loader from loading.io

Welcome! What is Stalkerware and Why should you be concerned plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 08/01/2020

eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? 📧 Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. 🛡️ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. 📥 Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! 🎩💻 Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! 🍪🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. 🌐🔍 Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
 
More Episodes

Welcome!

Craig discusses Stalkerware and explains why you should be concerned.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

How to find Stalkerware on your smartphone

This Simple Hack Could Tank Your Business

7 VPN services left data of millions of users exposed online

Universities Brand ‘Drama Therapy’ And ‘Journalism’ as STEM Majors to Circumvent Immigration Policy

DoJ suggested OANN should call FBI about NPR’s tipline, emails show

Google reportedly peeks into Android data to gain edge over third-party apps

Russia’s GRU hackers hit US government and energy targets

Your next smartphone will be a lot harder to scratch

---

[00:00:00] Hey, there is one simple hack that could ruin your business and ruin your credit and steal all of your money. And they're going after it today, against you.

Craig Peterson, you recognize the voice so glad to be with you. You can find me online at Craig. Peterson.com. We got trainings coming up for people. It's really important to understand what's happening? How you can protect yourself? How you can protect your business? And we're going to be talking a lot about that here today.

We're going to talk about this simple hack that can tank your whole business. We'll talk about VPNs. We have before. And I'm not a fan of, I'll tell you a little bit more about why I had a whole training course on VPNs and the dangers of VPNs. And huge dangers people just started using them.

So we'll get into that a little bit. I love this whole

[00:01:00] drama therapy. Now being branded as STEM science, technology engineering mathematics will tell you why universities are doing that. And the DOJ here telling one America news network that. Maybe they should call the FBI about NPR. So a kid into that Google is peeking into Android data.

Again. Now we've talked about this before. It's absolutely not to a Google gets away with, and it turns out they're doing something that Microsoft did years ago and got sued by every government in the world and lost every government in the world. So what's Google up to there for you. Poor Android users.

Russia's. Hackers they're GRU hackers have hit the U S government. We're going to talk about that one and your next smartphone may be a lot harder to scratch. And of course, we'll get into that one as well. So a whole lot to talk about today. But first, we're going to talk about

[00:02:00] how to find smartware. it is smart, but this is stock they're on your phone.

Now you may not be aware of this, but there are ways to monitor everything that you're doing on your phone and the best way to do it really is installing one of these apps that kind of hide now. This is particularly true for Android. This is true for you. Windows PCs to a slide, the lesser degree. It is true for your max as well.

So with the stocker where what you can do is look at the keystrokes, record them all. Do screen captures, usually grabs a frame if you will. What's on the screen every minute or so, so that it's not chewing up all of your disc space, but you can go all the way up to a live video so that you are tracking everything that's going on while someone's logged into a computer.

[00:03:00] So it's designed specifically because it is stalker where to run in the background of the computer. To make it very hard to see. And most of the antivirus software out there just won't catch it. If you have the advanced malware protection that's available through us and from Cisco then yeah.

You're probably going to be able to detect it, but it is designed to hide. So there's a high degree of probability that it is hiding and it's probably hiding pretty darn it's keeping tabs on. Everything on your phone. So your personal details are going to get leaked out. And we're talking about having access to all of your contacts, all of your applications, knowing what's going on, it may show up as an application on your phone.

It may not show up as an application. Same thing on your windows side. And this is a rich source of information for people,

[00:04:00] because if they can get the stock aware on your computer, they know pretty much everything they might need to know about you. You've gotta be very careful. It can track your location, record your phone calls.

Obviously your text messages steal the passwords to the social media accounts or email account or access that you're logging into through your phone reveal, your contacts, photos. Emails and even end to end encrypted communications, because remember what happens with these things like WhatsApp, et cetera, you have to be able to read that message.

Don't you, it's not good to you. If it shows you a bunch of Google. That is the recorded, encrypted, I should say message that was passed through. You need to see the clear text. So if you can see the clear text on the device, the stocker work and see it as well. Now we've found that in for

[00:05:00] the most part, the stock aware is really aimed at people that.

That, might be involved as activists. For instance, you have a lot of government agencies that do it. you have no activists. Of course, we're talking about socialists countries, right? It's illegal to do it here in the U S but every socialist country out there. Does it to some degree or another, the more socialist you are, the more they do it.

