loader from loading.io

Welcome! Incognito Mode and Why it May Not Protect You, and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 06/13/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

We have all heard of Incognito Mode on our Browsers, but what you may not know is that it may not be protecting you. Listen in and I will explain why.

 

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Google sued for at least $5 billion over-claimed ‘Incognito mode’ grab of ‘potentially embarrassing’ browsing data

---

Automated Machine-Generated Transcript:

Now isn't that interesting incognito mode, right? When you're going into incognito mode, it's when you want your data to be private. So a lot of people go to Incognito mode when they're doing some shopping, maybe they're Googling things and they don't want to see a hundred thousand ads for a hair straightener over the next three weeks when the ads come up.

[00:00:25] So they switch into incognito mode. I, you know, I think that's a reasonable thing to try and I'm going to give you as well as some names of a couple of products you'd probably want to look at and I've done some training on and we should probably release some training on them again. But anyways, free stuff.

[00:00:44] Incognito mode is apparently. Not going to block that information. So of course, the lawsuit talks here about the pervasive data tracking Google does. They know who your friends are, your hobbies, what you like to eat, the movies you watch wearing when you like to shop your favorite vacation destinations, and the suits alleging that whether or not you are using incognito mode, Google?

[00:01:16] Is still collecting it. So we'll see what happens here. Uh, the language is really kind of where it's focused here. The language Google is using to explain incognito mode. It says that incognito mode allows users to quote, browse the web privately, and quote. And Google pointing to advisories to the user that explained private browsing doesn't mean data is not collected.

[00:01:46] So Google is going to defend itself, of course, but you know, incognito mode, these private modes are not private. So don't think that just because you're turning it on that you're not being tracked. All right. Don't think that just you turned it on that your computer doesn't have little turds left, lying around that can be used to figure out what you did and how you did it.

[00:02:11] And unbeknownst to most users, Google is constantly tracking everything you read and request click by click page by page in real-time because a lot of the websites have Google cookies on them that allows Google analytics and Google ad manager now to know where you've gone and what you have done. So don't trust it.

[00:02:34] So I promised I would give you some alternatives. Uh, first let's just mention Safari kugel, also intercepts browsing data when the private modes are used on all other browsers, including Safari. Right? So don't think this is just a Chrome problem. Google is collecting it everywhere and it has to do primarily with the cookies, but also you can now identify.

[00:03:02] A browser, a specific computer without ever reading a cookie by looking at what that configuration is for that computer because that becomes quite a little fingerprint as well. What software do you have installed? How much memory what's the processor, but a version of the operating system, et cetera, et cetera.

[00:03:20] Right? So they can really track you down. So what I do is I recommend a couple of things. First of all, if you really want to browse privately on the web. Use Epic -E P I C. Epic browser.com is where you'll find it. It is based on Google Chrome, but they have removed all of the tracking information from it.

[00:03:44] So that's the first one. The second thing is Epic. It isn't going to work for everybody and it's not going to work for every website. That's for sure. So what you probably want to do is get a couple of privacy plugins that you can use. Privacy. Badger is one that I recommend and I, in my training courses, I show you how to get it and how to install it.

[00:04:09] You block origin is another good one. That you probably should look at it installing. And there are a few others that I recommend as well, depending on what you're trying to do, but that's the only way you are going to get some privacy online. Ultimately, if you want the ultimate in privacy in one, in one way, right?

[00:04:30] In another way, it's a little less than the ultimate, but generally speaking, it's ultimate and privacy. Do this. Get the tour browser T O R. It runs on the onion network. You're going to find it to be a lot slower than all the other browsers out there. And you are getting lumped in with some very bad people that use the Tor browser.

[00:04:53] So, you know, take that into account as well. When you're looking at it, should you use it? Should you not use it? That's going to be up to you, but if you absolutely want to make sure that your data is not being captured by your ISP and that your data is not. Being stored on your computer, a good way to get there.

[00:05:14] At least most of the way there is to use the Tor browser. Now there are other tools you can use. Maybe I'll, I'll put together some courses on that. You have to let me know if you're interested, where there are secure operating systems and other things you can use, to try and keep your information. Sure.

[00:05:30] Because listen secure. If you have your retirement, do you really want to have that all stolen? If your retirement set up in your business, do you want your business shut down? There's a lot of good reasons to try and keep your data safe. So stick around. We're going to be right back. We're going to be talking about zoom and end to end encryption.

[00:05:54] This is Craig Peterson here, and visit me online. Craig peterson.com.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553