The Chaddington Post: Insider Edition Podcast

Chad Burge
The Chaddington Post: Insider Edition Podcast

Join The Chaddington Post: Insider Edition for exclusive insights on tech, cybersecurity, and AI from Chad. Explore cutting-edge innovation with humor and wit, and stay ahead of the curve by subscribing today! #ChadGPT www.thechaddingtonpost.com

  1. 08/03/2023

    Device Fingerprinting: The Invisible Stalker Online

    Welcome to another Insider Edition of The Chaddington Post, where we make the complex world of tech and cybersecurity digestible for everyone. Today, we're diving into the murky waters of device fingerprinting. Buckle up, folks! This will be a wild ride through the labyrinth of digital tracking, where every click, every scroll, and every page view leaves a trail. It's like a digital detective story, with you as the unwitting protagonist and an invisible stalker always on your tail. The Invisible Stalker Did you know that whenever you browse the internet, you leave a unique trail behind? It's not just cookies anymore. Companies and governments are using sophisticated methods to track your online activity. They can identify your device through its unique characteristics, a process known as device fingerprinting. Think of it as your device's digital DNA, a unique combination of traits that can be used to identify it among billions of others. It's like a digital detective, always on your tail, examining your every move. This detective doesn't need a magnifying glass or a fingerprint powder - it uses your device's unique characteristics to track you. The Art of Fingerprinting Fingerprinting is a sophisticated tracking technique that goes beyond cookies. It uses unique markers from your hardware to identify and track your activity. Here's a list of some of the data points that can be used for fingerprinting: * IP address: Your unique address on the internet. It's like your home address but for your device. * HTTP request headers: These are sent every time your browser requests a webpage and can reveal information about your browser and operating system. * Plugins or fonts: The specific combination of plugins or fonts you have installed can be unique. * Screen resolution: The exact pixel dimensions of your screen can be another identifying factor. * Battery information: Yes, even the status of your battery can be used to track you! * Operating system: Whether you're a Windows fan, an Apple aficionado, or a Linux lover, your OS is another piece of the puzzle. * User agents: This is a string that the browser sends to the website describing itself. It usually includes the name and version of the browser, the operating system, and sometimes the device model. * Flash data: If you still have Flash enabled (and you really shouldn't), it can be used to track you. * VPN and browser information: If you're using a VPN or a specific browser, this information can be used as part of your digital fingerprint. * Type of web browser and browser version: Different browsers have different characteristics that can be used to identify them. * Time zone settings: Your time zone can reveal your approximate geographic location. * Language settings: Your language can say a lot about you. * Camera lens scratches and dust: This one is a bit out there, but researchers have found that your camera lens's unique imperfections and scratches can be used to identify images taken with your device. This is just the tip of the iceberg. Many more data points can be used to create a unique fingerprint for your device. The scary part is that these methods can still track you even if you switch browsers or go incognito. Why Do Companies and Governments Do This? Now, you might wonder why anyone would want to go to such lengths to track your online activity. Well, the answer is simple: data is valuable. Data is often called the 'new oil' of the digital economy. It fuels the engines of modern businesses and governments, powering everything from targeted advertising to national security operations. Companies, for instance, can use this data to target ads more effectively. By understanding your browsing habits, preferences, and online behavior, they can tailor their advertisements to match your interests. This increases the chances of you clicking on their ads and purchasing their products or services. But it doesn't stop there. Companies can also use this data to personalize

