Online Fraud Prevention through Education and Awareness
Chris Parker, founder of WhatIsMyIPAddress.com, started the Easy Prey Podcast with online fraud prevention in mind. He wanted to help listeners learn to avoid being an easy target for scammers and fraudsters, both online and in the real world. Since episode 1 aired on March 18, 2020, he has interviewed some of the most influential people in their fields, with topics ranging from personal safety, self-defense, social engineering, and romance scams to phishing, ransomware, cybercrime, and more.
To celebrate 150 episodes of the Easy Prey Podcast, this special highlight episode includes clips from the 10 most popular episodes.
See Education and Scam Prevention: Easy Prey Podcast Highlights for a complete transcript of the Easy Prey podcast episode.
In listening to this episode, you will hear from narcissist specialist Dr. Ramani Durvasula, romance scam survivor Debby Montgomery Johnson, trust and safety architect Jane Lee, programmer John McAfee, author and unmarketing specialist Scott Stratten, people hacker Jenny Radcliffe, former cybercriminal Brett Johnson, author and gaslighting expert Dr. Deborah Vinall, former FBI negotiator Chris Voss, and tech pioneer Steve Gibson. These are just a few online fraud prevention and personal safety topics covered in the podcast! Check out all the episodes to see what other topics you could learn about.
Episode 21: Narcissists, Psychopaths, and Sociopaths with Dr. Ramani Durvasula
Dr. Ramani Durvasula is an expert in narcissism. She came upon this interest through her fascination with human nature. As a clinical psychologist, she has to be equal parts researcher, scholar, and scientist. But there is something almost shamanistic about trying to understand how people work. The science is in its relative infancy, but people have been trying to understand human nature for thousands of years.
As long as there have been two human beings in the world, one of them was trying to understand the other.Dr. Ramani Durvasula
Narcissism, though, is an even more recent science. Dr. Ramani herself has only been studying it for around fifteen years. It started when she began exploring what made people make less than optimal health choices and how they treated healthcare personnel. Anecdotally, she found that some people come into a clinic and abuse receptionists, nurses, and physicians. Nobody liked being with them and they would cringe when they saw that patient’s name on the schedule.
Dr. Ramani understood why they were cringing, but she also knew that meant they probably weren’t getting the best quality medical care. The same was probably true in other areas of life. She found that a difficult patient in a clinic is often a difficult partner, sibling, child, or parent.
Studying “Difficult” People
This idea of difficult people aligned with what she saw in her clinical practice. She saw people in marriages with people who invalidated or devalued them, didn’t listen, and showed no empathy, and the pattern never changed. They would suffer for years or decades, hoping that maybe he’ll change when he gets a promotion or she’ll change when she gets the house she wants. They keep saying “maybe,” but it never changes. Dr. Ramini saw the fallout for those who stayed, and it was bad.
Psychology wasn’t talking about this. It wasn’t a traditionally violent relationship. The victims weren’t necessarily getting physically beaten or sexually assaulted. It was a chronically invalidating, unempathetic situation where the victim existed to serve the narcissist. It really does a number on people. Understanding narcissism and helping people deal with it is as much a vision and mission for Dr. Ramani as an area of scientific interest.
Narcissists, Psychopaths, and Sociopaths
The terms are often thrown out together and used interchangeably and incorrectly. But narcissism, psychopathy, and sociopathy have very big differences.
Narcissists lack empathy, are deeply entitled, are grandiose and arrogant, are very superficial, and need validation and admiration. They are also very sensitive, react badly to criticism or feedback, and feel like victims a lot. Their self-esteem is variable. When they’re having a good day, they’re king of the world. When they’re having a bad day, their entire world shatters. At their core, they lack self-esteem.
Psychopaths are similar to narcissists on the surface. They also have no empathy and are arrogant and entitled. But while narcissists do feel remorse and shame, psychopaths do not. Research on their nervous system shows that they are very stress-tolerant and not prone to anxiety. They are surprised that there are rules – if a person did them wrong and they murdered that person, they don’t understand why that’s a problem. Psychopaths can be charming, clever, charismatic, and confident. On the surface, they are always calm and collected, and people are drawn to them because we think cool is confident and confident is good.
Unlike psychopaths, sociopaths know there are rules. They just choose to break them anyway. Sociopaths tend to be more combative, the kind of person who gets angry in a bar and beats someone up. They are not calm, cool, and collected, but are much more blustery. Sociopathy can come from a difficult backstory, as well, which is not always the case with psychopathy.
