Basics of Biohacking

By Carl Weiss

Is your body letting you down?  How much time out of your daily schedule do you relinquish for exercise?  Are you tired of moving heaven and earth to support that bag of chemicals and water?  Do you wish you could enhance your senses or even add new capabilities to your existing body?  While this used to be the realm of science fiction only a few years ago, current and rapidly emerging technologies allow you to repair, replace or enhance that old bag of bones here and now.  In this week's Working the Web to Win blog, I will take you into the lab to explore bio-tech that is being used to repair, replace or enhance human beings.  I will also introduce you to a new cult of devotees who are ready, willing and able to undergo painful medical procedures to take the cyborg plunge and bio-hack their way to a better life. 
           
Dr. Geekenstein, I Presume

The name Steve Haworth isn’t exactly a household word.  At least not yet.  Unlike the other two Steve’s of Apple Computer fame, Steve Haworth has not yet achieved the level of rockstar geek status that Jobs and Woz did.  But he could well be on his way.  That’s because he is one of the pioneers of body modification who routinely performs surgery on people looking to add enhancements to their body.  Since he is not a board certified surgeon, this means that these procedures are done without the aid of anesthetic, unless you count ice. 

Although Haworth’s family has long been associated with medical device engineering, Steve cut his teeth in the 90’s by dabbling with body piercing, 3D tattoos and something called the Metal Mohawk.  (You can’t make this stuff up folks.)  Fast forward fifteen years and Steve’s modifications are now more sci-fi than technopunk.  One of the enhancements that Steve routinely performs is the surgical implantation of rare earth magnets.  Now I know what you’re thinking, “Why would anybody pay to get turned into a refrigerator magnet?” 

Well, it’s a little more complicated than that.  While Steve and other bio-hacking enthusiasts have posted videos which show them moving metal objects with the magnetic field generated by their enhanced digits, apparently there is another side effect of the procedure.  Apparently this enhancement also provides the recipient with a virtual Spidey sense that allows them to perceive magnetic fields.  For $350 you too can experience the pulse of electric motors, junction boxes, high tension wires and any device that imparts a magnetic field. 

Is a DIYborg Really a Cyborg?

Of course, there are more ways to enhance your senses than by simply implanting magnets.  Adventurous people have implanted everything from RFID chips that allows them to control nearby devices, turn on and off the lights, not to mention open their garage door without the use of a clicker.  There is another popular procedure called Southpaw that involves the implantation of a compass that in essence turns you into a homing pigeon by letting you sense kinesthetically when you are facing north.  (I should probably get one of these for my mother, since she is terrible when it comes to following directions.) 

You can also have computer chips implanted that sense your biometric data, turning you into the human equivalent of a FitBit.  Others have had led lights implanted beneath their skin, turning them into a cross between a tattoo and a casino marquis.  While most of the devices are tiny, I have seen at least one adventurous lad named Ted Cannon, who had a device the size of a smartphone implanted beneath the skin of his forearm.  You can view his video interview here:    (Just make sure you haven’t eaten recently.)



More telling is that Ted’s company, Grindhouse Wetware, builds devices that are designed to integrate with the human body. 


Geordi LaForge, Here We Come

Aside from DIYborgs, there are also apparently eyeborgs, ala Geordi LaForge of Star Trek fame.  This was the character in the Next Generation series played by LeVar Burton.  Having been born blind, Geordi sported a pair of high tech spectacles that not only permitted him to see, he could see light spectra that no human eye could, including infrared, ultraviolet and radio waves.  While today’s version of Star Trek tech isn’t quite as extraordinary as that of Geordi LaForge, it’s getting there.  Scientists have already reverse-engineered the retina and created an app that not only reproduces its operation, but it allows a camera to be connected through the optic nerve.  In principle, this enhancement could be used to augment the tiny fraction of the light spectrum we currently are able to see.  Holy x-ray vision, Batman!  (Another group in England is conducting experiments with an implantable lens that can not only provide perfect 20/20 vision to all you who wear glasses, but they claim the lens even provides a zoom capability.)

Do You Want Fries with That?

