Easy Prey
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
info_outline
Vanishing is a Lie
09/10/2025
Vanishing is a Lie
Trying to erase yourself from the internet sounds simple until you start counting up old accounts, scattered social media posts, and the hundreds of data brokers quietly collecting and selling your information. The reality is messy, and for most people, the idea of fully disappearing online is more myth than possibility. But there are practical steps you can take to cut down what’s out there and regain some control. My guest, Max Eddy, is a senior staff writer at Wirecutter who covers privacy, security, and software platforms. For one of his projects, he set out to see how much of his own digital footprint he could realistically reduce. Max shares what he discovered along the way and what worked, what didn’t, and how even small changes can make a meaningful difference. In our conversation, Max talks about the value of using password managers and email masking, what he learned from testing multiple data removal services, and the emotional side of deleting old social media history. He also explains why perfection isn’t the goal, and how thinking differently about privacy can help you stay one step ahead of scammers, marketers, and anyone else trying to piece together your personal information. Show Notes: [00:50] Max explains why he got into covering privacy and security and what keeps him motivated in the field. [03:27] We discuss the Wirecutter project on disappearing online and why it resonated with readers. [04:12] Using Have I Been Pwned, Max was able to reduce 350 online accounts down to 27 that needed immediate attention. [09:10] Max describes the tactics he used to break the links between his online accounts with fake names, masked emails, and random images. [11:55] We talk about data removal services, their limitations, and the challenges of removing certain public records. [17:52] We learn how scammers can piece together a person's complete profile from inconsistent, fragmented data from different data brokers. [18:54] We discuss how Google's removal tools only make information harder to find, but don't delete it. [23:15] We talk about the emotional side of deleting social media history and the automation tools he used to make it possible. [29:40] Max discusses the risks of deleting accounts entirely, from impersonation threats to losing important communication channels. [32:28] We talk about the value of taking a gradual approach to improving your digital privacy and how small, steady steps are most effective. [38:44] Max shares his key takeaways from the project: first, ask why you want to disappear, and second, remember that any effort to reduce data is valuable. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/38000695
info_outline
Hackers Are Winning
09/03/2025
Hackers Are Winning
Cyberattacks aren’t just about hackers in hoodies anymore. Today, we’re up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He’s the founder and CEO of Deep Tempo, and a serial entrepreneur who’s helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he’s seen firsthand how enterprises try to shift the balance. In this conversation, Evan explains why compliance checkboxes aren’t enough, why raising the cost of an attack is often more realistic than stopping one outright, and how AI is reshaping both sides of the fight. He also shares the creative ways defenders are adapting, from honeypots to sock puppets, and the simple steps every one of us can take to make life harder for attackers. Show Notes: [00:57] Evan Powell introduces himself as founder and CEO of Deep Tempo, with nearly 30 years in cybersecurity and tech innovation. [02:39] He recalls a high-profile spearphishing case where the CIA director’s AOL email and home router were compromised. [03:51] Attackers are professionalizing, running AI-powered labs, and making trillions while defenders spend billions and still fall behind. [07:06] Evan contrasts compliance-driven “checkbox security” with threat-informed defense that anticipates attacker behavior. [09:40] Enterprises deploy creative tactics like honeypots and sock puppet employees to study attackers in action. [12:22] Raising the cost of attack through stronger habits, better routers, and multi-factor authentication can make attacks less profitable. [15:01] Attackers are using AI to morph and simulate defenses, while defenders experiment with anomaly detection and adaptive models. [20:56] Evan explains why security vendors themselves can become attack vectors and why data should sometimes stay inside customer environments. [24:50] He draws parallels between fraud rings and cybercrime, where different groups handle exploits, ransomware, and money laundering. [26:29] The debate over “hacking back” raises legal and policy questions about whether enterprises should strike attackers directly. [30:18] Network providers struggle with whether they should act as firewalls to protect compromised consumer devices. [34:59] Data silos across 50+ vendors per enterprise create “Franken-stacks,” slowing real-time defense and collaboration. [37:28] AI agents may help unify security systems by querying across silos and tightening the OODA loop for faster response. [39:10] MITRE’s ATT&CK framework and open-source collaboration are pushing the industry toward more shared knowledge. [41:05] Evan acknowledges burnout in cybersecurity roles but sees automation and better tools improving day-to-day work. [42:59] Final advice: corporations should rethink from first principles with data-centric solutions, and consumers must build protective habits like MFA and secret family phrases. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/38000550
info_outline
Before the Fraud Tsunami Hits with Ritesh Kotak
08/27/2025
Before the Fraud Tsunami Hits with Ritesh Kotak
Scams aren’t what they used to be. These days, AI can write perfect emails, mimic voices, and even fake a video call so well you’d swear you were talking to the real person. The problem is, the timing of a scam can be just right when you’re distracted, busy, or looking for exactly what they’re offering. That’s when even the most careful person can get caught. My guest, Ritesh Kotak, knows this world inside and out. He’s a cybersecurity analyst, an Ontario lawyer, and a tech innovator who’s worked with Fortune 500 companies and served in policing, where he helped start one of Canada’s first municipal cybercrime units. He’s got a BBA, MBA, and JD, all focused on privacy, cybercrime, and the way emerging tech impacts everyday life. In our conversation, Ritesh explains how criminals are using AI as a weapon, how it can also be a shield, and why simple, low-tech steps, like having a secret phrase with family or confirming a request through a different channel, are still some of the best defenses. He even shares a close call he had himself, which is a good reminder that nobody’s immune when scams are this convincing. Show Notes: [00:50] Ritesh shares his background as a lawyer helping clients navigate AI, tech, and cybercrime. [01:18] His fascination with technology began at age three after taking apart his father’s computer. [03:59] In policing, Ritesh saw early signs of cybercrime blending with physical crime. [06:55] He demonstrates cybersecurity risks by live hacking a police chief, leading to the creation of a cybercrime unit. [09:16] A near-miss phishing scam involving discounted amusement park tickets highlights how timing plays a role. [15:14] Spoofed calls and evolving scam tactics make detection harder despite telecom safeguards. [17:09] Ritesh explains AI as both a sword for criminals and a shield for protection. [20:00] Generative AI enables flawless phishing emails, fake websites, and realistic deepfake audio and video. [28:00] Simple defenses like secret phrases and multi-channel verification can stop many scams. [31:45] Reporting scams to police can help investigations and sometimes recover funds. [33:17] Ritesh advocates for centralized fraud response centers to improve victim support. [36:45] Calling a lawyer can help victims navigate legal and civil remedies. [38:05] Final advice: pause, verify, and use low-tech habits to prevent high-tech crime. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37778405
info_outline
Privacy is Dead
08/20/2025
Privacy is Dead
Privacy in the digital age has grown from a background concern into one of the defining issues of our time. What began with simple questions about online safety has expanded into a complex, global conversation about how artificial intelligence, biometric data, and massive data ecosystems are reshaping daily life. Pam Dixon has been at the center of these discussions for more than two decades. As the founder and executive director of the World Privacy Forum, she’s worked across the U.S., Europe, India, Africa, and beyond, advising governments, international organizations, and policymakers on how to create effective privacy protections. In this episode, Pam takes us through the history of modern privacy law, the ways different regions approach the challenge, and the new frontiers like collective privacy, AI governance, and health data that demand fresh thinking. She also offers a grounded perspective on how to build systems that safeguard individuals while still allowing innovation to thrive, and why getting those guardrails right now will shape the future of trust in technology. Show Notes: [4:49] Pam identified privacy risks in early resume databases and produced a 50-page report on job boards, now known as job search platforms. [8:56] Pam now chairs the civil society work at OECD in AI, contributing to the Organisation for Economic Co-operation and Development Privacy Guidelines (first adopted in 1980). [11:17] The launch of the internet marked a major shift in privacy, transitioning from slower, isolated systems to globally connected networks. [11:46] Early adoption of the internet was limited to academia, government, and tech enthusiasts before reaching the public. [12:45] Privacy frameworks were built on Fair Information Practices, developed in the United States in the 1970s by the Health, Education, and Welfare Committee (later HHS). [15:58] GDPR was developed and enforced in 2018 with extraterritorial provisions applying to companies worldwide (General Data Protection Regulation, enacted in 2016 and enforced in 2018). [18:59] Large language models and deep machine learning advancements have created new and complex privacy challenges. [22:06] Some countries approach privacy with more flexibility and openness, while maintaining strong guardrails. [23:37] In June 2023, a University of Tokyo study on data privacy was presented at an OECD meeting, highlighting evolving global strategies. [26:30] Governments are working together on “data free flow with trust” to address cross-border data concerns. [28:09] Pam warns that AI ecosystems are still forming, and policymakers need to observe carefully before rushing into regulation. [28:31] She emphasizes the emerging issue of collective privacy, which impacts entire groups rather than individuals. [29:04] Privacy issues are complex and not linear; they require ongoing adaptation. [30:24] ChatGPT’s launch did not fundamentally change machine learning, but the 2017 transformer paper did, making AI more efficient. [31:53] Known challenges in AI include algorithmic bias related to age, gender, and skin tone. [33:07] Legislative proposals for privacy now require practical testing rather than theoretical drafting. [35:39] AI legislative debates often center on fears of harming innovation, but scientific data should guide regulation. [40:29] NIH reports caution participants in certain medical AI programs to fully understand risks before joining. [41:59] Some patients willingly share all their health data to advance medical research, while others are more cautious. [43:50] Tools for privacy protection are developing, but the field remains in transition. [48:56] Asia and Europe are leading in AI and privacy transitions, with strong national initiatives and regulations. [52:42] The U.S. privacy landscape relies on sector-specific laws such as HIPAA (1996) and COPPA (1998) rather than a single national framework. [54:48] Studies show that wealthy nations often have the least trust in their digital ecosystems, despite advanced infrastructure. [56:19] A little-known U.S. law, A119, allows for voluntary consensus standards in specialized areas, enabling faster innovation compared to ISO processes. [56:48] Voluntary standards can accelerate development in fields like medical AI, avoiding years-long delays from traditional approval processes. [57:32] An FDA case study on an AI-driven heart pump showed significant performance changes between initial deployment and later use, underscoring the importance of testing and oversight. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37778165
