loader from loading.io

Welcome! The Future of Cybercrime and What you Have to Prepare For plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Release Date: 08/08/2020

Welcome! Remote Work and Security of Home IoT devices on network plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Remote Work and Security of Home IoT devices on network plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

  Welcome! Craig discusses problems that businesses can face when remote workers have IoT devices on the network they use to connect to work. For more tech tips, news, and updates, visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, we got a new red flag for home workers when it comes to those smart digital assistants that we have in our homes. Yeah, indeed. Not only can it cause problems for us in our homes, but that problem can go right through to the business....

info_outline
Welcome! Security Concerns on Voting Technology plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Security Concerns on Voting Technology plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses problems related to Mail-in Voting and Voting technology. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Red team-blue team. This is a very interesting problem that is now being confirmed. Through a study. A bipartisan study. We are in trouble with our election this year. Hey everybody. Craig Peterson here. Thanks for joining us. Man alive! can anything be more political than a presidential election cycle? It...

info_outline
Welcome! Mounting Election Security Concerns plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Mounting Election Security Concerns plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses the mounting security issues revolving around the upcoming elections. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Before the break, we were talking about some of the problems with different types of voting, the electronic voting machines, the apps that have been used and developed, and serious problems with those. But now we're going to talk about the problem with the mail. Hey, you're listening to Craig...

info_outline
Welcome! Smart Lock and even larger issues with IoT plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Smart Lock and even larger issues with IoT plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses problems with some of the smart lock technology and an even larger issue surrounding IoT devices in general.  For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, welcome back everybody. If you have smart locks or you think maybe smart locks are the way to go, we've got a little bit of news for you. Some research had just come out about these smart locks in our homes and offices turns out they just smart...

info_outline
Welcome! Facial Recognition being used to Arrest Rioters plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Facial Recognition being used to Arrest Rioters plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses how Police are using Facial Recognition to identify and trace movements of rioters. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: r             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Facial recognition software is getting better all the time. You've seen these rioters and they're wearing all of the masks and hoods and helmets and everything to try and hide their identity. It isn't working anymore. Craig Peterson: [00:00:20] Hey everybody, Craig Peterson here....

info_outline
Welcome! The Future of Business Offices plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! The Future of Business Offices plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses the Hawthorne Effect and the changing business office. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, is this the great reset or maybe it's the inevitable reincarnation of the corporate office. That's what we're going to talk about right now. What is happening? What's happening at the corporate real estate? How are we using technology to cope? Craig Peterson: [00:00:18] You're listening to Craig Peterson...

info_outline
Welcome! Virtual Learning Meeting Lands Parents in Hot Water plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! Virtual Learning Meeting Lands Parents in Hot Water plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses how a kid on a zoom virtual learning meeting caused his parents to be questioned by Police.  For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] When you think of a violation of somebody violating your privacy, what are you thinking about? Is it people Tom's? Is it somebody sharing a little story about you? That isn't true. with back to school, virtual, um. Craig Peterson: [00:00:19] Yeah, we've got a story...

info_outline
 Welcome! CHARGES: Obstruction of Justice for Uber Security Chief plus more on Tech Talk with Craig Peterson on WGAN show art Welcome! CHARGES: Obstruction of Justice for Uber Security Chief plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Security Coach

Welcome! Craig discusses a hack at Uber that ended up with its Chief of Security facing Obstruction of Justice charges.  For more tech tips, news, and updates visit - CraigPeterson.com --- Read More:             --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, I've got a story right now that should be a word of warning to businesses that have personal information. If you are working for a company and they've got your personal information, you're going to want to hear this too. Hi everybody Craig Peterson here on...

info_outline
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Deep Fakes and China's Theft of US Intellectual Property show art AS HEARD ON: WGAN Mornings News with Matt Gagnon: Deep Fakes and China's Theft of US Intellectual Property

Craig Peterson - America's Leading Security Coach

Good morning everybody! I was on WGAN this morning with Matt Gagnon, and we began talking about Deep Fakes and then went right into China's theft of US Intellectual Property.  Let's get into my conversation with Matt on WGAN. These and more tech tips, news, and updates just visit - CraigPeterson.com --- Automated Machine Generated Transcript: Craig Peterson: [00:00:00] Be extra careful, because the best way to defend against these deep fakes is to hold the people accountable that host them. Good morning, everybody. It was on with Mr. Matt Gangon this morning, and he and I had a couple of...

info_outline
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Why Most Businesses Don't Take Security Seriously and Why they Should? show art AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Why Most Businesses Don't Take Security Seriously and Why they Should?