On the other side of the coin, there are people who are so unconcerned with appearances that they will risk ridicule, or even worse, to possess enhanced abilities.  One of these acolytes is Steve Mann, who has become something of a biohacking legend since he was forcibly ejected from a McDonald’s restaurant in Paris France when he walked into the establishment sporting what amounts to a DIY version of Google Glass.  The chief difference was that Steve Mann’s glasses were bolted to his head.  Referred to as the “Father of Wearable Computing,” he has been making a techno fashion statement for years.

While much of the biohacking scene has been taking place in basements and back alleys, that doesn’t mean that the phenomenon hasn’t garnered academic attention.  One notable is Captain Cyborg, otherwise known as Kevin Warwick, professor of cybernetics at Coventry University.  In a 2013 interview in Forbes Magazine that took place in Warwick’s office, which writer Emma Byrne described as “a cross between a toyshop and Tony Stark’s basement,” the professor was asked which project he was most proud.

“No question, it would have to be when I hooked up with my wife.”  He’s not talking about dating: In 2002, he and his wife Irena installed matching implants that recorded signals from their central nervous systems.  They were able to correctly identify each other’s nerve signals around 98% of the time.

“Sam Morse, the inventor of Morse code, talked about brain-to-brain communication.  He sorted out the distance, but he still needed that physical interface, the finger on the key.  Over the years we’ve made loads of improvements in bandwidth and distance, but we still haven’t got past the interface problem.” http://www.forbes.com/sites/netapp/2013/09/30/kevin-warwick-captain-cyborg/

Like Steve Hawaorth’s rare earth magnets, the brain-to-brain interface Dr. Warwick shared with his wife was more akin to a sixth sense than mere communication.  (How many men reading this would love to never be asked again what they are thinking by their wives?)  More significantly, it’s this extrasensory perception that has Warwick and other researchers interested in exploring the possibilities yet further.  When asked about the possibilities as well as the perils in experimenting with the human body, Warwick replied,

“When Alexander Graham Bell made the first phone call, at first people couldn’t see the point in what he was doing.  What’s the point of the first phone?  But it didn’t stop there.  I think what I’m doing is like that.  Maybe when I’ve been dead ten years people will go, ‘Oh! That’s what that was for.’  What you do in terms of prizes and degrees and all that – that’s absolutely nothing.  It’s when you do something no one’s done before.  When you push it, that’s what’s exciting.”

While that may hold true, just as advances in medicine in the past, such as joint replacement and transplantation have become commonplace, I can’t help thinking that somewhere the ghost of Mary Shelley is spinning in her grave.

“It’s Alive!”

  Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio   



Steve Jobs: The Ghost in the Machine?

By Carl Weiss

Image courtesy of setupsandspaces.com
At Apple Computer, Steve Jobs is gone but not forgotten.  While it would be hard to forget their iconic cofounder, even 3 years after his death, it is as though Steve had just stepped out for lunch.  That’s due in part to the fact that Jobs had his hand in so much of what we consider to be high tech today.  He was one of the architects in all kinds of technology, from the personal computer, to the tablet and smartphone.  If you buy music online, iTunes pioneered the way that the industry sells digital music.  If you enjoy animated motion pictures, let’s not forget that Steve was the knight in shining armor who came to the rescue of Pixar when even the likes of George Lucas was unable to afford to keep it afloat in the early days of digital cinema.

Of course, there is one other reason why anyone who visits Apple Computer corporate headquarters at 1 Infinite Loop, Cupertino, California would have the impression that Steve is due back at any moment. That’s due to the fact that his office has remained virtually untouched since his departure.  His nameplate still graces the door.  When asked why during a March 18, Washington Post interview, Apple CEO Tim Cook responded,

I haven’t decided about what we’ll do there. But I wanted to keep his office exactly like it was. What we’ll do over time, I don’t know. I didn’t want to move in there. I think he’s an irreplaceable person and so it didn’t feel right . . . for anything to go on in that office. So his computer is still in there as it was, his desk is still in there as it was, he’s got a bunch of books in there. His name should still be on the door. That’s just the way it should be. That’s what felt right to me.”
That could change in a year, when Apple’s new flying saucer-shaped headquarters is completed.  But what will not change is the large footprint and lasting legacy of one of the titans of microcomputing.  In their just released book, “Becoming Steve Jobs: The Evolution of a Reckless Upstart into a Visionary Leader," authors Brent Schlender and Rick Tetzeli document Jobs’ triumphs and travails. While a visionary, Steve had what amounted to blinders on in a number of circumstances that cost him big.