At he end of the day, the narcissist is insecure and feels anxiety and remorse. The psychopath doesn’t feel any of those things.
Episode 49: Surviving a Romance Scam with Debby Montgomery Johnson
Debby Montgomery Johnson was the victim of a romance scam. Since then, she has talked openly about her experience. She hopes that sharing how she was drawn in and what red flags to watch for will help in online fraud prevention. If she can help even one person avoid a romance scam or recover from one, she considers it worth it.
Getting Drawn Into a Romance Scam
Ten years ago, Debby’s husband passed away unexpectedly. Suddenly, she was thrown into running his company. She would work her job in the morning, come home, and run his company. Since it wasn’t an expected transition, she didn’t know everything she needed to know, and getting caught up took a lot of work. She was working twenty hours a day with little time to grieve. Although she was pretending to be fine, she really wasn’t.
After six months, some friends told her that she needed a life outside of work. They suggested online dating. It was safe, they told her, and she could do it from her house. Her husband was smart, well-read, and well-written, so the bar was high. But Debby decided to try it anyway. She went to a faith-based site and created a very transparent and open profile where she talked about her family and that she was a widow.
She was contacted by a good-looking man. He was from England, an international businessman who was also a widow. He looked athletic and wrote well. Debby found it fun. She liked what he was saying in the emails and the way he wrote to her.
The Red Flags Begin to Appear
A common tactic of romance scammers is to move the conversation from the dating site to somewhere else. This scammer moved their conversations to Yahoo! chat. He used the excuse that he had a new international business contract and he could use Yahoo! chat from anywhere. Debby wasn’t thinking about online fraud prevention at the time, so she didn’t know it was a red flag. In fact, she enjoyed it. She enjoyed using instant messaging and hearing the notification sound of Yahoo! chat letting her know that he wanted to talk.
Their relationship progressed relatively quickly. This is another common tactic of romance scammers. Debby even recalls at one time thinking that his feelings for her came very fast. She had just lost her husband and wasn’t ready for someone to say he loved her right off the bat. But she did notice that he jumped in a bit quick.
He was good at saying all the right things, and especially at listening to her. She told him about her kids, how she felt, and how she got mad after her husband died because he left her alone. They had great dialogues in their emails. He was good at listening and responding.
Disappointments and Money
He was supposed to come for Christmas. Debby had hotel rooms and everything set up for him and his family. When that got canceled, it was her first disappointment. But he was an international businessman, and she understood customs issues, tariffs, and those kinds of problems.
He did ask for money, but every time he did, it felt like a business proposition. There was always the promise that he would pay her back. At some point when sending the money, she felt like she couldn’t stop because if she did, she’d never get it back.
With every disappointment, it was like, “You’re so far into it now. Just keep going … this one last time.”Debby Montgomery Johnson
Episode 136: Pig Butchering with Jane Lee
If you’re at all familiar with online fraud prevention, you’ve heard of old-school romance scams or Nigerian Prince scams. The end goal of those scams is to get someone to wire money to the scammer. Pig butchering is a new kind of online scam. Jane Lee describes it as a romance scam on steroids, because there’s a cryptocurrency investment component to it. In addition, pig butchering scammers are more technologically sophisticated than your average romance scammer, which requires different online fraud prevention and awareness measures.
Jane went undercover to investigate pig butchering scams. She didn’t come up with the name “pig butchering.” That’s what the scammers themselves call it. They refer to victims as “pigs” that they fatten up for the slaughter. Once they’ve finished “fattening” the victims with compliments and praise, they drain them of their money and walk away with, in some cases, millions of dollars.
The scammers bait their targets mainly on dating apps, but also on platforms like WhatsApp. In fact, any app that has a messaging component is a risk. Once they’ve contacted a target, they quickly move them to an encrypted messaging app. This adds an extra layer of anonymity to help avoid any online fraud prevention methods.
Going Undercover for Online Fraud Prevention
Jane’s company, Sift, works with some online dating apps. The idea of pig butchering first surfaced among their network of dating apps. Being an occasional dating app user herself, Jane realized that all the scam accounts looked familiar. But she couldn’t quite put her finger on what was so similar.
Jane wanted to know the inner workings of this scam. Getting more information would help with online fraud prevention in dating apps. So she downloaded every dating app in the app store, recruited a single friend to help out, and set herself up as bait.
