loader from loading.io

Welcome! Looters, Thieves, Rioters, Protesters, Big Tech, Geo-Code, Device Finder and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 06/13/2020

Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
The Mobile Malware Menace: Protecting Against Evolving Threats show art The Mobile Malware Menace: Protecting Against Evolving Threats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In today's fast-paced digital age, staying ahead of the curve is not just an advantage; it's a necessity. From the electrifying world of electric vehicles to the intricate web of mobile security, and the visionary influence of Elon Musk, there's a lot to unpack. Join us on this insightful journey as we explore key topics that are shaping the future of technology. 1. Electric Vehicles (EVs): Paving the Way for a Green Future The surge in popularity of electric vehicles is undeniable. We delve into the latest advancements, innovations, and the environmental impact of EVs, providing you with a...

info_outline
Scan Smart, Stay Safe: Mastering the Art of QR Code Defense show art Scan Smart, Stay Safe: Mastering the Art of QR Code Defense

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In a world dominated by QR codes, the risk of falling prey to digital tricksters is on the rise. Fear not, fellow entrepreneurs, for we've decoded the secrets to outsmarting these cyber hosers and keeping your digital fortress secure! QR Code Unveiled: Understanding the Basics Let's kick things off with a deep dive into the world of QR codes. Learn what makes them tick and how scammers exploit these seemingly innocent codes to compromise your cybersecurity. The Rise of AI and Its Role in QR Code Shenanigans Artificial Intelligence (AI) has ushered in a new era, and unfortunately,...

info_outline
 
More Episodes

Welcome!

Let's get into these rioters and protesters -- actually -- they are thieves and how Apple and Big Tech is figuring out just who they are.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

iPhone looters find devices disabled, with a warning they’re being tracked

---

Automated Machine Generated Transcript:

We've seen the pictures of looters on TV, heard about them here on the radio. How can you know, if what you're buying online is a stolen good or not? We're going to talk about that. And the iPhone debacle,

[00:00:19] you are listening to Craig Peter Sohn. We're here every week. You'll find me [email protected]. And if you do sign up for my emails, You'll get some amazing content. We're, I'm going through handpicked articles that I share with you. These are curated out of hundreds of thousands of articles that are published every week.

[00:00:42] I boil it down to six or eight key articles, and I'm also now including links to special. Report and I mean, special reports where I take some of the deep dives that I just can't get to in a normal newsletter. So make sure you do sign up Craig peterson.com/subscribe. That way. You can also find out about what I am doing when it comes to these free pieces of training that I conduct these webinars, as well as some of the courses that I offer.

[00:01:15] So. Greg peterson.com/subscribe. Hey, let's get into what's happening right now with these looters. My gosh, how can you protect yourself? I've seen so many businesses that have been ransacked now, right? Pictures of them from all across the country and from around the world. Now, it's really interesting to see them talking about black lives matter and how the police are going after people and killing them in countries like.

[00:01:47] Great Britain where they are not even armed for the most part. Right. And there has not been the number of problems who've seen here in the United States. Now, of course, their population is a whole lot smaller than our population is as well. But when you boil down into the numbers, I think you'll see a bit of a different story.

[00:02:07] But part of the story that I want to talk about is the technology side, many of the. Apple stores were ransacked and the bad guys, the looters. I stole iPads and iPhones, and basically anything that they could get that wasn't nailed down. And even then they managed to get some of this stuff nailed down from some of these other high-end stores.

[00:02:32] So in response, some of these stores such as Apple target, as well as the real big guys, like the Gucci's and Rolexes of the world. They shut their stores down, thus hurting the neighborhoods that the stores are located in the people working there. Obviously they don't have a job if that store's been burned to the ground has happened too many times.

[00:02:56] And they also. Don't have a place to shop. You know, there's been talk over the last governor, what 20 years about having these food deserts, where there was no place to get fresh food. And I'm really worried that ultimately. These places where we had the riot are going to end up being just like these food deserts that we're trying to get rid of.

[00:03:23] Why would I spend money to reopen my store when my insurance won't even pay for it? And I'm afraid of looters coming in in the future? Well, Apple had a solution for this and still has a solution for it. All of the devices that are in the Apple stores run as a special version of their operating system and that operating system makes it so that the device will not work.

[00:03:51] If removed from the Apple store. So some of these brain trust people that have been looting, these stores took pictures of the screens of those eye iPhones. They stole complaining, Oh my gosh, here. Look at this, and there's a message on there. Now, the one that we've been seeing the most that was posted on Twitter said, please return to Apple Walnut street.

[00:04:19] This device has been disabled and is being tracked. Local authorities will be alerted. Now I mentioned this week, while I was on the radio. On a number of different stations during drive time. And I want to go further than that right now, since we have a few more minutes than, than just the five to 10 minutes I get during drive time, you know, we don't know how many I-phones have been taken from the Apple stores and put into circulation.

[00:04:46] We do know that Apple iPhones if they are stolen, and if they have "Find My iPhone" turned on. Are very difficult for thieves to really make bank on those phones. However, can be taken apart and use for parts and used by these little guys and bigger ones too, that repair the devices. So they will pay.

