loader from loading.io

Welcome! Remote Work and Security of Home IoT devices on network plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 08/28/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

Craig discusses problems that businesses can face when remote workers have IoT devices on the network they use to connect to work.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Newly Patched Amazon Alexa Flaws -- A Red Flag for Home Workers

 
 
 
 
 
 

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] Hey, we got a new red flag for home workers when it comes to those smart digital assistants that we have in our homes. Yeah, indeed. Not only can it cause problems for us in our homes, but that problem can go right through to the business.

Craig Peterson here. Thanks for joining me today and thanks for all of your messages. I've gotten some great comments. This week had one that I'm going to do another followup on, but it had to do with what kind of router to use at home. I did a whole webinar on this back in March. I'm going to add that back to my list again because obviously there's still a lot of questions.

Many people can't attend these webinars, but I really would suggest when I do come out with them. That you consider attending if you possibly can. I get it. You can't always attend these things that you'd like to attend, but I responded directly anyways. and I've gotten to the point now where I look at it and say, these crappy, sorry for that term, pieces of, hardware that you buy from the big box retailers that are given to you by your friends, at the phone company, the cable company, they are not worth it. It is not worth it. You've got to at least go to the prosumer stuff. And that's what I said to him. The prosumers stuff means that really you got to get something like a Cisco go hardware.

Really? You do. Yeah. There's a lot of alternatives out there. Juniper has some stuff. HP has some stuff, but there's only one that has a beautifully integrated ecosystem. The low end of the consumer world nowadays really has to be prosumer and me, I'll let you know if there's something that comes out that I think is as good or better.

But, also that Cisco is what I do. My company mainstream has been the number one, installing reseller of Cisco gear in the Northeast US, quarters into quarters. So it's something I like. So just to let you know. Okay. But bottom line, my advice to him was trying to get the Cisco GO stuff.

Now you can buy it on Amazon, but there are things that you need that you cannot buy from Amazon. You've got to go to a licensed reseller in order to get the more advanced protection that you get from some of this Cisco software that is available for the go. Of course, as you move up the line, there's better and better software, but at least start there.

Let's start the show off here with our first article. You'll see this, of course in your newsletter that came out this week, and this is something I've talked about a long time in general. And in general, what we're talking about is. The whole internet of things concept, and how many years have we talked about that? It's been at least a decade. In fact, I was going through some of the articles on our website.

We're just shutting some of them down because they are so old. But back in 2007, I was already talking about this. So we are 13 years later. And we still have these same problems.  People still aren't taking care of them, and they're still doing things the same way and they are getting nailed. And nowadays, particularly when we're thinking about workers working from home, and I am going to be in a couple of weeks doing a little sip series about working from home and what are the top things you can do to protect your business. If you have people connecting from home now, I don't mean like they're just connecting from home an hour a week, nor do we're only gonna talk about the people who are working from home pretty much full time. Doesn't matter. There are some things you have to do, things you can't do.

And so we'll be going into those with some of the training coming up in a couple of weeks and make sure. You are on my newsletter list. If you want to find out about that stuff. That's just Craig peterson.com/subscribe.

So we're working from home. I think we've established that we're starting to see office space deserts now. I went to see my chiropractor, this week and massage therapist.  I'm standing outside her office and she's in this cluster of offices with other people having a little business and of course, it's a type of business where she can't really do it from home now can she. She has to actually have her hands on you in order to do some of this stuff. And boy, was it. Oh, a wonderful thing. Cause my neck and my back just it's been really bad after that whole kind of COVID, in bed for a couple of weeks, thing. And. I looked around the parking lot. It was shocking to me. I was there and this was after lunch, usually, there are a lot of people who are there in the parking lot, not just for her business. there's gotta be a hundred different office spaces that are in there. There has to be that in this case, when I was there were three cars in the parking lot and that was it.

So you talking about these office space deserts. Where the people just aren't going in there anymore. It's just astounding. Some of these big cities like New York City, the whole city is shut down. They're losing all of these restaurants and all of these places where people used to go shopping because people aren't going there.

Where are they? They're at home. In some cases, you have to be at home. Think about all of the families or the young kids, where the kids are no longer going into school. They're sitting at home, they're on their computers, hopefully, following the teacher and doing their schoolwork. Now I got to put a side note here.

This is the perfect opportunity for you as a parent. To see what your kids are being taught, to look over the shoulder. Now it's amazing to me. I have read quotes from teachers who said they don't want parents looking in because they don't want parents to know what's being taught. Then there are some unions in some of the local school districts that are saying, it has to do with the privacy of the other children in the class.

You use to be able to, as a parent go and basically audit your school's classroom that your kid was in. So you could go there and sit in the back and just see what's being taught and how it's being taught. and then the teachers didn't like that because heaven forbid a parent question the professional.

Now we found out, some of these teachers, in fact, a very large number of them are blatant Marxists, just teaching the Marxists dogma. You can see that now when you look at all of these fascists marching in the street, it's just incredible. So take that opportunity and watch what your kids are doing.

Watch what the teachers are saying and help your kids out. But in many cases, obviously we can't and get people to watch kids. We can't get babysitters because there's such a high demand for that. So we are forced to work from home. For that very reason, just to make sure that the place doesn't burn down and maybe you can get a few minutes to watch what the teacher's saying. What's really going on there in that classroom.

So if you're working from home, what are you doing? we are sitting there on very frequently, our own computers connected again, quite frequently to the network at the office. Now, if you've attended any of my VPN training, that VPN we're designed for businesses to connect to. Networks at different locations and that's what they're good at. They're not really designed to protect anything other than the data while it's being transported. That actually becomes a problem, if you use one of these VPN services, it makes you less secure. I go into the reasons why in my VPN course, and we'll be teaching that one again. So keep an eye out.

But we're now looking at having people at home using their home computers, which don't have all of the protections in place that hopefully, your business computers had, the medium and large businesses have some pretty decent protections in place, but the small businesses, those businesses under 500 employees, very rarely have the right kind of protection in place.

So now you have a personal home computer to the network at the business. What's on that home computer? We've talked about that before. That's a real problem, but now we're asking them the question of what else is on your home network that's connecting to that business network. One of the things is probably your Amazon, Alexa, or your Google home or who knows what other things. We got light bulbs hooked up. We've got all kinds of things hooked up to our home networks. They found a trio of vulnerabilities recently in Amazon Alexa devices, just as they found them in all of these others, a Google home, everything else.

Apparently these vulnerabilities could have led to broader attacks on the home networks because of the way, most of us are misconfiguring VPNs. Those attacks can now easily spread over the network to our business computers. So these are vulnerabilities that were made public last week by researchers at Checkpoint.

Checkpoint has been in the security business for a long time. They made firewalls. I think they're based out of Israel. They've had some very cool stuff, but we're looking at more than 200 million Alexa smart home devices. I have them in my home, but what I've done is, I actually have five different networks in my home.

One of them is for the internet of things devices, so if they are compromised, they cannot get out and they cannot get to any of the other devices inside my network.

Then, of course, I'm using professional gear for my network, not just prosumer gear. I would advise people to look at that very seriously.

So next we have a study coming out about the. The presidential election and how both parties, both sides are very concerned about some security concerns.

So we'll get into that. When we get back.

Stick around, you're listening to Craig Peterson and I'll be right back.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553