loader from loading.io

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

Release Date: 02/03/2023

Preserving Innocence: A Parent's Guide to Protecting Children from Social Media Hazards show art Preserving Innocence: A Parent's Guide to Protecting Children from Social Media Hazards

Craig Peterson - America's Leading Technology News Commentator

In today's digital age, our children face unprecedented risks on social media platforms. As parents, it's crucial to understand these threats and take proactive measures to ensure their safety. In a recent article, I delved into this pressing issue, highlighting key points that every parent should keep in mind. Join me as I discuss the alarming ease with which children can be exposed to inappropriate content and dangerous individuals online. We'll talk about vigilance, monitoring, and teaching our kids how to be safe online. Don't miss out on the essential tips and tools I've shared in the...

info_outline
The Truth Unveiled: Debunking the Top 10 Myths about Digital Data Security show art The Truth Unveiled: Debunking the Top 10 Myths about Digital Data Security

Craig Peterson - America's Leading Technology News Commentator

In this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn...

info_outline
Defend Your Digital Kingdom: The Most Powerful PC Protection Tools show art Defend Your Digital Kingdom: The Most Powerful PC Protection Tools

Craig Peterson - America's Leading Technology News Commentator

Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If...

info_outline
Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information show art Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information

Craig Peterson - America's Leading Technology News Commentator

Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to...

info_outline
The Hand That Protects: How Privacy-Focused Search Engines Are Revolutionizing the Way We Surf the Web show art The Hand That Protects: How Privacy-Focused Search Engines Are Revolutionizing the Way We Surf the Web

Craig Peterson - America's Leading Technology News Commentator

Do you ever feel like someone is watching you as you browse the internet? With so much personal data at stake, it's no wonder that online privacy has become a hot-button issue. Luckily, there's a new player in town: privacy-focused search engines. These search engines are prioritizing user privacy and security by shaking up the online landscape. No longer will your personal information be sold to the highest bidder or your browsing history used against you. With privacy-focused search engines, you can rest easy knowing that your online activities are shielded from prying eyes. But how do they...

info_outline
How Software Makes Everything Vulnerable: Where to Start Protecting Your Network show art How Software Makes Everything Vulnerable: Where to Start Protecting Your Network

Craig Peterson - America's Leading Technology News Commentator

In this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It's essentially a security hole in software that hasn't been patched yet. These vulnerabilities can range from minor to critical, depending on how long the vendor can patch them. These are so dangerous because hackers can take advantage of them before they're patched. They can use these vulnerabilities to infect your computer with malware or ransomware, steal your data, or even take control of your...

info_outline
Exposing the Dark Side of Windows Updates: What You Need to Know Now!  🔍💻🚨 show art Exposing the Dark Side of Windows Updates: What You Need to Know Now! 🔍💻🚨

Craig Peterson - America's Leading Technology News Commentator

In today's fast-paced, technology-driven world, it is crucial for computer users to stay informed about the latest updates and security measures for their systems. For Windows users, automatic updates are a common method of ensuring their devices remain up-to-date and protected against various threats. While these updates are essential for maintaining a secure and smoothly operating system, they can also introduce unexpected problems, such as data loss, system instability, and other unwelcome changes. This podcast aims to shed light on the hidden dangers of automatic Windows updates and...

info_outline
Patch to the Future: The Ultimate Guide to Firewall and IoT Device Security show art Patch to the Future: The Ultimate Guide to Firewall and IoT Device Security

Craig Peterson - America's Leading Technology News Commentator

Which patches are critical? When do they really need to be applied? That’s where our new PatchAware™ features come in. We’re monitoring the thousands of patches that are issued every week, and will tell you which patches are the most critical to install right now. This week’s tip, 9 years after it was discovered, is the “Heartbleed” bug. It is still one of the most significant threats to online security. It gives the bad guys access to sensitive information from affected systems.  This article highlights the importance of upgrading software and keeping it up-to-date with...

info_outline
Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
 
More Episodes

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint

The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers…

https://craigpeterson.com/browsers/a-step-by-step-guide-to-clearing-your-browser-history-and-wipe-away-your-online-footprint/38583/

Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security. 

They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions' potential consequences, such as identity theft or data breaches.

https://craigpeterson.com/cyber-breaches/small-business-owners-be-wary-of-relying-on-younger-family-members-or-employees-to-manage-their-cybersecurity/38585/

Electric Cars…

Security and the Electric Vehicle Charging Infrastructure Failing US

https://www.darkreading.com/attacks-breaches/security-and-the-electric-vehicle-charging-infrastructure

The communications networks that connect chargers with their management system, the personal data that travels across those networks, the charge-point operators collecting payments, and the grid itself are increasingly vulnerable as the EV ecosystem grows and the attack surface expands. The risks include (but are not limited to):

  • Disruption of operations for public charger networks, rendering large numbers of chargers unusable and interfering with transportation
  • A takeover of charger networks to use the chargers as bots in massive distributed denial-of-service (DDoS) attacks
  • Theft of customers’ personal identifiable information (PII), including payment card information
  • Fraudulent payments for electricity used in EV charging
  • Disruption to the power grid, leading to blackouts and equipment damage
  • Damage to the EV charging provider's reputation

Google…

Google Pushes Privacy to the Limit in Updated Terms of Service

https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit

Google has a long history of searching the Play Store, its app repository, for programs that contain malware. Less than a year ago, Google removed multiple apps from the Play Store that had the banking Trojan SharkBot hidden inside.

However, while removing troublesome apps from the Play Store would seem prudent, Google takes this one step further into a legal gray area.

Debbie Reynolds says that Google's ToS is ambiguous because it is unclear precisely what it might block or remove that is "known to be harmful to the device, data or users." The ToS also does not commit Google to tell users when it makes such a deletion.

Ransomware…

Ransomware Profits Decline as Victims Dig In, Refuse to Pay

https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay

In another sign that the tide may finally turn against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers.

"Our findings suggest that a combination of factors and best practices — such as security preparedness, sanctions, more stringent insurance policies, and the continued work of researchers — are effective in curbing payments."

"The businesses that are most inclined not to pay are those that are well prepared for a ransomware attack."

Privacy…

Why your data is more valuable than you may realize

https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/

The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think.

Use a GPS map app to find a restaurant that specializes in a particular cuisine, and the search provider can ascertain that you eat out, what day of the week you eat out, possibly how frequently, how far you are prepared to travel, possible food preference, the time of day you eat, etc. In this case, the snippet of data was just the name of the restaurant, yet the resulting information that can be deduced from the action can be significant.

Understanding how data is collected and the conclusions that can be drawn is complicated and likely a topic that is interesting when someone explains it but probably too complex for any actions to avoid collection. I would hazard a guess that even those in the know, so to speak, likely give away more information than they realize.

Dark Web…

Business Insiders Pose a Huge Threat – Hunting Insider Threats on the Dark Web

https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web

According to recent research, malicious employees contribute to 20% of incidents, and the attacks that insiders are involved in are, on average, ten times larger than those conducted by external actors. Further data has shown an increase in insider threat attacks over the past two years, as the risk has been exacerbated by remote working through the pandemic.

To minimize insider threats, all organizations should monitor marketplaces, forums, and social media channels for chatter about their company. This helps them to spot the early warning signs of an imminent attack, such as cybercriminals looking for insider knowledge or disgruntled employees making unsavory comments.