Skip to content

Easy Prey Podcast

Exposing Weakness Before It’s Exploited with Jayson E. Street

There are many ways your network can be accessed, not just remotely but physically. How equipped are you and your coworkers to prevent intrusions? Today’s guest is Jayson E. Street. Jayson is the author of Dissecting the Hack: The F0rb1dd3n Network Series. He is the DEFCON Groups Global Ambassador and the VP of InfoSec for SphereNY. He…

[Read More]

How Technology is Fighting Against Child Trafficking

Children are exploited, trafficked, and go missing every day. Some factors, such as misinformation among the general public, can make it even harder to fight child trafficking and exploitation. It takes investigators, prosecutors, and private sector technology working together to help these children. See Child Exploitation and Human Trafficking with Kevin Metcalf for a complete…

[Read More]

The Rise and Risks of Cryptocurrency with Erica Stanford

Transferring money through a third party can add substantial fees and using cryptocurrency bypasses those. However, does the emerging technology invite additional risks? Today’s guest is Erica Stanford. Erica is founder of the Crypto Curry Club, UK’s number one rated networking educational event for blockchain, digital currency, crypto payments AI, and tech for sustainability. She…

[Read More]

The Dangers of Seeking Enlightenment with Caroline Slaughter

Many people have gone or plan to go somewhere to seek deeper connection and enlightenment. But what are the dangers to be conscious of before taking such a trip? Today’s guest is Caroline Slaughter. Caroline is a filmmaker and global voiceover talent. Most recently, she was supervising producer on Racket: Inside the Gold Club which…

[Read More]

Preparedness Without Paranoia with Kathleen Kiernan

Education can help people to be prepared without paranoia, but how do you teach safety without causing fear? There are specific things to be aware of in an extraordinary situation like an active shooter that can fundamentally change the outcome.  Today’s guest is Dr. Kathleen Kiernan. Dr. Kiernan is the founder and CEO of Kiernan…

[Read More]

Cryptocurrency Exit Scams with Aaron Lammer

We often make the assumption that if something is the biggest or the oldest, it should be trusted or it wouldn’t have grown so large. But when it comes to cryptocurrency, this may not always be true.  Today’s guest is Aaron Lammer. Aaron is the founder of Treats Media which produces original podcasts and work…

[Read More]

Resilience and Security with Kris Coleman

What does it look like to be resilient? Many of us have lost our edge after a year in our homes and many have become unprepared to handle the unexpected. Listen on to find out about five pillars of resilience from our guest’s book Raise Your Resiliency. Today’s guest is Kris Coleman. Kris has served with…

[Read More]

Stalkerware with Eva Galperin

If you’ve ever had the feeling that someone is eavesdropping on your calls, reading your messages or emails, and even knows where you’ve been going, you just might be right. Abusers often utilize stalkerware to control and manipulate their targets. Being educated on what it is, how it got there, how to clean it off…

[Read More]

Influence and Non-conscious Persuasion with Roger Dooley

If you’ve ever felt the pressure to buy something because the website said there were just two left at that price or that the sale was ending soon, you’ve experienced just two of the many techniques using neuroscience to advertise online.  Today’s guest is Roger Dooley. Roger is an author and international speaker. His books…

[Read More]

Hacking with James Kettle

Have you ever wondered how hackers find vulnerabilities and how companies can find and fix their own? You will find out today! On average 30,000 new websites are hacked every day. Our guest for this episode is James Kettle. James is the Director of Research at PortSwigger Web Security where he explores new ways to…

[Read More]

People Hacking with Jenny Radcliffe

When you hear the word “hacker,” you envision someone breaking into a computer, but did you know that people can be hacked? The manipulation and persuasion of people can lead to someone gaining physical access to a location or even data being leaked.  Today’s guest is Jenny Radcliffe. Jenny is the founder and director of…

[Read More]
What makes us easy prey

Stay Focused: How Losing Focus Makes You Vulnerable to Scams

Even the smartest person you know could be the victim of a scam if the circumstances are right. We become easy prey for scams when something causes us to let our guard down.

[Read More]

Sales Influence with Paul Ross

Standard sales scripts can make some people sound shady or pushy, but techniques of influence and persuasion are supposed to produce different results. How can you tell the difference between something shady or legitimate? Today’s guest is Paul Ross. Paul is an author, speaker, trainer, master hypnotist, and master practitioner of neuro linguistic programming. For…

[Read More]

Child Exploitation with Dr. Deaneè Johnson

Child exploitation is an incredibly sensitive and difficult topic. It is vital to understand what resources are available to help the victims find healing. Today’s guest is Dr. Deaneè Johnson. Dr. Johnson has been a key player in advancing the victim services field at the federal, state, and local levels for over twenty years. As…

[Read More]

Amazon Scams with Shaahin Cheyene

Amazon is a huge enterprise that makes billions of dollars every year and grew 84% in 2020. Some scammers have capitalized on its success and have found ways to deceive Amazon’s customers for their own gain. Today’s guest is Shaahin Cheyene. Shaahin is an award-winning entrepreneur, investor, speaker, podcaster, writer, and filmmaker currently based in…

[Read More]

Deep Fakes with Lonnie Waugh

A “deep fake” typically refers to a video that has been edited to replace the person in the original video with someone else, commonly a public figure in a way that makes the video look entirely authentic. These are time consuming to make but can be very convincing. Today’s guest is Lonnie Waugh. Lonnie is…

[Read More]

Data Destruction with Paul Katzoff

In the past, deleting a file was considered safe data destruction. But we know that it only clears the pointer to the file and not the data itself. Today there are many options when it comes to destroying data even though some hard drives seem almost indestructible.  Today’s guest is Paul Katzoff. Paul is the…

[Read More]

Hacking with Alissa Valentina Knight

Gifted hackers can access data from a government website, a hospital medical system, or even a car. Most are not aware when their personal information is stolen, sold, and used until it is too late.  Today’s guest is Alissa Knight. Alissa is a recovering hacker of 20 years, a cyber security influencer, content creator, and…

[Read More]

How to Spot a Liar with Pamela Meyer

Not all lies are scams, but everyone lies, even if it’s only about someone’s birthday gift. Liars give out both verbal and nonverbal cues, but how do you know what they are? Listen to this episode to learn how to spot a lie. Today’s guest is Pamela Meyer. Pamela is certified fraud examiner, international speaker,…

[Read More]

Influencer Marketing with Neal Schaffer

Not all social media influencers are equal. Just because someone has a ton of followers doesn’t mean they actually have any influence on their audience. It’s important that we learn to be critical thinkers that do research and not just believe what we hear and read. Whether you’re a business looking to use an influencer…

[Read More]

Pet Scams with Brandi Hunter

Pets are one way to get to someone’s heart and their wallet. Purchasing a dog is an investment that scammers can try to manipulate for their own advantage. Today’s guest is Brandi Hunter. Brandi has been in public relations and communications for over 15 years. The past five years she has been working for the…

[Read More]

Deception Detection with Abby Ellin

Many assume that dating scams only take place online. A scenario where they create an emotional connection over a period of time and eventually start asking for money. Today, we talk with someone who was deceived in person and how to see the warning signs in real life. Today’s guest is Abby Ellin. Abby has…

[Read More]

Ethical Hacking with Brian Self

Ethical hacking may seem like an oxymoron, but having someone that you trust do a penetration test on your network may shock you. Our guest today has been helping people for 20 years to know when they’re vulnerable, and he shares his stories and insights to help you keep your information secure. Today’s guest is…

[Read More]

Cyber Security for Seniors with Scott Schober

Seniors are prime targets for cybercrime because many of them have been preparing for retirement and have sizable savings. Their lack of familiarity with technology can set them up to be deceived or hacked. Scammers are going to elaborate lengths to hide their deception. It’s important to be aware of their schemes. Today’s guest is…

[Read More]

Ponzi Schemes with Steve Weisman

Some believe Ponzi schemes are doomed to fail. But with a sophisticated schemer and a broad enough base of people, they might just be able to keep it going. In honor of Charles Ponzi’s birthday, we talk about the history of the Ponzi scheme and some of the amazing stories of how they’ve been exposed…

[Read More]