Welcome! Government Embeds Trackers in Our Apps plus more on Tech Talk with Craig Peterson on WGAN
Craig Peterson - America's Leading Technology News Commentator
Release Date: 08/15/2020
Craig Peterson - America's Leading Technology News Commentator
First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...
info_outlineCraig Peterson - America's Leading Technology News Commentator
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security. They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...
info_outlineCraig Peterson - America's Leading Technology News Commentator
ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Craig Peterson Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...
info_outlineWelcome!
Craig discusses the disinformation campaigns by Russia and China and how they can interfere with our electoral process.
For more tech tips, news, and updates visit - CraigPeterson.com
---
Read More:
Window Swap Lets You Enjoy the View From Other People's Windows Around the World
Report: Hundreds of apps have hidden tracking software used by the government
Researcher Finds New Office Macro Attacks for MacOS
New cars can stay in their lane—but might not stop for parked cars
Here’s why Apple believes it’s an AI leader—and why it says critics have it all wrong
Snapdragon chip flaws put >1 billion Android phones at risk of data theft
Trump Targets WeChat and TikTok, in Sharp Escalation With China
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Information Operations Spotlighted at Black Hat as Election Worries Rise
---
Automated Machine-Generated Transcript:
Craig Peterson: [00:00:00] You've heard about Tik Tok and all of the problems there did, there are hundreds of apps that are tracking you and your data.
Hey, it's Craig Peterson. Thanks for joining us here on the radio, online on my website, all over the place. I really appreciate it. And yeah. I love it. If you would subscribe to my podcast, you can do that. Of course, by going to your favorite podcast platform, there's many out there and I'm on pretty much all of them would love to have you join me there.
Tik Tok is a real problem right now, many people just aren't aware of what's really been going on. Tik Tok is a Chinese built and run piece of software that has been caught multiple times grabbing our personal information. Things like who our contacts are, who we are contacting frequently, even things like phone numbers, it addresses the whole shooting match check top basically is.
Kind of evil. And in fact, what Tik Tok has been doing is sending out and information to China, where it's now available to the socialist government over in China, the Chinese communist party, which is of course an issue of a very big issue. At least it should be for all of us. Is that data that you have been sharing.
Maybe unbeknownst to you with Tik Tok is in their hands forever. This means the rest of your life. So think about it. If you've got on tick-tock a few years ago, maybe you were younger than right now, you're in your twenties. You're off of work. Many of these people, these young kids that are now out in the job field in the job world are where.
some of them might be security specialists. Some of them might be working for the federal government or they're sensitive businesses. Just think of all of the manufacturers that are selling to the DOD. So now these same kids that were kids just a few years ago are now adults out there in the real world.
And Tik Tok has all of this information about them that they can steal. They can sell it. They can use to figure out how can I get into that company? Hey, I want to get into Boeing and their jet engine division. And once I'm in the jet engine division, I can poke around a little bit. I can get information on some of the jet engines that are used by the military and then take all of that and put it together.
Have you noticed how so many of these Chinese military jets, even their aircraft carriers look a lot like ours? Some of them actually have plug and play replacement Smiths that can be used for some of our US military equipment. Now they're carriers, not so much. The carriers have some of our techs acknowledging in fact, a lot of them in there, but they still haven't mastered a few things like the catapult, et cetera.
Hey, there's another opportunity to steal from us. Think about the whole idea behind socialism. The bottom line is everybody is equal except for the people at the top. There they're more equal, right? Read animal farm, great books, or George Orwell, but they are more equal than everybody else. So the rules don't really apply to them.
Actually that's been happening here too. Hasn't it? But the rules, I don't apply to them. And for the rest of the population, they're pushing down your ability to start businesses. They control what you say, what you think, who you are associate with. All of the stuff is controlled. if it's controlled, if I can't just go out and create a new product, go out and hire who I want and do whatever I might want to do.
Guess what? There's no innovation. So in a socialist country, how do you innovate? the bottom line is theft, right? That's exactly what China is doing right now. They don't have the innovation. They don't have the motivation for innovation because unless you are high up inside the party apparatus, you are not going to get a chance to do anything.
We could get into a lot of other stuff here, wild way, why there are problems with them and what has been doing, the Chinese government has given Huawei more money. Then the entire world's five G implementation is going to cost. In other words, the Chinese government went and gave Huawei enough money to equip the entire world for free with Chinese five G technologies.
