Synopsis
ClearChannel Radio's Number One Weekend Tech Show in the Boston Market -- More Than 20,000,000 Podcast Downloads! Craig interviews top industry insiders and explains the technology secrets everyone needs to know.www.CraigPeterson.com
Episodes
-
Beyond Likes and Comments: Empowering Parents with Craig's Cutting-Edge Strategies for Managing Children's Social Media Use
10/06/2023 Duration: 01h15minIn this episode, we delve into the world of digital parenting and equip you with the necessary knowledge to navigate your children's social media activities. Join us as we explore Craig's comprehensive guide, which provides cutting-edge strategies for managing and regulating your kids' online presence. Episode Highlights: Learn how to set up parental controls on popular platforms like Facebook, Instagram, Twitter, and TikTok. Discover reliable third-party apps and tools that can simplify monitoring your children's social media use. Understand the significance of open communication with your kids about their online activities. Gain insights into effective talking points to address with your children regarding responsible social media behavior. Explore additional resources and recommendations to enhance your digital parenting journey further. Other topics discussed in this podcast: The Threat to Our Kids Rapid Onset of Gender Dysphoria Why People Don't Patch Patching Firewalls and WiFi Futility of Insurance
-
Preserving Innocence: A Parent's Guide to Protecting Children from Social Media Hazards
03/06/2023 Duration: 01h27minIn today's digital age, our children face unprecedented risks on social media platforms. As parents, it's crucial to understand these threats and take proactive measures to ensure their safety. In a recent article, I delved into this pressing issue, highlighting key points that every parent should keep in mind. Join me as I discuss the alarming ease with which children can be exposed to inappropriate content and dangerous individuals online. We'll talk about vigilance, monitoring, and teaching our kids how to be safe online. Don't miss out on the essential tips and tools I've shared in the article to help shield our little ones from the dark side of the internet. Subscribe now to our podcast and gain valuable insights into protecting our children from the potential pitfalls of social media. To access the detailed article and embark on this journey of safeguarding our children, visit: Stopping Children From Becoming Victims Of Social Media Remember, our kids' safety is in our hands. Let's work together to crea
-
The Truth Unveiled: Debunking the Top 10 Myths about Digital Data Security
26/05/2023 Duration: 01h47minIn this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn practical steps you can take to enhance your overall online security. Secure Websites: Debunking the Myth of Invincibility Gain a deeper understanding of even seemingly secure websites' vulnerabilities and how cybercriminals can exploit them. Identity Theft: Taking Action to Safeguard Your Information Realize that it's never too late to protect yourself against identity theft, and explore strategies to stay informe
-
Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information
12/05/2023 Duration: 01h27minAre you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to fortify your defenses. In this article, you will learn the steps to recognize that you are a potential target, be cautious of unsolicited emails and phone calls, and use multifactor authentication as an extra layer of protection. Additionally, you'll learn how to prevent breaches by not clicking on links in emails. If you want to stay ahead of the curve and protect yourself from the ever-evolving tactics of cybercriminals, th
-
Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information
12/05/2023 Duration: 01h27minAre you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to fortify your defenses. In this article, you will learn the steps to recognize that you are a potential target, be cautious of unsolicited emails and phone calls, and use multifactor authentication as an extra layer of protection. Additionally, you'll learn how to prevent breaches by not clicking on links in emails. If you want to stay ahead of the curve and protect yourself from the ever-evolving tactics of cybercriminals, th
-
The Hand That Protects: How Privacy-Focused Search Engines Are Revolutionizing the Way We Surf the Web
08/05/2023 Duration: 01h26minDo you ever feel like someone is watching you as you browse the internet? With so much personal data at stake, it's no wonder that online privacy has become a hot-button issue. Luckily, there's a new player in town: privacy-focused search engines. These search engines are prioritizing user privacy and security by shaking up the online landscape. No longer will your personal information be sold to the highest bidder or your browsing history used against you. With privacy-focused search engines, you can rest easy knowing that your online activities are shielded from prying eyes. But how do they work, you ask? It's simple. Rather than tracking your every move online, these search engines prioritize your privacy by avoiding invasive tracking techniques. Instead, they focus on providing you with accurate search results without compromising your personal data. And the benefits don't stop there. Privacy-focused search engines also offer powerful tools for businesses looking to keep their sensitive information under
-
How Software Makes Everything Vulnerable: Where to Start Protecting Your Network
21/04/2023 Duration: 01h26minIn this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It's essentially a security hole in software that hasn't been patched yet. These vulnerabilities can range from minor to critical, depending on how long the vendor can patch them. These are so dangerous because hackers can take advantage of them before they're patched. They can use these vulnerabilities to infect your computer with malware or ransomware, steal your data, or even take control of your entire system without you knowing it's happening! You need to do a few different things to protect yourself from these attacks, and we will discuss them all step-by-step.