Image courtesy of fastcodesign.com


One of the first was a unilateral decision he made in 1984 to air an Orwellian 60-second spot during the Super Bowl without consulting the board until the day before it was scheduled to air.  According to the book, the board was so horrified that they sold one of their spots so that the ad only appeared once during the game.




Shortly after that, Steve decided it was time to reinvent the personal computer, the market for which was becoming glutted since the introduction of the IBM PC and its many clones.  Taking $50 million of the company’s money, Steve assembled a team of the best and brightest at Apple and created what he thought would be the next leap forward in personal computing technology.  Called Lisa, the computer was released in January of 1984 priced between $3,495 and $5,495. Even though the system was well ahead of its time, commercially its launch was hailed as a failure, one that would ultimately cost Jobs his job.  

Courtesy of en.wikipedia.org
This failure did not deter Jobs, who along with several other ousted Apple employees went onto start NeXT Computer, Inc. in 1995.  While NeXT only sold around 50,000 units and was ultimately absorbed by Apple for $429 million, several of the concepts developed at NeXT were incorporated into later Apple systems, including parts of the OS X and IOS operating systems.  During his hiatus from Apple, Steve Jobs also dabbled with another company called Pixar, in which even George Lucas had lost faith.  Pixar would later go onto produce a number of animated features some of which would receive Academy awards.  Jobs also clearly had a bead on the NeXT big trend of the 1990’s which he referred to as interpersonal computing that would soon appear with an eerily similar moniker: The Internet. 

While Steve Jobs returned to Apple, after running another computer company he started called NeXT, a man named Gil Amelio was the CEO of Apple. The company was a disaster at this point, and Jobs didn't think very highly of him — in fact, he thought he was a bozo.  
To signal his displeasure, Jobs dumped all but one of the shares he had gotten for selling NeXT to Apple without telling anyone. He had one share, so he was still able to attend Apple's annual meeting, "but the sale was a high-decibel vote of no confidence," write the authors. "Amelio felt stabbed in the back, as he was."        
More importantly, immediately upon his return as CEO, Steve’s first job was to replace nearly everyone on Apple’s board.  You have to remember that Steve was absent from Apple for eleven years, during which time the company had floundered.  Within two years Jobs had brought Apple back from the brink of near bankruptcy.  In 1998, Steve started debuting a number of revolutionary new products, including the   iMac,  iPod, iPhone, and iPadHe also initiated the service side of the business by opening a chain of Apple Retail Stores and two new etailers,  iTunes Store and the App StoreAs a result, by 2011 Apple became the world’s most valuable publicly traded companies.
Unfortunately, that was also the last year of Steve Jobs life.  That doesn’t mean he waited until the last minute to make sure that his legacy was preserved. 
"Steve cared deeply about the why," current Apple CEO Tim Cook told authors Brent Schlender and Rick Tetzelii. "The why of the decision. In the younger days I would see him just do something. But as the days went on he would spend more time with me and with other people explaining why he thought or did something, or why he looked at something in a certain way. This was why he came up with Apple U., so we could train and educate the next generation of leaders by teaching them all we had been through, and how we had made the terrible decisions we made and also how we made the really good ones.
Apple's senior vice president of Internet Software and Services, Eddy Cue, noted that Jobs was "working his ass off till the end, in pain," using morphine to remain functional. In his final years Jobs began accelerating preparations to leave the company in a good shape, including founding Apple University, but also talking with Cook about what would happen after his death.

"He didn't want us asking, 'What would Steve do?' He abhorred the way the Disney culture stagnated after Walt Disney's death, and he was determined for that not to happen at Apple," according to Cook."
Summoning Tim Cook to his home on August 11, 2011, Steve passed him the torch by naming Tim as his successor.  But even that meeting demonstrated Jobs unwillingness to give up the ghost.
“Cook remarked to the biography's authors.  "I thought then that he thought he was going to live a lot longer when he said this, because we got into a whole level of discussion about what would it mean for me to be CEO with him as a chairman. I asked him, 'What do you really not want to do that you're doing?'"

