loader from loading.io

Smart Speakers and Eavesdropping and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show [10-26-19]

Craig Peterson - America's Leading Security Coach

Release Date: 10/25/2019

AS HEARD ON - The Jim Polito Show - WTAG 580 AM:Warnings From The NSA and Stats About C-Level Non Compliance show art AS HEARD ON - The Jim Polito Show - WTAG 580 AM:Warnings From The NSA and Stats About C-Level Non Compliance

Craig Peterson - America's Leading Security Coach

Welcome! Good morning, everybody. I was on with Jim Polito and we covered Warnings from the NSA, Stats on C-Level Non-Compliance, and how companies are handling patching and updating and the problems that it is causing. For more tech tips, news, and updates visit - ---  Automated Machine Generated Transcript: Craig Peterson: Al Qaeda has used business servers here in the U.S. Just regular businesses that are online and are trying to, have a nice little website and get their message out to people. Al Qaeda has taken some of those over and is used to spread just horrific propaganda....

info_outline
AS HEARD ON NH Today with Jack Heath WGIR-AM 610: Security in a Post COVID World show art AS HEARD ON NH Today with Jack Heath WGIR-AM 610: Security in a Post COVID World

Craig Peterson - America's Leading Security Coach

Welcome, Good Monday morning, everybody. Craig Peterson here. I was on with Jack Heath this morning discussing the security implications that businesses are facing in the post-COVID environment. Here we go with Jack. These and more tech tips, news, and updates visit -  ---  Automated Machine Generated Transcript: Craig Peterson: We are way more likely to tell our IT team that we do not want to abide by not that COVID restrictions here, but the security restrictions, particularly when it comes to mobile devices as we're moving around. [00:00:18] Hi everybody. Craig Peterson here. And...

info_outline
Welcome! Anti-Virus, New Threats and Risks, Appropriate Protection, and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Anti-Virus, New Threats and Risks, Appropriate Protection, and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s got a deep-dive into Anti-Virus software. Which should you use? What is anti-Virus’s pioneer saying? What’s the future? Some of the first big worms that crawled through the internet. And hit him! What it takes to be appropriately protected Changes in the malware ecosystem. What to do to supplement the now-almost-useless anti-Virus software. Also: Going back into the office after working at home. How can we handle new risks? Interested in Cybersecurity? Craig’s got a new Facebook Group called Navigating Cybersecurity. Are you on Facebook? He’s planning on...

info_outline
Welcome! Exploits, Updates, Patches,  Uninstalling apps and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Exploits, Updates, Patches, Uninstalling apps and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome!   Today Craig’s talking about Antivirus and what is going on with it? Why are we constantly being told to buy antivirus and to use antivirus? The latest ways that the bad guys try and get into our systems Typical antivirus software only looks at yesterday's threats Why it can take like a month or six weeks for the antivirus software to be able to adjust itself for these new attacks Antivirus software that has signatures and engines that are designed to look for what it's already seen. Also: Half of the businesses that were polled had had successful malware attacks on them,...

info_outline
Welcome! Computer Viruses, Mutating Malware, Vaccine Signature Lists and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Computer Viruses, Mutating Malware, Vaccine Signature Lists and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s talking about Computer Virus and Vaccine Signature Lists and why these types of anti-virus are getting left behind in the dust, and what should you be using in this day and age? Mutating malware means big trouble for antivirus software. Why you must use next-generation anti-malware software. He will discuss behavior-based anti-malware solutions Why anti-malware solutions need to act like ransomware For more tech tips, news, and updates visit - CraigPeterson.com --- More stories and tech updates at: Don't miss an episode from Craig. Subscribe and give us a rating: ...

info_outline
Welcome!  Behavioral anti-virus, file list malware, zero-day, layered security, anti-virus, advanced malware protection, powershell, and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Behavioral anti-virus, file list malware, zero-day, layered security, anti-virus, advanced malware protection, powershell, and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s talking about malware specifically. He will help you understand what is going on with antivirus software? Is it something you should be using? How did it get left behind in the dust, and what should you be using in this day and age? Where the Internet started. What is next-generation malware? Why are half of all Malware utilizing File Lists? The security problems with Microsoft PowerShell Also: Behavioral malware Why traditional anti-malware software can’t stop file list malware The danger of Zero-day vulnerabilities Anti-virus is 0% effective against modern...

