loader from loading.io

AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Internet of Things Root Access, Wordpress Vulnerability, Apps and Reverse Image Search

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 09/11/2020

Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
The Mobile Malware Menace: Protecting Against Evolving Threats show art The Mobile Malware Menace: Protecting Against Evolving Threats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In today's fast-paced digital age, staying ahead of the curve is not just an advantage; it's a necessity. From the electrifying world of electric vehicles to the intricate web of mobile security, and the visionary influence of Elon Musk, there's a lot to unpack. Join us on this insightful journey as we explore key topics that are shaping the future of technology. 1. Electric Vehicles (EVs): Paving the Way for a Green Future The surge in popularity of electric vehicles is undeniable. We delve into the latest advancements, innovations, and the environmental impact of EVs, providing you with a...

info_outline
Scan Smart, Stay Safe: Mastering the Art of QR Code Defense show art Scan Smart, Stay Safe: Mastering the Art of QR Code Defense

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In a world dominated by QR codes, the risk of falling prey to digital tricksters is on the rise. Fear not, fellow entrepreneurs, for we've decoded the secrets to outsmarting these cyber hosers and keeping your digital fortress secure! QR Code Unveiled: Understanding the Basics Let's kick things off with a deep dive into the world of QR codes. Learn what makes them tick and how scammers exploit these seemingly innocent codes to compromise your cybersecurity. The Rise of AI and Its Role in QR Code Shenanigans Artificial Intelligence (AI) has ushered in a new era, and unfortunately,...

info_outline
 
More Episodes

Welcome!

Good morning, everybody. WTAG experienced some issues which prevented me from joining Jim on Tuesday.  But this morning he reached out and had me on. Jim and I discussed The Internet of Things and why Businesses must be careful when they are attaching all these cool gadgets to their networks.  Then we got into the WordPress Vulnerability that is hitting business websites hard.  Then Jim asked about Apps and China. Here we go with Jim.

For more tech tips, news, and updates visit - CraigPeterson.com

--- 

Automated Machine Generated Transcript:

Craig Peterson (2): [00:00:00] So you ask yourself, how can this app be free? Really? Whoever developed it had to put hundreds or thousands of hours into developing that app, how could they possibly afford for it to be free?

 I had a bit of a surprise this morning. This is Craig Peterson.

Craig Peterson (2): [00:00:15] I got a text from Mr. Jim Polito asking if I could come on today because their board was so messed up on Tuesday, they couldn't get me on. But he really wanted me on this week. So that was fun.

We freewheeled today. Although normally we stick with the topics that I have sent him that I also include in the newsletter. We go into deep dive on my radio show on the weekend. And of course, those are podcasts as well, but it was fun. I was a little bit of a different thing today. So here we go with Mr. Jim Polito.

No week would be complete without a visit from our good friend and tech talk guru. Craig Peterson. Missed him on Tuesday.

Jim Polito: [00:00:53] Can't wrap up the week without a visit from the man. Good morning, Craig.

Craig Peterson (2): [00:00:58] Hey, Good morning. I want to correct the thing that Fake Bernie said this morning and that is Connecticut river is entirely a New Hampshire. Vermont doesn't even have a border on the river, let alone the ocean.

Jim Polito: [00:01:14] I thought they had. 

Craig Peterson (2): [00:01:15] Did you realize that?

Jim Polito: [00:01:15] No. No. So the state line is on the other side of the river.

Craig Peterson (2): [00:01:21] It is. It came from years ago. It was an order in council signed by King George, the third back in 1764 because remember Vermont was part of New Hampshire. And then yeah, New York, in fact, we've even got ski Hills that tried to re-annex themselves a few years ago to New Hampshire, tired of all of the taxes and everything.

But, yeah, so what had happened is that New York said, No No Vermont is ours. Then so King George says, okay, I'm going to settle this. So he established the border between New Hampshire and Vermont. It could be the Western bank of the Connecticut River and then the US Supreme court in 1933, upheld that.

So normally when you go across a bridge, I don't know if you've noticed, but usually in the middle it says, you're now doomed during the state of, whatever it might be, where Joe Biden might be from this week. But, when you're going from, Vermont, New Hampshire to Vermont, you don't see the sign until you hit the ground on the Vermont side.

Jim Polito: [00:02:22] Hey, you're right. I was Chesterfield New Hampshire over the weekend and I went and did the bridge there. There's the old bridge right next to the new one. And cause they never knocked down the old one. You're right, you get over the bridge, you come to the rotary, but there's the sign before you get into the rotary. Welcome to Vermont.