How Pig Butchering Works
The scammers position themselves as successful businesspeople who have achieved financial freedom. They start by romancing their target quickly. Tactics like love bombing – a manipulation tactic that overwhelms a person with love and compliments – are common.
Once they have their victim hooked by the romance, they start talking about investing. They show how much they’ve made with cryptocurrency investing, and say that you should try it. They try to drive a sense of urgency to get you to send your money quickly.
For some period of time, the target may be able to withdraw the funds. It feels tangible, because the victims see huge returns in a short period of time. The profit feels real. Ultimately, there’s a tax or fee to withdraw the money. That’s when many people realized they’ve been scammed, and often when the person they were interacting with ghosts them.
Identifying Pig Butchering Scammers
At the time, pig butchering scam accounts were mostly objectively-attractive Asian men. Since she did her research, this has changed and they are more diverse now. But all of the images looked extremely photoshopped. A reverse image search turned up no results, so Jane thinks they’re either AI-generated or likeness theft from other social media.
The responses to the standard dating app questions were all the same. They set themselves up as successful business people who have achieved financial freedom and want to retire by age 40 and travel the world. They talked about financial freedom and a desire to travel with their future wife and family. All of them had generic job titles, just something like “CEO” or “Entrepreneur” and a location. It used to be their responses to questions didn’t even relate to the question, but that has changed. They’re paying more attention and adapting as online fraud prevention methods target them.
Episode 26: The Unexpected Cost of Privacy with John McAfee
John McAfee works hard to stay hidden when he goes online. He takes some serious precautions to be private. It’s not just online fraud prevention and protection he’s after. The kind of privacy that he needs takes serious work.
Precautions for Going Online
Neither John nor his wife have cell phones. If you have one, even a brand new one, and call three people you have called before and the government is looking for you, they can find you within five minutes. Smartphones are also susceptible to spyware, which you can get just from browsing unsavory sites. Having a cell phone just doesn’t fit the kind of privacy he needs.
He also has a Faraday cage in his home where no signals can come in or leave. It used to just be a room covered in tin foil, but that was very ugly and reflected light. He eventually put soundproofing over the tin foil, so it’s now also a soundproofed room. Because it’s a Faraday cage, none of his electronic communications can get out of the room.
In addition, he has a serious VPN. It isn’t the kind you can find on Google and buy for $80 per year. For the kind of privacy John is aiming for, that’s not going to cut it. His VPN goes through nine different countries, including the Netherlands, Vietnam, Russia, and Tierra del Fuego. It gives some lag to his communications sometimes, but it provides serious privacy protection.
In order to keep people from knowing where he is, John and his wife provide as much disinformation as possible. If they visit a country for a day or two, they’ll take a lot of photos. Then they publish them on Twitter at different times. On Twitter, it may look like they spent a week traveling between Germany, the south of France, the west coast of Spain, Portugal, and England, while in reality they were somewhere else altogether. They never post a photo of a place while they’re still there.
You have to be vigilant. It’s hard work every day in order to remain hidden.John McAfee
Even trivial things matter. They change the date and time of the photos, even when posting them to Twitter. Twitter strips all that information from photos. But the government could come with a subpoena and ask to see the data before it’s stripped. So John and his wife provide bogus data for everything. If they post a picture of the Eiffel Tower, obviously it’s in France. Someone could probably figure out an approximate time of day from the angles of the sun. But they can put in whatever date they want. At that point, is anyone going to put in the time and effort to locate them? And even if they do, when John finds out they’re trying to locate him and are getting close, it’s very easy to move somewhere else.
The Aspect of Privacy that No One Thinks About
When we think about privacy, we don’t think about our friends. No matter how careful or smart we are, we all have friends, and sometimes they’re not as aware of reality as we are. John has to lie to his friends as well as the public because he just doesn’t know. If they know something that shouldn’t be told, they might accidentally let it slip.
We don’t realize the severity of privacy and how hard it is these days. To have true privacy, you can’t tell your family, siblings, parents, children, best friend, kid that grew up with you, or guy that would help you bury a body. You can’t be honest with them anymore. That’s where people screw up, because you can’t tell anyone.
Episode 101: Business Ethics with Scott Stratten
The big epiphany for Scott Stratten happened when he was talking with a friend in his friend’s office. The phone rang, and his friend answered it. It was a cold caller. His friend berated the caller for wasting his time, and he and Scott talked for a bit about how ridiculous cold calling is. Finally, his friend said, “Okay, Scott, I have to go. I have to do my calls for the day.”