While his passing did have a short term negative impact on Apple’s stock price that briefly fell 5%,
Courtesy of extremetech.com
the company Steve founded is today stronger than ever. In March 2011, Fortune Magazine named Steve Jobs the “greatest entrepreneur of our time.”  Other posthumous honors included the Grammy Trustees Award, inducted as a Disney Legend, along with a bronze statue in Budapest commissioned by the Graphisoft company and a memorial that was erected in 2013 in St. Petersburg, Russia.
Suffice it to say while the corporeal form of Steve Jobs will only be with us via YouTube and previously televised interviews, his undying spirit and lifelong list of  technological accomplishments will continue to haunt the industry that he helped spawn. 


The Perils of Getting Away from it ALL

By Carl Weiss

It’s that time of year when thoughts turn to going on vacation for a week or so in order to get away from it all.  In years gone by, most people wouldn’t give it a second thought while packing their bags about being extra vigilant before and during their trip.  Sure, they might tell a friend or neighbor to pick up the mail.  Perhaps they would suspend delivery of the newspaper.  But that’s about all the thought that they’d give it.

Now that we life in the digital era, a little extra effort needs to be taken before heading for the airport, unless we want our trip to be ruined before it even begins.  In fact, savvy travelers not only use the Internet to shop for the best travel deals, they also use it to check out their intended destination from the comfort of their homes. 

The Problem with Paris
Image courtesy of britannica.com

How would you like to travel to the City of Lights only to find out that the most famous Parisian tourist destination of them all had gone dark?  That’s what happened on May 22, according to Fox News.

The Eiffel Tower closed to the public for most of the day Friday as workers protested a rise in aggressive pickpockets around the Paris landmark that attracts thousands of visitors daily. The walkout came a day after Paris authorities announced that crime against tourists in the French capital had dropped this year thanks to reinforced police presence and video surveillance.
The tower didn't open Friday morning because the staff was concerned about petty crime around the site. Clusters of tourists streamed beneath the tower, unable to reach its viewing platforms. It remained while staff and management held meetings about security measures, then reopened in the late afternoon, according to the company that manages the site. The tower is normally open every day of the year, but sometimes closes briefly for bomb threats or strikes.
Tower employee Denis Vavassori of the CGT union said the workers want a permanent police presence." It is a growing problem. There were always pickpockets at the Eiffel Tower but now we are really facing an organized group," he told The Associated Press.
Parisian pickpockets…Sacre bleu!  While many people read about this news item, there are hundreds of other travel calamities to which the traveling public is completely unaware.  In a recent article in the Huffington Post, travel writer Charlotte Alfred pointed out the 10 Countries that have the highest murder rates.  While you would expect destinations such as Colombia (#10) and El Salvador (#4) to make the list, what might come as a shock to many is that the islands of St. Kitts (#8) and Jamaica (#6), along with Belize (#3) also make the top 10.  http://www.huffingtonpost.com/2014/04/10/worlds-highest-murder-rates_n_5125188.html

For a Free Copy of Carl's E-Book, Fill Out the Form Below.

Danger Afloat

Of course, danger doesn’t only lurk on dry land.  In an April 2014 blog posted by cruiselawnews.com, maritime lawyer Jim Walker points out the 10 Most Dangerous Cruise Destinations in the World.  His list includes such places as the US Virgin Islands (#8), Antigua (#7) and the Bahamas at #1.

“We have been warning about crime in Nassau ever since we started this blog in September 2009.  In October of that year two vicious robbers robbed a group of 11 terrified cruise passengers from a Royal Caribbean ship at gunpoint in Nassau.  Two months later, 18 cruise passengers were robbed during excursions from Royal Caribbean and Disney cruise ships.

We receive more complaints about crime in Nassau than all of the other ports in the Caribbean combined.  Armed robberies, sexual assault of teenagers and young women, and the murder of a tourist makes this port a dangerous place to take your family.  The US State Department has issued multiple critical crime warnings for the Bahamas.”