info_outline
America’s Scam Crisis
08/13/2025
America’s Scam Crisis
Most of us think of scams as random or isolated or something that just happens to unlucky people. But what if the truth is far more organized, far more disturbing? Behind many of today’s scams is a global web of criminal enterprises, structured like corporations and fueled by technology, data, and billions of stolen dollars. In this episode, we sit down with Ken Westbrook. Ken spent over three decades in the CIA before retiring, only to return to the fight after his own mother was targeted and lost most of her life savings to a tech support scam. That moment changed everything. He founded Stop Scams Alliance, a nonprofit on a mission to stop scams before they ever reach our devices. His approach? Building bridges between tech companies, banks, telecom, government, and consumer advocates to cut these criminal operations off at the source. Ken brings a rare blend of intel experience and personal urgency to this issue. He breaks down what’s really going on behind the scenes, why the U.S. is falling behind in this fight, and how other countries are pushing back effectively. If you think this can’t happen to you or someone you love, think again. This conversation is a wake-up call. Show Notes: [00:58] Ken is the founder and CEO of Stop Scams Alliance, a non-profit dedicated to reducing scams in the United States. [01:21] They are focused on the left of the boom or before the scam happens. [01:43] Ken served for 33 years in the CIA. [02:28] We learn how Ken's mother was scammed on Valentine's Day of 2023. He started looking into these scams, and he was horrified. [03:19] As a nation, we need to do better to defend ourselves. Ken came out of retirement to do just that. [03:32] His board of directors has a lot of government officials who decided to join the fight. We are literally under attack by foreign organized crime, and we're not doing enough to protect ourselves. [04:03] 21 million Americans are scammed each year. [04:45] The number of scam and fraud victims are increasing. [05:15] It's become a business, and the scammers are getting better at what they do. [06:36] How Chinese criminal gangs shifted from casinos to scamming operations. People join voluntarily or are sometimes kidnapped. [07:24] It's also expanding around the world. [10:12] The British government actually has a scam czar. So does Australia. They have a strategy and a fraud policy. [12:08] You think you're talking to the IRS or your bank, but you're not. [13:45] Having a whitelist for financial advertising. Other countries are finding value in authenticating, maybe the United States should pay attention. [15:36] Scammers love to get people on the telephone. In many countries, telecom companies will block spoofing calls from other countries. [16:47] We need authenticated text messages in the US. [17:42] We have more companies and free enterprise, so it's more complicated in the US. [19:35] We need somebody in charge. It's an economic war with transnational organized crime. [22:34] Fake investment scams are the number one scam when it comes to losses. [27:46] Ken shares what happened in his mom's case. It was a tech support scam. His mom clicked on an obituary site and scareware popped up. [30:08] The whole point is to get you to call a fake 1-800 number that you think is Microsoft. [30:51] The Phantom hacker was able to look up where she banked by using her phone number. Then they put her in touch with the fake fraud department at the bank. [32:11] Then they sent her to Home Depot to buy gift cards and then cashier's checks. [33:55] Fortunately the banks intervened, but she still lost a lot of money. [36:38] We need to realize that we're being attacked by Chinese cyber criminals. [39:38] People under the age of 50 are falling victim to scams more than the elderly people. [41:31] The average loss last year of an older person was $83,000. Older people are being targeted because of their demographic. [43:31] Criminals micro-target just like advertisers. [44:04] We all need to be aware of the threats out there. If you get a call that you're not expecting, always assume it's not legitimate. [45:21] Be wary of links. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37482745
info_outline
How Fraudsters Choose Targets
08/06/2025
How Fraudsters Choose Targets
It’s easy to think of fraud prevention as a technical problem with a software solution. But according to Brian Davis, effective fraud defense is just as much about people, trust, and communication as it is about tools and data. With over a decade of experience, Brian has built fraud teams from scratch, shaped company-wide strategy, and helped growing startups shift from reactive to proactive risk management. Brian is the Head of Fraud at Dodgeball, where he’s helping bring their orchestration platform to market, and the founder of House of Fraud, an invite-only community where top fraud professionals collaborate and share intel. He’s seen firsthand how fraudsters adapt quickly, and how internal misalignment or a lack of education can leave companies vulnerable. His layered approach focuses on understanding how business systems are abused and using that knowledge to design smarter defenses. In this episode, Brian shares his journey into the fraud space, explains why internal politics often matter more than policy, and offers a real-world breakdown of how fraud teams can gain traction and build trust. Whether you're running a digital subscription business, a fintech platform, or an e-commerce store, this conversation will help you think more clearly about why you’re a target and what you can do to make your organization harder to hit. Show Notes: [00:50] Brian is the head of fraud at Dodgeball Fraud Orchestration Platform. [01:15] We learn how Brian noticed something was off about 10 years ago when he was working for an accounting client. [02:01] He loved accounting, but as he got his master's degree, he started focusing on entrepreneurship and fraud. [02:45] He worked in accounting for a year and then became the first fraud hire of an e-commerce company. [03:30] Then he built out teams to help businesses combat fraud. [04:07] He's now on the vendor side of fraud prevention, and he does consulting and runs The Fraud Space community. [05:18] Brian likes the dynamic aspect of always having to solve a problem. Micro patterns pop up that can be connected to bigger patterns. [06:47] Most people are willing to help the fraud department, because it gets them what they want. [09:20] Issues that arise when doing a really good job in the fraud department and justifying the expense. [11:05] When coming into a new company, the areas where Brian starts looking for fraud. [12:04] The first step is to understand how the company makes decisions. He then begins with a surface map. How does a user interact with your site for an outcome? [16:29] Where the larger threats are coming from. [18:49] Understanding the fraudster's criminal journey and where they choose to attack. [25:25] Founders who have previously been hurt by fraud asked more questions. [28:20] Behaviors that might actually attract fraud. [30:58] How referral programs can attract fraud. [40:29] There are many similarities between the different types of fraud and the tools used across multiple industries. [41:23] Has Brian ever been the victim of a scam? [42:28] A fraud story purchasing sporting tickets through marketplace. [49:12] The pitfalls of passwords and password hygiene. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37456090
info_outline
Hidden Dangers of AI in Cybersecurity
07/30/2025
Hidden Dangers of AI in Cybersecurity
Everyone’s talking about AI these days, especially in cybersecurity. Sure, artificial intelligence can boost your defenses, but cybercriminals have noticed too. Now they're crafting phishing emails so believable it’s scary and finding clever paths around spam filters while zeroing in on vulnerabilities you didn’t even realize were there. Today, Aviad Hasnis joins the show. He's the CTO of Cynet Security and spent years running cybersecurity missions for the Israeli Defense Forces. Aviad’s here to help us figure out what the changing threat landscape really means, whether you're leading a corporate giant or just trying to keep your small business safe. From passwords getting scooped up to VPN setups from a decade ago that no one updated, Aviad’s seen just about everything go wrong. He also explains why copy-pasting AI-generated code might open you up to attacks you never saw coming. He’s big on education, common sense, and making sure you’re using multiple security layers. These days even one slip-up can give attackers exactly what they're looking for. Aviad also walks us through supply chain vulnerabilities and why they should keep you up at night. Whether you're the CISO of a Fortune 500 company or you’re running a small team with Bob, the go-to tech person juggling 18 other tasks, this episode is packed with practical insights to help you avoid the next big cybersecurity headache. While AI might be reshaping the cybersecurity landscape, staying secure still comes down to thoughtful planning, human judgment, and making sure someone you trust has your back. Show Notes: [01:08] Aviad has been Cynet's Chief Technology Officer for the past five years. Prior to that, he worked in cyber security for the Israeli Army. [02:18] He was always fascinated with computers and technology. When Iran had a technology problem, he realized that cybersecurity was what he wanted to do for the rest of his life. [03:19] Aviad shares a story about his friend's mother being exposed to a scam. She received a phone call from someone pretending to be a police officer. She even installed different executables on her laptop. She didn't realize she was being victimized until she transferred over five grand. [06:07] Social engineering is one of the most dominant ways to gain access. [08:39] The security implications of using AI. [09:30] It's important to have guardrails with how you use AI. [10:28] If you're just copying and pasting code you may copy something that could be vulnerable to exploits. [11:16] People need to be aware of the types of risk and educate themselves. [12:49] Conversations at the C-suite level for implementing AI. [13:43] The challenge is to harness AI the right way without replacing people. [15:18] It's important to use critical thinking when creating with AI. [16:04] AI is helping security by allowing people to consult and get information. You can also introduce vulnerabilities into your application if you just copy and paste from chat GPT without knowing the context. [17:05] The bad guys can also use AI. [17:56] AI has improved the quality of phishing scams. [21:36] Where organizations are missing out when it comes to sniffing out threats. This includes VPNs and SaaS or cloud. [22:52] Employees could be using their home computers to connect to the company VPN and then their kids might download some malware or trojan. Companies need to use two-factor authentication when it comes to VPNs. [24:11] Email phishing can be another way to steal credentials. [27:54] The most effective approach is security layers. [30:40] Another security measure is creating profiles where we know where you're logging in from. [33:35] Is this doom and gloom for small businesses? [34:48] The best solution for small businesses would be to find a company with an all-in-one solution. [37:11] The importance of being proactive, so you can act quickly if you see something suspicious. [38:24] How the move to the cloud affects security. [39:08] Shifting to the cloud is safer. [44:20] New threats on the horizon include threat actors utilizing AI. They love to get control of remote applications. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37455900