info_outline
Welcome! Layered Security, Basic Online Security Rules, Updates, Patching, and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Layered Security, Basic Online Security Rules, Updates, Patching, and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s got a deep-dive into whole malware virus thing. What does it mean? What is it doing? How Layered Security is like Submarine Compartments What are the layers that you should have on your computer, on your network? What security you should be using in your business? Three basic rules of online security How Apps can be a security issue How out of date computers using old pieces of antivirus software are still catching all of this old nastiness Why no single technique that's ever been entirely successful. What is Wetware? And why it is the biggest problem. What is...

info_outline
Welcome! Advanced Malware Protection, Spear Phishing, False Positives, Overloading and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Advanced Malware Protection, Spear Phishing, False Positives, Overloading and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s got a deep-dive into ways to improve your cybersecurity How to prevent malware from “Calling Home” Use of specialized DNS services to prevent any accidental clicks How Advanced Malware Protection Software provides greater information on cyberattacks in six hours What does traditional antivirus protect us against and what about this next generation stuff, this anti-malware? Also: Spear phishing type attacks Why hackers can remain inside the system and inside its network for at least three months before being noticed but bad guys usually start getting working in...

info_outline
Welcome! Malware, Anti-Virus, Anti-Malware, Right Defenses for Protection and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Malware, Anti-Virus, Anti-Malware, Right Defenses for Protection and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Today Craig’s got a deep dive into the whole world of malware, antivirus, anti-malware, what you can do about it. Having the right defenses including different types of security for protecting different things. It is important to have a properly configured, multilayered defense approach. Artificial intelligence systems for cyber defense don't live up to the hype surrounding them. Why using layered approaches is important and they should be from a single integrated, unified vendor. The importance of training your employees especially if you are a regulated industry Also: What...

info_outline
Welcome! Anti-Virus, Layered Security, Phishing and more on Tech Talk with Craig Peterson on WGAN show art Welcome! Anti-Virus, Layered Security, Phishing and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome!   Today Craig’s got a deep-dive into Anti-Virus software. Which should you use? What is anti-Virus’s pioneer saying? What’s the future? What businesses need to do to clean up their security, get back on track. Email Delivery and Spam and what the major email providers watch for The cybersecurity impacts of COVID-19 on Business The five tips for fighting credential stuffing attacks Data web scrapers and how they're hurting online businesses. Also: Data web scrapers and how they're hurting online businesses Facebook’s contract moderators win 52 Million dollar lawsuit...

info_outline
 
More Episodes

Welcome!  

Today, we are going to discuss Smart Speakers and how hackers are able to eavesdrop into your home using them to phish for information.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Related Articles:

Is someone eavesdropping on your Smart Speaker?

---

Automated Machine-Generated Transcript:

Craig Peterson
Hey, welcome back, Craig Peterson here on WGAN. And online at Craig Peterson calm. Now, you might be wondering about these pale blue batteries. If you do a search for them, you'll find them on Kickstarter. They may be out in the market now but they're about $30 for a box of four of them. And they are going I think they're going to just go like crazy. It's out of Hong Kong near as I can tell. Some really good, very cool stuff. You might look them up lithium polymer type batteries. Okay, moving on here. Let's talk about Google Home. This is absolutely fascinating. And I'm glad that digital trends.com put an article up on this which I have at my website, of course at Craig Peterson dot com but we've all been concerned about Amazon Lexile listening to us and maybe Google Home listening to us. And, you know, there's pros and cons to all of this. I'll be obviously you want an assistant and that's why the assistant is in your house in the first place, right? Oh look, one of these little batteries just turned green. That means it's fully charged up to three of them fully charged, they have only been charging for a short while so that's kind of cool. Anyhow, for those people who are watching right now, but these pale blue batteries as in the Blue Earth, right. So we have them because we want them and we want them to be helping us out a little bit. So what Amazon does is on the Alexa as they have a light, they might have a light ring as they have on the echo. And Amazon's been very, very good about making sure that it can't record for more than 30 seconds. And also that it does the processing of your voice for the initial wake up command on the device. And that light has to be on physically on the echo in order for that microphone to be working in recording right in basic recording mode. So it's listening all the time. But it's not recording. It's not sending anything up to the internet. That's obviously a good thing, right? So what happens here now with Google Home is they don't have the same restrictions in place the same safety features that Amazon has. And what they're talking about here is a company called SR Labs. And I'm familiar with them. We've quoted them on the show here before. And SR Labs did some tests and they did some tests looking for what they expected to be vulnerabilities. What are the vulnerabilities of these devices as Google closes The holes, you know, where does this all set? Now they were able to collect personal data, including user passwords and eavesdrop on users. Now, I don't want to just poke here at Google Home. Because this could be similar things could happen on your Alexa or your other smart device that's out there. So for instance, all of these devices have basically apps that you can download and use. And they're called different things on the different platforms. But for instance, on my Alexa, I have it so I can say red alert and it'll play like from the original Star Trek, you know, the light so flash will go red, it's really kind of cool. And you can develop those many people have many businesses have and they made it available for you. And now, you know, that's kind of cool.

But the problem with these is that sometimes the developers have snuck bad stuff into them. And specifically, one of the things they've snuck into some of the Alexa apps, if you will, is that they are asking for more information than they need. So they, they'll ask for the password. So you can say, Okay, well in order to not change your password, and people are giving the password and now remember, here's the biggest problem with people giving the password if it was one password, and it was only ever used for that one app. Great, right? Who cares? So the app already has my password, who cares if they get my password because they already have my password. But the problem is, so many people use the same password over and over again. So that's Problem number one, these apps get your password because you just gave it to them. And Problem number two is they're asking you for a password. And if they say oh, you know that's incorrect, please try again. You're going to give basically, let's see, I have three passwords. So I'm going to give them all three passwords and they now have it. So that is a problem. But these trigger words that you used to feel like so which can be Alexa can be a computer, there's a third one that eludes me right now. And it will respond. But those are trigger words. But with the Google Home, that's not the case. As long as the device hears someone talking, it can and will keep voice recording going possibly infinite infinitely. So if if you have it in your kitchen, and there's a conversation going on the radios playing in the background, which I'm sure a lot of you guys have going on right all of the time. And you have the Google Home in there, and there is an app running. It's going to be streaming the data up to the app. This is a real real problem. And according to what SRL lab Found in digital trends.com is reporting the safety checks that are run by Amazon and Google are part of the problem that allows these types of vulnerabilities to exist. And in fact they're saying SR Labs also found that even if Google or Amazon reviews a third-party app and or skill which is what they're called over on the Alexa for safety in the past is the app can be changed after the say to review and can be used at that point to fish you or to eavesdrop on users kind of think about the Boeing the max eight jet right? That whole jet has not been type-accepted certified as an entire unit since that what the 60s 70s and they just made incremental changes slowly incremental changes. Yeah, yeah. incremental change, the world changes. And then you end up with the problem they have now which is the max eight jet. has an issue because they made yet another incremental change. And it wasn't tested overall, as well as maybe it should be. So it's the same type of thing here looks like, which is Google and Amazon, they review it. And then the app developer, the developer comes out with a slightly different version. It's just a bug fix or whatever. Google and Amazon cannot spend the time to constantly review and, and fix these things. So then you end up with some serious problems. Okay. So here you go. The best strategy to avoid the hackers eavesdropping on your data. Number one, don't have these devices, period, right. If your device asks you for a password, don't answer. Now we're saying app and skill. These are things that run essentially on The Alexa or on the Google Home device. And with the Alexa and this is true for home as well. You can control and configure the devices and log into them using the app. So Google has its own little app for the Google Home stuff that I've used that before. And Amazon has its own little Alexa app to control the Alexa that's where you should be putting your information in. And you should not be giving it to the device itself when it asks most Yeah, exactly the same most require you to go to the app link your accounts.

There you go. And there's a smart speaker the Google Home the Alexa, they're not going to ask you for a password so they can do updates, okay. And then don't say sensitive information out loud. There are people in government who are saying that since these devices are always listening, they should listen for potential arguments. Be That might be happening in the home. That's a different thing. Now we're going down a whole other path, very political, something, obviously, I'm not very fond of that path because it just leads to, you know, crazy government control so many times. So just be careful what you say around them. And in many cases, it's easier just to unplug it when you're not using it. But it'll get safer as time goes on. All right, when we get back, we're going to talk about these futuristic cars. You're already talking about these pale blue, futuristic batteries. Well, what are the problems that we're seeing already? With these electric cars, including the Tesla just this week? A 48-year-old anesthesiologist died? will tell you why and how and what some of the dangers are you listening to Craig Peterson, of course right here on WGAN and online at Craig Peterson, calm. That's Peters on SOM stick around. We'll be right back.

Transcribed by https://otter.ai

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553