Speaking of the State Department, at the time of this blog, there had been 36 travel warnings issued by them since the first of the year, including this update concerning Mexico:

“Millions of U.S. citizens safely visit Mexico each year for study, tourism, and business, including more than 150,000 who cross the border every day.  Nevertheless, U.S. travelers should be aware that the Mexican government has been engaged in an extensive effort to counter organized criminal groups that engage in narcotics trafficking and other unlawful activities throughout Mexico. Crime and violence are serious problems and can occur anywhere, and U.S. citizens have fallen victim to criminal activity, including homicide, gun battles, kidnapping, carjacking, and highway robbery. While many of those killed in organized crime-related violence have themselves been involved in criminal activity, innocent persons have also been killed. The number of U.S. citizens reported to the Department of State as murdered in Mexico was 81 in 2013 and 100 in 2014.

Gun battles between rival criminal organizations or with Mexican authorities have taken place in towns and cities in many parts of Mexico, and have occurred in broad daylight on streets and in other public venues, such as restaurants and clubs. During some of these incidents, U.S. citizens have been temporarily prevented from leaving the area. Criminal organizations have used stolen cars, buses, and trucks to create roadblocks on major thoroughfares, preventing the military and police from responding to criminal activity. 

The number of kidnappings throughout Mexico is of particular concern and appears to be on the rise. While kidnappings can occur anywhere, according to SEGOB, during this timeframe, the states with the highest numbers of kidnappings were Tamaulipas, Guerrero, Michoacán, Estado de Mexico, and Morelos. Additionally, according to a widely publicized study by the agency responsible for national statistics (INEGI, the National Institute of Statistics and Geography), Mexico suffered an estimated 105,682 kidnappings in 2012; only 1,317 were reported to the police. Police have been implicated in some of these incidents. More than 130 kidnappings of U.S. citizens were reported to the U.S. Embassy and consulates in Mexico between January and November of 2014.”

While we are all looking for a little excitement, dodging narcoterrorists and crooked cops is probably not what most of us have in mind.  A quick scan of other hotspots includes an update on the aftermath of the recent Nepal earthquake, as well as a reminder concerning Hurricane and Typhoon season.  (Due to El Nino, the Atlantic basin is expected to see a 70% lower change of Hurricanes this year, while on the flip side the Pacific is predicted to be anything but, expecting a 70% greater percent probability of typhoons.)

The link to the State Department’s website is http://travel.state.gov/content/passports/english/alertswarnings.html

You have been warned!

Loose Lips Sink Trips

Speaking of warning, my last bit of advice has to do with most people’s propensity to blab about their vacations on social networks like Facebook, Twitter and Google+.  It never ceases to amaze me that otherwise cautious Americans would be so foolish as to broadcast not only their travel plans in advance on social sites, but the details as they occur.  I have seen everything from a play-by-play from the airport as friends sit at the airport waiting for their flight to leave, to extensive photo sessions from foreign shores detailing the wonderful time they are having while away from home.

Really?

Let me point out to you the fact that in the world of cybercrime, crooks no longer need to cruise through your neighborhood in order to case likely suspects.  All they have to do is connect with your social nets.  A blog by crime reporter Ben Parsons reported a case of a burglar that taunted a victim by logging onto their Facebook page. 

“The crook said he planned to pawn their belongings and signed off with “regards, your nighttime burglar”.
Victoria Richardson, 42, whose web page was hijacked the day after the break-in, said the invasion of privacy made the crime doubly painful.
The home she shares with her husband Dan, 35, and their children in Marine Avenue, Hove, was raided between Wednesday night and Thursday morning.
An iPhone, a Nintendo DS games console, a handbag containing a purse, cash and debit cards and a black Toshiba laptop were all stolen.  The next day someone logged on to the social networking website Facebook under Mrs. Richardson’s profile and started leaving illiterate taunts - claiming they had left the television behind because it was not good enough for them.
One read: “on my new laptop”. The next said: “listening to music on my new phone feels so good.”
They then wrote: “i have the laptop , phones ok but a bit scratched itll do tv was rubbish so i left it ,ds was a bonus now to the porn shop i goto , thank you toshiba is my favorite make”.
The final note read: “regards your nighttime burglar”.
Lesson learned, I hope.  If you do want to share your travel memories with friends and family, be smart and wait until you return to do so.  Your insurance agent will thank you.
Also, be smart when it comes to avoiding problems while away.  Never flash a lot of cash or wear expensive jewelry.  The only people you are likely to impress are those that make their living robbing tourists.  (A friend of mine who is with the police taught me years ago to carry the bulk of my cash in my socks.) 