info_outline
Author Scams Exposed
07/23/2025
Author Scams Exposed
Writers pour their hearts into their work, but unfortunately, that passion can make them prime targets for scams. From fake agents and vanity publishers to slick marketing schemes and social media impersonators, the tactics have only gotten more sophisticated over time. In this episode, we dig into the murky world of publishing scams and how they work and who they target. Along with why even experienced authors can get caught off guard. Today’s guest is Victoria Strauss. Victoria is the author of nine fantasy and historical novels for adults and teens, and she’s also the co-founder of Writer Beware, a watchdog group sponsored by the Science Fiction and Fantasy Writers Association. Drawing from decades of experience, Victoria shares red flags to watch out for, practical steps authors can take to protect themselves, and eye-opening stories of deception that highlight just how easy it is to get pulled in. This conversation is about awareness and empowerment. Whether you’re just getting started or you’re a seasoned author, you’ll learn how to do your due diligence, where to turn for trustworthy resources, and how to avoid becoming an easy target in a complex industry. With tools like Writer Beware, Victoria equips authors to stay vigilant, protect their creative work, and steer clear of costly traps. Show Notes: [01:00] Victoria shares her background including publishing nine novels. She's a member of the Science Fiction and Fantasy Writers Association, which is the sponsor of Writer Beware. [01:49] Writer Beware was formed with Victoria and a colleague when they became interested in writer scams. [03:36] When it first began, the most common scams for fee-charging literary agents and scam editing referrals. [04:25] Most current scams are digital and focus on self-publishers. [05:11] We learn what a vanity publisher is. [06:22] How self-publishers do everything a writer does and everything a publisher does. [10:34] One marker for a scam can be solicitation and out-of-the-blue emails. [12:42] A lot of people offer services like cover design when they don't really have the experience or expertise. Research anyone you're going to hire and their experience. [15:50] Look for what to cover in a contract, such as keeping your copyright. Watch out for scam registration services. [17:36] A DM scam where the scammer impersonates a writer and offers a marketing service recommendation. [22:21] Be aware and understand what the risks are and what to look for. [23:52] Evaluating opportunities. [26:16] Use a credit card and report any problems. [27:51] The newest scams are usually on social media. [28:40] A crazy story about a literary agent who is charging upfront fees and even accepted fees for a conference and then faked her own death. [30:39] A cautionary tale of how a publishing marketing company from the Philippines scammed authors out of millions of dollars. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37413415
info_outline
Tricked by Followers and Badges
07/16/2025
Tricked by Followers and Badges
What if your social media success was built on deception, and it was working? In today’s episode, we hear from someone who knows exactly how that happens. Tim O’Hearn is a former software engineer and the author of Framed: A Villain’s Perspective on Social Media, a book that pulls back the curtain on how follower factories, automation, and persuasive technologies have shaped the online world we now take for granted. Tim doesn’t just theorize, he built these systems himself. Tim walks us through how his small side gig growing Instagram accounts evolved into a lucrative business, one that constantly navigated the blurry line between innovation and breaking platform rules. He opens up about the clever strategies he used to avoid detection and psychological hooks that made these methods so effective, as we explore the deeper consequences of social media’s addictive nature. We’ll also explore the hidden risks businesses and individuals face when they obsess over metrics and follower counts instead of genuine connections, and why most people don’t even realize they're caught up in this trap. Whether you're running a business, casually browsing, or just trying to figure out the complicated world of online attention, this conversation will give you a rare peek behind the curtain. And as you’ll find out, stepping away from it all might not be as straightforward as you'd think. Show Notes: [01:12] Tim recently published Framed: A Villain's Perspective on Social Media, a book that shares his journey from breaking the rules on social media to getting millions of followers for his clients. [02:15] We learn a little bit more about the beginnings of spamming the Internet and increasing online presence, including MySpace and Instagram, which evolved into getting more followers. [04:14] This created social proof and the possibility of higher conversion rates. [05:09] Increasing followers using botnets or fake followers. Organic growth and interacting with accounts that might follow or like. [08:35] Tim's business was Shark Social, where he bent the rules to get followers for clients. [09:53] The technical side of his operation. Proxies were used to mask their tracks. [12:30] Social media services have taken efforts to stop things like follower growth services. [14:54] Risks for businesses using social media growth platform services. It's against TOS, and your account can get banned. [18:36] Systems Tim built to target consumers using social media. The goal was to get users to spend more time on the app. [20:50] Thresholds for annoying users. It was shocking how many people allowed push notifications and other annoying things. [22:54] How social media affects Tim. [26:11] We learn how he feels about the influencer culture and promoting his book on TikTok. [27:14] Advice for business owners, including these services, may not get you more business. Pause before doing too much. [28:48] Individuals should focus on conversions. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/37347785
info_outline
Only 10 Seconds to Expose a Scam
07/09/2025
Only 10 Seconds to Expose a Scam
What if you could stop a scam in real-time before the damage is done? In this episode, I’m joined by Nick Stapleton, an investigative journalist and the face behind Scam Interceptors, the BAFTA award-winning BBC series that exposes online fraud and steps in to protect victims as scams unfold. Nick brings a decade of undercover documentary experience to his current mission: fighting digital deception and empowering everyday people to stay safe. He shares jaw-dropping stories from the front lines, including the near miss that almost caught him off guard, and breaks down the complex operations behind everything from romance scams to global scam compounds. As the author of How to Beat Scammers, Nick also gives practical advice on how to recognize red flags and build your own defense against a rising tide of fraud. Show Notes: [01:06] Nick presents a show called scam interceptors for the BBC. He also does scam advice on a chat show called Morning Live. He also wrote a self-help book about . [01:59] We learn how Nick got into the space. He began in investigative journalism and hidden camera work and now 5 years later Scam Interceptors is his full-time job. [06:17] He came very close to becoming a victim of a scam, because a lot of scammers try to get him. [14:30] About 300,000 accounts a day get hacked on Meta. [15:10] There are things you can enable on Meta to help protect your account. [16:43] In the UK scammers rarely go to prison. [17:18] When he first started the series the scale of some of the scam operations out there really shocked him. [18:43] There can be 200 people working in a scam call center. [20:52] A lot of the people who run pig butchering scams are indentured slaves. [24:12] They would even hire models to have video conversations with potential scam victims. [25:22] Why local governments don't break up these scam centers. [26:38] It's difficult to motivate the authorities when the victims aren't from that country. [29:21] APP refunds in the UK. In most cases we need to be aware and protect ourselves. [30:52] Assume everything out of the blue is fake. Come from a position of skepticism. [35:04] When investigations go wrong filming the show and they lose people to scams. [39:10] When the show first began, sometimes the people they were trying to stop from being scammed thought they were the scammer. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36821355
info_outline
Gambling, Lies, and Millions Stolen from Celebrities
07/02/2025
Gambling, Lies, and Millions Stolen from Celebrities
What happens when the drive to succeed masks deep emotional wounds and addiction? In this episode, Jonathan Schwartz shares a powerful and painfully honest account of how his life unraveled. Once one of Hollywood’s most trusted financial advisors, Jonathan worked with icons like Beyoncé, Mariah Carey, and Gwyneth Paltrow. On the surface, he had it all. But underneath the success was a secret struggle with gambling and drug addiction that led him to steal millions from the very clients who trusted him most. His fall from grace was dramatic and public, ending in a prison sentence and the loss of everything he had built. But that wasn’t the end of his story. Today, Jonathan is sober and rebuilding his life with purpose. As Program Director at Altus Rehab, he now helps others find their own way out of addiction and shame. His story is raw, real, and full of hard-earned wisdom for anyone who has ever felt like they couldn’t ask for help. Show Notes: [01:30] Jonathan is a different person from who he was. He grew up in Upstate New York and his father left when he was four. His mom had a lot of stress and took it out on him which created childhood trauma. [03:34] Accounting was the subject that he was good at. [05:02] Eventually, his cousin gave him a job working in Los Angeles for celebrities. [06:33] In 2004, he became a partner in GSO business management. He got a break when Linkin Park was looking for someone in business management. Their success opened up the floodgates. [08:37] He began getting more and more A-list clients. [09:04] In 2010, he became addicted to gambling. [10:01] This eventually led to embezzlement from his celebrity clients. He placed the bet with this bookie everyday for 6 years. [13:48] He ended up embezzling about 7 million dollars. [14:12] When he stopped gambling he had suicidal ideation. [17:05] He always intended to pay the money back. [19:37] Jonathan shares a time when the bank wanted to call Alanis. [21:03] There was a point when his partners started to notice something wasn't right. [22:04] In 2015 he was fired by Alanis, but he continued to give his attention to his A-list clients. [24:42] He didn't want to expose anyone to the fact that he was committing crime. He never told a soul. [25:07] The dark secret was eating him inside, and he also had to deal with his unresolved trauma. [27:12] How Jonathan had to come clean with his wife, because he was scheduled for a lie detector test. [28:48] After failing the test, he was facing 23 years in prison. He negotiated a four to six year plea agreement. [31:14] He ended up being released early because of COVID. [32:11] He struggled to get a job and ended up going back to school, and now he's a marriage and family therapist with an emphasis on addiction and trauma. [34:00] In prison he had the opportunity to reflect on his bad decisions and read a lot of books. [36:33] He's proud to be sober and a nerd. His trauma is resolved, and he gets to help people in treatment not make the same mistakes that he made. [41:34] Celebrities today need to understand not to trust their business manager so quickly and to make sure that they're proactive in their financial affairs and that they're asking for source documents. [42:11] Audit your business manager with some level of frequency. [48:43] Don't go out and spend all your money. Treat your first dollars as your last dollars. [50:56] Jonathan has a book coming out in about 12 months. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36821215
