loader from loading.io

Welcome! Looters, Thieves, Rioters, Protesters, Big Tech, Geo-Code, Device Finder and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 06/13/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

Let's get into these rioters and protesters -- actually -- they are thieves and how Apple and Big Tech is figuring out just who they are.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

iPhone looters find devices disabled, with a warning they’re being tracked

---

Automated Machine Generated Transcript:

We've seen the pictures of looters on TV, heard about them here on the radio. How can you know, if what you're buying online is a stolen good or not? We're going to talk about that. And the iPhone debacle,

[00:00:19] you are listening to Craig Peter Sohn. We're here every week. You'll find me [email protected] And if you do sign up for my emails, You'll get some amazing content. We're, I'm going through handpicked articles that I share with you. These are curated out of hundreds of thousands of articles that are published every week.

[00:00:42] I boil it down to six or eight key articles, and I'm also now including links to special. Report and I mean, special reports where I take some of the deep dives that I just can't get to in a normal newsletter. So make sure you do sign up Craig peterson.com/subscribe. That way. You can also find out about what I am doing when it comes to these free pieces of training that I conduct these webinars, as well as some of the courses that I offer.

[00:01:15] So. Greg peterson.com/subscribe. Hey, let's get into what's happening right now with these looters. My gosh, how can you protect yourself? I've seen so many businesses that have been ransacked now, right? Pictures of them from all across the country and from around the world. Now, it's really interesting to see them talking about black lives matter and how the police are going after people and killing them in countries like.

[00:01:47] Great Britain where they are not even armed for the most part. Right. And there has not been the number of problems who've seen here in the United States. Now, of course, their population is a whole lot smaller than our population is as well. But when you boil down into the numbers, I think you'll see a bit of a different story.

[00:02:07] But part of the story that I want to talk about is the technology side, many of the. Apple stores were ransacked and the bad guys, the looters. I stole iPads and iPhones, and basically anything that they could get that wasn't nailed down. And even then they managed to get some of this stuff nailed down from some of these other high-end stores.

[00:02:32] So in response, some of these stores such as Apple target, as well as the real big guys, like the Gucci's and Rolexes of the world. They shut their stores down, thus hurting the neighborhoods that the stores are located in the people working there. Obviously they don't have a job if that store's been burned to the ground has happened too many times.

[00:02:56] And they also. Don't have a place to shop. You know, there's been talk over the last governor, what 20 years about having these food deserts, where there was no place to get fresh food. And I'm really worried that ultimately. These places where we had the riot are going to end up being just like these food deserts that we're trying to get rid of.

[00:03:23] Why would I spend money to reopen my store when my insurance won't even pay for it? And I'm afraid of looters coming in in the future? Well, Apple had a solution for this and still has a solution for it. All of the devices that are in the Apple stores run as a special version of their operating system and that operating system makes it so that the device will not work.

[00:03:51] If removed from the Apple store. So some of these brain trust people that have been looting, these stores took pictures of the screens of those eye iPhones. They stole complaining, Oh my gosh, here. Look at this, and there's a message on there. Now, the one that we've been seeing the most that was posted on Twitter said, please return to Apple Walnut street.

[00:04:19] This device has been disabled and is being tracked. Local authorities will be alerted. Now I mentioned this week, while I was on the radio. On a number of different stations during drive time. And I want to go further than that right now, since we have a few more minutes than, than just the five to 10 minutes I get during drive time, you know, we don't know how many I-phones have been taken from the Apple stores and put into circulation.

[00:04:46] We do know that Apple iPhones if they are stolen, and if they have "Find My iPhone" turned on. Are very difficult for thieves to really make bank on those phones. However, can be taken apart and use for parts and used by these little guys and bigger ones too, that repair the devices. So they will pay.

[00:05:12] Someone for a broken or even a pretty well-working iPhone or iPad. And we'll, we will remove the buttons. If there are buttons on, it depends on how old it is. All of the sensors, the screens, everything, and then use them for repairs. So even though the phones were stolen and Apple has made sure that the phone will not work outside the store, That phone is still worth something.

[00:05:41] So I want you to keep that in mind too if you have an Android or an iPhone and it is set to South flock and with the iPhone, you cannot erase it either and it's to reset it and then reuse it. Remember that they still are worth something. So don't be cavalier with that iPhone. When you take it out of the store, they also have this it's, it's kind of a kill switch, frankly, here.