Scott responded, “What are you talking about? We just had a conversation about how lame cold calling is as a business development tool.”
His friend said, “Well, yes, but I sell something people need.”
Scott realized that so much of sales and marketing was a “buy or goodbye” mentality. He thought there had to be a better way. We don’t have to take a ladder to success by stepping on everyone on the rungs below us. We can take an elevator to success together. People do business with those they know, like, and trust. So Scott started to wonder, why aren’t we doing that? He set out to prove you can build a business by building relationships with your target market.
The Story Behind the unmarketing.com Domain
In the year 2000, Scott was ready to start his UnMarketing brand. He went to register unmarketing.com, and it wasn’t available. He registered un-marketing.com instead, then inquired about the person who owned unmarketing.com. It just led to an error page, so that person wasn’t using it at the time. He found the contact information and emailed the person, saying he would like to buy it.
The person emailed back and said he had some plans for the domain, but would be willing to part with it for $1,000. Scott didn’t have that kind of money. He said “Okay, thanks anyway,” and built his website on un-marketing.com.
Fast forward five years. A week before Christmas, Scott got an email from GoDaddy telling him a domain had been transferred to him. When he looked, he had been given ownership of unmarketing.com. He checked his email again, looking for an explanation. There was an email from the person who originally owned the domain. He said, “I could have sold this domain recently for five figures. But I realized the only reason it’s worth anything is because of the brand you’ve built on it. Merry Christmas.”
Scott was entirely floored. It was a testament to how he does business, which is to always do what’s right. That person owned the domain, and Scott never made a claim on it, even though he probably could have. Even if he’d never gotten the domain, it would have been the right thing to do.
Episode 66: People Hacking with Jenny Radcliffe
Jenny Radcliffe is a social engineer. She does hacking without using technology. A normal hacker, the kind you might see in movies, is a guy in a hoodie behind a computer. But that’s not what Jenny does. She hacks people. Many people know social engineering from online fraud prevention and scam awareness. Social engineering is a big topic in online fraud prevention because scammers use it so much. But what Jenny does is called penetration testing, or pen testing. She uses psychology, persuasion, and manipulation techniques to get past people and break security. Once she breaks it, she knows where it’s vulnerable so it can be fixed before real bad guys try it.
The two main things she does are physical infiltration and using psychology to manipulate. Physical infiltration is more commonly known as breaking and entering. However, she does it ethically since she’s not there to steal things, but instead hired to find security flaws. The other thing she does is use psychology to manipulate people. The physical breaking and entering is more theatrical and dramatic. But the psychological stuff, trying to get people to take the bait, click on the phishing link, or give that last piece of information, can also be a lot of fun.
Social Engineering for Physical Entry
There’s a cliché that you can get into anything by carrying a clipboard and looking like you belong. It may be a cliché, but it works. If you look like you belong, often people don’t think to question you.
Restrictions and rules around the coronavirus pandemic are a great opportunity for physical infiltration, since people are already uncertain. Jenny has used it in recent infiltration attempts. As of her interview, Western countries were just starting to come back to in-office work, but nobody knew what the rules were. If someone says, “Covid, wait,” they will wait. Jenny claimed to be a “covid inspector” and told people to wait, and they did.
She decided to try asking people to write their email and password down for a covid check. She pressured them a little, saying things like, “Do it now, thank you. It’s a pain, I know, I had to do it as well. Thanks for putting your password.” Nobody knew what the rules were around coronavirus restrictions, so they obeyed.
A Big Piece of Security Advice
Jenny’s big piece of security advice is that if something has to be a secret, it’s suspicious. And if something feels wrong, check it out. With employees, they need to know that if something feels wrong, they get a feeling that they’ve done something wrong, or they feel like they’ve been coerced, they need to call and tell the security team. Then the security team needs to be sympathetic to it.
The quicker you can deal with something like that, the better. It’s like a bully. On Monday, they say that if you give them your lunch money, they’ll leave you alone, so you do. Then on Tuesday, they have your lunch money and bus fare and everything else. To end it, you have to get it out in the open. You need to be able to kill it as soon as you identify it.
Episode 37: The Life of a Cybercriminal with Brett Johnson
Brett Johnson has been called the “original internet godfather.” He got that title because he built the first organized cybercrime community, called ShadowCrew. It was the precursor to today’s darknet and darknet markets and it laid the foundation for the way modern cybercrime and financial cybercrime still operate today.