Craig Peterson (2): [00:02:42] Yeah. Yeah, exactly. I don't know if that's like the only one, but it's really weird. A little bit of history actually knew. How's that for strange?

Jim Polito: [00:02:50] No, that's why you're the man. And, and King George, the third, how do you like that coming up with the idea? No, it's on the banks of Connecticut.

Back in those days, The Connecticut River used to flood and break its banks. Oh, the Vermont border was a moving target. all right. I want to talk about some of the stuff that you,  gave us today, but what is top of mind for Craig Peterson right now? By this top of the most brilliant man in tech wake up on Thursday morning, which is not typical for him.

What does he wake up and say, but that other people won't understand by the way?

Craig Peterson (2): [00:03:29] Oh, okay. details. so yeah, the big thing, and I'm going to talk about this on my show on Saturday here, but the big thing that has to do with the internet of things, hardware, again. Now we're talking about all of these lights that we have that may be voice-activated, and now it's everything.

If you're a business, I can't tell you how many businesses I've walked into that have. These hick vision cameras on the wall, security cameras. They've got automatically lights that come on when entering rooms, et cetera. So there is a little bit of a study that was just conducted and they found that about 85% of the devices that were tested could and be completely 100% hacked.

It's called complete root access on these devices. This is a real problem because we're making these IoT devices, the internet of things. They've got to be small. They have to be cheap. At least we want them to be cheap. So what they do is just cost reduce cost reduce, cost reduce, and what you end up with is a little computer.

It has to be a computer inside that can talk to, of course, your wi-fi in order to send its messages. And they just leave out all concepts of security, frankly. They come pre-configured with default usernames and passwords. These things come also with the ability to be completely hacked because they cannot get updates, so many of them. They never get re flashed. In fact, this particular investigation showed that they could be completely re-flashed by hackers. So we're surrounding ourselves with all of this wonderful equipment, all of this really cool stuff. At the same time, we're exposing ourselves and we're exposing our businesses to some of the worst hacks that have ever been going on, and frankly, that's a huge problem. I'm going to talk about that one this weekend. And similar to that, I gotta bring up one more thing while I'm on my soapbox. And that is, we know we're supposed to update our computers, right? And so you go ahead and you update windows, you're reluctant to do it. Cause is it going to break. What's going to happen.

If you're on a Mac, it just happens for you automatically and it's extremely rare that anything breaks or an iPhone. Android, of course, you got the problems and trying to do updates.

The biggest problem we're finding right now is that people think that they have turned on automatic updates and they're safe. Without thinking about the dozens of other apps or programs that they have on their computer that need to be updated. To a business 99% of the time they say, yeah, we're 99% patched up. we're fine. But then you dig into it at all, then you find out, they haven't updated flash. Oh, they haven't updated their web browsers. Oh, they've got all of these plugins, these extensions on the web browser that are known to be major security hazards.

So my whole message this weekend and this morning are, Yes, you've got to patch up and right now. Over 350,000 websites out there that are hosted, that are run on WordPress, which is most business websites have a critical flaw, critical, and we've seen before where ISIS goes ahead and they hack one of our websites, Jim, and then they have uploaded videos of the beheading of Americans and American soldiers onto and attacks against the soldiers to onto our business website. Then they share that with all of their friends and it's unbeknownst to you sometimes. They just hide it and they're using it for touch and go places. The bad guys are using it for child pornography.

They're using them for attacking other websites. They are putting in skimmers, just like ATM skimmers that we've seen before, right into the website checkout pages.

So that's my big thing today and I'm going to be talking about it more on Saturday. It's terrible.

Jim Polito: [00:07:47] We're talking with Craig Peterson, our good friend, our tech talk guru, and some of the concerns, Craig, I'm going to call an audible.

I have the list of stuff that you brought to us, but something came up personally for me yesterday. I wanted to do a reverse image lookup. I wanted to find the origin of a picture. And, there's a lot of different ways you can do that. But one of the ways that your smartphone will steer you toward is getting an app to do that, and of course, I'm on Apple.

Here's my question. I started looking at all the PR of course, I don't want to pay for it. I want a free app. And I started looking at all the free apps available to do a reverse image lookup. Now, for those of you who don't know, here's a reverse image. Look up. you take a picture that you have, you put it into an app and the app tells you the other places on the internet that they can find it.

