loader from loading.io

Welcome! Mounting Election Security Concerns plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 08/28/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

Craig discusses the mounting security issues revolving around the upcoming elections.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Newly Patched Amazon Alexa Flaws -- A Red Flag for Home Workers

 
 
 
 
 
 

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] Before the break, we were talking about some of the problems with different types of voting, the electronic voting machines, the apps that have been used and developed, and serious problems with those. But now we're going to talk about the problem with the mail.

Hey, you're listening to Craig Peterson. Thanks for joining us today.

A great little study was just performed and I kinda liked it. The way they did some of this stuff. They were looking at the problems we are going to have with the presidential election this year. A lot of States, first of all, don't bother checking your voter ID. They don't bother checking to make sure you are a legal voter. Of course, that's a problem and you might know, I live in New Hampshire, our state sport is voting up here. It is. Politics we're first in the nation when it comes to the primaries and we pay a lot of attention to this. One of the things that is illegal and yet happen every time, every two years there's a vote. This is absolutely illegal, is that these kids are in our schools. Because we have some Ivy League colleges, universities. We have even high schools that have kids in them that are of age to vote. It is illegal for them to vote because they are not New Hampshire residents are just here for school and yet they vote every year.

 It really bothers me, right? Because us taxpayers in New Hampshire, are being or election severely influenced by people that have legally no right to vote in New Hampshire.  I could tell you all kinds of stories, talking with people that come up from mass to vote in New Hampshire elections that have no residency in New Hampshire. There is so much fraud. It just makes my mind boggle.

So this year, the only, or the problems that people have already been talking about, President Trump has talked about, the Democrats used to talk about with people voting illegally. We are looking at problems of, what happens when a state mails out ballots to pretty much every person in the state.

There have already been complaints in States where there have been ballots showing up for people who haven't lived in a house 15 years. Are you kidding me? Don't you guys purge your voter rolls? If people aren't voting it is absolutely insane. So what happens if a ballot shows up at a house and the person hasn't lived there in 15 years? Is someone going to take that ballot and fudge it for their favorite candidate?

How about these homes that people are living in, right where we've had all these COVID deaths. Many of these people are invalid, unfortunately. So are their caretakers going to take their ballots and vote for them? How do we know that a legitimate voter voted and only voted once? We don't. Okay.

That's a problem that many people have I've been talking about, but I talk about tech here and security behind the tech. One of the big problems that we could have right now. Has been proven by this red team-blue team approach. If you've been in the military, you are probably very familiar with red team-blue team.

This is where you will have a team of people that are attacking. We have another team that are defending. So that whole concept has been moved into the security realm in cybersecurity. We use it. I got a book on it about what to do, how to do that sort of thing. If you're the attacker, here's how you attack.

If you're the defender, here are some good ways to defend it again. That's why it's so important. If you're trying to defend a network to have a unified integrated defense system so you can see when things are happening. You don't have software from these guys, hardware from those guys, hardware from another party, hardware from yet a fourth party. It's impossible to defend when you have too many disparate data points. It might actually be pointing in different directions, every one of them. So you've gotta be very careful about that.

So they had a red team group of attackers that had security professionals, election experts, and law enforcement from both sides of the political spectrum.

They tried a whole bunch of things. Their goal was to undermine confidence in the election results themselves, as well as reducing election turnout. So we've heard accusations that four years ago, the Russians were meddling in our election. Of course, they were, and it happens every year.

Russians meddle. They really are trying to undermine confidence in it. But the Marxists big time, that's what they want to do. They wanted to divide and conquer. They don't want to have any sort of trust, in any sort of government entity or anybody that has any authority so that they can collapse the system and then take over.

So when we're talking about this red team, trying to do something to the election. It's very difficult for them to get into all of the secretaries of state offices computers because all of these secretaries of state have different systems. It's very difficult to break into them. Remember, we do not have a national election at all, ever in the United States.

We have 50 individual state elections. It's designed in such a way the small States have a voice against the big States. That's very important. Unfortunately, they changed some of this here with an amendment to the constitution. Senators were supposed to protect the state and they changed all of that by turning it into a popular election, but that's a separate issue.

You've got this red team and if they can't get into the 50 secretaries of States, individual election systems to modify the results or get into the voting machines to modify the results. What's the next best thing, obviously, you're trying to undermine the faith in elections. In voting. Undermine the faith in the results.

We're already hearing from both sides, that we're not going to trust the results. In fact, just this week, I think it was Wednesday, maybe Tuesday, secretary of state Clinton, Hillary Clinton came out and said, no matter what, if Joe Biden doesn't win, he should never concede. Because there is fraud coming. We know President Trump's been warning about fraud as well.

So we've got to come from both sides. Well, they found, through this study, that they can easily and inexpensively spread misinformation about new outbreaks in the COVID virus and that'll hamper people going out to vote. It's going to hamper the processes of mail-in ballots. And if the aim is undermining faith in the election and not necessarily swinging the vote towards one candidate or the other. It's very easy to do.

So we've got a great quote on my website here. You'll find it on dark reading from Maggie McAlpine. She is a co-founder of Nordic innovation labs and it was one of the red team participants and a cyber reason, by the way, was the company that ran this whole thing. She's saying, Hey, it's quite achievable.

And it's a very inexpensive direct quote here. There is this creeping sense of uneasiness because none of what we did was very expensive. Most of the attacks we proposed don't cost anything. Putting out a tweet that shows a crowded hallway and claiming it's a certain polling place. It's just that easy.

Then on the tech side. Did you know how easy it is to reset the post office sorting machines? Yeah. there's been all of this complaint about machines being removed from post offices, which they have been. That was a process that was started under President Obama. It's been going on for years now.

Did you realize that putting a specific barcode on a piece of mail, dropping it in a mailbox and that mail now goes to the post office that will reset the sorting machines? Yeah, it really is that simple. Then guess what happens? Those ballots do not make it to be counted by the secretaries of state in time.

Hey, you're listening to Craig Peterson, stick around. Cause when we come back, we're going to talk about the corporate office reincarnated.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553