    2 min
  2. 07/21/2023

    Securing Your IoT and Remembering Legends: Kevin Mitnick and Tony Bennett

    Greetings, Insiders! It's Chad, back with your regular dose of cyber sagacity, a sprinkle of whimsy, and a nod to culture. Today, we're standing on the shoulders of giants, peering into the labyrinth of IoT devices and celebrating the birth of an idea that might save us from a robot uprising. Excited? Me too! TrustMark Initiative: Making IoT Security Sexy In the news hotter than a soldering iron, the Biden-Harris administration has unveiled the TrustMark initiative - a cybersecurity labeling system on a mission to spell out the security prowess of smart devices. Picture it as a 'sell-by' date for cyber threats. If you want to immerse yourself in all the details, you can just head over to their official press release. For the latest cybersecurity insights, subscribe to TheChaddingtonPost.com today – remember, in the digital battlefield, knowledge is your Excalibur. Securing a TrustMark involves hopping over several hurdles, including assuring the device is not a haven for known vulnerabilities, flaunting an upgradable software, and guarding user data like a miserly dragon hoarding gold. A promising stride towards holding manufacturers accountable and empowering consumers to identify secure devices. IoT Devices: Trojan Horses or Temperamental Toasters? IoT devices - mini-computers in disguise, freely cavorting on your network – and potentially, privy to your darkest secrets. Many of these handy-dandy devices run full or lite versions of Linux, transforming them into irresistible hacker bait. The truth is as bitter as burnt coffee: these devices, as useful as a Swiss army knife, also usher in a Pandora's box of vulnerabilities. Kevin Mitnick: The Cyberpunk Who Shifted My Trajectory The world of cybersecurity owes much to Kevin Mitnick, a digital daredevil who made a sport of exploring unchartered territories. I first crossed paths with Mitnick in 2004, during this interview and found myself enthralled by the realm of hacking. His compelling book, "The Art of Deception," was my rabbit hole into the captivating world of social engineering. The realization that trust, an inherently human quality, could be so effortlessly manipulated was a plot twist. His influence was seminal, shaping my career path and spurring a love for hacking and then cybersecurity that rivals my affection for coffee. Mitnick introducing me to social engineering was a skill that's come in handy more often than not, especially during my stint in sales. And yes, I may or may not have used it to secure backstage passes and infiltrate concert VIP zones. But, as they say, what happens behind the velvet rope, stays behind the velvet rope! Tony Bennett: The Maestro of Melodies As we navigate the complex chords of technology, we pause today to remember a master of simpler ones - the legendary Tony Bennett. Much like a familiar aroma, his music evokes memories and feelings that transcend generations. I was lucky to witness his enchanting performance at Macworld in San Francisco in 2009. Here's a reminder of his timeless magic. Dealing with IoT: Because Your Toaster Might Be Plotting Against You As our homes and workplaces continue to resemble an electronics expo, understanding the potential risks of IoT devices is crucial. Consider whether each device truly needs an internet lifeline. If yes, relegate them to a separate network, significantly reducing the damage from a potential breach. The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. Key Takeaways: 1. The Biden-Harris administration's TrustMark initiative is the cyber knight in shining armor for IoT security. 2. Your IoT devices may be more 'intelligent' than you'd like. They're tiny computers, ripe for hacker picking. 3. The inspirational stories of Kevin Mitnick and Tony Bennett remind us of the power of curiosity, resilience, and an occasional dash of rebellion. Action Items:

    2 min
  3. 07/10/2023

    Bridging the Gap: The Importance of Bilingualism in Tech and Business

    Hey folks, Chad here. You know, in my career, I've noticed a fascinating phenomenon. It's like we're in the Tower of Babel, but we speak in business and tech instead of different languages. And let me tell you, these two dialects could not be more different. Now, I've always been a bit of a translator, a bridge between these two worlds. I've found that I can speak both "Business Executive" and "Technical Engineer" fluently, which has been a game-changer in my career. Especially in cybersecurity, it often feels like CEOs, COOs, and boards are on a different planet than CISOs. The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. But here's the kicker: it's often easier to teach a business person technical acumen than to teach a technical person soft skills. Don't get me wrong, both are challenging, but in my experience, the former is more feasible. And this isn't just me talking. Research shows that technical experts often struggle when they try to apply their problem-solving skills to leadership challenges (source). But here's the thing: it shouldn't all be on the technical teams to learn soft skills. Business executives and boards must make an effort to learn technical as well. And often, this will be easier and less stressful. In fact, studies have shown that technical skills are crucial for business success (source). So, how do we bridge this gap? Well, it's a two-way street. Business folks, take a coding class or complete a track on TryHackMe. Tech folks, read a book on business strategy. And for the love of all things digital, let's start speaking the same language. And if you're struggling with this, remember, I'm here to help. As a consultant, I can serve as a translator, helping both sides understand each other and work together to meet objectives. So, let's get to work. Because in the end, we're all on the same team. Key Takeaways: * There's a significant communication gap between business executives and technical engineers. * It's often easier to teach business acumen to technical people than the other way around. * Both sides need to make an effort to learn each other's language. * Hiring a consultant like Chad can help bridge this gap. Action Items: * Business folks, consider taking a coding or technical class. * Tech folks, consider learning more about business strategy. * Consider hiring a consultant to help bridge the communication gap. Remember, folks, it's not about who's right or wrong. It's about working together to achieve our goals. And if you need a translator, you know where to find me. Until next time, keep bridging those gaps! Chad Get full access to The Chaddington Post: Insider Edition - Tech, Cybersecurity at www.thechaddingtonpost.com/subscribe