Craig Peterson - America's Leading Security Coach

Welcome! Good morning, everybody. I was on WTAG this morning with Steve Fourni who was sitting in for the vacationing Jim Polito.  He had a few questions about computer security especially in light of the 129 Microsoft Vulnerabilities that were addressed on Patch Tuesday, I did get up on my soapbox for a bit, but Here we go with Steve. For more tech tips, news, and updates visit - ---  Automated Machine Generated Transcript: Craig Peterson: [00:00:00] Hey, it's political season. I had to get on my soapbox. Okay. Little stump, speech, going on here, Craig Peterson. Of course this...

info_outline
 
More Episodes

Welcome!

Craig discusses the Future of Cybercrime and Why it might already be here. 

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Average Cost of a Data Breach: $3.86 Million

The Future's Biggest Cybercrime Threat May Already Be Here

Election Interference: Google Purges Breitbart from Search Results

Google Has Been Purging Breitbart Content from Search Results Since the 2016 Election

Heads roll at Intel after 7nm delay

Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness

Three people have been charged for Twitter’s huge hack, and a Florida teen is in jail

Remote Work Isn’t Working? Maybe Your Company Is Doing It Wrong

FBI Releases Flash Alert on Netwalker Ransomware

Electric car startup Lucid is challenging Tesla’s anti-lidar stance

---

Automated Machine-Generated Transcript:

[00:00:00] I can't believe it's been an hour. Hey, we're going to talk right now about the futures, biggest cybercrime threat. And guess what? It's already here.

Hey, you're listening to Craig Peterson. I really appreciate you being with me and I enjoy being here on the radio. You can also hear me during the week, so make sure you listen to morning drive time. Those appearances as well.

Well, we're going to get into really the future here. What is the future? What does it contain? It's a crystal ball, right? Well, in reality, there is no crystal ball, but this is a great article that I want to review with you guys. It's from a site. Called dark reading. And if you are someone who is involved in cybersecurity, it really is a must-follow site. There's just so much great stuff in here, [

00:01:00] but this is about the future of cybercrime.

And what does that mean? So let's, uh, I'm going to kind of zoom in a little bit here on this, so you can see it on the screen. If you're watching this in the video, um, Bottom line, the bad guys are paying a lot of attention to what we're doing. They're paying attention to what the FBI is doing, what cybersecurity professionals are doing.

What's being done also by the businesses out there. The responses. To these crimes. And sometimes they'll even get really advanced and start poking. And see if you notice we had a law firm, a big law firm, one of the biggest in the state and they reached out and we went in and talked to them and said that, well, they said, Oh, we're all set.

We're all set. Right. Which is what we hear every time. And yet we've never walked into a business that was really all set. Right.

[00:02:00] So we were working with our, it people, their security people. And we said, Hey, is it okay here? Let's just do a test. If can I try and drive a freight train through your front door and, uh, do a little bit of a white hat backing here.

And they said, yeah, absolutely. Let's have a look. Let's see if, if our security provider even notices. We drove, not afraid train, but I am a multitude of freight trains, including cross Continentals. Through the front door. Uh, and guess what nobody noticed it, nobody noticed at all, because we went back and talked to them and, uh, Dick, who was the guy we were dealing with there, who was our it, the head of it said, yeah, you know, we didn't get any calls.

I said, okay. So that's great. Let's get down to work here. We'd be more than glad to clean things up for you and have a look at what you got and maybe help backfill a little bit. And.

[00:03:00] No, no, there's no budget for it. You're only a loft, right? With w with incredible amounts of PII. Plus all of the case histories, we, we had another small, this was a one-man practice where someone had.

Paid to hack into his computers. Uh, apparently his ex-wife and she charged it on his credit card. So that's part of what we're going to talk about here right now. We've, we've all known about the fake news and the propaganda that's going on and sometimes see something new, but you know what it is, it's not that much different from what had happened with the Nigerian scam, right.

Although. They were just broadcasting to everybody trying to get somebody to bite today. It's the same thing but refined it's refined down to what we call phishing or spear-phishing attacks. So as they're saying right here, they are growing

[00:04:00] in sophistication. They're looking to focus on what works best and when it does work best.

Now, this is the part that I think is very, very, very. Concerning to me, and it should be for everybody else. And that is that you can get hackers for hire. How long ago was that law? That small law firm, about two years ago. Um, and back then, I think it was 50 bucks and fed, uh, that was paid on this lawyer's credit card by his ex-wife that apparently was for hacker services.

Well, now they're way more complicated and professional. So. The hackers start now at $300 to hack an individual for $300. You can have a person hacked and get at their data. And in the case, so the small law firm is a one-man operation. They ended up deleting.

[00:05:00] All of his court documents that had to be filed, all got deleted.

Any pictures of his kid got deleted or, or his ex-wife got deleted. That one. It's what they do. And union 300 bucks. Yeah. Yeah. Deal. Right. So when a young adult over in Eurasia can get $7,000 per month. $7,000 is enough to support a family in many of those countries for a year, a year. Okay. That's how much money they can make so they can get $7,000 a month.