info_outline
Human Side of Fraud: Empathy, Education, & Evolution
06/25/2025
Human Side of Fraud: Empathy, Education, & Evolution
People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t even think to look. In this episode, I sit down with PJ Rohall, Head of Fraud Strategy and Education at SEON and co-founder of About Fraud. PJ’s work is all about staying ahead of scammers and helping businesses and individuals understand how fraud actually works. From synthetic identities and AI-powered scams to account takeovers and refund fraud, he breaks it all down in a way that’s both eye-opening and surprisingly accessible. We talk about how fraudsters think, what makes people vulnerable, and why collaboration is one of the best defenses we have. PJ shares practical tips, real-world examples, and some of the patterns he’s seeing that everyone should be aware of. Whether you run a business or just want to better protect yourself online, this conversation might change the way you think about trust, technology, and the digital world we live in. Show Notes: [00:52] PJ Rohal is a co-founder of About Fraud and Fraud Fight Club, which is our in conference, in-person experience. He started that back in 2017, but his fraud prevention journey started back in 2011. [02:45] He began studying finance and business. He had some mental health issues and was open to trying something different when he saw a job for a fraud analyst. [06:22] His experience transferred really well into the entrepreneurial journey. [11:13] It's in the best interest of everyone to collaborate and share tips and tricks when trying to prevent fraud. [13:05] Everybody is open or vulnerable to being a victim of a scam. There shouldn't be a stigma around it. [14:51] It's powerful to see even tech savvy people being victims of scams. [17:20] How a contextually relevant scam could actually get you. [21:16] It's PJ's dream to get outside of his bubble and help educate the community the best he can. [23:43] Two-factor authentication codes have changed, because they give warnings and instructions for the consumer now. [28:45] People with platforms could get the word out about the risk of scams. [34:30] Getting fighting scams to the front and center is a challenge. [36:57] Handling calls from people who've lost large amounts of money in a scam. Having a psychologist or people who understand human behavior would really help with this journey. [40:39] Banks and financial institutions are starting to think differently about handling these issues. [41:05] There's also a lot of technology on the market that's designed for scams. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36821045
info_outline
Identity Is The New Security Perimeter
06/18/2025
Identity Is The New Security Perimeter
Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it's clear we live in a time when cybersecurity isn’t just a tech issue, it’s a human issue. In this episode, I talk with Jeff Reich, Executive Director of the Identity Defined Security Alliance. Jeff has been in the cybersecurity world since the early days, with decades of experience helping organizations protect what matters most. His passion for identity security and risk management runs deep, and he brings a thoughtful perspective on how the industry has changed and what we need to do to keep up. We explore why identity is the real perimeter in today’s digital world, how businesses and individuals can be proactive rather than reactive, and what it really takes to build a security-first mindset. Jeff also shares why communication is just as important as tech when it comes to staying secure. Whether you're a cybersecurity professional or just someone trying to stay safe online, this conversation will leave you thinking differently about the role identity plays in your digital life. Show Notes: [00:54] Jeff Reich is the Executive Director of the Identity-Defined Security Alliance, a nonprofit focused on raising the level of awareness of identity and identity security. [01:52] Jeff began studying physics and astrophysics in school. He even taught in a planetarium. He also went into law enforcement. [03:10] He went into security and was planning on working at EDS, but he ended up at ARCO. He then moved to Dell computers and a financial services company. He started the security program at Rackspace and was also a research director at the University of Texas, San Antonio. [03:49] He is now enjoying the nonprofit space. [04:43] Not becoming a victim of a scam comes down to situational awareness. If you're receiving something from someone you don't know, assume it's hostile. [06:33] Jeff tells the story about when he was working at a hosting company, and he noticed clusters of servers turning from green to red and then back to green. [07:42] It turned out scammers were taking over customers' websites. It ended up being ransomware. [16:03] Be very aware of fake invoices and spoofed emails and scam phone calls. [20:18] They recently had identity management day 2025. They had a lot of presentations on what existential identity might mean to a certain individual or corporation. [21:57] People can protect themselves by using different email accounts. [24:34] Tips on protecting yourself when someone is impersonating you. [27:21] The future of identity should have big advances going forward that will involve AI. [31:40] Improved authenticator apps and DNA-based identity are in our futures. [36:22] Hackers are stealing credentials and logging into companies not breaking in. [39:01] Our identity needs to be protected more than an account number. [40:01] Clean house and get separate accounts for important things like banking. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36820910
info_outline
Your Car Is Spying On You What It’s Collecting and Who It’s Telling
06/11/2025
Your Car Is Spying On You What It’s Collecting and Who It’s Telling
I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggering amount of personal information. In this episode, I talk with Andrea Amico, the founder of . Andrea is one of the leading voices in automotive data privacy and someone who’s spent years uncovering the hidden ways cars collect, store, and share our information. He breaks down how connected cars work, what’s actually being tracked, and why it matters not just for your privacy, but for your safety and finances too. We get into everything from rental car risks and data left behind when you sell a car, to how automakers and third parties might be profiting off your data without your knowledge. If you’ve ever paired your phone with a vehicle or assumed your texts disappear when you disconnect, this episode is going to change the way you think about driving and how to take back control. Show Notes: [01:28] Andrea started because cars collect a lot of data. There were zero protections for privacy and security. He's dedicated to turning your car into a more private space and giving you more choice, understanding, and control. [02:25] We talk about when cars started collecting data. OnStar started about 25 years ago. Things really began to evolve when Bluetooth and navigation became common. [03:12] Things really exploded with modern telematics which is like putting a cell phone inside your car that calls home all the time. The average car collects around 25 GB of data per day. [04:08] We talk about the type of data that is collected by cars from GPS to having your phone collected and the car even knowing your weight. [05:26] The sensors in your car know exactly how you drive. [06:46] Informed consumers are better off. These data collecting policies are usually hidden in the car manufacturers privacy policies. [08:46] You can find your car's privacy policy at . [10:21] The goal is to make the car manufacturer's behavior visible to consumers, because that's the way to drive better company behavior. [11:26] When you rent a car and when you sell a car, your car is like a giant unencrypted hard drive that contains your data. [12:06] We should wipe the data in our cars the same way we wipe the data in our phones when we replace them. [13:05] You can find a tool to help remove data from your car at . [14:21] We talk about what rental cars get from your connected phone. [17:24] Found data can be used in targeted spear phishing attacks. [19:18] Most cars since 2017 have a SIM card. If a prior owner consented to data collection, that data is still being collected when you take over the car. [22:15] Ford estimated that they would make $2,000 per car per year from data services. [24:17] It's common for cars to even have a camera that looks at you. In a few years it might be common for vehicles to monitor for things like intoxication. [26:56] Organizations creating standards like the Future of Privacy Forum. [29:09] Cars have an EDR electronic data recorder. It's like a black box for when an accident happens. [34:05] Delete data when you buy, rent, or sell a car. Opt out if you can. [36:33] Think about your car just like your computers and your phone. [37:15] Andrea shares a story about how an ex-spouse was able to duplicate her key. The dealer wanted $1,000 to reset her car. [40:23] Parting advice includes looking up your car's VIN at Vehicle Privacy Report. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36820780
info_outline
Why Everyone’s A Target
06/04/2025
Why Everyone’s A Target
Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap. In this episode, I sit down with Gabrielle Hempel, a security operations specialist at Exabeam and a current law student at Purdue University. Gabrielle brings a sharp perspective shaped by years in cybersecurity, a master’s in cybersecurity and global affairs from NYU, and hands-on experience navigating everything from vulnerability management to executive risk consulting. She even wrote her graduate thesis on critical infrastructure security. We talk about the new era of digital deception, why younger people are actually falling for scams more often, and how criminals are using AI and current events to build trust and bypass defenses. Gabrielle shares practical advice, personal stories, and a fresh way to think about digital safety that could help you spot the next scam before it costs you. Show Notes: [01:09] Gabrielle has held quite a few jobs in cybersecurity. She's currently the Security Operations Strategist at Exabeam. [01:40] She's involved with anything to do with the internal security operation. [02:04] She majored in psychology and neuroscience. Working in Pharma and with medical devices led her to the path of cybersecurity. [04:34] We learn about an incident that she was involved in. Her parents were attempting to file their taxes with TurboTax, but they were flagged as already filing. This led to a lot of shenanigans with the IRS. [06:29] Most everyone has been a victim to some type of fraud or scam. [07:20] Our information is out there. It's more about staying vigilant and keeping an eye on things. [08:05] A lot of the current scams are blending with the cybercrime ecosystem. [09:17] AI has made it easier for people to craft more convincing phishing emails. [12:51] Are modern phishing emails getting through the spam filters more often? [15:48] How it's not retirees being the people most frequently caught in scams. [16:42] Why 20 to 29 year-olds frequently fall for scams. It could be because of their comfort with technology. [21:12] Better education surrounding threats might be a good idea for young people. [22:47] As scammers get more information about us, targeting will be easier. [24:32] Big trends are voice cloning and deep fakes. [27:51] Scams around shipping fees and tariffs are skyrocketing. [29:15] Advice includes adopting zero trust with communication. [33:10] If you're not expecting it. It's potentially suspect. [34:45] Best practices include doing your due diligence, and if you feel like something may not be legitimate go around and check. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36820545
info_outline
Child Exploitation Cyber Investigations
05/28/2025
Child Exploitation Cyber Investigations
Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping families safe in a world that moves faster than most of us can keep up. Debbie Garner knows this world intimately. She’s a retired Special Agent in charge with the Georgia Bureau of Investigation and former commander of the state’s Internet Crimes Against Children Task Force. For years she led efforts to track down online predators and bring justice to survivors. These days she’s working in the private sector, serving on the boards of Raven and Revere Technologies, pushing for smarter tech solutions and stronger training to support those still on the front lines. In this episode we talk about the growing problem of online child exploitation, the reality of underfunded cybercrime units and the ways technology is being used to fight back. Whether you’re a parent, an educator or just someone who cares about kids online, you need to hear this. Show Notes: [00:58] Debbie shares her law enforcement background over 30 years. She even worked undercover buying crack! [02:19] She spent the last 8 years of her career as the Supervisor Special Agent in charge of GBI's Child Exploitation and Computer Crimes Unit. [02:45] Now that she's retired from law enforcement, she works in the private sector with technology companies. [05:36] It's become her passion, even in retirement, to help those who are victims of exploitation. [07:09] Most children are victimized by someone they know. There's also plenty of predators online. [08:55] There are multiple organizations that work on child exploitation investigations. [10:53] People in law enforcement do tend to prioritize these types of crimes. [12:12] We talk about how the investigations begin. [13:53] Cases have increased from 2400 tips a year to over 30,000. [15:17] There's never enough technology to keep up with the increase. [16:41] RAVEN is a lobbying group to request additional funding from Congress. [18:33] With over 30,000 tips last year Georgia made over 450 arrests. [22:13] There's now technology that will help find CSAM on phones. There are also some amazing investigations on the dark web. [25:15] OSINT is helping investigate and it's a collaborative community. [27:55] Channels to report exploitation. Start with the platform, then National Center for Missing and Exploited Children, and law enforcement. [31:34] Don't put images on the internet. Websites like Take It Down can help with images of underage people and Take It Down can help adults. [33:43] Always mention if the person is underage when you make a report. [34:10] Talk to your kids and start early with age appropriate conversations about CSAM. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36296685
info_outline
Reclaiming the Internet
05/21/2025
Reclaiming the Internet
We may not always understand the evolution of the internet and how tech monopolies exist, but having digital freedom fighters is vital to making conscious change. Today's guest is Cory Doctorow. Cory is a science fiction author, activist, and journalist. He is the author of many books and most recently, Picks and Shovels, The Bezel, and The Lost Cause, a solar punk science fiction novel of hope amidst the climate change emergency. His most recent nonfiction book is the internet con How to Seize the Means of Corruption, a big tech disassembly manual. Other recent books include Red Team Blues, a science fiction crime thriller. In 2020, he was inducted into the Canadian Science Fiction and Fantasy Hall of Fame Cory talks about the slow decline of online platforms and has spent decades fighting for digital rights, fair tech policy and a better, freer internet. His work spans peer to peer networks to antitrust reform and his books—fiction and nonfiction—have become battle cries for tech reformers and digital freedom fighters around the world. In this episode we talk about how we got here, what Cory sees as the most urgent threats to digital freedom and the small cracks in the system that might finally let the light back in. From jailbreaking laws and app store monopolies to what comes after big tech’s dominance, Cory shares a roadmap for reclaiming the internet—not just as consumers but as citizens. Show Notes: [00:59] Cory shares his background. He's a science fiction novelist, activist, and journalist. He worked with the Electronic Frontier Foundation for over 23 years. [01:20] Cory has written more than 30 books. Most of them are science fiction novels. He's also co-owner and was co-editor for 19 years for the blog Boing Boing. [02:43] Being born in 1971 with a computer scientist father meant they had teletype terminals in the house. [04:01] Cory shares his interesting and pioneering internet and tech history. [05:17] We learn about the origins of Cory's love for science fiction. [07:21] Cory shares a story about how he was mentored by Judy Merril. [09:08] Cory talks about the internet and the changes we've seen from modems and memory cards to FidoNet to now. [15:09] Currently, he's as worried about the internet as he is excited about its potential. [16:13] He's concerned about the internet becoming a powerful tool of surveillance and control. [18:46] Possible paths forward or hill climbing and reevaluating. [22:00] We discuss why printer ink is $10,000 a gallon. It's about laws protecting big tech. [29:45] The hopeful optimistic view of the internet. We're close to making positive changes. [32:31] Advice for consumers is to be a citizen. [34:16] Cory talks about the Electronic Frontier Alliance or EFA. [45:30] Talking about Cory's books and art. [46:31] He says he writes when he's anxious. He talks about his book Red Team Blues. He wrote the last book first and realized that you can write in any order. [49:01] Bizarre early computers and the storyline of the new. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36296045
info_outline
Security Gaps Hackers Exploit
05/14/2025
Security Gaps Hackers Exploit
Scammers aren’t just phishing your inbox anymore—they’re impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale. What used to take a hacker hours and expensive tools can now be done in minutes by anyone with a Wi-Fi connection and a little malicious intent. Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. Aaron’s background includes 14 years at Microsoft and executive roles in cloud tech across Europe and Asia. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who’s really behind the screen? With Nametag, Aaron is building real-time, high-security ID checks that are already reshaping how help desks and businesses protect users. In this conversation, we unpack the difference between authentication and identity, why traditional methods like security questions are dangerously outdated, and how mobile tech and biometrics are changing the game. Aaron also shares practical tips on protecting your most valuable digital asset—your email—and what consumers and companies alike can do to stay ahead of evolving threats. This one’s packed with insight, and more relevant than ever. Show Notes: [00:54] Aaron is the CEO of Nametag. A company he started 5 years ago that focuses on identity verification at high-risk moments. [01:37] He spent 14 years at Microsoft working on product including at Microsoft China. He also ran a cloud computing company that was AWS's largest partner in Europe. [02:12] When everything went remote in 2020, he discovered that there were identity verification issues over phone lines. [03:03] He began building technology that will help accurately identify people when they call in to support or help desks. [04:22] Most of what we think of as identity is really just authentication. [07:41] A common new challenge is the rise of remote work and people having to connect remotely. The rise of technologies that make it easier to impersonate someone is also a problem. [10:38] Knowing who you hire and who you're working with matters. [11:03] Deep fakes and voice cloning has become so much easier. [15:47] How platforms have a responsibility to know their users. [18:11] How deep fakes are being exploited in the corporate world. [19:30] The vulnerability is often the human processes. Back doors and side doors are deleting ways that companies are breached. [23:53] High value accounts and companies that know they have something to protect our early adopters of Aaron's technology. [24:50] Identity verification methods including using mobile phones. The device has cryptography. [27:07] Behavioral biometrics include the way we walk or the way we type. [29:56] If you're working with a company that offers additional security tools, take them up on it. [34:04] Dating sites are starting to do verification profiles. [43:07] We all need to push for more secure ways to protect our accounts. [43:48] The importance of protecting your email. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/36279105
info_outline
Cyber Warfare
05/07/2025
Cyber Warfare
Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally. I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible. We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it. Show Notes: [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research. [03:24] We learn how Chase got involved with computer work and cryptology. [05:29] We're seeing cyber war play out in real time with Russia and Ukraine. [07:13] We talk about the future of war and drones. [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity. [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets. [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools. [14:12] Some of the unique issues with dealing with the attacks from cyber criminals. [19:20] How the CCP plays 3D chess. [22:26] Reducing risk and protecting ourselves includes following best practices. [25:10] What the government is doing to try to mitigate cyber risk. [27:23] Chasing money and finding cyber crime. [32:04] A lot of valuable assets are being developed in the context of war. [35:06] Chase talks about some of the things he covers in his book. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35944005