[00:05:12] Someone for a broken or even a pretty well-working iPhone or iPad. And we'll, we will remove the buttons. If there are buttons on, it depends on how old it is. All of the sensors, the screens, everything, and then use them for repairs. So even though the phones were stolen and Apple has made sure that the phone will not work outside the store, That phone is still worth something.

[00:05:41] So I want you to keep that in mind too if you have an Android or an iPhone and it is set to South flock and with the iPhone, you cannot erase it either and it's to reset it and then reuse it. Remember that they still are worth something. So don't be cavalier with that iPhone. When you take it out of the store, they also have this it's, it's kind of a kill switch, frankly, here.

[00:06:08] Now they are also reporting some of these stolen phone locations. To law enforcement, which I think is pretty darn cool because then they can catch the bad guys. And we've seen cases in the past where someone's phone was stolen. They used "Find my iPhone" to locate that phone. And then they went to the police and said, Hey, my phone was stolen.

[00:06:34] And here's the location it's at. And then the police using probable cause went to that residence. And in many cases did find the device and arrested the people for possession of stolen merchandise. So I would expect some of that to happen here. Although I think Apple's trying to stay out of this as much as they can.

[00:06:57] Because they consider this to be a political issue. Now, how can you tell if something that you want to buy has been stolen while there are some pretty basic things that you can look for to try and determine if your item has been stolen? The first off is that the price of the item is just totally unreasonable.

[00:07:22] No, I don't mean it's expensive. I mean, wow. That's cheap a couple of years ago I needed to replace my pickup truck. And so I went online and we did a lot of research. You can, you can probably guess what I'm like when it comes to this. Right. So pretty thorough research. We found the exact truck that we wanted and it was a.

[00:07:46] About a 10-year-old. I think it was an F two 50 diesel with this diesel engine that just lasts forever. It's just absolutely amazing. And we found online one of those Ford trucks that were available. And the price was wonderful. We're trying to figure out why. And so we contacted the seller who said, well, Jess got mobilized, have to go over to Afghanistan and need to get rid of the truck because they were making payments on it before they left.

[00:08:18] And I figured, okay, well, that's a reasonable enough explanation. So, what I did is I then took the picture that they had posted online. This was on eBay and I went to Google. Now, if you are not familiar with this, it something you should look at. Google has an image search feature. And that image search feature allows you to upload an image or give Google the URL of an image.

[00:08:50] So I gave it this image that they had posted of that pickup truck. And I asked Google to see if it could find it online. Sure enough, it found it, it did find it in that eBay ad that I mentioned that we had found the truck in, but it also found the same truck on a dealer's lot. And of course, the price was much higher.

[00:09:14] I think that the bad guys are trying to sell it. If I remember right for five or six grand and the dealer was trying to sell it for 20 grand. So it started to smell bad because the price was just too low. When I did some research by going to Google, uploading the image, and having Google tell me if that image was used elsewhere.

[00:09:36] I was able to solve that mystery. The next thing to look for is a warning sign for stolen items is missing or inaccurate product details, misspellings, bad grammar. That's a very, very common thing. The graphics just don't look quite right. Like they were using a real cheap imitation of Photoshop in order to edit some of those pictures together.

[00:10:04] And then. An unknown seller. Now, eBay is great in this respect because you can see how long that seller has been on eBay. You can see how many items they've sold. You can see what their ratings are. You can pull all of this together. So those are our top tips here for looking for stolen items. Some of these are going to be hard to find, for instance, if you've got this wonderful Gucci bag or rather piece of clothing, Just looking for that picture online does not mean it is stolen if they're using a stock picture that might come from the Gucci site or the clothing site.

[00:10:44] Right. So that's not necessarily a dead giveaway, but it does mean you should look a little further because if you're buying used clothing, you expect a photo to have been taken. By that person's smartphone and then uploaded from there. And if you really want to dig into it, that photo probably has the GPS coordinates of where that photo was taken.

[00:11:09] What type of device took that photo and just kind of add those numbers up. But many of these sites, like The Real-Real, If you haven't checked them out, you really should. Yeah, but The Real Real has all kinds of great high-end clothes available for a very cheap price. Some of these clothes have never been worn and they're telling us that they are keeping a very close eye looking out for stolen goods, for signs of stolen goods.

[00:11:41] So sites like that, I think you'll be able to trust more than maybe an eBay. Who does try and police us, but they can't be a hundred percent successful. Amazon's kind of in the same boat have for the items on Amazon are not sold and fulfilled by Amazon. They're sold and fulfilled by. Third parties. So keep your eyes out when you are looking for some of these great deals online, because they might've come from the looters out in LA, Boston, Illinois, who knows where, Hey, when we come back, we're going to talk about some of the security requirements that are in place now.

[00:12:26] We're working from home. We're getting back in the office. If you are a government contractor or subcontractor, the government's really going to come down on you. And we're going to talk about that. What does that all mean? How is that protecting us as citizens and as taxpayers, make sure you get my weekly email, find out what's going on.

[00:12:48] Craig peterson.com/subscribe, stick around because I'll be right back.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553