How do you think that works? Where do you think that comes from? it comes from the fact that. They want to get the fingers into everything, know what's going on, have all of this technology available to them. Everything. Yeah. Internet. I see ICM bees, the Intercontinental ballistic missiles. We gave them the technology to launch missiles against the US.
If you can believe that, right? That's a real problem. If he asked me, let's get into this app story here. It is absolutely fascinating. And the bottom line is, Oh my gosh. There is so much of they're doing that we don't know about now. I'm not just talking about the Chinese here. But I'm talking about our government.
there are restrictions in place for the US government. They do not allow them to do certain things. One of those things is to track us as civilians. Now here's where the problem comes in. How can they track us if they're not allowed to track us? they've got to work around. So I want to go to this article from all of all places travel, excuse me, Android authority.
We got it up on the screen right now, so you can check it out yourself and they have a report out that talks about hundreds of apps. That has hidden tracking software that's being used by the government. how does this work? if the government, if our government can track us, how are they going to track us?
The bottom line, they want to, we know already about the five eyes, the seven eyes, the. What is it? 14 eyes or 11 eyes. I'm trying to remember. These are countries that spy on each other citizens for the other country. So for instance, the US federal government cannot spy on us as individuals, unless we are suspects in a case bottom line.
And so then they can go to the court, they can get court orders, they can examine what's going on. You can't just blanket, grab all of our information, funnel it into some database based somewhere, and then use it for whatever they want to ultimately write, which can obviously be a problem. It goes back to show me the man I'll show you the crime.
what they're pointing out in this secular article is something that is very. Concerning because there's a new report that came out from the wall street journal here in the last week and exposes that apparently there has been a new development in mobile phone tracking. it's legal for businesses to keep information on us.
We've known that I've had data brokers on my show as many as 10 years ago, frankly, where I was talking with them about, okay, what data can you gather? Where's the legality here. Basically a private company can gather almost any information they want on this. Look at Equifax. What happened there, where we had all of these data breaches, right?
We had over a hundred million people's personally identifiable information stolen, and it wasn't just from the US, it was stolen on Canadian citizens and many other citizens that were here in the US that were there in Canada. So they were collecting the data. The federal government cannot collect the data.
Do you see where I'm going? can you see that the mix here? You're here. It's coming. Here's coming. So what does the federal government do? It buys the data from data brokers. So what are the, what they've exposed this last week is that apparently there is at least one federal contractor that has been putting in government tracking software in more than 500 mobile applications?
Now, if that's not something that kind of blows your mind and should frankly, so in this case, I, again, you'll find this on Android authority. You'll find it and more about it on the wall street journal. But the contractor, in this case, is a Virginia based company called and normally six LLC. And it's pain, mobile app developers to include it's.
In house tracking code within their apps. Now the app developers don't have to disclose that this tracking code is in there. They don't have to disclose that this data is then being sold to the federal government. no. They just aggregate the data and they sell it to the US government. It's happening and it's illegal, absolutely legal.
The wall street journal story goes on more and more. And although this company anomaly six would not disclose the apps that their code is embedded in and where it has the partnerships, the wall street journal could not figure out the details through other methods. At least at the time, they published the article.
This is a bit of an issue here. Okay. App developers don't need to disclose that there is this data, broker technology built into it. So you could have one or even dozens of apps with this government tracking code. Right there on your mobile device and you would have no idea. Absolutely amazing.
Absolutely amazing. What's going on here. So that's the basics of what you need to know, By the way, anomaly six says all of this data is actually anonymized. So there's nothing to worry about. Nothing. Ignore the man behind the curtain, but as the best and brightest listening to my show for years, there's something called de-anonymizing that allows you to pretty easily take any data set and figure out who the people really are within that data set, even if it is supposedly anonymous.
Hey, when we come back, I got to tell you about this cool new app that I found. It's actually a website and we're going to talk about new Microsoft office attacks.
You're listening to Craig Peterson. Thanks for joining us.
Stick around. We've got a lot more coming up here or right after the break.
---
More stories and tech updates at:
Don't miss an episode from Craig. Subscribe and give us a rating:
Follow me on Twitter for the latest in tech at:
For questions, call or text:
855-385-5553