-
Exposing the Dark Side of Windows Updates: What You Need to Know Now!
15/04/2023 Duration: 01h25minIn today's fast-paced, technology-driven world, it is crucial for computer users to stay informed about the latest updates and security measures for their systems. For Windows users, automatic updates are a common method of ensuring their devices remain up-to-date and protected against various threats. While these updates are essential for maintaining a secure and smoothly operating system, they can also introduce unexpected problems, such as data loss, system instability, and other unwelcome changes. This podcast aims to shed light on the hidden dangers of automatic Windows updates and provides a comprehensive guide to help users protect their valuable data and maintain a stable system. Automatic Windows updates are designed to provide users with the most recent security patches and feature improvements, keeping their systems running optimally. However, these updates can also introduce new bugs and incompatibilities, which can lead to system instability and crashes. In some cases, the new software components
-
Patch to the Future: The Ultimate Guide to Firewall and IoT Device Security
15/04/2023 Duration: 01h08minWhich patches are critical? When do they really need to be applied? That’s where our new PatchAware™ features come in. We’re monitoring the thousands of patches that are issued every week, and will tell you which patches are the most critical to install right now. This week’s tip, 9 years after it was discovered, is the “Heartbleed” bug. It is still one of the most significant threats to online security. It gives the bad guys access to sensitive information from affected systems. This article highlights the importance of upgrading software and keeping it up-to-date with regular security patches to protect against Heartbleed and other vulnerabilities. The Need for Upgrading Firewalls and IoT Devices The need for upgrading firewalls and IoT devices is a clear one. As the number of connected devices continues to grow, so do the risks associated with them. A lack of proper security can lead to a variety of problems: • Ransomware attacks on hospitals or other critical infrastructure • Hackers stealing sensitive i
-
Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.
24/03/2023 Duration: 01h27minFirst up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised, you'll want to change the password associated with that account immediately. Next, let's talk about something more futuristic: artificial intelligence (AI). AI refers to machines that are capable of performing tasks that would typically require human intelligence, such as learning from experience or recognizing speech patterns. To give you a live demonstration of AI in action - think about Siri on an iPhone - ask her a
-
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy
11/03/2023 Duration: 01h26minWelcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy https://craigpeterson.com/internet/privacy-internet/discover-the-secrets-of-internet-anonymity-and-protect-your-privacy/38677/ The best way to protect yourself from online theft is to stay anonymous and keep your online activities private. Taking the necessary steps to ensure anonymity can significantly reduce your risk of being targeted by malicious actors. I’ve put together an Action Guide showing 10 Steps you can take to increase your Anonymity and Protect Your Pr
-
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure
18/02/2023 Duration: 01h27minCyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the ransomware will encrypt all of the data and demand a ransom from the victim before releasing the data. To stay safe from ransomware, all small businesses should educate their employees about the dangers of clicking on malicious links or opening unexpected email attachments. Additionally, businesses should back up their data frequently and ensure that all software is up-to-date. Phishing Scams Phishing is a type of attack designed to s
-
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI
11/02/2023 Duration: 01h26minArtificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported minerals, particularly from China, which is accused of dumping cheap products into the U.S., causing prices to plummet. The Trump administration has been working on curbing this practice through tariffs imposed on steel and aluminum imports from China and other countries. But critics say those efforts are misguided because they would raise costs for American companies that use those metals in their products — from cars and airp
-
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US