Cybercrime Before ShadowCrew
In order for cybercrime to happen, there are three things that have to work together: Gathering data, committing the crime, and cashing out. If all three don’t work together, the crime fails. But most criminals can’t do all three things. Often they’re good in one area, potentially two, but very few can do all three. In order to successfully complete a crime, most cybercriminals need to partner with other cybercriminals.
If you look at the necessities of cybercrime, there are three things that have to work in conjunction for cybercrime to be successful: Gathering data, committing the crime, and then cashing out.Brett Johnson
If you were good at committing the crime, you would still need partners to help in gathering data and cashing out. Before ShadowCrew, the only way you had to find them was Internet Relay Chat. It was a rolling chat board, and you had no idea who you were talking to. They could be a good potential partner, or an amateur pretending to be an expert, or a cop, or someone just trying to steal your money.
ShadowCrew Made Cybercrime Easier
ShadowCrew, along with Counterfeit Library (which Brett also ran) and CarderPlanet, became the three sites for organized cybercrime. Whether you wanted to do credit card theft, phishing, account takeovers, tax return identity theft, or anything else, you could go one one of those three sites. They provided a trust mechanism that criminals could use. You knew from someone’s screen name what their still level was, if you could trust them, and if you could learn from or network with them.
That’s why cybercriminal forums and marketplaces exist today. They allow one criminal who isn’t as good in one area to network with other criminals who are good in those areas.
Episode 84: Gaslighting with Dr. Deborah Vinall
Gaslighting is a term that many of us have heard, but not all of us know how to define. Dr. Deborah Vinall studies gaslighting and how it works. It is a targeted form of psychological control and manipulation. Often it accompanies other abuse, such as physical, sexual, or emotional abuse, and it’s a way of someone gaining the upper hand or gaining control by making you doubt your own self, memories, and perceptions. It involves pathological lying, but with the added edge of causing self-doubt and making you feel like you’re crazy.
For a very simple example, you did something. Let’s say you swept the floor. Your partner was at home, and they saw you do it. But then they start berating you for not sweeping the floor. You know you did it, and you know they saw you do it. But they’re just so certain that you didn’t. At some point, you’ll start to think, Am I confused? Did I do it yesterday? Am I crazy? A pattern of this over time can really break a person down.
Gaslighting Can Happen Anywhere
You can see gaslighting anywhere – in intimate relationships, parent-child dynamics, politics, bosses, and even friendships. It tends to occur where there is already a power imbalance or where one party wants to create one.
Anywhere where there’s a pre-existing power imbalance or the person is trying to create one to gain the upper hand is a ripe opportunity for gaslighting to happen.Dr. Deborah Vinall
There are different types of gaslighting, which Dr. Vinall talks about in her book, Gaslighting: A Step-by-Step Recovery Guide to Heal from Emotional Abuse and Build Healthy Relationships. The classic form is the sadistic, narcissistic person who is carefully cultivating a reality where they can be in control. It could also be a defensive reaction, where a person changes the narrative because they can’t bear to be wrong.
It’s easiest to recognize the more sadistic type, and it’s more clear-cut and obvious. But gaslighting is something that all of us do at some point. When Dr. Vinall was getting feedback on her book, she was interested to find that many people said they had done the behavior she describes at one point or another. We all do it sometimes. It becomes problematic when it’s an intentional choice and a repeated pattern of behavior.
How to Avoid Being a Gaslighter
Humility is the biggest thing if you’re trying to avoid gaslighting behavior. When someone asks how they can avoid doing it, they’re not the typical gaslighter trying to gain an upper hand in a relationship. When you have humility and a desire to self-reflect, you’re already ten steps ahead of everybody else.
Gaslighting is about power and a dynamic that puts the gaslighter in control. Gaslighting is intentionally choosing to manipulate. If you’re able to recognize the inherent worth of every person around you, recognize that others are just as valuable as you are, and keep that in mind when you interact with others, you’re not going to gaslight.
Episode 106: Negotiating with Chris Voss
Chris Voss spent twenty-four years working with the FBI, including as their Lead International Kidnapping Negotiator. During his time there, he taught negotiation techniques to local cops. Cops aren’t interested in academics or theory. They’re practical people and have problems they’re dealing with right now. All they want is something that works.
