Easy Prey Podcast
As our kids are more and more online, it becomes easier and easier for them to encounter online predators, cyberbullying, pornographic and violent content, and other dangers. Internet safety for kids is essential. As parents, we need to educate and empower our children to be safe on their devices. See Keeping Children Safe Online with…
[Read More]Online quizzes are entertaining. Links in emails, texts, and social media messages are convenient. But both can put you at risk for identity theft – which can be costly and take months to recover from. Putting some identity theft protection measures in place can help you limit the damage. See Protecting Your Identity with Patrick…
[Read More]Scammers, phishers, and other cybercriminals are much more organized than we think. But it doesn’t take a hacking expert or a criminal mastermind to learn their schemes. Open-source intelligence, or OSINT, lets investigators peer into the world of cybercrime. One investigator in particular has made some interesting discoveries. See Investigating Cybercrime with Anthony van der…
[Read More]Romance scams are nothing new, especially when online dating is involved. And with the popularity of cryptocurrencyover the past several years, crypto scams are starting to show up on people’s radars. But scammers are getting creative and putting the two together. Also called “pig butchering” by the scammers who do it, crypto romance scams are…
[Read More]Start looking at all text messages you get with a wary eye! If this subject is new to you, good. It means you haven’t been tricked yet by a scammer through a text message you’ve received on your phone. But here’s a guarantee. Scam texts are heading your way. We live on our phones and…
[Read More]You need to be up to speed on “smishing,” the text message trick scammers use to capture victims. The more you know the better you’ll be at catching a deceptive text before you reply.
[Read More]Cybersecurity isn’t just for cybersecurity professionals or people who understand code. Employees at any level can let malicious actors into a company network. Human factor cybersecurity is an approach to help every employee keep your organization secure. See 4 Levels of Human Factor Security with Roy Zur for a complete transcript of the Easy Prey…
[Read More]As you watch your parents get older, it’s easy to begin to worry about them falling for scams or being taken advantage of financially. After all, older adults are common targets for scams and financial exploitation. If they are showing signs of memory loss or have been diagnosed with dementia or Alzheimer’s disease, it’s even…
[Read More]When you find a scam website – or worse, fall for a scam – you’re not thinking about the people behind it. But the people who build scam sites and the companies that enable scammers are all part of a larger scam economy. In order to combat scam websites, we need an understanding of the…
[Read More]Scammers are always on the lookout for new ways to part you with your money. Sometimes they can get extremely creative, and sometimes they use new tools to run the same old grifts. Zelle scams, for instance, are just a new way to get paid for old scams. But if you know how they work…
[Read More]Scammers want to get at your money. It’s no surprise that they’ve started using payment apps like CashApp, Venmo, and Zelle to trick you out of your money. Venmo scams, Zelle fraud, and other shady dealings with similar apps actually has many benefits for scammers. Read on to learn how to protect yourself – and…
[Read More]For many of us, insurance seems inscrutable and unnecessarily complicated. But insurance fraud is the second most costly white-collar crime in the United States, and the victims are all of us. It’s important to know what steps to take to protect yourself. But the good news is that it’s not as difficult as you might…
[Read More]So much of our lives are online these days. This has many benefits, but it also opens us up to risks. One of those risks is cyberbullying. The anonymity of being online provides many opportunities for it, and it can sometimes be difficult to spot the signs of cyberbullying. And when it comes to cyberbullying,…
[Read More]With new government regulations making it harder for scammers to make spam calls, they have turned to a new medium. Spam text messages are on the rise – and they carry new risks that spam calls don’t. Learn why scammers are moving from calls to texts and what you can do to protect yourself. See…
[Read More]Most of us would have thought artificial intelligence was limited to science fiction just a few years ago – but now, AI has become almost mainstream. Businesses of all kinds use artificial intelligence to help analyze patterns, make decisions, and more. With all the new artificial intelligence applications, though, come new challenges and dangers. See…
[Read More]Technology is advancing rapidly. It seems like every day something that used to be the purview of science fiction becomes a reality. But scammers are taking advantage of this to make tech scams look like legitimate products. Learn how to identify tech scams to avoid spending money on a useless product. See How to Avoid…
[Read More]The world of technology is changing rapidly, and the COVID-19 pandemic rushed the use of remote work, remote school, telehealth, and other technologies. With these new tools and devices come new risks and dangers. It’s essential to know what risks are out there so you can take charge of your personal cybersecurity. See Former FBI…
[Read More]Technology has evolved dramatically since the early days of the internet. With all the new technological developments, scamming methods are improving, too. It’s essential to be vigilant to keep yourself safe. See The Impact of AI on Scamming with Ran Levi for a complete transcript of the Easy Prey podcast episode. Ran Levi has been…
[Read More]Phishing techniques are changing all the time. A phishing attack might not even be trying to get more money – the scammer may use their illicit access to impersonate you and scam someone else. Learning how to detect phishing is the first step in defending yourself. See Attack Techniques Scammers are Using with Joel Hollenbeck…
[Read More]If you haven’t noticed, cryptocurrency is going mainstream—or is trying desperately to do so—with high-profile actors like Matt Damon appearing on Super Bowl ads to a major sporting venue, the former Staples Center in Los Angeles taking on the name of a new cryptocurrency company.
[Read More]Corporate espionage is alive and well, and not nearly as sophisticated as you might think. Competitors are hiring corporate spies to find out information and poach the best employees. In order to prevent it, you have to know how it happens. See Corporate Spying with Robert Kerbeck for a complete transcript of the Easy Prey…
[Read More]If you’re not aware of and addressing blind spots in your cybersecurity, you can’t prevent or mitigate the damage from a cyber attack. A large part of creating a cyber defense strategy is being aware of the risks. See Risk Review Helps Discover Weaknesses with Ralph Russo for a complete transcript of the Easy Prey…
[Read More]You can’t always prevent financial fraud in your business before it happens. But you can catch it early and limit the damage it can do. Easy-to-use forensic accounting processes should be part of your business owner toolkit. See Forensic Accounting with Leah Wietholter for a complete transcript of the Easy Prey podcast episode. Leah Wietholter…
[Read More]Most of us view the internet as a useful and benign tool. But in many ways, it’s more like walking down a dark alley. Knowing how to reduce the cost of cyberattacks is important for anyone who uses the internet today. See Minimizing Damage from Cyberattacks with Stuart Madnick for a complete transcript of the…
[Read More]