AS HEARD ON - The Jim Polito Show - WTAG 580 AM: The problems with the Iowa Caucuses
Craig Peterson - America's Leading Technology News Commentator
Release Date: 02/05/2020
Craig Peterson - America's Leading Technology News Commentator
First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...
info_outlineCraig Peterson - America's Leading Technology News Commentator
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security. They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...
info_outlineCraig Peterson - America's Leading Technology News Commentator
ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Craig Peterson Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...
info_outlineWelcome!
Good morning, everybody. I was on with Mr. Jim Polito this morning and we discussed the debacle that was the Iowa Caucuses and what it means to you as the election season moves forward. In short, test, test, test. So, here we go with Mr. Polito.
For more tech tips, news, and updates visit - CraigPeterson.com
---
Automated Machine Generated Transcript:
Craig
Tied into Hillary's campaign staffers that were paid 10s of thousands of dollars by the Iowa Democratic Party. $60,000 was paid to them by the Nevada Democratic Party, who was caucusing in a couple of weeks as well.
Craig
Morning everybody, Craig Peterson here on with Mr. Jim Polito this morning heard throughout New England, every state New England can listen to and does listen to his show. Amazing guy. I love this guy. We spent time discussing the Iowa caucuses and the software they were using as well as the people behind that software. I will give you some advice about what can you do? It turns out that there are some significant allegations about some Anti-Virus software that was spying on you. So here we go.
Jim
Well, here we have Craig Peterson on the roster. It's just incredible because we've got a complete meltdown of the Democrat Party in Iowa. Now I'm not a conspiracy theorist. I don't believe it's, well, like Hillary behind the scenes trying to destroy Bernie Sander's chances again, like she did last time. I just think it's general and competence. Let's get in the most competent person when it comes to the internet. This on safer internet day in the US. It's just baffling to me. And so today, the rumors are flying. You know, they're taking pictures of the forms, and they had filled out these caucus chairs of them. They're scorers, and they're texting them, and they had phone line shut up in case there was a problem and the phone line, they had three different numbers people could call, they can't get through the phone lines aren't working, right. It's just a total disaster just like Obamacare was it would But doesn't that invite you to know, now I'm going to ask you to step out of your tech talk Guru shoes and stepping into the ones of you know, being a commentator. Doesn't that invite people saying, Is this a conspiracy? I mean, like we were joking about Hillary and there are connections to Hillary, basically anything in democratic politics is somehow connected to her. But isn't this just inviting the crazy claims of you know, Bernie's people who I've already seen on social media, you know, saying this is another attempt to get Bernie knocked out?
Craig
Yeah, well, I have. I've had a slogan for four decades now. And that is to "Never attribute to malice that which can easily be attributed to incompetence." So if you see incompetence, just say, okay, you know, this is incompetence. Negligent incompetence, but you know incompetence.
Jim
Yeah, yeah, exactly. I'm not saying that this point anything that says this is a Hillary thing or even that indicates it is.
Craig
Still, the rumors are flying because, again, we have this company tied into Hillary's campaign staffers that were paid 10s of thousands of dollars by the Iowa Democratic Party. By the way, the Nevada Democratic Party also paid $60,000 was paid to them, and they are caucusing in a couple of weeks as well. So it's just total incompetence, frankly,
Jim
We're talking with Tech Talk guru, Craig Peters, on gave us a great explanation. To the mess in Iowa. Now Craig, Let's move on to sup today's safer internet day in the US, and I know that's something you support because your feelings are, hey, passwords, security, things like that. You should always, always be mindful of it not just today, every day, but I want to ask you about something else. The secretive market, the little secret market that is selling my web browsing history. Somebody's making an awful lot of money off of what I searched for our day.
Craig
Yeah, this is I think kind of interesting because it goes back to you know, you know, I'm always talking about, you know, how to set your passwords what to do, etc. This ties into something else that I've been saying forever. And that is nothing free on the internet. Yes. Nothing right, and so what's come out right now? Is this anti-virus giant called Avast who makes anti-virus software now I'm inserting something here I am pausing discussion business second? And the virus software is zero percent effective against two days attacks on the internet. Wow, zero percent. Okay. So well, let's just say that okay, but antibonding this giant Avast has had a product. They've since canceled it since news Lee doubt was, again, one of these free anti-virus pieces of software out there. And they've got four has 435 million active users and JumpShot, which is this product she has it has data from 100 million places. Allegedly there is what's been going on, reported by motherboard and PC mag. But your Google searches, look upon locations, GPS coordinates, Google Maps, LinkedIn pages, different companies, where did you go? Which specific YouTube videos? Have you watched people visiting porn websites, all of that was tracked by them? That data was uploaded from your computer and sold to advertisers and anybody willing to pay ultimately, collectively, millions of dollars. And it was called an all click feed to track everything users were doing from this free software.
Jim
Wow. So they then take that information, probably explains why, you know, I get all of these ads for things I've either looked at or had somewhat of an interest in in the past week. I mean, you know, it's crazy. The kind of stuff that comes my way in terms of ads. It's like they know me ultimately.
Craig
Yeah, it's shocking. And I can tell you how many times I think one of the most common questions is how many times I've had people ask Craig, and he's my phone listening to me. Yeah, and believe me, Facebook, etc., etc. But we're using some computer technology. Now the Colin and artificial intelligence, that term has morphed, I would not call it that. I'd call it machine learning, but they're calling it AI. And now we know they have been harvesting all of this. Those people that have the free or even the cheap VPN services that have a free or cheap anti-virus service. All of that data is getting collected, being put together be mixed in a pot with this machine learning software that says Well, people that watch this video, go to the websites that are looking for a job, etc., etc. are likely to be looking for this pair of shoes. And now you get an act an ad for a couple of shoes, and you wonder why you got it because you weren't looking for shoes. But you know what, those are pretty cool shoes. Yeah, that is it.
Jim
Craig, quickly, we have just about a minute left. What can people do to protect themselves from this?
Craig
Man, I am worried that people have just kind of given up because we hear every day about this sort of thing happening. But the bottom line is Be very careful when you're online free is not free. You're the product. Use a web browser like Firefox that's quite well secure. Chrome and never use Chrome again, unless you are forced to -- do not use Microsoft Edge browser. Stick with Firefox and Safari. Right now. Those are the two big ones Safari is an apple Yeah, and those are the two big ones that we know are not tracking you.
Jim
We are talking to Craig Peterson. You hear that information, folks, what a great day to have him here. But you can have him with you all the time. If you text My name, Jim, to this number 855-385-5553. That's 855-385-5553 standard data, and text rates apply. That will get you information from Craig Peterson and Craig Peterson. Will not bother you will not hack; you will not try to sell you anything. Craig, fantastic segment.
I look forward to talking with you next week.
Craig
Take care, Jim,
Jim
Take care. All right, a crucial final word. When we return. You're listening to the Jim Pulido show your safe space.
Transcribed by https://otter.ai
---
More stories and tech updates at:
Don't miss an episode from Craig. Subscribe and give us a rating:
Follow me on Twitter for the latest in tech at:
For questions, call or text:
855-385-5553