loader from loading.io

AS HEARD ON - The Jim Polito Show - WTAG 580 AM: North Korea Hacking and Social Media Censorship through Birdwatching

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 01/26/2021

eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
 
More Episodes

Welcome!

Good morning, everybody. I was on WTAG this morning with Jim Polito.  We had an interesting discussion about North Korea and their extensive hacking efforts, who is supporting them, and why.  Then we got into Social Media censorship and Birdwatching and how the left has succeeded in shutting down conservative opinion. Here we go with Jim

For more tech tips, news, and updates, visit - CraigPeterson.com.

--- 

Automated Machine Generated Transcript:

Craig Peterson: [00:00:00] Good morning, everybody. Craig Peterson here this morning, we talked about Canada being a big hacker nation and the other big one, there's really top three if you will. So that's what we got into today. A lot of people just weren't expecting what's happening. It's crazy. So we get into why Mr. IL is out there hacking and it was a surprise to Jim, anyway.,

Hopefully, you got my email this morning. I got another one Thursday. We've got some little training things coming up that I want you to pay attention to all part of this launch of the finally the improving windows security course.

No, we had a name. We had like working names, everything else, you know how that goes, but the whole idea behind the course is how to improve your windows security to that next level. All right, everybody, take care. And here we go.

Jim Polito: [00:00:59] Craig Peterson, the Tech-Talk guru and our good friend who joins us every Tuesday at this time.

Good morning, sir.

Craig Peterson: [00:01:06] Good morning.

Jim Polito: [00:01:08] Hey, we're going to get some Some of your, Canada like weather, just a little bit, little snow. Hey, a little snow.

Craig Peterson: [00:01:17] Have you seen this? A Northwest territory's Buffalo airways show. They have it on the weather channel at times at night, sometimes. They're up in the Northwest territory up in Yellowknife. They're flying to places, Calgary, Edmonton, red deer, that's south to them.  I never moved this far North as those guys. Yeah.

Jim Polito: [00:01:39] You might as well be in Alaska seriously.

Craig Peterson: [00:01:43] Yeah. Yeah, exactly.

Jim Polito: [00:01:48] Here's something I want to talk about still more about social media and censorship and everything else that's going on, but I do want to ask you about. The country in the world that is probably the least high tech or one of the least high tech. You see a satellite picture of this country at night and there aren't many lights on, and yet they couldn't be one of the best hacking units in the world.

I think I'm giving it away as to who it is, Craig, but I'll let you, yeah.

Craig Peterson: [00:02:25] Yeah. It's Canada.

Jim Polito: [00:02:27] No, that was pretty good because if you get, if you see a picture of the Northwest territories at night, there aren't any lights up the other than the Northern lights.

Craig Peterson: [00:02:41] The Northern half of Canada has a total of just over a hundred thousand people that said something like two-thirds of the population lives within a hundred miles of the US border.

But no, that's not it here. We're talking about cybersecurity and cybersecurity has become a real problem. In fact, Rhode Island. Now you can call 211 to report cybercrime in Rhode Island. In Mass, there is a 211 is you probably could, but Rhode Island has been really leading this somewhat and setting this up.

For cybercrimes and includes cyber-stalking, identity theft, financial fraud, cyberbullying. They've been trying to stay ahead of this game. So what we're talking about right now is this state-sponsored hacking.

Now countries, if you look at Russia, you look at China, they're hacking us as part of what kind of world war three right.

What's the easiest way for us to attack the United States. It's via cyber. We've seen power outages in some of these countries, including Iran lately. There's a lot of speculation that it's us doing that to them.

Although Iran says the reason that they've had power outages is that too many people are trying to mine Bitcoin cyber currencies. They use too much electricity and we didn't allot for that then. They shut down 1600 cyber mining facilities within Iran.

There are countries like Iran that want the cash and North Korea, believe it or not, is one of the leaders out there because they want their hands on money. They have a number of different groups out there. There's a Lazarus group, which is probably the best known, Hidden Cobra is another one of them. They do all kinds of extortion and ransom and just general online so that they can get their hands on money.

There's an estimated of I've seen various numbers, about three to 6,000 people in North Korea that are very advanced technologically. They have gone to foreign universities.

Look at current leader of North Korea. He went to school over in England, and it's just amazing. Some of the things we let these other countries do.

Now they have what Kim Jong himself calls an all-purpose sword that guarantees North Korea military capability to strike relentlessly. The main reason they're doing this is getting their hands on hard currency.