Keeping that focus in mind, Chris and his son developed the Black Swan method of negotiating. Chris also wrote Never Split the Difference, a well-known book on negotiation techniques. One of the big things he focused on with the Black Swan method and his book was making it practical and actionable. The book is actionable and the methods are easy to learn. Some of it is counterintuitive, which can be scary, making getting out of your own way one of the challenges.
Negotiations We Don’t Realize are Negotiations
We are negotiating all the time for all sorts of things. But often, we don’t recognize it. That makes it harder for us to get what we want. If the words “I want” or “I need” are being said or thought by you or the other party, you’re in a negotiation.
The most dangerous negotiation is the one you don’t know you’re in.Chris Voss
Some people think it’s only a negotiation when money is involved, but that’s not the case. Time is a commodity too, and some measure of time is at stake in every negotiation. Whether it’s you doing something, the other party doing something, or even something asking for your attention, if time is involved, it’s still a negotiation.
Sometimes people aren’t clear on the difference between sales and negotiation. That’s because the goal of sales is to become a negotiation. Sales wants to convince you to want something. As soon as you start wanting it, you’re in a negotiation.
Getting to “No”
Many sales and negotiation techniques are focused on getting people to say “yes.” The hope is that this series of micro-commitments will eventually convince the other party to buy into your big proposition. But Chris turns that on its head. Instead of asking “Do you agree?” he asks, “Do you disagree?” Instead of “Do you want to do this?” he asks, “Are you against this?” Every question that could have a “yes” answer, he rephrases to have a “no” answer.
We’re conditioned to feel that “yes” is a commitment, while “no” protects us. When we feel protected, we’re better able to evaluate our options. It also makes it easier to the other party to ask for what they need. When Chris asks, “Do you disagree?” they are able to respond, “I don’t disagree, but I need the following things first.” Saying “yes” feels like a commitment, and in the early states of negotiation, people often aren’t ready to or comfortable with committing to anything. Being able to ask for what you need and still reserve the option to not commit feels safer and leads to better negotiations.
Episode 108: Online Security: Just Hope for the Best with Steve Gibson
Steve Gibson has been working with computers since before the internet existed. He got to see firsthand how the internet grew and technology adapted, and how that’s led to some of the security issues we see today.
When the internet first happened, Microsoft wasn’t prepared at all. They rushed to put internet functionality into Windows, and they succeeded. But in their rush, calling security an afterthought was an understatement. The C: drive on Windows computers weren’t firewalled. If someone knew how to get there, printers, files, and everything else on personal computers were publicly available online.
This is where Steve’s project ShieldsUp came from. To his horror, he was able to map a stranger’s C: drive to his computer. He realized he could create a website that people could go to and it could tell them if their files and printers were exposed.
The Internet Was Never Designed for Security
When the internet first came around, the idea that universities could create a group and correspond was a miracle. People on the internet knew the other ten people on the internet, so it wasn’t like there were strangers with a ton of access. The internet wasn’t really designed for people, either. It was designed by and for techies, and then foisted on the general public.
Security was, at best, an afterthought. Internet security is like designing a house, but neglecting to put locks on the doors because there weren’t even doors there originally. In the early days, security wasn’t really necessary. There were viruses, but they were just kids playing around to see how bad an infection could be. Now there’s malware, ransomware, and more. It’s become a big problem, because now it’s profitable. When you create a profit motive for bad guys, they can leverage the fact that there are still major weaknesses in internet security.
Celebrating 150 Episodes of Online Fraud Prevention and Awareness
Online fraud prevention and scam awareness are big topics with a lot of aspects. But the Easy Prey Podcast is determined to cover them all to keep you from falling victim to online bad guys.
If you prefer to listen to your podcasts instead of read about them, the Easy Prey Podcast can be found on your favorite podcast listening service. We always appreciate reviews, which you can leave at easyprey.com/review (). And finally, if you find any of our episodes helpful or know someone who would be interested, we would greatly appreciate you passing it on to them. Help us spread our goal of online fraud prevention and keep everyone from being easy prey.
- Easy Prey Podcast
- General Topics
- Home Computing
- IP Addresses
- Online Privacy
- Online Safety
Online dating can be a fun way to pass the time. It can also be a way…[Read More]
Many of us are aware that scams, fraud, and cyber threats are out there. We may even…[Read More]
We all know the old phrase “seeing is believing.” We’re hard-wired to believe the things that we…[Read More]
It’s been six years since the infamous Ashley Madison hack, the one that published the information of…[Read More]