[00:06:08] Now they are also reporting some of these stolen phone locations. To law enforcement, which I think is pretty darn cool because then they can catch the bad guys. And we've seen cases in the past where someone's phone was stolen. They used "Find my iPhone" to locate that phone. And then they went to the police and said, Hey, my phone was stolen.

[00:06:34] And here's the location it's at. And then the police using probable cause went to that residence. And in many cases did find the device and arrested the people for possession of stolen merchandise. So I would expect some of that to happen here. Although I think Apple's trying to stay out of this as much as they can.

[00:06:57] Because they consider this to be a political issue. Now, how can you tell if something that you want to buy has been stolen while there are some pretty basic things that you can look for to try and determine if your item has been stolen? The first off is that the price of the item is just totally unreasonable.

[00:07:22] No, I don't mean it's expensive. I mean, wow. That's cheap a couple of years ago I needed to replace my pickup truck. And so I went online and we did a lot of research. You can, you can probably guess what I'm like when it comes to this. Right. So pretty thorough research. We found the exact truck that we wanted and it was a.

[00:07:46] About a 10-year-old. I think it was an F two 50 diesel with this diesel engine that just lasts forever. It's just absolutely amazing. And we found online one of those Ford trucks that were available. And the price was wonderful. We're trying to figure out why. And so we contacted the seller who said, well, Jess got mobilized, have to go over to Afghanistan and need to get rid of the truck because they were making payments on it before they left.

[00:08:18] And I figured, okay, well, that's a reasonable enough explanation. So, what I did is I then took the picture that they had posted online. This was on eBay and I went to Google. Now, if you are not familiar with this, it something you should look at. Google has an image search feature. And that image search feature allows you to upload an image or give Google the URL of an image.

[00:08:50] So I gave it this image that they had posted of that pickup truck. And I asked Google to see if it could find it online. Sure enough, it found it, it did find it in that eBay ad that I mentioned that we had found the truck in, but it also found the same truck on a dealer's lot. And of course, the price was much higher.

[00:09:14] I think that the bad guys are trying to sell it. If I remember right for five or six grand and the dealer was trying to sell it for 20 grand. So it started to smell bad because the price was just too low. When I did some research by going to Google, uploading the image, and having Google tell me if that image was used elsewhere.

[00:09:36] I was able to solve that mystery. The next thing to look for is a warning sign for stolen items is missing or inaccurate product details, misspellings, bad grammar. That's a very, very common thing. The graphics just don't look quite right. Like they were using a real cheap imitation of Photoshop in order to edit some of those pictures together.

[00:10:04] And then. An unknown seller. Now, eBay is great in this respect because you can see how long that seller has been on eBay. You can see how many items they've sold. You can see what their ratings are. You can pull all of this together. So those are our top tips here for looking for stolen items. Some of these are going to be hard to find, for instance, if you've got this wonderful Gucci bag or rather piece of clothing, Just looking for that picture online does not mean it is stolen if they're using a stock picture that might come from the Gucci site or the clothing site.

[00:10:44] Right. So that's not necessarily a dead giveaway, but it does mean you should look a little further because if you're buying used clothing, you expect a photo to have been taken. By that person's smartphone and then uploaded from there. And if you really want to dig into it, that photo probably has the GPS coordinates of where that photo was taken.

[00:11:09] What type of device took that photo and just kind of add those numbers up. But many of these sites, like The Real-Real, If you haven't checked them out, you really should. Yeah, but The Real Real has all kinds of great high-end clothes available for a very cheap price. Some of these clothes have never been worn and they're telling us that they are keeping a very close eye looking out for stolen goods, for signs of stolen goods.

[00:11:41] So sites like that, I think you'll be able to trust more than maybe an eBay. Who does try and police us, but they can't be a hundred percent successful. Amazon's kind of in the same boat have for the items on Amazon are not sold and fulfilled by Amazon. They're sold and fulfilled by. Third parties. So keep your eyes out when you are looking for some of these great deals online, because they might've come from the looters out in LA, Boston, Illinois, who knows where, Hey, when we come back, we're going to talk about some of the security requirements that are in place now.

[00:12:26] We're working from home. We're getting back in the office. If you are a government contractor or subcontractor, the government's really going to come down on you. And we're going to talk about that. What does that all mean? How is that protecting us as citizens and as taxpayers, make sure you get my weekly email, find out what's going on.

[00:12:48] Craig peterson.com/subscribe, stick around because I'll be right back.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553