By conducting cyber extortions sound like a big deal to you. What's cyber extortion while it can be a number of things nowadays, again, they just refine the techniques. Ransomware has been around a long time, but it's still refined now. So extortion could be something as simple as old fashioned ransomware, where they encrypt all of

[00:06:00] your data and then they demand money from you.

To get your data back. And according to the FBI, the odds are about 50% that you'll get all your data back if you pay the ransom. Okay. So the odds aren't that great if you do pay so on the other side, Uh, if you don't pay, what do you have to do? Well, you have to restore from backups. Did your backups work?

Will your backups take months to download? Because it's up in the cloud somewhere. Most backups take at least a week to download. And does your backup provider have the option to put all your files on a hard disk and ship it to you? So that you can now restore those files. Right. Uh, and so the other way they're doing extortion is failing, pop up.

This is so clear are so refined, right? They'll get on your machine and they'll take control. No, no, no, it's not. It doesn't mean that they're controlling and your

[00:07:00] mouse and your senior mouse move when you're not expecting it and things type being program's coming up on your screen. No, they do it in the background.

So they will install are basically a remote control. And then within a couple of weeks, weeks, one, or their people will hop onto your machine and see what files you have there. Now, if there are great financial files or maybe there are designs of intellectual property, maybe there's personally identifiable information of your customers.

They'll say, Oh, okay, well, this is actually pretty good. And they will upload all of those files. He'll grab them off the machine. Now there's still a copy on your machine. Your machine's still working really well. There's no problem here. And then they will pop up a message for you. Kind of like a ransomware message.

It says if you don't pay up. We're going to release all of this data and they'll give you some samples of some of your data, right? And

[00:08:00] so people start freaking out. Well, there you go. That's another example of cyber extortion that's happening right now. So these guys and gals over there they're in Eurasia can make almost a million dollars a year.

It's readily achievable. According to this article here, and I believe it over on dark reading.com. So it's a very, very lucrative proposition because if you make a million dollars in those countries, you, your family, your extended family is set for maybe the rest of their lives, certainly for a decade.

And you're just a rich American who cares, right. If we steal that money from you. Now it goes on to talk about the weakest link here. Okay. And they talk about the human firewall. I refer to where right? You've got hardware. Do you know what that is? You got the software, you know what that is? You've

[00:09:00] got firmware.

Which is software that's embedded in the hardware? And then you've got wetware, which is us, right. Mostly water, as said, in, in that star Trek episode, right. Bags of water, I think is how that alien referred to us. So we're wetware and we are. The biggest problem. In many, many cases, remember we went through the statistics from IBM on attack vectors and compromised passwords and usernames compromised accounts were the number one way to get in.

And also the most costly when it came to a breach. So these phishing attempts, which again, think of the old Nigerian scams, how they've morphed today into a, it's a note from Bank of America telling you that your account has been frozen. You need to click through and do an update or. Very recent here.

I've been getting these for the last few weeks. It's a note from

[00:10:00] Amazon saying that your prime membership has been suspended because your credit card didn't work when it was charged. And if you want your prime membership to continue, you have to go onto their website. No, no, no, you don't type it in, just click this link, right?

Those efficient attempts. Now the shocking part of this is 70 to 90. Percent of these successful breaches come from. Social engineering, phishing attacks, one type of social engineering. There's a number of others. What just happened to Twitter, where Barack Obama was telling you to send him a Bitcoin. So send me a thousand dollars in Bitcoin.

I'll send you back 2000 as part of payback for you, right? Because you deserve that money. And it was, I think over 120,000 toddlers people sent this hacker. Well, how did they get in. How'd they get into Twitter to take over all of these big accounts, big named accounts?

[00:11:00] Well, they use social engineering.

They called on the phone and they got people inside Twitter to believe they were from it. Very very big deal. So the criminals have a lot of ways to do stuff. They've got a lot of tools. We're starting to see artificial intelligence. We had another one called vishing and this was an interesting one that happened over in the UK.

They were owned by a German company and they got a phone call from the owner. There's a German company. Right? I think it was supposedly the CEO and he told them to wire some money over. And this is the amount. These are the account numbers. The voice was entirely generated. It was not a real human being.

Okay. So we gotta be careful here. There are so many examples of it happening, but we'll see what happens with five G coming down the pike here.

We're really starting to look at the internet

[00:12:00] of forgotten things. How many pieces of the internet of things hardware do you have? That you've forgotten about how many of them have patches available? How many of them ever had a single patch available? Have you been patching your light bulbs, people? Cause that's what it comes down to.

Alright. Stick around. We're losing some stations. Now either's going to stick with us, make sure you visit me online. So you get all of this stuff. Craig peterson.com/subscribe. I love to hear from you and try and keep you a little bit up to date on the goings-on.

Take care of everybody. If you're leaving, have a great week.

Hey, you're gonna have a great week, even if you're not leaving and we will be back after the top of the hour.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553