03/02/2023 Duration: 01h26minA Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… https://craigpeterson.com/browsers/a-step-by-step-guide-to-clearing-your-browser-history-and-wipe-away-your-online-footprint/38583/ Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security. They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions' potential consequences, such as identity theft or data breaches. https://craigpeterson.com/cyber-breaches/small-business-owners-be-wary-of-relying-on-younger-family-members-or-employees-to-manage-their-cybersecurity/38585/ Electric Cars… Sec
-
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More
28/01/2023 Duration: 01h26minChatGPT's Technology Will Be Part of Everything This Year https://craigpeterson.com/artificial-intelligence-2/chatgpt/chatgpts-technol…ything-this-year/38570/ ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to create plausible-sounding fan fiction about Harry Potter and the Avengers. The latest development in this field is ChatGPT's ability to generate paragraphs, full-length sentences, and even paragraphs. In addition, the system can produce coherent text up to a certain length (currently between 10 and 15 sentences) that humans
-
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports
21/01/2023 Duration: 01h26minGoogle Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click.https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-to-spread-malware-in-legit-software/ Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google AdWords, is a platform provided by Google that allows businesses and individuals to create and display online advertisements on various websites and platforms across the internet, including Google's own search engine results pages. Advertisers can create and target ads based on keywords, demographics, interests, and o
-
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.
14/01/2023 Duration: 01h27minArtificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient and effective. And if you think this is just another boring news story about how artificial intelligence is taking over everything… well, sorry to tell you that most of these "news stories" are probably written by computers anyway! Cars… Touch Screens on Dashboards Found to be Dangerous Evidence suggests that touch screens in cars may be more distracting than traditional controls such as knobs or buttons. This is because
-
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?
06/01/2023 Duration: 01h26minPrivacy… Ring Cameras Hacked in 'Swatting' Scheme https://www.entrepreneur.com/business-news/ring-cameras-hacked-in-swatting-scheme/441518 Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal your password vaults, after all… https://nakedsecurity.sophos.com/2022/12/23/lastpass-finally-admits-they-did-steal-your-password-vaults-after-all/ …“customers’ information” turns out to include both customer data and password databases. Loosely speaking, the crooks now know who you are, where you live, which computers on the interne
-
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized
10/12/2022 Duration: 42minCraig Peterson Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China https://www.wsj.com/articles/apple-china-factory-protests-foxconn-manufacturing-production-supply-chain-11670023099 In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year of events that weakened China’s status as a stable manufacturing center, the upheaval means Apple no longer feels comfortable having so much of its business tied up in one place, according to analysts and people in the Apple supply chain. Cybercrime… Spyware posing as VPN apps https://www.welivesecurity.com/videos
-
Can't Trust Amazon.com Any More
03/12/2022 Duration: 01h26minIt's not your imagination: Shopping on Amazon has gotten worse https://www.washingtonpost.com/technology/interactive/2022/amazon-shopping-ads/ [Amazon founder Jeff Bezos owns The Washington Post] Sure, Google and Facebook are chock full of ads, too. But on Amazon, we're supposed to be the customers, not the eyeballs for sale. We're paying Amazon to buy a product and probably paying for a membership in its Prime two-day shipping product. When you search for a product on Amazon, you may not realize that most of what you see at first is advertising. Amazon is betraying your trust in its results to make an extra buck. I call it the "shill results" business. Even when they contain a tiny disclaimer label — as do Amazon's — these ads can be misleading because they fill up spaces people have every reason to expect to collect trustworthy, independent information. Privacy… Tor vs. VPN: Which should you choose? https://www.welivesecurity.com/2022/11/18/tor-vs-vpn-which-choose/ Tor and a VPN can significantly help you