Easy Prey Podcast
I’m contacted by people on a regular basis who believe that their devices have been compromised and that they’re being stalked and spied on. Sometimes they’ve misinterpreted what they’re looking at but sometimes they are actually being digitally stalked. Find out what to do about it in this episode. Today’s guest is John Bambenek. John…
[Read More]I’ve been telling people for years that they need to implement two-factor authentication wherever possible. Now that you’ve done that, imagine the havoc that would happen if those security codes were sent to somebody else enabling them to access your email, social media accounts, and worse your bank accounts. It is called SIM swapping, porting…
[Read More]Many of us have used the term “narcissist” or “narcissistic” to describe someone who’s irritatingly proud or full of themselves. But narcissism isn’t just being stuck up. It’s a specific combination of traits and behaviors, and unless you’ve dealt with one yourself, you probably don’t realize how destructive they can be. Narcissistic people can do…
[Read More]We’ve all had that random fraudulent charge show up on our credit card and we wonder how did that happen. Do I need to cancel my credit card? Do I need to get a new one? Today we talk about credit card skimming with Scott Schober. Scott Schober is the president and CEO of Berkeley…
[Read More]Many of us have seen James Veitch’s comedic YouTube videos of him interacting with email scammers. Today’s guest shares how he helps real-world victims of those scams and he has participated in taking down criminal enterprises. Wayne May is the owner of scamsurvivors.com. He began as a scam baiter in 2005 before concentrating and helping the…
[Read More]Accounting doesn’t sound like a sexy career choice. How about forensic accounting and getting to work with the FBI and Secret Service? Now that’s getting interesting. White-collar crime is typically committed by business or government professionals that engage in fraud, insider trader, embezzlement, or cybercrime. It can destroy companies, individuals, and families. What happens when…
[Read More]Have you ever wondered what strange things a digital forensic investigator has to dig through? Listen to this episode to find out. Our guest for this episode is Jake Moore. Jake Moore is a cybersecurity specialist for ESET, Europe’s number one internet security and anti-virus company. Jake previously worked in the police force for 14…
[Read More]I have always been curious as to why so many people fall for scams. What are some of the consistent elements that scammers use to hook us? In this episode, we find out. We talk about the different psychological tactics scammers use to successfully scam their victims. Our guest for this episode is Dr. Stacey…
[Read More]You have probably heard of multi-level marketing also called MLM or network marketing. A multi-level marketing company is a company that recruits people to sell their products to their network including their friends and family. Network marketers typically buy inventory and then try to sell it. They can also recruit people underneath them and create…
[Read More]Workplace bullying and violence seldom happens in a vacuum but rather are led up to with warning signs and events. In this episode, I talk with Timothy Dimoff about workplace bullying and violence. Workplace bullying is usually not physical, but it is ongoing. We talk about steps you can take if you are a victim…
[Read More]The S in HTTPS doesn’t always mean safe. In this episode, I talk with Casey Crane about trust and encryption. We discussed many practical ways for you to avoid being a victim of a scam. Prevention and knowledge can help stop many attacks before they even begin. Casey Crane is a cybersecurity writer for Hashed…
[Read More]School districts, health care organizations, cities, and towns have all been victims of ransomware. Families have lost access to photo albums of 20 years of memories and personal finances. It can be a very devastating experience. It is very scary to not be able to do your job or access your data. Now attackers are…
[Read More]Identity theft comes in many forms. Children and adults can be victims of identity theft. Each year there are over 9 million identity victims. 1 million of these victims are minor children. The worst part is that we often don’t notice a problem until we need to buy a car, house, or get a college…
[Read More]Website attacks are very common. They are often not personal, but they can create a mess for website operators. As website owners and operators, we need website privacy and security especially if we are collecting data and personal information. As I was making more money from my business in 2015, the need for better performance…
[Read More]Your online identity is quickly becoming more crucial to your personal and professional success than in-person communications. But most of us don’t understand this digital Wild West and the dangers that lurk around every corner. Most of us are unaware of the digital breadcrumbs that we leave behind with every post, and how easy it…
[Read More]With over ten million cyber-attacks reported daily, we have to be equipped with the knowledge, information, and software to protect ourselves and our families. With the outbreak of the Coronavirus, there was a sudden shift of employees working at home and this has become even more of a problem. Since time wasn’t available for most…
[Read More]In this day and age, we are experiencing knowledge overload. There is information everywhere on the internet and social media. Add in the changes and hoaxes we are seeing pop up with the Coronavirus and it is harder than ever to decipher the truth. How do we research and check out this overload of information?…
[Read More]Many of us love traveling, but safety and security are usually a concern in the back of our minds especially if we are traveling with our family. So how do we stay safe and secure when we are traveling? J. teaches us what red flags to look for when reserving and staying with Airbnb. With…
[Read More]Has your information ever been compromised in a data breach? There are security measures you can implement to lessen the effects. Troy Hunt shares about the frequency and increasing size of data breaches of personal information. Don’t miss the end where we share lots of strategies you can put in place today to better protect your information.
[Read More]In today’s internet age we are meeting more and more people online. How do we use this incredible resource wisely and keep our families safe?
[Read More]Have you ever been the victim of an email scam? Business Email Compromise is a type of scam where scammers focus on businesses that conduct wire transfers and work with suppliers abroad. There are many things businesses and consumers can be on the lookout for to avoid falling into these email traps. Learn how to…
[Read More]Chris Parker, CEO of WhatIsMyIPAddress.com, also hosts a the Easy Prey podcast, which focuses on scams and fraud. He interviews experts on the topic, who share advice on how to avoid troubles and traps online and in the real world.
[Read More]- « Previous
- 1
- …
- 9
- 10
- 11