It’s a wild and wooly world out there.  If you don’t want your vacation to end in the police station or even worse the ER, then you need to take care before you find out the hard way about the perils of getting away from it all.



 Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio   

Swimming With the Cyber Sharks

By Carl Weiss

It is said that the only sure things in life are death and taxes. While this pearl of wisdom has stood the test of time, in the not too distant future there could be an addition to that list: Cyberattack. That's because cyberattacks on businesses and individuals are up nearly 50% in the past year alone. Where cybercriminals used to almost exclusively target big businesses with deep pockets, now that ransomware has become so prolific, small businesses and even individuals are finding their online assets and machines being hijacked. And why not, since most individuals and small businesses offer little in the way of resistance.

Enter the Cyber Sharks
Image courtesy of worth1000.com

Who can forget the opening music to the movie Jaws.  In it’s day, the novel and subsequent blockbuster motion picture was enough to keep people on the beaches and out of the surf.  But as paranoid as many moms became about letting their kids frolic in the waves back in 1975, forty years later we should all be hearing the strains of da-da-dum-dum every time we surf the web.  That’s because while Jaws was a work of fiction, the arrival of schools of Cyber Sharks is all too real.

Just like the real deal, there is no 100% reliable cyber shark repellent that can keep someone from putting the byte on your computer, tablet and/or smartphone.  Even worse is the fact that while individuals are woefully unprepared to be hacked, what’s even worse is the fact that many of the devices connected to the Internet of Everything have absolutely no protection whatsoever.

Literally everything from appliances to medical devices to automobiles are rapidly becoming web-enabled.  While this provides the public with even more interactivity, it also provides hackers with more ways to get to consumers and business owners. Just as most people make the mistake of thinking their smartphone is a phone instead of a computer that you can talk on, nearly everyone doesn’t realize that the average automobile being built today have 100 lines of code onboard.  Many are now Wi-Fi enabled as well. You don’t have a car with q computer onboard. You have a computer that drives.  Soon, these computer cars will do most of if not all of the driving.  So if a hacker can take control of your car, what does that mean for the passengers and driver?  (On a recent 60-Minutes telecast, hackers gained access to the car in which Leslie Stahl was driving, turning on the lights and windshield wipers.  So this is not a hypothetical possibility.)

Who’s Watching Who?

Courtesy of Samsung.com
Smart Houses and appliances are also becoming more and more commonplace.  They’re also becoming easy pickings for hackers.  If a hacker can crack your home’s security system, this makes breaking and entering child’s play.  Don’t even get me started on what a hacker can do to your web-enabled Nanny Cam.  The same smart TV that you just installed in your living room can be hacked with ease, since most contain little or no security.   

A February 24, 2015 blog by CNN reported: Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on a voice command feature that saves you the trouble of finding the remote, pushing buttons and scrolling through menus. But making that feature work requires the television to listen to everything you say. And what you say isn't just processed by the television; it may be forwarded over the Internet for remote processing. It's literally Orwellian.

What’s really scary is the fact that last year alone more than 10,000 smart appliances were hacked, according to leading US security firm Proofpoint.  Once inside your smart TV or refrigerator, hackers can then gain access to other web-enabled devices.  Believe it or not, your refrigerator can spam your smartphone, laptop or tablet once infected.  Even if your device does come with some semblance of security, unless the protection is updated on a regular basis, it’s only a matter of time before a hacker will prevail.

How Do I Hack Thee?  Let Me Count the Ways.

So many smart devices…So little time.  Everything from wearables to medical devices are becoming vulnerable to hacking.  Symantec reported on March 12 that: “All of the devices failed to check whether they were communicating with an authorized server, leaving them open to man-in-the-middle attacks. One out of five devices did not encrypt communications and many did not lock out attackers after a certain number of password attempts, further weakening their security. All of the potential weaknesses that could afflict Internet of things systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices”

Image by culturedigitally.org
While Symantec’s report was referring to smart appliances, in October of 2014, the US government told the FDA to start taking medical device security seriously while citing the same problems that smart appliances were facing.  The next time you go to the hospital for a dialysis treatment or to get your pacemaker checked out, you might like to ask your physician about the inherent hacking vulnerabilities of these systems.