info_outline
DDoS Attacks
04/30/2025
DDoS Attacks
Scammers are getting smarter, understanding the psychology behind social engineering and the challenges companies face every day can help keep networks secure. This episode will show how to anticipate these threats and secure networks against ever-changing vulnerabilities. We’ll focus on practical, real-world solutions to protect data and trust. Dr. Jared Smith joins us to share his insights from his role leading research and development at SecurityScorecard. He also co-founded UnCat, a B2B accounting technology company serving thousands of customers and teaches as an adjunct professor at the University of Tennessee, Knoxville and NYU. His experience shows why social engineering is so effective and how companies can adapt to a world where attackers are always refining their techniques. This episode shows how even small oversights or minor issues can lead to big breaches. Dr. Smith shares concrete steps to strengthen defenses, and why we need both technical solutions and employee awareness. By looking at the psychology behind the attacks, he’ll show that staying one step ahead depends on using smart security tools and a culture that recognizes vigilance at every level. Show Notes: [01:19] Jared is a distinguished thought researcher at SecurityScorecard. He's built systems and helps vendors monitor and secure their networks. He also has a PHD in computer science. He focuses on Border Gateway Protocol or BGP. [02:16] He was also a high clearance government national security researcher. [03:02] Jared shares a story about how sophisticated phishing scams are becoming. [08:43] How large language models are making more sophisticated social engineering possible. [10:26] The importance of thinking about cybersecurity needed in the next 10 years. [11:02] BGP is like the plumbing of the internet. BGP poisoning breaks the typical internet traffic route. It's very nuanced traffic engineering that uses the Border Gateway Protocol. [13:34] BGP is also useful when you have multiple internet connections and one goes down. [14:20] The most sophisticated DDoS works are called link flooding attacks, where they identify links that have a certain amount of bandwidth, and they flood that specific border gateway protocol link, effectively segmenting the internet in those places. [15:39] Managing DDOS attacks and where the traffic comes from. [16:02] Being aware of botnets, because they are what's rented out or being used for these attacks. [17:32] Lizard Squad launched DDoS as a service. [21:00] Attackers try to get the actual IP addresses from behind a CDN. [23:41] How AWS has the ability to manage large amounts of traffic. [25:24] There are some DDoS that just require sending enough traffic to fill up the buffers on the other side of the application. [28:15] The size of a botnet for DDoS to take down a big network like X. We explore potential paths for these attacks. [32:21] We talk about the uptick on attacks during tax season. A large accounting firm with a lot of clients could be spoofed. [36:50] The predominant attacks are coming from organized cybercrime groups and ransomware groups. [45:40] The vast majority of large networks taken out are usually a result of user error. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35943965
info_outline
Safe AI Implementation
04/23/2025
Safe AI Implementation
Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and keep AI systems secure. Today’s guest is Dr. Aditya Sood. Dr. Sood is the VP of Security Engineering and AI Strategy at Aryaka and is a security practitioner, researcher, and consultant with more than 16 years of experience. He obtained his PhD in computer science from Michigan State University and has authored several papers for various magazines and journals. In this conversation, he will shed light on AI-driven threats, supply chain risks, and practical ways organizations can stay protected in an ever-changing environment. Get ready to learn how the latest innovations and evolving attack surfaces affect everyone from large companies to everyday users, and why a proactive mindset is key to staying ahead. Show Notes: [01:02] Dr. Sood has been working in the security industry for the last 17 years. He has a PhD from Michigan State University. Prior to Aryaka, he was a Senior Director of Threat Research and Security Strategy for the Office of the CTO at F5. [02:57] We discuss how security issues with AI are on the rise because of the recent popularity and increased use of AI. [04:18] The large amounts of data are convoluting how things are understood, the complexity is rising, and the threat model is changing. [05:14] We talk about the different AI attacks that are being encountered and how AI can be used to defend against these attacks. [06:00] Pre-trained models can contain vulnerabilities. [07:01] AI drift or model or concept drift is when data in the training sets is not updated. The data can be used in a different way. AI hallucinations also can create false output. [08:46] Dr. Sood explains several types of attacks that malicious actors are using. [10:07] Prompt injections are also a risk. [12:13] We learn about the injection mapping strategy. [13:54] We discuss the possibilities of using AI as a tool to bypass its own guardrails. [15:18] It's an arms race using AI to attack Ai and using AI to secure AI. [16:01] We discuss AI workload analysis. This helps to understand the way AI processes. This helps see the authorization boundary and the security controls that need to be enforced. [17:48] Being aware of the shadow AI running in the background. [19:38] Challenges around corporations having the right security people in place to understand and fight vulnerabilities. [20:55] There is risk with the data going to the cloud through the LLM interface. [21:47] Dr. Sood breaks down the concept of shadow AI. [23:50] There are also risks for consumers using AI. [29:39] The concept of Black Box AI models and bias being built into the particular AI. [33:45] The issue of the ground set of truth and how the models are trained. [37:09] It's a balancing act when thinking about the ground set of truth for data. [39:08] Dr. Sood shares an example from when he was researching for his book. [39:51] Using the push and pretend technique to trick AI into bypassing guardrails. [42:51] We talk about the dangers of using APIs that aren't secure. [43:58] The importance of understanding the entire AI ecosystem. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35943905
info_outline
The Art of Espionage
04/16/2025
The Art of Espionage
What makes someone betray their country? It’s rarely just about money. In this episode, you’ll hear from a retired CIA officer who spent 25 years recruiting foreign spies by tapping into something deeper than greed. Jim Lawler shares real stories from his career in human intelligence, where persuasion was built on empathy, trust, and understanding what truly drives people. From failed pitches to high-stakes successes, he explains the psychology behind espionage, how personal stress becomes a powerful leverage point, and why most people who commit treason believe they’ve been betrayed first. Whether you’re curious about spycraft or just want a better grasp of human behavior, this conversation pulls back the curtain on how people can be influenced to cross the line. Show Notes: [00:50] Jim was a CIA operations officer. His job was to recruit foreign spies for the CIA. [01:21] Most of his career was about battling weapons of mass destruction. His specialty was human intelligence and recruiting foreign spies was the backbone of that. [02:32] He's now a speaker and a teacher. He's also written three spy novels. [03:02] MICE Framework: Money, Ideology, Coercion, and Ego. [05:11] Jim shares a story from one of his first recruitment pitches. He also found out that revenge is a driving force for espionage. [11:58] Polygraph tests are stress detectors. [15:16] Divorce is one of the most psychologically tumultuous times in a person's life. When recruiting, Jim would become their best friend because he never once recruited a happy person. [16:07] He would study the crack system like a rock climber. He was a keen listener and very curious. [17:33] Empathy and patience were everything when recruiting spies. [20:21] Jim talks about the metaphysics, which is like a neural link where he would put out what he would envision as an invisible link to the brain of his recruits. [22:11] If something is too good to be true it is. [23:45] As a recruiter, he had to manipulate, exploit, and subvert people to get them to do what he wanted them to do. [27:58] Jim believes in treating people the way he would like to be treated. He was sincere with his actions. [28:35] He believes in using his powers of persuasion for good. [32:43] Over 90% of the people he pitched became assets. [33:48] Jim explains what a cold pitch is and the objective to get the second meeting. [36:58] His novels are thinly based on operations he did. A lot of his stories are based on things that he has done or things that his colleagues have done. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35943870
info_outline
Understanding Ransomware and Defense Strategies
04/09/2025
Understanding Ransomware and Defense Strategies
When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as having the right defenses in place. That’s where Paul Reid comes in. As the Vice President of Adversary Research at AttackIQ, Paul and his team work to stay one step ahead of cybercriminals by thinking like them and identifying vulnerabilities before they can be exploited. In this episode, we dive into the world of cyber threats, ransomware, and the business of hacking. Paul shares insights from his 25+ years in cybersecurity, including his experience tracking nation-state attackers, analyzing ransomware-as-a-service, and why cybercrime has become such a highly organized industry. We also talk about what businesses and individuals can do to protect themselves, from understanding threat intelligence to why testing your backups might save you from disaster. Whether you're in cybersecurity or just trying to keep your data safe, this conversation is packed with insights you won’t want to miss. Show Notes: [00:58] Paul is the VP of Adversary Research at AttackIQ. [01:30] His team wants to help their customers be more secure. [01:52] Paul has been in cybersecurity for 25 years. He began working in Novell Networks and then moved to directory services with Novell and Microsoft, Active Directory, LDAP, and more. [02:32] He also helped design classification systems and then worked for a startup. He also ran a worldwide threat hunting team. Paul has an extensive background in networks and cybersecurity. [03:49] Paul was drawn to AttackIQ because they do breach attack simulation. [04:22] His original goal was actually to be a banker. Then he went back to his original passion, computer science. [06:05] We learn Paul's story of being a victim of ransomware or a scam. A company he was working for almost fell for a money transfer scam. [09:12] If something seems off, definitely question it. [10:17] Ransomware is an economically driven cybercrime. Attackers try to get in through social engineering, brute force attack, password spraying, or whatever means possible. [11:13] Once they get in, they find whatever is of value and encrypt it or do something else to extort money from you. [12:14] Ransomware as a service (RaaS) has brought ransomware to the masses. [13:49] We discuss some ethics in these criminal organizations. Honest thieves? [16:24] Threats look a lot more real when you see that they have your information. [17:12] Paul shares a phishing scam story with just enough information to make the potential victim click on it. [18:01] There was a takedown of LockBit in 2020, but they had a resurgence. It's a decentralized ransomware as a service model that allows affiliates to keep on earning, even if the main ones go down. [20:14] Many of the affiliates are smash and grab, the nation states are a little more patient. [21:11] Attackers are branching out into other areas and increasing their attack service, targeting Linux and macOS. [22:17] The resiliency of the ransomware as a service setup and how they've distributed the risk across multiple affiliates. [23:42] There's an ever growing attack service and things are getting bigger. [25:06] AttackIQ is able to run emulations in a production environment. [26:20] Having the ability to continuously test and find new areas really makes networks more cyber resilient. [29:55] We talk about whether to pay ransoms and how to navigate these situations. [31:05] The best solution is to do due diligence, updates, patches, and separate backups from the system. [35:19] Dealing with ransomware is a no win situation. Everyone is different. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35790510