    2 min
  4. 07/03/2023

    Securing Your Digital Independence: A Guide to VPNs and IoT Devices

    As we celebrate Independence Day, let's also take a moment to secure our digital independence. In today's interconnected world, protecting our online privacy and security is more important than ever. The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. Firstly, let's talk about Virtual Private Networks (VPNs). These are essential tools for maintaining your online privacy, especially while traveling. They encrypt your data and hide your online activities from prying eyes. Here are three VPNs that I recommend: * ProtonVPN * Private Internet Access (PIA) * Mullvad Remember, you're likely the product if you're not paying for the service. So, it's worth investing in a reliable VPN. And hey, at least with a VPN, you know who's spying on you! Let's move on to Internet of Things (IoT) devices. These devices are notorious for their insecurity. These devices can be a gateway for hackers to infiltrate your network, from smart refrigerators to BBQ pits. Back then, BBQ pits just needed charcoal, not a Wi-Fi connection! If you must connect your IoT devices to your network, consider creating a separate network just for them. This way, even if one device is compromised, the rest of your network remains secure. You can read more about the security risks of IoT devices here. This Independence Day, let's declare our independence from cyber threats. Stay safe, everyone! -Chad The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. Get full access to The Chaddington Post: Insider Edition - Tech, Cybersecurity at www.thechaddingtonpost.com/subscribe

    1 min
  5. 06/29/2023

    Don't Be Fooled: How to Spot and Prevent Generative AI Voice Attacks

    Hello, folks! Chad here from TheChaddingtonPost.com. Today, we will discuss something scarier than finding out your favorite coffee shop has run out of coffee. Yes, we're talking about Generative AI Voice Attacks! Don't miss out on more cybersecurity tips and tricks! Subscribe to TheChaddingtonPost.com today. Because when it comes to staying safe online, knowledge is power! Now, I'm not talking about the kind of voices you hear when your mother-in-law calls. No, this is the kind where cybercriminals use AI to mimic the voice of your loved ones or friends, tricking you into thinking they're in trouble. Services like ElevenLabs can generate incredibly realistic voices. It's like having a personal voice actor, but in the wrong hands, it can be used for some pretty sneaky stuff. But don't worry, I'm here to help you spot these sneaky cyber impersonators and keep your phone lines safe. So, let's dive in! Spotting a Voice Phishing Attack * They often sound like your loved ones or friends, but listen closer! * Is there a weird background noise? * An unusual request? * A sense of urgency? These are all red flags. Now, you might be thinking, 'Chad, I'm not a superhero. How can I protect myself?' Well, it's easier than you think. Protecting Yourself * Never act on suspicious calls. If your friend calls you asking for money, hang up and call them back on a trusted number. * Be aware of the information you share online. * When in doubt, reach out! Contact your friend or family member directly to verify any suspicious calls. And here's a pro tip: Set up a secret word or phrase with your loved ones. Ask them for the secret word if they call you in an emergency. If they can't give it to you, you'll know something fishy is happening. Now, let's have some fun. Here's an example of how ElevenLabs can mimic my voice. A: Me B: AI Spooky, right? But remember, it's just a tool. In the right hands, it's harmless. Remember, the phone line is like a big city. It's exciting and full of opportunities, but you wouldn't give your personal information to a stranger on the street, would you? So, don't do it on the phone either. Stay safe, stay smart, and keep those cyber impersonators at bay! In the world of cybersecurity, you're the superhero. You have the power to protect yourself and your information. So, let's put on our capes and keep the phone lines a safe place for everyone. Join the Cybersecurity Superhero Squad! Subscribe now! P.S. If you found this article helpful, don't forget to share it with your friends and family. Because when it comes to cybersecurity, the more people who know how to protect themselves, the safer we all are. And remember, there's no such thing as being too safe on the phone! Help your friends and family stay safe from cyber threats. Share this article with them today! Get full access to The Chaddington Post: Insider Edition - Tech, Cybersecurity at www.thechaddingtonpost.com/subscribe

    2 min
  6. 06/24/2023

    Venturing into the AI Cosmos: From Cybersecurity Alerts to Cutting-Edge Innovations and Dreams of Narrowboat Living