The number of ways that hackers can get into your devices is staggering. Below are some of the most popular tools of the hacker’s trade:

  1.    Sniffers are programs or device that monitors all data passing through a computer network. It sniffs the data and determines where the data is going, where it's coming from, and what it is. In addition to these basic functions, sniffers might have extra features that enable them to filter certain types of data, capture passwords, and more. 
  2.     The Hex Dump (aka Voodoo) - When an electronic device is manufactured, it is programmed with firmware.  Hacking firmware is simply a matter of buying a programmer that can receive the memory dump and transmit it to a computer where the code can be altered.  Then transmit the modified code back to the device.
  3.    Attacking Defaults – Virtually every piece of hardware on the market comes with a set of standard defaults, including username and password that provide access to the system.  Since most people do not change these default settings, this is the easiest way to exploit a system.
  4.    SQL Injection – While it sounds like a medical procedure, what an SQL Injection attack are conducted by entering unexpected entries into a database and then probing the returned error messages to reveal information that can be used to hack the system.  For instance, by entering metacharacters like #$%^ into a field that processes only alphanumeric information, the database could be tricked into revealing the contents of the database, or in some other way compromise an SQL server. 
5. DDoS Attacks - Directed Denial of Service Attacks occur when hackers flood a targeted website with so much bogus traffic that it brings the victim's server to a halt.  This is usually followed by a demand for payment in order to restore service.
6. Data Extortion - Most people aren't aware that their data can be hijacked and held for ransom.  This can take a number of different forms, including threatening to release sensitive information stolen from a machine, to locking a legitimate user out of their own website or machine by changing the password.  Just as with DDos attacks, all too many extorted users don't realize they've been hacked until a ransom note appears demanding payment.  Even worse than DDos attacks, non-payment in this case can result in your website or data being erased.  (Lately, online extortion has also extended to threats of having one's reputation smeared online unless payment is rendered.)
7. Ratting - Remote Administration Tools are an increasingly popular and insidious means of hacking everything from laptops to tablets and smartphones.  Once successfully deployed, a ratted machine is literally under the control of the hacker.  Ratted machines can not only be rifled for information, but their webcams and built-in microphones can be surreptitiously turned on, allowing the rat to become the equivalent of a cyber peeping Tom.  (There have been a number of high profile celebrities who have been ratted, resulting in compromising photos and videos making the rounds online.

Courtesy itunes.apple.com
While all of the abovementioned tactics require a bit of technical knowhow, there are many other hacking programs and devices that can be bought online.  There are also online forums, hacking blogs and clubs that teach hackers the tools of the trade.  There are also annual hacker conventions and hackathons such as the one held yearly in Las Vegas.  If you don’t believe me, simply google, Hacking devices available online.”

The real danger is that the Cyber Sharks have the upper hand since detection, much less prosecution is hit and miss at best.  Meanwhile hacking continues to proliferate nearly unchecked.  CNN recently reported that in 2014 hackers exposed the personal information of 110 million Americans, roughly half of the nation’s adults.

 So the next time you turn on your Smart TV or start your web-enabled car, don’t be surprised if the sound you hear emanating from your surround speakers is something like, “Da-da, dum-dum.”

 Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio   



The DIY Online Marketing Solution

By Carl Weiss

“We’re Number ONE!”
Image from engineerofknowledge.wordpress.com

That’s what everyone strives for in this country. Whether you’re talking sports, business, academics, or keeping up with the Jones’, Americans are extraordinarily competitive.  This especially holds true online, where ever since the first search engines appeared more than 20 years ago, website owners vied for the top spot on every keyword combination imaginable.

Back in the early to mid-1990’s achieving a page one result wasn’t all that difficult.  That’s because everything you needed to feed the search engines was on page one of your website.  Back then, there were no blogs.  Social networks hadn’t yet been invented.  Video was not even possible, since most web surfers used a dial-up connection.  Heck, most web designers had to be careful not to use hi-res images, since these could cause a site to load at a glacial pace.