info_outline
Privacy and Surveillance
04/02/2025
Privacy and Surveillance
Ever had that creepy feeling someone's watching you online? Now imagine if that feeling was actually your reality, not just your browsing history being tracked, but cameras following your every move on the street, your conversations being monitored, your payments scrutinized. For our guest Josh Summers, this wasn't some dystopian nightmare, it was his daily life. Josh isn't your typical privacy advocate. As the creator behind All Things Secured (both a website and YouTube channel), his passion for digital privacy was forged through nearly 20 years living abroad, much of it in China. There, he didn't just read about surveillance, he lived under its shadow, using VPNs to bypass censorship and experiencing the gut-wrenching moment of being detained and questioned by Chinese authorities. In our revealing conversation, Josh pulls back the curtain on what government surveillance actually feels like from the inside. He shares how these experiences transformed a personal survival strategy into a mission to help others protect themselves in our increasingly watched world. We dive into how surveillance actually works from those eerily accurate facial recognition systems to the GPS tracking that follows your every move, and the countless ways big companies turn your personal information into profit. Josh not only makes us aware of potential problems, he offers real-world solutions that balance security with the convenience we all crave. With Josh's guidance, we discover surprisingly simple ways to shield our digital lives from encrypted messaging apps that keep conversations private, virtual credit cards that protect your finances, and alternative mailing addresses that safeguard your physical location. He also reveals the hidden dangers lurking in those so-called smart devices scattered throughout your home, and explains why privacy matters even if you think you have nothing to hide. Show Notes: [00:34] Josh is the host of All Things Secured. He wants to help people become a hacker's worst nightmare. [01:30] Josh, his wife, and children lived in China. There was censorship and social platforms were blocked. [02:05] He began using VPNs. Over the decade there, every type of surveillance was used. [03:34] He had a travel site and walked around with a camera. [04:03] In 2018 he was detained by the government. It was scary and he realized the rights he was giving up when traveling to other countries. [05:53] He was kicked out of China, and became more conscious of the pervasive mass surveillance. [08:40] He was severely outmatched with the psychological tricks of the interrogators. [12:57] Even if surveillance is legal, that doesn't make it ethical. [13:18] Small consistent steps towards privacy will make us less of a target. [14:25] Josh talks about ways that we are being monitored from cameras to facial recognition. Digital currencies track what we purchase. [17:04] Facebook has so many files on us. Being tracked online adds up. [21:07] There are ways to build a privacy moat around your digital life and still stay in contact with friends and family. [22:27] Steps for practical privacy include being careful about how you share data, encrypted alternatives, and use masking services to reduce your digital footprint. You can also use virtual credit cards. [31:46] We talk about using peer-to-peer payment apps. [34:12] When your habits and your contacts are public, it makes it easier to social engineer. [35:29] Virtual mailboxes can add additional privacy. [39:50] Issues with IoT devices include how it's being stored, transmitted, and shared. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35612075
info_outline
Navigating Data Brokering and Privacy
03/26/2025
Navigating Data Brokering and Privacy
In a world where data is more important than ever, understanding how it is acquired, shared, and misused is critical. Data brokers work behind the scenes, amassing enormous amounts of personal information from online activity, loyalty programs, and even public records, often without the users' knowledge. This data powers targeted marketing, scams, and even identity theft. But what can be done to regain control of personal privacy? Today we're diving deep into this topic with cybersecurity expert Darius Belejevas, who has spent years assisting folks in removing their data from these digital marketplaces. He is the head of Incogni and Surfshark. In this chat, Darius is going to share how these sneaky data brokers operate. He'll break down why it's such a big deal when our data gets out there for all to see, and he'll arm us with some solid strategies to keep our privacy intact. We’ll also look at practical tactics that everyone can apply to limit their exposure to hackers. We’ll discuss data sharing, using privacy-focused products, and understanding legislation like GDPR and CCPA. We also dive into the shifting landscape of digital security, the role of AI in data collection and fraud, and what the future of online privacy may look like. Show Notes: [01:01] We learn about Darius's background. [02:16] We learn about the creation of Incogni. [04:04] Data brokers are businesses who collect data and sell it to other businesses. One problem can be lack of transparency of what is happening to your data. [07:19] There are probably a few thousand data brokers. [09:36] Does removing your data get you out of a breach? [10:48] Limiting what we share. Prevention, consequences, and clean up. [12:22] When giving identifiers like your phone number, stop and ask if you really need to do that. [14:10] Some brokers make it way more difficult to remove data. [20:13] We talk about privacy regulations and how they can help you or make things more difficult. [22:12] How AI will make malicious activities easier to scale. [23:41] Have people given up on privacy? At the end of the day, it's about personal comfort. [25:00] Privacy laws are helping with data broker issues. [26:59] Being mindful about what you post online. Many people don't want to share too much. [29:56] Physical junk mail has decreased. [30:52] What to do today. Think about what you want to share. Do you really need to subscribe? [32:21] Use a service like Incogni to help you protect your data. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35513315
info_outline
Be Your Own Fraud Prevention Hero
03/19/2025
Be Your Own Fraud Prevention Hero
Getting defrauded is common. It happens everywhere but it’s underreported because of embarrassment. If you’re a victim of fraud the sooner you report the more likely you are to get a better outcome. To learn more about fraud I’m pleased to welcome Marc Evans, a seasoned financial crimes detective and co-founder of Fraud Hero, who has spent over a decade investigating fraud schemes that affect everyday people. With expertise in social engineering, money laundering and credit card scams he has spent his career uncovering the ways criminals use to exploit victims. His passion for fraud prevention comes not only from his investigative experience but also from his personal experience of identity theft which almost derailed his entry into law enforcement. Through his work Marc has recovered millions of dollars for victims and trained thousands of people on how to recognize and prevent fraud before it happens. In this episode Marc lifts the lid on the evolving world of financial fraud, revealing the most common scams and the sophisticated tactics criminals use to stay one step ahead of their victims. From bank imposters to phishing scams and CEO fraud he breaks down how these crimes work, why they are so effective and how law enforcement is trying to disrupt them. He also shares practical steps individuals and businesses can take to protect themselves including monitoring of financial accounts, reporting fraud quickly and using digital security tools. Beyond his law enforcement career Marc’s passion for fraud prevention extends into his entrepreneurial venture Fraud Hero where he educates the public on how to protect themselves from financial deception. He believes knowledge is power and has developed resources to help individuals secure themselves personally and financially. As fraud continues to rise with criminals getting more resourceful and brazen, Marc's mission remains the same – to empower people to be their own first line of defence. Show Notes: [01:10] Marc is a fraud and financial crimes detective. He's worked with law enforcement and is a certified fraud examiner and training coordinator. He also started Fraud Hero to help stop fraud and prevent people from becoming victims. [02:14] He's always been passionate about preventing fraud. [04:25] Marc was still learning when he began his fraud fighting career. [05:52] He sees all types of fraud. He's also seen a lot of social engineering tactics and imposter scams. [07:15] Marc has recently seen a lot of bank imposters. This includes a lot of email and message phishing attacks. [08:30] Scammers are being more specific now. When they call they even know the victims financial institution. [09:49] When it comes to getting your money back from the bank it depends on how long before you file your report. [11:44] Tricky scammers not using the sense of urgency tactic. [15:25] Marc talks about how quickly money can be withdrawn by scammers, [18:40] If a bank calls with a fraud situation, they can respond quickly. [21:12] Fraud has been increasing as criminals way risk versus reward. [22:11] Prosecutors are beginning to understand better how fraud works and increasing charges. [24:03] How stealing mail is the tool of the fraudsters. [26:35] Benefits of informed delivery. [31:26] The number of victims reporting crime is really low. [33:34] Phone number and email spoofing are starting to look more legitimate with AI. [35:39] Educating people is the main goal. [41:13] Using digital wallets and keeping your cards safe. [43:43] Banks want you to show the police report when reporting fraud. [45:18] Don't be afraid to learn, reach out, and share what's happened to you. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35512660
info_outline
Empowering the Vulnerable
03/12/2025
Empowering the Vulnerable
In cybersecurity, we need to understand the mindset of hacking, which is not ethics. We also need to realize that even if we have cybersecurity experts get hacked, there is no reason to feel embarrassed or ashamed when it happens to us. In today’s show we’re going deep into the world of cybersecurity with one of the industry’s most seasoned experts, Sam Curry. With over 30 years of experience in information security, Sam has been defending against cyber threats, shaping security strategies and mentoring the next generation of cyber professionals. Currently the Global VP and CISO-in-Residence at Zscaler, Sam has also held leadership roles at companies like RSA, McAfee and Arbor Networks where he helped pioneer innovations in VPN technology and personal firewalls. But cybersecurity isn’t just about firewalls and encryption—it’s about mindset. Sam joins us to talk about the hacker mentality, zero-trust security and why even the best security professionals get hacked. From his early days in cryptography to mitigating major cyber breaches Sam shares his insights on how businesses and individuals can defend themselves in a digital world. If you’ve ever wondered how cybercriminals think, how AI is changing the security landscape or what you can do to stay one step ahead then this episode is for you. Show Notes: [00:55] Sam is Global VP and CISO-in-Residence at Zscaler. For the last 32 years, he's been involved in every part of security at some point. [01:23] He teaches cyber and used to run RSA Labs at MIT. He currently teaches at Wentworth Institute of Technology, and he also sits on a few boards. [02:41] We learn how Sam ended up working in cyber security. He has patents in VPN technology, and was one of the co-inventors of the personal fire law which was sold to McAfee. [04:14] There were security principles before 1996. [07:38] Sam feels a need and a mission to protect people. It's very personal to him. [08:40] He was there for the breach that RSA had. He's also been spearfished. [12:47] The shepherd tone is an audio illusion that makes sound that can make people sick because it sounds like it's always increasing. [16:31] Scams are way under reported because people are too embarrassed to report them. [19:31] Challenges of keeping security up. In peacetime we have to remember to build resilience and be antifragile. [22:10] Zero trust is a strategy and architecture for minimizing functionality. [28:14] There are immediate benefits from a security perspective to start creating zero trust. [30:17] Problems need to be defined correctly. [33:03] Even people who've done incredible research on hacking techniques have gotten hacked. There's no shame in it. [34:02] We need the hacker mindset. It's an important part of the human community. [36:44] The importance of making things easier to understand. [38:18] Advice for people wanting to get into cybersecurity is being just this side of ready and tackling things that are a little too big and a little too scary. Also find allies and a network. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35461960
info_outline
How Not to Money with Joel Larsgaard
03/05/2025
How Not to Money with Joel Larsgaard
Managing money isn’t about numbers, it's about making informed decisions that shape your future. Whether you’re a seasoned saver or just starting out on your financial journey understanding the basics of personal finance can make all the difference. Today’s guest Joel Larsgaard has been helping people take control of their finances for over 15 years. As the co-host of How To Money and a weekly radio show Joel breaks down the often confusing world of personal finance. His passion for financial literacy comes from personal experience and he’s been recognized for his work including being on the Forbes Advisory Board. In this episode we’ll cover common financial mistakes, smart saving strategies and how to avoid financial pitfalls so you can make better money decisions. Show Notes: [00:53] Joel co-hosts the How To Money podcast with his best buddy Matt. It's about helping people learn how to handle their finances well. [01:29] So many people are missing the information they need about money, yet it's a tool that touches every aspect of our lives. [02:32] Joel's parents had money troubles. He always wanted to learn about money so he wouldn't have problems. He also worked for Clark Howard who was a consumer advocate and money guy. [05:30] Everyone has different dreams and financial goals. [06:29] We learn Joel's scam story. A kid sold him fake Blockbuster gift cards. [08:32] Common financial traps include not saving enough and not tracking expenses and knowing where the money is going. [09:15] Knowing where your money is going is the first step to finding leaks. [10:38] Using credit cards and discriminately buying now and paying later is another big pitfall. A lot of people are using BNPL on top of credit cards. [12:04] You have to have a plan. Know your debts, know your interest rates. Where's the Gap where you can find extra savings? [13:30] Paying off your debt feels amazing. [14:58] Online budgeting software can make it easier. [16:00] Think of a budget as not being restricted but something that helps you accomplish what you want. [18:08] Once you write it down, you're dealing with reality. [20:11] The joy of spending your money proactively on what you want and cutting back on other things. [21:08] Finding savings by shopping for insurance yearly. [22:56] You can also save with a defensive driving course. [23:41] Look at subscriptions and bundling. Sign up with deals. Keep track of when you should cancel. [28:11] Bank loyalty will cost you money. [29:29] There are some highly competitive online savings accounts like CIT, Discover, and Ally. [31:29] Be sure the online bank you are doing business with is FDIC insured. Make sure you're dealing directly with the bank. [33:30] Tips for looking for legitimate investments. Simplicity trumps most things. [34:59] Building wealth slowly with average returns. [42:00] There are a lot of wealth building options open for people who aren't making a lot of money. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35314525
info_outline
Brushing Scams with Venkat Margapuri
02/26/2025
Brushing Scams with Venkat Margapuri
Scams come in many forms but receiving a freebie from a scammer doesn’t make sense. If something shows up at your door that you didn’t order, should you be worried? Brushing scams are becoming more common and while they may seem harmless at first they can be a gateway to fraud, identity theft and financial loss. Today we’re diving into how these scams work, why they exist and the real dangers behind them. Our guest is Dr. Venkat Margapuri, an assistant professor of computer science at Villanova University. His research focuses on AI applications in agriculture and healthcare but he’s also spent time studying online fraud and digital security. He’s here to help us understand what’s really going on when scammers send you something for free and most importantly what you should do about it. Show Notes: [00:44] Venkat is an assistant professor in the department of computer science at Villanova University. A lot of his research is focused on artificial intelligence, image processing, and security. [01:53] Brushing scams are where you receive products that you haven't ordered. It's a fraudulent e-commerce scheme. They try to get reviews or add additional sales for their product. [04:48] Venkat explains why it's not a good idea to scan those QR codes in products. You don't want to put your credentials into the website. [05:41] This is where brushing leads to phishing scams by getting people to enter information into a fake website. [06:20] The major risk of receiving these packages is identity theft. [09:30] Scam charges on Amazon can be used to verify stolen credit card credentials and overconfidence often leads to being scammed. [10:52] We discuss where these scammers find people's addresses. [13:05] A lot of scammers are really smart people who got into the wrong business. Key qualities include narcissism and psychopathy. [17:05] When you receive these packages just dispose of them. Don't scan the QR codes. [21:25] A scam where they send emails with the link to free Apple Gift Cards. Be careful about what you post on social media. [22:43] Assume unsolicited contact is a scam. [23:50] Don't share personal information. Look out for things that are out of the norm. [27:04] Venkat talks about advance fee scams. [28:14] Being careful about geographic perceptions. [31:18] Be cautious if you are being rushed. [32:18] Whenever you suspect something isn't right, err on the side of caution and don't do it. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/35314315
info_outline
Ransomware, Phishing and Fraud
02/19/2025
Ransomware, Phishing and Fraud
Cybersecurity isn't just a concern for large corporations. It's vital for businesses of all sizes. It's essential for companies to know how to protect sensitive data, restore from backups, and regularly test their systems with internal pen tests to keep their teams safe. Today's guest is Bryce Austin. Bryce is the CEO of TCE Strategy, a cybersecurity advisory firm. They provide vulnerability scans, penetration tests, fractional CISO services, and incident response services. He is also a professional speaker on ransomware. Bryce is the fractional CISO to many companies, including one on the S&P 500. We talk about the key aspects of cybersecurity for businesses, and how to be proactive with patching, training and strong password management. He shares his experiences with major cyber incidents including ransomware, phishing and the Target breach, and how defense in depth, backups and financial controls are key. Bryce also mentioned the use of password managers, regular vulnerability scanning and external monitoring to increase cyber resilience. We share practical tips for all businesses to protect against ever changing cyber threats. Show Notes: [00:59] Bryce started TCE Strategy in 2016. It's their goal to keep their clients one step ahead of cybercriminal risk. [01:32] He has a degree in chemistry. Technology was just for fun. He ended up working in the payroll space which was ripe for cyber security concerns. [03:00] He was really pushing cybersecurity and then their company was purchased by Wells Fargo. It ended up being amazing training for starting his own cybersecurity business. [05:24] Bryce shares how he was affected by the Target security breach. He ended up unemployed and was deeply affected by food stamp requirements for his family. [07:34] He wanted to make sure he would never go through this again and started his company. [08:19] His public speaking began in 2011. [09:17] He was indirectly affected by the Target breach, and he also shares his indirect personal one. [12:59] Bryce was actually spearfished in 2018. [14:36] Incident response is when something happens from a cybersecurity standpoint and damage has occurred. Oftentimes data is encrypted. This is a ransomware attack. [17:18] Bryce tells the story about how a hotel was hacked and a large payment was able to be intercepted. [18:31] Phishing attacks are where someone clicks on a bad link. [20:38] His biggest Christmas gift was none of his clients getting hacked. [21:05] They also had a ransom demand where they had to pay a million dollars. [23:02] If they would have been looking harder this wouldn't have happened. [26:26] Issues with hooking up to the Internet and having default passwords. [28:07] Why it's impractical to make ransomware illegal. [31:12] Even criminals have a reputation to uphold and usually hand over the encryption key. [33:56] Bryce talks about some of the preventative things that people can do. [34:47] Be proactive and have diligent patching. [35:37] Don't use the same passwords over and over. Use a password keeper. [36:54] Have offline backups. [38:09] Follow all processes and procedures when moving money. Use unique passwords. [39:27] It's important to encrypt your backups. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources: (612) 730-9897.
/episode/index/show/easyprey/id/35083040