Skip to content

Easy Prey Podcast

Kevin Roundy has some advice for data breach protection.

Data Breach Protection: How to Keep Your Personal Information Secure

Data breaches happen. In fact, data breaches happen more often than you might expect. And once your information is exposed, it can be sold and resold to anyone who might want to access your accounts or steal your identity. Data breach protection is essential to proactively secure your private information. See Protect Your Social Security…

[Read More]
Kevin Mitnick - Most Notorious Hacker

How Kevin Mitnick Went from the FBI’s Most Wanted List to Successful Businessman…and Good Guy

Hacking has almost become its own industry, nut in Kevin Mitnick’s time, it wasn’t like that. Kevin Mitnick gained his fame because he was among the most notorious of the early hackers.  

[Read More]
Butchery Scam Shop

“Pig Butchering” Combines Text Scams, Crypto Scams and More

Pig butchering, a horrible name for a large theft of money, starts with a scam texts that have become a big problem, especially in the U.S.

[Read More]
Titania Jordan of Bark talks about internet safety for kids.

Internet Safety for Kids: How to Protect Your Children in the Online World

As our kids are more and more online, it becomes easier and easier for them to encounter online predators, cyberbullying, pornographic and violent content, and other dangers. Internet safety for kids is essential. As parents, we need to educate and empower our children to be safe on their devices. See Keeping Children Safe Online with…

[Read More]
Patrick Glennon talks about identity theft protection and recovery.

Identity Theft Protection and Recovery

Online quizzes are entertaining. Links in emails, texts, and social media messages are convenient. But both can put you at risk for identity theft – which can be costly and take months to recover from. Putting some identity theft protection measures in place can help you limit the damage. See Protecting Your Identity with Patrick…

[Read More]
Anthony van der Meer talks about OSINT and how scammers operate.

Open-Source Intelligence (OSINT) and Investigating Cybercrime

Scammers, phishers, and other cybercriminals are much more organized than we think. But it doesn’t take a hacking expert or a criminal mastermind to learn their schemes. Open-source intelligence, or OSINT, lets investigators peer into the world of cybercrime. One investigator in particular has made some interesting discoveries. See Investigating Cybercrime with Anthony van der…

[Read More]
Jane Lee talks about crypto romance scams, or "pig butchering."

Crypto Romance Scams: “Pig Butchering” Adds Cryptocurrency to Dating Scams

Romance scams are nothing new, especially when online dating is involved. And with the popularity of cryptocurrencyover the past several years, crypto scams are starting to show up on people’s radars. But scammers are getting creative and putting the two together. Also called “pig butchering” by the scammers who do it, crypto romance scams are…

[Read More]
Text Scams on Your Smartphone

Scam Texts Are Robbing Us of Millions of Dollars. Here’s Why.

Start looking at all text messages you get with a wary eye! If this subject is new to you, good. It means you haven’t been tricked yet by a scammer through a text message you’ve received on your phone.  But here’s a guarantee. Scam texts are heading your way. We live on our phones and…

[Read More]