    Navigating the Cyber Seas: CISA Alerts and Apple Updates We're setting sail into the vast ocean of tech, beginning with CISA Alerts and Apple's security updates for their ever-growing galaxy of devices. With the digital realm becoming increasingly complex, staying vigilant and up-to-date is crucial in guarding your cyber territory from potential threats. The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. An Evening with the AI Titans: SparkCognition AI Reception As we cruise along, we dock at the SparkCognition AI Reception at St. Arnold's. The air was electrified with tech enthusiasts and AI experts mingling over clinking beer glasses. Conversations soared across machine learning algorithms, data analysis, and the future of AI, occasionally interspersed with chuckles over tech puns. Yes, only Sith deal in absolutes, but there was an absolute consensus about one thing - AI is a game-changer. Perfection is a mighty claim in a field as dynamic and evolving as AI. But, let's give it to SparkCognition for pushing the boundaries. NASA Tech Talks and the Magic of Novosound's Ultrasound Tech An orbit away from the bustling AI reception, we journeyed to the cosmos of knowledge at the NASA Tech Talks. The event was a smorgasbord of intriguing presentations, one of them being Novosound's groundbreaking thin-film ultrasound technology. The talk, led by Joe Schmid and Dave Hughes, dived into the intricacies of how the tech could revolutionize various fields, from medicine to industrial inspection. Ion District and Ion Prototyping Lab Next on our tech exploration, we landed at Ion District and their innovative prototyping lab. This dynamic hub of tech creativity offers state-of-the-art tools and collaborative spaces for developing game-changing solutions. It's here that ideas transform into reality, fostering an environment that encourages pushing the envelope of what's possible. Stepping into the Future of Entertainment: OmniSpace 360 Our AI odyssey wouldn't be complete without a look at OmniSpace 360, where the future of immersive entertainment unfolds. Offering panoramic experiences that catapult viewers into virtual realms, it's a testament to how far we've come in blending reality and technology. Generative AI Takes Center Stage at Disney One of the most significant turns of events this week was the bold move by Disney and Marvel. In an unexpected twist, they used generative AI to create the intro for their new show on Disney Plus, 'Secret Invasion.' As detailed in this Arstechnica article, this decision sparked a mixed bag of reactions. But whether we're ready or not, generative AI is knocking on Hollywood's door, and it seems Disney has decided to let it in. Now, just imagine the possibilities if Disney decides to generate AI content based on 'Star Wars'! The Dark Side of AI: Kidnapping Scams Just as we're admiring the glitz and glamour of AI in Hollywood, we're jolted back to reality by the alarming rise of artificial intelligence kidnapping scams. A recent ABC News segment reminds us of the dual-edged sword AI can be. Using generative voice AI, like that provided by Eleven Labs, scammers are creating eerily convincing false voices for nefarious activities. It's crucial that we remain vigilant and raise awareness around this issue. Off the Beaten Path: The Koncrete Podcast Stepping aside from the AI universe, we take a detour into the mysterious world of ancient technology, astronaut gods, and UFOs, brought to life by the Koncrete Podcast. While it might seem a tad out there, you might be surprised to discover how many people find these topics fascinating. Dreaming of Narrowboat Life Lastly, we switch gears from the hi-tech world and plunge into the tranquil charm of narrowboat living. The YouTube VLOGS by Cruising The Cut, Foxes Afloat, and the new couple on the block Ben and Emily offer a peek into

    20 min
  7. 06/16/2023

    Drones, Robots and More: Delving into the Tech Spectacle at the 7th Annual Energy Drone & Robotics Summit with Chad Burge

