and I was smart enough to double check, you know, thank God I knew, right? Who knows this stuff. And I did a search, I found that they had taken some pictures from a car dealers website, who actually had this truck, they were the ones with the truck, and the truck that the car dealer website had there was the same use truck. But it was $10,000 more than the scammer wanted. So what happens a lot with these truck and car scams is they have this scam going right. And they get people to bite, they get them to pay them the money. And they've set up these fake accounts on YouTube or elsewhere. So they wire the money. And while they don't wire they send them a check, right? Or the car shows up and they have to pay, but there's always a
refund involved. And the refund is you refunding the money.
So they may sell say while the shipping cost is only going to be $500 I thought it was 1500 dollars. So I overpaid you because you'll get a check and it's for too much. And you'll you might contact them and say well, what's going on here, this is more than I thought you were supposed to pay me. So some people will do that. Some people who are a little dishonest won't. But at any rate, the scammers going to ask for that money back and then people send them the money. And so now the scammer just made 1500 bucks. Now in this case, what we're starting to see is a major problem. This is a report out for mine cast. And it's talking about how the business email compromise scam has ramped up 200 hundred and 69% from last quarter to this quarter. And this is an article we're talking right now on June or July, October right mid October. So a massive spike in emails that had dangerous business email compromise stuff in it. So what they're doing is they're finding out about you, they're getting your email address. And then they're sending you dangerous file types. It might be PDF, it might be a.xz, it might be a.ba T might be a.com. And they are sending them to people's inbox. Very, very dangerous malware attachments are in these things spam and target inbox is. This quarterly report by line cast reviewed more than 216 million emails from a half a million users. So think about how many spam emails these guys are getting. So all the emails that were scanned by these different emails security systems, and successfully delivered 28 million or spam, and 28,000 contain malware attachments. And 28,000 had can dangerous file types. So 60,000 was the bottom line of the messages contained business email compromise stuff, impersonation, fraud, scammed, a lot of different words for them. So be very careful, one of the biggest ones and we picked up a new client over this one. This is called a vendor email compromise. This is kind of a new technique that's been discovered. And it involves the intruder sitting on a target network and observing communications. They get a hold of the emails that might be coming out from the billing department might be from a manager and they now know who they're sending emails to what the what they're talking about how much is normally built. Very interesting article, it's up on dark reading. There are some links to the original, you know, articles that were talking about this, and you'll see all of this up. But Craig Peterson calm Of course. And you also should have gotten this in your weekly email. Now if you didn't get that. Go ahead and right now to Craig peterson.com. Right on the homepage, there's a sign up. And when you sign up today, you will get my password special report. This is a 10 page special report going through the pros and cons of different password managers. The cost, what you might want to look at why you would use them what kind of passwords all of that stuff. So just go right now. To Craig Peterson calm. Of course you're listening to Craig Peterson you're watching me live Facebook, YouTube, and on the radio WGAN so stick around We'll be right back and talking about line to your bank.

Transcribed by https://otter.ai

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553