Jim Polito: [00:05:32] That makes sense. We're talking with Craig Peterson, our tech talk guru. So Craig, the expression if only you had used your powers and skills and talents for good. This type of high-tech hacking, that requires smart people requires some hardware, requires software, all of this, they're doing it just to steal, so that they can fund them, shall we say, hermit nation.  As I said, you take a satellite picture of the nation at night and there's hardly any lights on because there's just, the people are living in a primitive society. So that's their motivation.

When you look at Yosef Stalin when he first became a communist, this was before they had over three around the czar, he was a bank robber, robbing banks for money, for the Bolsheviks, for the revolution.

Isn't that basically what they're doing here in North Korea, although they've already had their communist revolution.

Craig Peterson: [00:06:40] Yeah, they are. That is what they're doing. They're trying to fund this so that they can feed their people. Remember people are starving in North Korea. These are defectors their medical conditions are just insane, crazy. 

They're also directly tied into China. So even though they're obviously playing not even second fiddle there they're way in the back in a different auditorium, from China.

China is a huge cyber threat and frankly. Russia and China and then North Korea is right behind them. China is actually providing them with some of this technology to do the hacking as well, which is absolutely fascinating to me.  China is continuing to support North Korea, but it's doing it by giving them technology, giving them training, allowing North Koreans into their universities. Specifically, so that they can learn how to hack computers in the United States, as well as other countries, and fund themselves. So they don't have to keep coming back to China for more money and grain and oil and everything else for free at the very least they'll be able to pay for it.

It's like the kid in the basement you're trying to get rid of, and not everyone can get on that hermit out of the basement and put them into the white house.

Jim Polito: [00:08:01] Wow. We're talking with Craig Peterson tech talk. We will tell you how you can get in touch with him at the end of this segment.

But Craig, we just got a few more minutes here. Anything new in social media? I heard Twitter invented, what is it? Bird something or bird catcher or whatever. This system that's supposed to identify tweets that are inappropriate. Does this really mean anything?

Craig Peterson: [00:08:34] Yeah, they've been doing it for quite a while. It's called birdwatch and this is a community-based.  Here's what's really been going on and no one, I don't understand why, but I haven't heard anyone else talk about this. Jim.

This is a first in the media, but the problem we have out there is that Twitter and Facebook, they don't have the time. They don't have the resources, even the artificial intelligence to be able to monitor all of the tweets and catch the bad ones.

The way they find the tweet that they want to shut down is they get people reporting them. So now they've made this more formal by calling this community, birdwatch and doing all of this stuff. Here's what happens, you post something online that is maybe slightly questionable, especially if you'd take it the wrong way. There are people who are sitting there again in the basement I'm running for president, or maybe they've never gotten a job, or maybe it's both. They're watching a few social media accounts.

They think of these hacking communities overseas, where you have all of these people. Pretending to be someone else. As they're pretending to be someone else there, they're posting and trying to change our opinion, right? So much of these bots, et cetera, we're not going to get into that right now. The reason Twitter shuts things down is that somebody reports.

Now you or I, we looked at a tweet and say that guy's an idiot and we move on. But the people on the left, particularly the far left, all see a tweet and they will say, okay, we can get them on this one. They then have a few hundred of their fellow community members report that person, tweet to Twitter. Twitter then has to respond based on his community standards because so many people were complaining. You got a 24-hour ban or demonetization. That's the big secret behind all of this?

It's these kids, bad guys obviously not all of them are young kids who are sitting there watching certain accounts reporting on mass. People w via different people and different bonds. That this is really offensive to them and now Twitter has something to fall back on.

Jim Polito: [00:11:09] Yeah. And you know what? They destroy a lot of conservatives and I've had it. I've had it happen to me. That's why everything I write on Twitter, anywhere else, is something that I would not be afraid to say to a priest, my late mother, when she was alive, anyone like that is. 

I have my political opinions, but the way in which I convey them, I do it in a way that's not offensive, but even doing that, they keep reporting.

You can get hurt and that's scary. That is scary. Craig.

If folks want to get more information from you what do they do?

Craig Peterson: [00:11:52] I sent out this morning, in fact, a video to everyone that's on my email list, and I've got another email going up Thursday. I've got some more training coming out. This is all training stuff, people, and you can get on that list.

Just go to Craig peterson.com. You can subscribe right there. Craig Peterson.com/subscribe. If you'd like. All of my podcasts are up there. You can get copies of these special reports. Like the one, I released today and much, much more just Craig peterson.com.

Jim Polito: [00:12:25] All right, Craig. Thanks so much, great information. We'll catch up with you.

Craig Peterson: [00:12:30] Take care. Thanks. Jim.

Jim Polito: [00:12:32] Thanks. Bye-bye, all a final word. When we return.

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553