    Join us as we embark on an exciting journey through the tech-laden aisles of the 7th Annual Energy Drone & Robotics Summit in Houston, TX, with none other than Chad Burge. Get ready to explore American-made drones, a novel reality capture platform, and even a sneak peek into a hilarious city-wide prank. Let's dive in! The Chaddington Post: Insider Edition - Tech, Cybersecurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber. All-American Innovation: Skydio First stop on our tech tour is Skydio, an American-made drone manufacturer that has made waves in the industry with its strong focus on cybersecurity and regulatory compliance. Partnering with giants like NVIDIA, Skydio is certainly an impressive sight on the drone horizon. Key takeaway: American companies like Skydio are setting a benchmark in the drone industry, emphasizing the importance of cybersecurity in the ever-evolving tech landscape. From Drones to Robots: Enter DroneDeploy Next, we visit DroneDeploy, a company that is reshaping perceptions of drone capabilities. Despite its drone-focused name, the company offers a versatile reality capture platform that processes data from various platforms, enabling automated asset inspections utilizing reality capture from the popular Boston Dynamics' Spot drones all the way to a normal smart phone. Key takeaway: Companies like DroneDeploy are pushing the boundaries of data integration, effectively bridging the gap between various tech platforms and creating a more unified, efficient tech ecosystem. Revolutionizing Construction: Kewazo's Liftbot We then traverse to the Kewazo booth, showcasing their robotic hoist system, Liftbot. This German innovation is set to streamline the construction process, marking a significant shift from labor-intensive practices. Key takeaway: Technological advancements are revolutionizing traditional industries, with innovative solutions like Liftbot leading the way. Unconventional Aesthetics: The Turtle-esque Drone from Voliro Our tech adventure takes a fun turn with Voliro's uniquely shaped drone. Resembling a turtle, this drone not only tests paint thickness but also performs a variety of aerial acrobatics. Key takeaway: Drones are increasingly versatile, embodying diverse functionalities and even playful designs. Teaser Alert: The QR Code Rick-Roll Prank To wrap up our tech trek, we introduce an intriguing teaser from an off-the-record chat with the FAA. Stay tuned for more on a drone-facilitated city-wide Rick-roll prank - a humorous testament to drone technology's multifaceted uses (and potential cybersecurity concerns)! Key takeaway: As drone technology evolves, so do the questions and considerations regarding cybersecurity and regulation. Don't forget to hit the 'Subscribe' button below to join our tech adventures on TheChaddingtonPost - no Rick-rolls, we promise! PS: Can't get enough of the Rick-roll prank? Find more about it here! Keep an eye on TheChaddingtonPost for more riveting tech tales. Until next time, -Chad Get full access to The Chaddington Post: Insider Edition - Tech, Cybersecurity at www.thechaddingtonpost.com/subscribe

    1 min
  8. 06/07/2023

    QR Codes in Public Spaces: An Unseen Cybersecurity Risk Right Under Your Nose

    Greetings, Insiders and visitors of TheChaddingtonPost.com! It's Chad here, and I've got a timely cybersecurity topic to share with you. During a visit to the Nela Laura Thomas-Brown Dog Park at Waldemar Park here in Houston, Texas, an otherwise innocuous detail caught my eye: a QR code placed subtly on a memorial plaque. QR codes have been increasingly integrated into our daily lives, offering convenience at the tap of a smartphone. However, with this ease comes a hidden cybersecurity risk. As stated in a Public Service Announcement released by the FBI in January 2022, cybercriminals have started exploiting QR codes to defraud unsuspecting individuals. The risks aren't limited to physical objects. A fascinating yet unnerving sight I captured was a drone, hovering above Houston, displaying a QR code as part of an ad campaign. The reality of such airborne advertisements underscores the need for increased vigilance when scanning these seemingly simple barcodes. So, how do we ensure our safety in this digitized world of QR codes? * Scan with Caution: Limit your QR code interactions to trusted sources. Refrain from scanning those floating in the sky or randomly placed in public spaces without credible sources. * Beware of Personal Data Requests: Should a QR code scan prompt you to download a file or input personal details, be wary. This can be a red flag for malicious activity. * Use Trusted Scanners: Utilize your smartphone's built-in camera or QR code scanner. Avoid third-party apps that may expose your device to additional threats. Awareness is our greatest weapon against such cybersecurity threats. Recognize that cybersecurity extends far beyond complex systems—it's woven into the fabric of our daily lives. For further guidance on safe QR code practices, this article from Fox News provides a great overview. As always, no matter the source, including myself, please do your due diligence and research before acting on any information. Subscribe Now and become an Insider! Don't miss out on important updates and insights designed to empower you in this increasingly digital world. Subscribe now and become an Insider! Don't miss out on important updates and insights designed to empower you in this increasingly digital world. Stay vigilant, stay informed, and above all, stay safe. For more insights and updates on cybersecurity, digital trends, and beyond, be sure to follow TheChaddingtonPost.com. Get full access to The Chaddington Post: Insider Edition - Tech, Cybersecurity at www.thechaddingtonpost.com/subscribe

    3 min

About

Join The Chaddington Post: Insider Edition for exclusive insights on tech, cybersecurity, and AI from Chad. Explore cutting-edge innovation with humor and wit, and stay ahead of the curve by subscribing today! #ChadGPT www.thechaddingtonpost.com

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada