loader from loading.io

AS HEARD ON NH Today with Jack Heath WGIR-AM 610: Iran, Amazon Delivery, Vulnerable Cable Modems and Urgent Firefox Patch and More

Craig Peterson - America's Leading Technology News Commentator

Release Date: 01/14/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome,

Good Monday morning, everybody. Craig Peterson here. I was on with Jack Heath this morning. We discussed Iran, The Broadcom chipset in cable modems that makes them vulnerable to attack, How Amazon is changing it's delivery model and most importantly if you use Firefox, the Patch that is available. Here we go with Jack.

These and more tech tips, news, and updates visit - CraigPeterson.com

--- 

Automated Machine Transcript:

Craig
Good morning, everybody. It's another week we got a lot of fun stuff we're going to be doing this week. Thanks for joining me this morning. Or we talked about the latest in security. Jack talked, a fair amount, about what's happening in Iran right now with some of the demonstrations anti-government demonstrations going on. And so we took a slightly different angle, but what is Iran doing? And what can you do about it? That was this morning with Mr. Heath.

Jack Heath
Our Tech Talk Guru, Craig Peterson, joins us live now. I had a chuckle over the weekend on Sundays. In the past, I saw a lot of US mail trucks delivering Amazon packages, but this past week, and I saw a lot of Amazon prime vans. Is Amazon going to try to take over their delivery?

Craig Peterson
Well, those vans are not Amazon-owned. We have all kinds of individual contractors now who have bought routes and that have their own equipment. I have a friend of mine who has done precisely that. He's bought a bunch of these sprinter vans. They're all branded Amazon now, and he's hiring guys to go out and make the deliveries. Amazon is getting to the point where they're using only contractors and are saving a lot of money in doing this. They've entirely severed ties with FedEx, which upset a few people. It did not hurt FedEx's bottom line. But this is a considerable change, Jack.

Jack Heath
Interesting. What else is catching your eye on the high tech side of things?

Craig Peterson
Some big news this morning, first of all, we know that Iran is attacking us and that Firefox is vulnerable. A very, very big deal right now, so make sure you patch Firefox if you use it as your browser. It's an excellent browser to use. I certainly recommend it over Internet Explorer, but with Firefox, it will self-update. Make sure it's updated, and the second Big thing is over 2 billion. Cable modems are known now to be vulnerable to a dangerous new attack. So I guess the bottom line this week, Jack is to make sure everything's patched up to date because Iran is after us. They've increased their attacks by more than 50% in one week. So this is a bad time to have unpatched computers because they're trying to destroy our machines. They are wiping them when they can get their hands on them.

Jack Heath
Listen, not to advise Iran, but if they were going to do something like that, can they start with the companies that hold my wife student loan debt, because that would be nice to have it all wiped out.

Craig Peterson
That would be a great idea. They are going after banking, businesses, and government, but they are trying to hurt the job makers in the United States. They are trying to nail small companies. So if your wife's loan is in a small business, maybe they'll get nailed, and they'll lose all the information. Who knows?

Jack Heath
All right, Craig. His Tech Talk show airs Saturday morning, or Saturday, midday, and I heard you are on some new stations, Craig making the good money. Thank you.

Craig Peterson
Take care. Bye. If any of you guys out there are having a little advice for me on this, I'd love to know. I was on the Oversight Board. I was the chairman of the board for a State Agency, and we're supposed to be providing oversight for it. I ended up not accepting the nomination for another term, I guess that is the right word, for my position on this oversight board because we could not investigate things. I'm the freakin Oversight Board Chairman. Why can't I look at records or look at individual cases that the State was investigating? The State got to pick the situations I would look at, which was infuriating to me because it's a federally mandated oversight board. And I just don't get it anyhow. Right now, it seems that there is some lawsuit activity going on concerning this board. I am not sure that what I have to say would be valuable or not. What do you guys think? Should I contact the lawyers involved? Contact my lawyer? I don't know if any of you guys have any opinions on this. What is the right way to go? I think there are some substantial abuses, and they indeed are alleged in this lawsuit. I did not see these abuses because they would not let me investigate. I don't know if it would muddy the waters or muddy my name. I have no idea. I don't know that I'd be of much use. But it upset me at the time, even though it was several years ago. But anyway, so like, I'd love to know. Hey, if you have any questions, comments, concerns, if there's some training, you'd like to make sure you email me at Craig Peterson calm. Sorry to put you guys into this. Maybe I shouldn't have, I don't know. We'll be back tomorrow more than likely with Mr. Pulido. Take care of your body and keep an eye out because I have some I think cool pieces of training coming up here. Some pop-up training and Morgan do some webinars in the next couple of weeks. Take care. Bye-bye.

Transcribed by https://otter.ai

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Message Input:

Message #techtalk

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553