Today, the game has changed.  The Internet has become the mac daddy of interactive, multimedia marketing.  If you want to wind up on page 1 of major search engines, you need to do more than just create a properly optimized website.  There are a lot of moving parts to take into consideration.  Not only do you need to be concerned with site architecture, but you also need to add and feed everything from daily social posts and weekly blogs, but you should also create videos on a monthly basis. 

The Web is run by the Golden Rule – He Who Has the Gold, Makes the Rules

Image courtesy of andhoraa.com
The multimedia approach isn’t just a great way to build and engage a targeted audience, it’s also a way to generate Google Juice. The world’s most popular search engine takes into account everything from how many followers you have on Twitter, Facebook and Google+, to how many people are reading, commenting and reposting your blogs.  Since Google also owns the world’s most watched video portal: YouTube, creating a growing following who watches your videos is another way to move your site and your videos onto page 1.

The problem is that unless you have the time or a dedicated online marketing staff to continually feed content day in and day out to the Internet, most business owners usually take one of three tacks:
1.      They outsource their online marketing
2.      They start off with the best of intentions only to run out of steam
3.      They throw in the towel

Having spoken to thousands of business owners over the past few years, what I always ask is the obvious question, “If your competition is on page one of the search engines and you are not, is this good or bad for your business?”  While every business owner agrees that the last thing they want to do is provide their competition with any competitive edge, some of them have either tried to outsource their online marketing with horrible results, while others simply can’t afford to spend $1,000 or more per month to get the job done.

While I sympathize with both these situations, while I can educate the public on the ways to select a reputable online marketing firm, what I haven’t been able to do is show them how to get the job done cheaply.  That’s due to the fact that it takes a considerable amount of time to feed a minimum of 3 social nets daily.  Not to mention that writing and distributing weekly blogs that engage and grow readership doesn’t come cheaply.  So if you think that paying someone a couple hundred dollars a month is going to magically move your website onto page 1 of Google, you are in for a rude awakening.

    Is Scalable Online Marketing Possible?

Being the CEO of one of the last online marketing agencies around that still offers written guarantees for organic results, I can tell you that until recently, all I could do was shake my head and wish business owners who wanted the results but couldn’t afford the price good luck.  That’s because there is no longer any shortcut to long term online results.  While you can sometimes get an optimized blog or video to pop up on Google page 1, when it comes to getting your website to move up the rankings, someone has to be willing to do the work.

That’s also the main reason we’ve been producing a weekly Working the Web to Win blog and radio show for the past three years.  Hector and I weren’t trying to be blogging or online radio superstars.  We just wanted to keep the public up to speed on the ever changing Internet.  While this provided business owners with tidbits of knowledge, there was no way to pull this material together into a multimedia training course that would teach them what they needed to do in order to become a scalable DIY online marketing system.  Until Now!

Introducing WWW University

Starting on May 1, WWWU was introduced to bridge the gap by allowing website owners to decide how much of the task they want to take on and how much they want to outsource.  That’s because we have launched the first of our DIY Online Marketing Training Courses that are guaranteed to show people the same techniques that we have been using to generate page 1 results for clients.


Our first e-course, SEO Made Easy, consists of twenty chapters that take students step-by-step through the process of optimizing websites.  The course material covers everything from the proper use of page and image tags, to maximizing your Google Juice and leveraging local SEO.  Better still, the course includes a half-dozen videos that show you what it takes to generate page 1 results.  We also include everything from contact information with the instructor, to a weekly WWWU Newsletter that is designed to keep you up to speed with regards to the ever changing World Wide Web.  Not bad for a one-time tuition of only $97.



Check out our Free Preview at http://wwwu.patience.io/catalog/4385

During the course of the next few months we are going to add more courses including Business Blogging, Viral Video Magic, Social Media on Steroids and more.  Even better is the fact that we will provide special pricing for alumni for additional training modules and optional online marketing via Working the Web to Win that will allow graduates to create a scalable online marketing system that lets them decide how much time and money they want to spend to get the job done. 
To put this system into perspective, imagine what it would be like if you could go to your local Mercedes Benz dealer and pick out any car on the lot, knowing that by helping out around the dealership you could get the car of your dreams at a price you can afford. If the prospect of creating a scalable, affordable system of online marketing is something that you would like to learn more about, take our SEO Made Easy course for a test drive at http://wwwu.patience.io/catalog/4385 

 Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio