Afleveringen

  • Understanding our cognitive biases can help us realize that we sometimes are too trusting of emails, texts, or calls from someone we perceive to be an authority. Today’s guest is Martina Dove. Martina is a researcher with a fervent passion for fraud prevention. Her expertise focuses on persuasion, scam techniques, and individual characteristics that make people susceptible to fraud. She is passionate about fighting fraud by teaching people how to spot scammer techniques and has recently published a book on fraud psychology.

    Show Notes:

    [0:50] - Martina shares her background in cybersecurity and what she does in her career now.

    [1:56] - Martina learned a lot about techniques scammers use by noticing cognitive bias.

    [3:27] - Through interviews with scam victims, Martina learned that it is not always the case that victims are just gullible. She has also been scammed.

    [5:48] - One of the scales that Martina developed is about how people perceive authority and how gullible they think they are.

    [7:03] - There are five fraud vulnerability factors: compliance, impulsivity, decision time, vigilance, and the belief in justice.

    [9:57] - Somebody who follows rules more than breaks them, there’s a persuasion technique that scammers use to dupe them.

    [11:19] - We tend to rationalize why bad things happen to other people.

    [13:06] - When we are under visceral influence, we lose our ability to reason.

    [15:42] - Some scams evoke social norms, especially in charity scams and fake social media posts.

    [19:06] - Scammers are always one step ahead.

    [21:37] - A good scammer will go a long way to support their story.

    [23:20] - Websites are very believable. How can you tell when one is legitimate?

    [24:36] - Fraud situations are complicated because no two human beings will be the same.

    [26:44] - Even if you have to lie, make it a rule for yourself to not make a decision right away.

    [29:20] - Scams work because humans are vulnerable and can be persuaded.

    [30:47] - Martina describes the way scammers control the conversation with a victim.

    [33:51] - The grooming component of fraud is hard to break.

    [35:17] - Prevention is always better than intervention.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Martina Dove’s Website

    Martina Dove on LinkedIn

    The Psychology of Fraud, Persuasion, and Scam Techniques by Martina Dove

  • The tech world is ever-changing and it can be difficult to keep up. As businesses and individuals, it's important to remember to keep your software up to date and apply patches as they are released. Today’s guest is John Hammond. John is a cybersecurity researcher, educator, and content creator. As part of the Adversary Tactics Teams at Huntress, John spends his days analyzing malware and making hackers earn their access. He is an online YouTube personality showcasing program tutorials, malware analysis, dark web threats, and other cybersecurity content.

    Show Notes:

    [1:01] - John shares his role at Huntress and his side work as a YouTuber that creates content to help educate people about cybersecurity.

    [2:26] - John explains how he found himself in cybersecurity as a career.

    [4:10] - He hasn’t been a victim of a scam, but in his pursuit of catching hackers in the act, he has certainly been a target.

    [5:25] - What is doxxing and how can someone track down your information?

    [7:23] - When popular software is compromised, it is a really big deal.

    [9:22] - There’s a balance between companies releasing information about a threat and that information causing more damage.

    [13:17] - It is so important to update software and patch right away.

    [15:22] - Consumers are not always on the lookout for patches and updates. It’s crucial for companies to relay this information.

    [17:49] - One tactic for hackers is the use of remote software to access devices.

    [19:37] - It is best practice to not allow anyone to use your computer.

    [21:28] - Since 2020, there has been an increase in people working from home, which means that company devices are now out of their safety and control.

    [23:54] - John describes the People’s Call Center collaboration and the mission of bringing the fight back to scammers.

    [25:28] - John explains some of the tricks he has used to social engineer the scammers right back.

    [29:43] - The experience of keeping someone from being scammed or even just making a scammer’s life more difficult was rewarding for John.

    [31:09] - What is the dark web?

    [35:09] - John shares why he interacts on the dark web to research and learn how threat actors operate.

    [39:02] - By researching on the dark web, John has learned a lot about how cybercriminals work and think.

    [41:01] - Some of the ways cybercriminals work are better and more successful than some legitimate businesses and startups.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    John Hammond on YouTube

    John Hammond on LinkedIn

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

    Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.

    Show Notes:

    [0:54] - Kevin shares what he does in his current role and his background in the industry.

    [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

    [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

    [6:53] - It comes down to ownership.

    [8:19] - Know your baseline and who is responsible.

    [10:07] - Kevin makes an analogy to help us better understand the supply chain.

    [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

    [14:12] - You trust a process and then when something breaks, how do you find out about it?

    [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

    [19:51] - What should be asked about the organization’s environment?

    [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

    [23:27] - Where do all of these components come from?

    [26:47] - Kevin points out the challenges in the cybersecurity legislature.

    [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

    [31:22] - The trickle down of data is really what the supply chain is.

    [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

    [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Cyolo Website

    Kevin Kumpf on LinkedIn

  • There are significant risks to be aware of when using crypto and over the past two years, many tokens have imploded. As you choose to invest digitally, do your research and understand the commodity that you use. Today’s guest is Natalie Burnell. Natalie is the host of the #1 woman-led show in the bitcoin space, Coin Stories. She is a bitcoin educator, a frequent media commentator, and an award-winning journalist.

    Show Notes:

    [0:50] - Natalie shares her background and the mission behind the Coin Stories Podcast.

    [2:19] - Learning about bitcoin gave Natalie a little more hope as she came from having no background in financial literacy.

    [3:48] - Anyone can issue a token and it is hard to tell what cryptocurrency is legitimate.

    [6:42] - There are some that are regulated and unregulated. Natalie shares some red flags.

    [8:09] - Choosing to work with companies that are Bitcoin only is one way to stay safe because of regulatory clarity.

    [10:01] - A major red flag is overpromising and guaranteeing unrealistic returns.

    [11:59] - Longevity should stand out.

    [14:08] - Natalie explains how Bitcoin custodians work and how you can take your own custody of Bitcoin.

    [16:29] - Self-custody could be intimidating, but it just takes a few steps to learn.

    [19:15] - Natalie shares a clever analogy to make the concept easier to learn.

    [20:47] - Bitcoin offers more privacy than other monetary technology.

    [22:38] - There are a lot of frictions in banks and the system is ultimately very fragile.

    [26:07] - If exchanges receive Bitcoin and they don’t know where it came from, they are contacted by agencies like the IRS.

    [28:56] - The knee-jerk reaction to people wanting privacy is to assume that they want to do something bad.

    [31:17] - Look for verified accounts to interact with. Be careful if someone says they’ll send you money.

    [33:39] - Some companies are trying to help people recover their funds. But most of the time, it is impossible.

    [34:50] - If you send your money somewhere, you are likely not getting it back.

    [36:40] - Natalie has several tutorials on her YouTube channel that can help you protect yourself and your money.

    [38:52] - Bitcoin the block chain was built beautifully for security, but that means it can only fit so much. Bitcoin is “slow” for a reason.

    [41:20] - Consider Bitcoin built in layers.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Coin Stories Podcast

    Natalie Brunell on YouTube

  • In this episode, we uncover the intricate web of tax-related scams that prey on unsuspecting individuals every year. From phishing emails promising tax refunds to elaborate identity theft schemes, join us as we expose tactics used by scammers to exploit fear and ignorance during tax season.

    Today’s guest is Richard Gilbert. Richard is the Director of the Examination Division with the North Carolina Department of Revenue. He has been with the department for over 25 years. He is a licensed CPA and has received his Bachelor’s of Business Administration from North Carolina Central University.

    Show Notes:

    [1:10] - Richard shares his background and what he does in the Examination Division at the North Carolina Department of Revenue.

    [2:38] - Taxes can get very complicated for a lot of people.

    [5:17] - The vast majority of tax professionals do their job well and serve their clients honestly. But there are some people who don’t focus on the right thing.

    [8:09] - Tax preparers who say they can get you the largest return, ask questions.

    [9:36] - Like any other business you employ, you should ask for references.

    [11:43] - If you can afford a CPA, hire one.

    [12:39] - Be wary of YouTube tutorials and advice. You are responsible for your taxes and if you are audited, it is all on you.

    [13:52] - Richard shares some of the things that a good tax preparer will ask for.

    [15:11] - There are scammers that will try to file someone else’s tax return before they do and direct their refund somewhere else.

    [17:49] - There are things in place that slow down the process that can be frustrating, but are there to protect you.

    [19:29] - It is highly recommended to file your tax return as early as possible.

    [20:10] - You will never be contacted over the phone, via text, social media, or email by a legitimate tax collector. It will always begin through the mail.

    [21:28] - If someone is telling you there is only one way to make a payment, be suspicious.

    [24:33] - The biggest problem in mail correspondence is when people do not respond. Open your mail especially during tax season.

    [26:31] - There is a form of identity theft in which people use another person’s Social Security number to gain employment.

    [28:06] - Be sure that you have everything available to validate your identity when verification is asked for.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    North Carolina Department of Revenue

  • In this episode, we shine a light on the sinister phenomenon of virtual kidnapping. From deceptive phone calls to the psychological manipulation tactics, join us as we delve into the dark world where fears are exploited for profit, leaving victims shaken and families torn apart.

    Today’s guest is Titania Jordan. Titania is a nationally renowned tech, social media, and family expert who has appeared on programs such as the Today Show, Good Morning America, Fox News, CNN, and more. She is the author and founder of Parenting in a Tech World and serves as Chief Parent Officer of the online safety company Bark Technologies.

    Show Notes:

    [1:06] - Titania Jordan shares her background and what she does at Bark Technologies.

    [3:04] - Virtual and cyber kidnapping are the same thing. Anything that involves kidnapping without actually moving a person’s physical location against their will.

    [4:26] - Titania explains a recent event in which an exchange student was targeted.

    [6:18] - Children and adults alike are targeted everyday, but Titania explains that older teenage boys are heavily targeted and impacted.

    [9:20] - Another type of scam is actually targeting the family and loved ones of someone to require a ransom for a kidnapping that hasn’t happened.

    [11:17] - Built-in location services are very helpful. Parental controls and alerts are also something important to have in place.

    [13:53] - Be careful answering the phone from a number you don’t know.

    [16:20] - Contact law enforcement immediately if this is something that happens to you.

    [19:51] - It is never a bad idea to be prepared.

    [22:17] - These events are opportunities to have really important conversations with your children.

    [24:41] - Flip the script and ask your children to help you do a safety audit.

    [27:52] - If it feels off, it probably is. Don’t hesitate to report it and talk about it.

    [30:26] - Bark Technologies offers a lot of programs and even a family smartphone that can help keep kids safe.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Bark Technologies

  • In this episode, we navigate the ever evolving landscape of messaging app dynamics, examining the challenges and opportunities in striking the right balance between preserving user privacy, ensuring robust security measures, and maintaining accountability in an ever changing digital landscape.

    Today’s guest is Kurt Long. Kurt is an entrepreneur with over 25 years of experience in starting, growing, and building Information Security and Privacy businesses. Kurt is the Executive Director of The Long Family Force for Good Foundation which focuses on supporting not-for-profits dedicated to improving the mental health of families and children. Kurt is also the Co-Founder and CEO of BUNKR.

    Show Notes:

    [1:09] - Kurt shares his background and what he does through The Long Family Force for Good Foundation and BUNKR.

    [5:01] - He found himself interested in technology and the idea of doing something bigger than himself with a team.

    [9:26] - Currently, Kurt’s work is directed to messaging apps.

    [13:22] - In the early days of messaging, there was an inherent trust. We didn’t think about the bad guys yet.

    [15:57] - Communication platforms were never intended to secure communication.

    [17:31] - Most communication apps now do begin with good intent. Kurt describes WhatsApp as an example until it was purchased by Facebook.

    [19:50] - We want information and access, but we want safety, too.

    [21:38] - We have to put trust in someone to strike a balance.

    [23:41] - The Federal Trade Commission has announced apps that don’t support legal due process and implemented a fine for use of them.

    [25:56] - Kurt shares a true story that is a great example of inside trade problems in messaging apps.

    [28:28] - Using secret messaging apps or apps that feature disappearing messages are hard to track. You could be affiliated with someone doing something illegal.

    [30:29] - Privacy and security do help us retain rights we have.

    [32:35] - Messaging issues also impact the medical industry.

    [34:07] - Some countries have legislation that ban secret messaging apps, but they aren’t really being enforced.

    [36:25] - BUNKR has consumers and public usage in 32 countries worldwide and is popular with families.

    [37:52] - When companies have more control over their app, there is less criminality involved.

    [40:02] - This service is invitation based. You cannot receive random messages from anyone you do not invite.

    [41:55] - “The entire planet deserves to conduct their affairs with dignity at bank level security.”

    [44:29] - Kurt leans towards following United States laws and legal action, but also has a large legal team to help guide through unusual situations.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    BUNKR

  • The fundamentals of scams are the same. However the technology used is increasingly more clever. It is important to know how to spot identity theft and credit card fraud and where to report it if and when it happens. Today’s guest is Paige Hanson. Paige is an authority in consumer and digital safety with nearly 20 years of experience in identity management. As co-founder and Head of Communications and Partnerships at Secure Labs, Paige has dedicated her career to protecting consumers and businesses from identity theft and cyber threats. She is a certified Identity Theft Risk Management Specialist and holds a certificate in Identity Leadership from the University of Texas. Paige also serves as an advisory board member to R.O.S.E. (Resources/Outreach to Safeguard the Elderly).

    Show Notes:

    [1:16] - Paige shares her background and what she does in her current roles.

    [3:02] - She worked with LifeLock in the early days of her career, but the experience led to her expertise in identity theft now.

    [6:08] - Chris shares what happened to a friend and their experience with identity theft.

    [7:40] - The Federal Trade Commission has an Identity Theft Affidavit.

    [9:25] - If you pay a bill that was made by a fraudster, it will be considered that you made the charge. Paige explains what best practice is.

    [12:06] - Always watch your credit card bills and take note of things that look unusual. Pay attention, even to the small charges.

    [13:47] - Notifications from your credit card company are a must have.

    [16:07] - Sometimes the notifications can seem annoying, but when something is out of the norm, these tools are critical.

    [17:48] - When you get an email that includes a link to login to an account, even if you recognize the sender, don’t click it. Develop the habit of using your browser.

    [20:22] - It can happen to anybody! Chris and Paige are security-minded, but it could happen to them as well.

    [22:48] - Paige shares an experience of noticing charges that she did not make and how noticing it early, she could cancel the order.

    [24:29] - Always use multi-factor authentication. Paige also recommends using an app in addition to what is included with your credit card company.

    [26:37] - Check links and make sure they are correct.

    [29:02] - At one time, Chris owned a business and shut it down because of the number of people making a fraudulent order.

    [30:45] - Online shopping and online payments are so common and a credit card doesn’t even need to be present to make a purchase.

    [32:35] - Paige explains how skimmers work and how they store card numbers.

    [35:19] - The likelihood of this happening is slimmer than other scams, but there are low-inconvenience and low-cost preventative measures you can take.

    [36:07] - The safest way to make in person payments is through mobile pay. If a location is breached, it doesn’t have your card info.

    [37:18] - If you use mobile pay, it is crucial that you keep your operating system up to date.

    [41:23] - When it comes to ATMs, it is best to go inside your bank’s branch and use the one inside. The worst ATMs to use are stand alone that are not attached to a bank.

    [44:33] - Identity theft could be accomplished by fraudsters by just taking advantage of low hanging fruit.

    [46:29] - Paige recommends using a credit card rather than a debit card.

    [49:11] - When traveling, Chris has a specific card that limits the amount of loss in the event of an issue.

    [52:47] - Using a service like PayPal helps with keeping things updated on accounts.

    [54:33] - When we make a convenient choice, we need to consider all the parts of risk management.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    SecureLabs

  • Advances in technology are increasing at a rate we’ve never experienced before. Many will need to decide how much privacy they’re willing to give up for the sake of convenience and the impact that AI will have on that decision. Today’s guest is Leo Laporte. Leo is a broadcaster, author, tech pundit, the former host of The Tech Guy weekly radio show, and the founder and host of Twit.tv which is a podcast network focused on technology.

    Show Notes:

    [1:20] - Leo has been in broadcasting since 1976. He explains how he got into the industry.

    [5:02] - Eventually, Leo found himself learning more about technology which led to him writing for magazines.

    [9:32] - In 2004, Leo started a podcast network.

    [13:02] - Podcasting didn’t peak until 2018 and Leo already had a lot of podcast content online.

    [15:13] - Leo explains that if he were to start Twit.tv now, it would be a completely different business.

    [19:01] - Although technology has advanced, Chris admits he still loves listening to the radio and often has it on in the background.

    [21:40] - What motivated Leo to keep up was the terror and desperation callers showed when asking him questions.

    [24:09] - The goal has always been to educate people on technology but it is harder now than ever with how fast things are changing.

    [26:46] - A common problem right now is pig butchering. It is also becoming more and more apparent that many scammers are laborers.

    [31:04] - People in the field have to have the hope that people are good and we can help each other.

    [32:29] - Leo shares the experience of his ex-wife falling victim to a scam.

    [35:14] - A lot of people have the misconception that social media sites like Facebook operate like smaller businesses.

    [37:22] - Initially, AI like ChatGPT was pretty basic, but as it improves over time, scammers will be even stronger.

    [39:42] - What sounds impossible right now will be not only possible but a reality soon.

    [42:37] - If you are willing to give up some privacy, there are some real benefits you will get out of that.

    [44:17] - Leo shares what he expects will be available by the end of this year.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Twit.tv

  • Our golden generation, rich with wisdom and experience, unfortunately often finds itself in the crosshairs of deceitful schemes. In today’s episode, we shine a spotlight on the tactics employed by scammers, share real-life anecdotes, and provide practical advice to help safeguard our beloved seniors.

    Today’s guest is Joyce Petrowski. Joyce started her professional career in the public accounting sector and is an accountant and tax preparer. As an avid volunteer and philanthropist, she shares her focus on the non-profit sector and co-founded a non-profit in 2014. Since leaving that non-profit in 2021, she saw a need to educate people, especially the older adult population about the financial scams and how to protect themselves and their hard earned assets. In August 2021, Joyce founded R.O.S.E. (Resources/Outreach to Safeguard the Elderly), with the mission to prevent financial exploitation and frauding older adults through advocacy and education.

    Show Notes:

    [1:16] - Joyce shares her background and the mission of her non-profit, R.O.S.E.

    [3:42] - R.O.S.E. provides education and resources for older adults so they are aware of how these scams are happening.

    [5:54] - When speaking and meeting with people, Joyce sees the hesitation in people coming forward with past experiences with scams.

    [8:01] - It has been difficult for the general population, specifically the older generation, to keep up with the evolution of scams and red flags.

    [9:38] - The first sign that should raise some suspicion is unexpected contact.

    [12:07] - There is an option in your phone that can silence calls from unknown numbers so there is no accidentally answering scam calls.

    [15:03] - If you’re not sure, talk to somebody else that you know and trust. Them asking questions might help you determine if it is a scam.

    [18:51] - Many older adults feel uncomfortable sharing their experiences with their children to avoid losing their independence.

    [21:18] - Scammers don’t discriminate. They don’t care about age, gender, or even how much money you have.

    [23:34] - It can be very confusing and overwhelming when considering the ways to deal with this problem.

    [26:00] - Joyce shares some of the things that scammers are looking for and why it can be easy for them to get a victim into an emotional state.

    [29:44] - Scams are very sophisticated now compared to just ten years ago.

    [31:45] - Everybody needs to be aware and have conversations about this with the older adults in their lives.

    [33:17] - Joyce has recently started a podcast called Let’s Talk About Scams.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    R.O.S.E. Resources/Outreach to Safeguard the Elderly

    Let’s Talk About Scams Podcast

  • There are so many things to learn about utilizing crypto, understanding the benefits as well as the benefits. It can be used to save time and money, but you need to be careful and only interact with reputable companies. Today’s guest is Bam Azizi. Bam is a tech entrepreneur and the co-founder and CEO of Mesh, which provides FinTech companies with a seamless and secure one-click system for users to transfer their assets for deposit, payment, and payout. He previously founded No Password, a cybersecurity identity company acquired by LogMeIn in 2019.

    Show Notes:

    [0:53] - Bam shares his background and current endeavors with Mesh, of which he is co-founder and CEO.

    [2:26] - Bam explains how he found himself working in FinTech with his background in cybersecurity.