So I, I did that, but I'm looking at all these apps. Then for some reason popped up on my phone who created the app and there were, and this isn't certainly a racist thing, but there was a lot of what appears here to me to be Chinese names. I said, okay, this could be someone in the United States, who's from China. Or could these all be Chinese apps from China?

So my question was how good of a cop is Apple when it comes to allowing its apps in the Apple app store. Cause I thought to myself, wait a minute. If Apple is offering it's gotta be safe. Am I being naive?

Craig Peterson (2): [00:09:32] No, you are not a few things that come out over the last few weeks. One is there is a library that a lot of application developers are using that tracks you and your data and the application developers are paid for it.

So you ask yourself, how can this app be free? Really? Whoever developed it had to put hundreds or thousands of hours into developing that app. How could they possibly afford for it to be free? So the big problem over the last few weeks was, Oh my gosh, there's this the library that app developers are using for Apple and for Android that they're getting paid to include in their app and Apple wasn't noticing it.

Then there's another problem app and requires apps to be signed on your Mac as well as your iPhone and there are ways around that. It was also found out that Apple had, this is just the last week, approved some malware to run on Mac. Now this is unbeknownst to Apple and we have to step back a little bit, and look this isn't just Apple this is Google as well. Although Apple historically has done a better job. But in both cases on the app store from Apple and the Google play store, they use software to scan the apps, to look for potential malicious stuff. They've done an okay job over the years.

That's part of the reason Apple gets 30% of any proceeds from apps that are on there.

Jim Polito: [00:11:07] Yeah

Craig Peterson (2): [00:11:07] You brought up China. China has been flooding both app stores. Then, of course, socialist government over there wanting to get our information because once your socialist, you've squashed most, if not all innovation. So the only way you can grow is to steal it from other people that aren't socialist.

Jim Polito: [00:11:27] It's true.  it's true.

Craig Peterson (2): [00:11:28] Yeah, absolutely true. And so they've been very, It's strong or, front line thinking here on getting apps into the app stores that can leak data. Because again, they just need a little bit of data from this app. Maybe a little bit of data from that app. Get your contacts from this app, pull them all together. And now they've got a very good picture of you. Who do you work for? Where do you live? What kind of data might you have access to? Then they're using that to go spearfishing. So to answer your question, Apple does a, quite good job of vetting the apps.

Google does a good job on betting the apps. But there are many ways to obscure the code and frankly, Yeah. Having written all articles over the years and worked on a lot of different people's code, I can tell you that obfuscation seems to be the middle of the name of every programmer are known to demand, where are it's impossible to try and figure out what they're doing sometimes takes a while.

So I can't blame Apple and Google for letting some of that, this stuff into the store, but they're pretty careful about it, but this thing twice, Why is the app free? Why is the app cheap? What else are they getting out of me?

Jim Polito: [00:12:43] Let me just ask you a quick question and then, Oh, go ahead. Go ahead.

Craig Peterson (2): [00:12:47] No, I was going to say when it comes to reverse image this is a great tip for everybody that's listening. If you are in the dating realm or your kids or grandkids or whatever it might be, or out there dating. Google regular Google search has an image search on it. One of the best things you can do is take that photo that you found on the dating site and run it through the Google reverse image search and see if it's a stock photo or if it's just someone else.

Because so many of our seniors as well, they're not dating, but they're, the reaching out, some of them are lonely and you've got to make sure that this person is legit. And what Jim did with the reverse image search, just use Google. It is a wonderful idea

Jim Polito: [00:13:32] See, learn from my mistakes. Excellent.

Phil, I have since deleted the app, but who knows, there's probably code somewhere in my phone right now, from the Chinese and, and they know I'm friendly with you. So I'm  I'm the enemy.

How can folks get in touch with you?

Craig Peterson (2): [00:13:50] Why don't you check out my website? I've got a new one going up here either this weekend or next week at Craig peterson.com.

You can get my newsletter. You can get all of the articles and background that I talked about here on Saturdays at 11.  You can also of course digging a little bit more. Ask me questions, all of that. Just Craigpeterson.com.

Jim Polito: [00:14:13] Craig. Thank you. 11 o'clock Saturday. Be listening. Thank you, sir, for doing the extra duty this week and we'll catch up with you next week.

Craig Peterson (2): [00:14:22] All right. Take care. It was fun.

Jim Polito: [00:14:24] It was fun. Hey, when we return a very important thing you want to back the blue, I'll tell you how it's my final word. You're listening to the Jim Polito show your safe space.

Craig Peterson (2): [00:14:35] And safe it was. Take care, everybody.

We'll be back this weekend. Bye-bye.

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553