Like China, for instance of courses using stock or where by demand, it's the law. You will go to jail. If you don't have stock go. Where on your smartphone? Venezuela, Brazil. Cuba, some examples of some very socialist countries that are doing all of this, where you don't have the rights that you might want right there.

The typical Marxists socialist countries that are out there. So the average person doesn't have to worry about it too much. Is that what's your thinking? Because in fact, what happened is that the average person, right?

[00:06:00] Can be the target of stocker, where if that person has someone that wants to monitor them.

So who might want to monitor you for instance? obviously, maybe a lover, ex girlfriend, boyfriend, ex lover, maybe a jealous person. Who's just a third. Party, maybe your best friend, right? You we're always hearing about somebody marrying the husband or the brother or sister of someone that they're dating anybody who has physical access to your device could potentially.

Put stock aware on it. And that's where I'm constantly warning people. If you work with China, be very cautious. And if you go to China, the same thing applies because they will go into hotel rooms. They've been caught doing it before and they'll copy all of the contents of your computer. So I'll make sure everything is encrypted.

You probably want to turn off your computer.

[00:07:00] Entirely all the way down so that they can't use some of the techniques that will look into the memory of the computer to try and find the encryption key, because it is kept in the memory. There's some really cool techniques to do that. It's some pretty simple one.

So shut it all the way down. But. These people that want to monitor us. If they have access to it, they can do it. victims of domestic abuse. They're a common, person that could have stock or where the abuser puts it on the phone, because usually abuse is about controlling somebody. And if you're controlling them, you want to see what they're doing, what they're saying online.

It's a very modern concern, but it's a real. Concern. We need to be careful of a motherboard had a really good little article on it recently. Now, one of the things that is happening right now to fight back are the ads for the stocker where ads have been appearing all

[00:08:00] over social media. So you can go to Facebook and see had for stock or where, It's monitors spy on. and so now there's new. Policies that are just going into effect. I think they might go into effect August, but w new policies are going to affect by all these major social media sites that say we will not accept advertising for stocker war, but unfortunately there is a loophole when it comes to advertising for style or where, because that's same software.

Can be advertised as something to monitor your kids online. And we all want to do that. Don't we, while I'm on a monitor or kids and make sure they're not going to bad places and even more, we want to make sure they're not being influenced by a bad influence, maybe bit of a pedophile or something. You just don't want that to happen.

So what do you do? If you are a Mac user, I want you to visit this site right

[00:09:00] now. I want you to write this down. It's called objective C as an S E. So go to objective dash C. Pretty sure that's where it is. Let me just double check here on my note. Yeah, it's subjective-c.com. Now this guy's a security researcher, his name's Patrick Wartell.

He works at damp, J a M F, which is a great company that has all kinds of software for monitoring computers and controlling them. Making sure certain software's installed software is updated. Remote control, everything else. Okay. Jamf, if you want to check that out, we don't use them. We use some software from IBM.

That actually has some real security validation to it, but, he said the best way, easiest way is to just keep your device out of the hands of someone that might be a starker. Okay. So that's obvious. And, that doesn't mean that it's always going to happen. Kaspersky labs have some good

[00:10:00] points here.

they're saying that the industry is messed up. They use a stronger word than that. And everybody providing these services are one of the worst people on this planet. Okay. Not that he has any opinion about the matter, right? For iOS, if you have an iPhone or an I pad, usually what they use is device management.

So go to your settings, general profiles and device management. So go there right now on your phone. This is how to check to see if you might have stock or were installed, go to their settings, general profiles and device management. And. If you don't see the device management in there, it's a reasonable thing, because that means there is no device management.

And so therefore there's almost certainly no stock or where regular stock or where. However, if there is device management, don't panic. Because it might be legitimate. If your phone is a business phone,

[00:11:00] it's probably legitimate, but that's the easiest way to do it. There should be a remove management option in the settings as well.

When we get back, we're going to do a little bit more of a dive here. What if you have windows? What if you have Android? We're going to talk about that.

You're listening to Craig Peterson. Make sure you visit me online right now. Sign up for my email list. Craig peterson.com/subscribe.

 I've got some treats for you when you subscribe and you'll get my weekly newsletter and info about some of the trainings I'm doing.

All right, take care. We'll be right back.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553