    [5:01] - You cannot educate every single user on the planet. People make mistakes all the time and there should be no shame about that.

    [7:37] - Defense needs to get it right 100% of the time, but to move the scam forward, the scammer only needs to get it right once.

    [11:01] - Security and compliance act like guardrails.

    [12:30] - There are mechanisms in place that can protect users, but there are pitfalls and disadvantages.

    [13:41] - Crypto is like any other type of data, but how it is stored is different.

    [14:57] - Crypto is inherently secure, but transit becomes a problem.

    [17:34] - Sometimes, you just don’t know who you are sending money to or if the company receiving funds is legitimate.

    [19:40] - Bam explains what happens when we initiate a transaction and try to rescind it.

    [22:02] - We should be able to identify the people interacting with blockchain.

    [23:40] - The industry wants crypto to be adopted world wide, but if that were to happen, some things need to be accepted.

    [24:48] - The blame can’t be placed on one entity.

    [26:40] - One major benefit to crypto is global transfers.

    [30:44] - There are a lot of moving pieces when it comes to crypto and you never actually see it. It’s hard to think about in-transit security.

    [33:30] - There is a huge pushback against crypto from banks and financial institutions.

    [35:09] - Crypto has been demonized to some extent, but as a technology and the advances we will see in coming years, it’s not inherently bad.

    [37:34] - We can build practices and mechanisms that can prevent collapses.

    [40:36] - There are some risks in using crypto but some risks are much bigger than others.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Mesh Payments Website

    Bam Azizi on LinkedIn

  • There are times we can answer a question without much thought. If we were to examine the reasons why we gave the answer, would we change our response? Today’s guest is David McRaney. David is a journalist, author, and lecturer fascinated with brains, minds, and culture. He has created a blog, book, and ongoing podcast entitled You Are Not So Smart which is about self-delusion. His most recent book, How Minds Change, is all about the science behind how and why people do and do not change their mind and the intricacies and nuances of persuasion.

    Show Notes:

    [1:09] - David shares what he does as a science journalist and how he found himself interested in the topics he writes and speaks about.

    [4:38] - The way people work has always fascinated him.

    [6:50] - David shares a story about psychology that really excited him.

    [8:35] - In the height of blogging’s popularity, David began his blog You Are Not So Smart.

    [9:57] - David explains what the Introspection Illusion is.

    [12:31] - If you want something, you will come up with reasons why.

    [13:40] - An example of this is when you share what you like about another person.

    [15:59] - This concept can be looked at as delusion, but it’s really just how brains work.

    [19:30] - What do you have in place to approach your own feelings and beliefs?

    [23:08] - David and Chris go through an exercise to demonstrate guided metacognition.

    [27:00] - We can answer some questions quickly, but others need more thought.

    [30:00] - The technique that David demonstrated is used to allow people more introspection.

    [32:22] - Start with things that you love and practice this technique.

    [33:37] - David and Chris talk about conspiracy theories and how to improve critical thinking.

    [35:27] - ConspiracyTest.org is a site that gives you a score on how susceptible you are to conspiratorial thinking.

    [37:48] - Conspiracy theories seem much more prevalent now, but conspiratorial thinking is no more rampant than it has been in the past.

    [39:32] - What should we do if a friend or family member has fallen into conspiratorial thinking?

    [42:17] - Finding reasons to rationalize conspiracy theories has never been easier with the internet.

    [44:31] - There are reasons that some people are more attuned to this thinking and some are more skeptical.

    [48:36] - Think about a scenario and imagine your initial reaction.

    [49:33] - Build rapport and assure the other person that you are not out to shame them. Get out of the debate frame.

    [52:01] - You can have conversations that don’t end in a dead end.

    [55:13] - Reactance is when someone takes away your agency.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    David McRaney’s Website

    The Conspiracy Theory Test

    You Are Not Smart Podcast

  • The advent of technology has created both advantages and challenges for people trying to protect themselves from harmful situations. Being aware of the capabilities of the technology around us, the data that can be collected, and how it can be accessed can lead us to being physically safer.

    Today’s guest is Audace Garnett. Audace provides assistance nationally and internationally supporting crime victims and domestic violence survivor organizations. She worked at the Brooklyn District Attorney’s Office where she served as Teen Services Coordinator in the Victim Services Unit. She is current a Technology Safety Project Manager with Safety Net at the National Network to End Domestic Violence, where she focuses specifically on the intersection between domestic violence, sexual assault, stalking, and technology.

    Show Notes:

    [1:12] - Audace shares what she does with Safety Net and the National Network to End Domestic Violence.

    [5:18] - 97% of cases include tech misuse, but Audace explains that domestic violence is very underreported.

    [8:06] - Technology is not the problem. It’s the person behind the technology that is causing harm.

    [9:22] - A common problem is the sharing of images without consent. Victims can report this to StopNCII.org.

    [11:42] - Survivors should trust their instincts.

    [13:17] - Audace shares some tips on protecting online identification.

    [15:54] - A major and unfortunately common concern and problem is location tracking through mobile devices.

    [18:25] - Tracking devices like Airtags and apps on smartphones can alert abusers of your location.

    [20:33] - Some vehicles also come with integrated GPS tracking.

    [22:14] - Although these services and tracking/monitoring devices can be used maliciously, the technology itself is not the problem.

    [24:20] - Another technology misuse possibility is abusers interacting in a victim’s social media platform as the victim.

    [25:56] - The impact of this interferes greatly with day to day life.

    [28:11] - The Domestic Abuse Hotline is a space to not only report domestic violence, but they can also help with support, resources, and a plan.

    [30:20] - How can community members help with this problem and build awareness?

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    National Network to End Domestic Violence

    StopNCII.org

  • Social engineering has become so creative and clever with the ways scammers are trying to infiltrate your world. AI and deep fakes are only going to make things worse. Over the past 30 years, fighting viruses and malware has only increased with no end in sight. Today’s guest is Roger Grimes. Roger is a Data-Driven Defense Evangelist for KnowBe4. He is a 34-year computer security expert and an author of 14 books and over 1,300 articles on computer security.

    Show Notes:

    [1:06] - Roger shares his background and his drive to continue writing in the field of computer security.

    [3:17] - In his career as an accountant, Roger found himself more interested in the computer side of things.

    [7:45] - Things have gotten worse every year. Ransomware has attacked hospitals and law enforcement in addition to personal devices.

    [10:21] - In many cases, older devices are very hard to replace.

    [11:44] - Most employees of a company don’t know how devices work when it comes to security and things go without updates and patches.

    [15:10] - Some companies are getting better about making sure products are set to auto-patch.

    [16:20] - Social engineering is involved in about 70-90% of all successful hacks.

    [17:23] - Compromised credentials is another common way hackers are easily able to gain access to accounts.

    [19:38] - Social engineering is all about getting you to perform an action that is harmful to yourself or your organization.

    [19:50] - Three qualities to look for: unexpected, asking you to do something you’ve never done before, asking you to do something harmful.

    [21:12] - If something has those qualities, slow down before clicking anything within an email.

    [23:26] - Really good scammers will prepare you for the scam.

    [25:06] - It is hard to retrain yourself to think about these things during any communication.

    [27:14] - People shouldn’t get in trouble with their organization for taking precautions.

    [29:47] - Scammers prey on vulnerable populations, including the elderly.

    [32:10] - Always remember that no legitimate organization accepts payments in gift cards.

    [34:10] - The best we can do right now is educate people to help prevent successful scammers. There’s no stopping it.

    [36:04] - Try to use a MFA that is phishing resistant.

    [38:55] - Roger shares the experience of his fingerprints being stolen.

    [41:20] - Security questions are surprisingly guessable in a lot of situations. Your password might not be guessable, but the security questions aren’t always secure.

    [44:31] - Roger shares some data about patches and what is important to remember.

    [48:31] - Roger sets a time every few months where he sits down and changes every single one of his passwords.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    KnowBe4.com

    Roger Grimes on LinkedIn

  • As we approach the next season, threat actors will be keeping a close eye on dating apps. These apps have become a prime target for threat actors due to the size of the market expanding to over 300 million users and the rich information stored in these apps.

    Today’s guests are Jason Kent and Will Glazier. Jason is a hacker-in-residence at Cequence Security. He has a diverse information security, networking, and IT background and a generous level of knowledge for most pieces of the IT spectrum including firewalls, security architecture, security controls, and security infrastructure.

    Will Glazier is the Head of Threat Research at Cequence Security where they protect some of the world’s largest brands from sophisticated bot attacks and threats against the public facing APIs. Will has a background in fraud abuse and prevention as well as building threat intelligence systems.

    Show Notes:

    [1:18] - Jason and Will share their backgrounds and current roles at Cequence Security.

    [5:24] - As common as scams and fraud are, even Jason and Will have personal experience with them.

    [7:39] - Dating app attacks are particularly hard because they prey on vulnerable people. There are so many cases, that there should not be shame around talking about it.

    [9:32] - The first red flag is when someone you are talking to on a dating app tries to get you over to texting or another app.

    [11:37] - In any given month, the amount of malicious API transactions that Cequence is blocking is in the billions.

    [13:52] - Fake accounts are constantly made but not as heavily used as taken over accounts.

    [16:08] - Scammers are now paying for premium accounts to appear more legitimate and the investment pays off when they scam someone.

    [18:11] - There are tools people can buy to make all accounts look real through automation.

    [19:29] - It is essential that people in a fraud department can trust the information and push it out to Cequence.

    [22:04] - Some organizations will pay a ransom to decrease the time wasted and money lost. In their eyes, the money lost to pay the ransom isn’t as much.

    [26:11] - Margins are getting tighter for the bad guys.

    [30:31] - The infrastructure that scammers use varies. There are some that are really well known at Cequence and some that are more difficult.

    [32:51] - It is easier to take out one big player than to take out hundreds of small ones.

    [36:03] - There are human and political pressures that make things more challenging for security.

    [38:07] - Romance scammers are employing new tactics and switching them up.

    [39:48] - If you put too much trust in the platform that it makes you trust the random person you’re talking to, take a step back.

    [42:40] - Take a look online for things that have been done by scammers historically, especially if you are new to dating apps.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Cequence Security Website

  • Everyone who’s on the internet is exposed to risk. Every time you set up a new account or app, you create another place where your data can be hacked or breached. This makes your differing passwords crucial.

    Today’s guest is Troy Hunt. Troy is a Pluralsight author and instructor, Microsoft Regional Director, and Most Valued Professional specializing in online security and cloud development. He is a conference speaker and runs workshops on how to build more secure software with organizations. He is also the creator of the popular data breach aggregation service known as Have I Been Pwned.

    Show Notes:

    [1:26] - Troy shares what he currently does and the work he is known for.

    [2:57] - You can put your data in one place and it can traverse the internet and end up in places you don’t expect.

    [6:54] - There’s a challenge in running a site that has millions of queries at any time.

    [9:25] - Troy shares some of the accomplishments of Have I Been Pwned.

    [13:32] - Does he experience a lot of malicious traffic? He used to. Troy explains how he has managed this.

    [18:14] - Have I Been Pwned has been around for a while and began as a lot of manual labor for Troy.

    [23:10] - It is crucial for organizations to be receptive to security reports.

    [25:09] - In a lot of ransoms, data of specific groups of people are used as threats.

    [27:56] - Troy lists some of the things that happen on the back end of running a site like Have I Been Pwned.

    [30:36] - Cloud services have been an amazing advancement in technology, but they open up more points of entry.

    [33:35] - There is a hierarchy of multi-factor authentication. Troy discusses the current strategies that are best practice.

    [35:45] - For users, what is the second-factor authentication you can manage to use?

    [37:27] - There are different risk levels to different things. What do you actually need to carefully protect and what level of inconvenience are you willing to bear?

    [39:59] - Troy shares how his parents have been impacted by confusing technology. What is the right technology for a demographic?

    [43:15] - Some data is more important than other pieces of information.

    [45:33] - Some data is also more or less important to different individuals.

    [46:54] - For those managing and discussing data breaches, we also need to be aware that there are pieces of data that could be important to someone but isn’t important to others.

    [48:24] - Unfortunately, data breaches haven’t gotten less common and aren’t really getting better.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Have I Been Pwned?

    Troy Hunt’s Website

  • As people age and their physical and mental health declines, conservatorships are often considered. If you’re not careful, the entire estate can be spent on management costs and abuse can occur. There are things a family can do for better outcomes.

    Today’s guest is Diane Dimond. Diane is the author of four books and is a veteran investigative reporter for radio, TV, and print. Crime and justice is her preferred genre and she broke the Michael Jackson story twice. Currently abusive guardianship and conservatorships are her focus.

    Show Notes:

    [0:55] - Diane shares her background as an investigative reporter.

    [2:48] - Her recent book We’re Here to Help: When Guardianship Goes Wrong is all about the possible pitfalls and risks of conservatorships.

    [5:15] - Diane explains how guardianship and conservatorship is granted.

    [6:21] - In a lot of cases, Diane has found that judges assume if conservatorship is being asked for that the family is dysfunctional.

    [8:59] - Guardians are paid out of the ward’s estate and many charge an outrageous amount of money.

    [10:31] - The most public conservatorship that went wrong was Britney Spears’s. But some celebrity guardianship scenarios have been beneficial.

    [12:29] - Diane firmly believes that guardianship needs to be harder to establish.

    [14:06] - Anybody can initiate a petition.

    [17:14] - Once it is in front of a judge, it can become a catch-22 situation.

    [19:11] - Every state is different and many are starting to pass some reform. Florida in particular is a terrible state for this system.

    [20:42] - SEAR is a very useful resource if you are in an abusive guardianship situation.

    [23:07] - It is almost impossible for the ward to make any decisions.

    [25:50] - It is you against a whole system.

    [27:52] - Unfortunately there is a lot of criminality that is possible.

    [29:51] - It isn’t impossible for abusers to be caught and punished, but it is not common.

    [31:59] - There are alternatives to guardianships that really should be considered.

    [34:21] - If these abusers were punished, they would go somewhere else and commit a different crime, but they would at least leave these vulnerable people alone.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    We’re Here to Help: When Guardianship Goes Wrong by Diane Dimond

    Diane Dimond Website

  • Many parents assume that their children will never be groomed by a predator and then miss the opportunity to educate their kids on the techniques that are used. Every child, regardless of gender, can be manipulated and tricked into making poor choices and put themselves in dangerous situations. Today’s guest is Michael Buraimoh. Michael joined Breck Foundation as CEO in January 2022. He is dedicated to the foundation’s mission to create a better online world for children and young people and is helping take the foundation’s important work to new heights. He is an author, and having his own children inspires him to create a safer digital world for them to grow up in.

    Show Notes:

    [1:01] - Michael shares the background and the reason behind the creation of the Breck Foundation.

    [4:02] - Michael’s own background is in criminal justice, specifically with young people.

    [6:23] - It is crucial that parents are honest and open with their children about this discussion.

    [7:51] - Ignore the misconceptions about grooming.

    [10:37] - Safety doesn’t mean having to put every form of digital activity aside. Parents need to be involved.

    [12:07] - Trust is the key to ensuring that a child will tell their parents things that are happening online.

    [14:05] - There are signs to look out for that could be indicative of something going on.

    [16:32] - It can be hard to determine what is unsafe and what is normal teenage conversations, but it's important to be aware of red flags.

    [18:11] - Young people now are digital natives. They have to be able to engage online.

    [19:52] - There is a place and time for parental controls and limiting access, but relationships are far more important.

    [21:42] - The Breck Foundation educates parents but also the children and young people themselves.

    [23:08] - Young people need to know that if someone is trying to isolate them from their friends and family through secret conversations, something isn’t right.

    [24:52] - Look for a trusted adult to report to. For parents, contact authorities.

    [28:30] - Screenshot, shutdown, and report. The Breck Foundation has a lot of resources for this education.

    [31:51] - Play virtually, but live real.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Breck Foundation Website

  • Currently we have hard copy passports and driver's licenses, but as our digital identities evolve, we may find ourselves with a worldwide digital standardized way of proving who we are. Today’s guest is Philipp Pointner. Philipp leads Jumio’s digital identity strategy and the initiative to enable multiple digital identity providers in its ecosystem. Prior to Jumio, Philipp was responsible for paysafecard, Europe’s most popular prepaid solution for online purchases.

    Show Notes:

    [0:53] - Philipp shares his background and current role at Jumio.

    [2:12] - Our online identity has changed very quickly over the last decade.

    [3:47] - Over time, this evolution has made people a lot more comfortable with technology.

    [5:50] - The changes that Philipp thinks are coming may cause problems with some countries not accepting them.

    [7:30] - The digital identity will likely be more secure than physical copies of important documents like passports and driver’s licenses.

    [10:47] - Chris and Philipp discuss a recent experience in verifying the credibility of physical documents.

    [12:52] - With more sophisticated benefits to a digital identity comes more sophisticated attack attempts.

    [15:40] - Where does one turn if they are a victim of identity theft?

    [17:11] - Philipp believes that it should be the responsibility of an organization to ensure the end user is safe.

    [18:48] - Philipp shares the results of a survey that asked people if they were willing to take more steps to ensure that they were secure online, but the exception was social media.

    [22:02] - Education around scams is improving and increasing, but not about everything.

    [26:20] - The technology exists to keep people more secure, but it isn’t employed as often as is necessary.

    [27:47] - At the end of the day, the inconvenience is always put on the end user.

    [29:07] - Biometrics are strong and have a lot of well governed standards already in place.

    [31:40] - Research shows that the requirement to change passwords every 90 days is ineffective.

    [32:59] - Currently, there isn’t a one-stop shop to receive the education they need to better understand cybersecurity.

    [35:48] - Philipp and Chris talk about the recent issue with concert tickets being purchased by bots for scalping.

    [38:28] - The general public has become an easier target than in years past because of the increase in online activity.

    [40:09] - People vastly overestimate their ability to detect fake images and deep fakes.

    [41:42] - Philipp explains what it means to have a reusable digital identity.

    [43:30] - When digital identity is used to verify in the future, will users have the ability to revoke their provided information?

    [46:58] - Pursue education on this topic and then take action.

    [50:01] - Your data is definitely online and it's important to be aware of what is available for potential scammers to know.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    Jumio’s Website

  • Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks and products. Today’s guest is Robert Karas. Rob came to the Cybersecurity and Infrastructure Security Agency in 2010. He has over 30 years experience in the information security field and significant experience in building nationally recognized security platforms. At CISA, Rob built the Cyber Hygiene Program, risk and vulnerability assessments, and penetration testing programs. He has also created the Cyber Defense Education training programs to address industry challenges. Rob was also recognized by Cyber Patriot as Mentor of the Year.

    Show Notes:

    [1:03] - Robert shares his background, what he does at CISA, and what CISA does as an agency.

    [4:01] - At CISA, agents hack into a company’s system with their permission to see where the vulnerabilities are.

    [5:53] - Phishing and social engineering continue to be the most successful attacks.

    [8:41] - A lot of times it feels like good security equals bad customer service.

    [10:27] - Playbooks are all the same or similar but the tools that CISA uses are unique.

    [12:29] - With the introduction and evolution of AI, there is some preparation to be done for an inevitable increase in attacks.

    [14:07] - Attackers prey on human vulnerability and emotion.

    [15:53] - Phishing emails are so good now that many times they really appear to come from someone you know.

    [17:15] - Over the last ten years, the statistics of people reporting a scam have improved.

    [20:16] - It is important for organizations to be prepared. For help with this, you can email [email protected].

    [23:39] - CISA has implemented Secure by Design.

    [25:30] - If you suspect you are communicating with a scammer, stop communicating right away.

    [27:02] - It is overwhelming when you think about the amount of devices we have that are connected and relied on.

    [30:16] - The amount of data we have and can have access to is so immense. How can we inspect everything?

    [32:09] - When it comes to purchasing new devices, ensure that frequent updates are part of the guarantee.

    [34:41] - A great place to start for resources on CISA’s website. Robert shares some of the resources available, including Secure Our World.

    [35:54] - CISA also offers free vulnerability scans for businesses.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:

    Podcast Web Page

    Facebook Page

    whatismyipaddress.com

    Easy Prey on Instagram

    Easy Prey on Twitter

    Easy Prey on LinkedIn

    Easy Prey on YouTube

    Easy Prey on Pinterest

    CISA Secure Our World

    CISA’s Website