PLAY PODCASTS
Easy Prey

Easy Prey

323 episodes — Page 3 of 7

Ep 223The Difference Between Fraud and Scams with Uri Rivner

Moving money has never been easier. We no longer need to go into a bank, fill out a slip, and hand it to a teller to receive our money. We can now transfer money instantly. Scammers are taking advantage of unfamiliar technology to either hack in and take our money or to deceive you into sending it to them yourself. Deciding if the bank is responsible for the loss is becoming more and more of a conversation. Today's guest is Uri Rivner. Uri has been fighting financial crime for 20 years working closely with the world's largest banks on developing strategies against online fraud and scams. Prior to founding Refine Intelligence, Uri was co-founder and Chief Cyber Officer at BioCatch, the global leader in behavioral biometrics for fraud detection. Earlier, Uri served as Head of New Technologies at RSA. Innovations Uri spearheaded, such as risk-based authentication, are now saving the industry billions of dollars each year in fraud. Show Notes: [1:19] - Uri shares his background in fighting fraud for the last 20 years. [3:43] - The companies Uri has worked for, founded, and co-founded work with banks and financial institutions to help protect against fraud. [5:10] - In a fraud situation, people are tricked through social engineering to hand over their information, but the fraudsters move the money. [6:41] - Fraud is unauthorized. A scam is an authorized payment. [7:39] - Uri describes some of the history of frauds changing over to scams. [10:42] - Although there's a difference between fraud and scams, the lines can be blurred. [14:10] - Remote access malware became a real problem. [17:13] - What are the differences between how the banks handle fraud and how they handle scams? [19:08] - Banks can look at data and account action to determine if a criminal moved money or if the victim did it for them. [20:36] - It is much more difficult for banks to detect scams. [23:29] - If banks see something unusual, they typically reach out to the customer to hear the reason. This doesn't always work due to social engineering. [28:13] - Engaging customers is tricky because people don't typically answer the phone or criminals are coaching the victim through what to say. [30:17] - This year, in the UK, banks will be held liable. [33:17] - By design, banks are supposed to know their customers. But that's not the case these days. [36:48] - For banks, it is harder now to connect with customers to find out exactly what happened. [39:31] - Uri explains what happened with the US introduction of instant money transfers through Zelle. [41:50] - There is an increase in Zelle scams, but banks were able to offer some support and reimbursement. [43:59] - Scams are the most effective tools criminals have. [46:45] - Uri describes what we can look out for and how to best prepare ourselves to prevent scams. [49:19] - When money is moved from a bank account, it is the end of a chain of events that led to it. What is the responsibility of the platform that transferred it? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Uri Rivner on LinkedIn

Jun 5, 202454 min

Ep 222Sex Trafficking and Murder on the Road with Frank Figliuzzi

It sounds like an episode straight out of Criminal Minds. The FBI's Highway Serial Killers initiative hunts for long-haul truckers behind at least 850 murders of mostly female sex trafficking victims along our nation's highways. Today's guest is Frank Figliuzzi. Frank was the FBI's Assistant Director over Counterintelligence. He served 25 years as an FBI Special Agent in assignments across the country. As the head of all espionage investigations, Frank frequently briefed the White House, the DNI, and the Attorney General. For the past seven years, Frank has been a national security analyst for NBC News and MSNBC. He's the author of a national bestseller, The FBI Way: Inside the Bureau's Code of Excellence, and now Long Haul: Hunting the Highway Serial Killers. Show Notes: [1:30] - Frank shares his background and what his role was in the FBI for 25 years. [3:52] - His most recent book is Long Haul: Hunting the Highway Serial Killers and is about the FBI's Highway Serial Killers initiative. [5:57] - These cases go back several decades and remain unsolved. [7:13] - Trucking is a crucial part of our society, but there are different types of truckers and some are more likely to commit crime. [9:12] - The success of the initiative really relies on local police departments. [11:13] - Frank describes some of the things he learned from experts in street-level human trafficking. [14:27] - Frank gives examples of some of the things he did for research. [15:53] - The type of trucker that Frank is most concerned about are the ones with very little interaction with other people. [17:21] - There is more security and tracking of truckers in more corporate organizations. [18:44] - The corporate job is less attractive to someone who is motivated to commit crime. [20:03] - Frank was amazed at how high tech trucking is these days and the brains needed to understand it all. [23:03] - Frank describes his experience as he shadowed a trucker and immersed himself in the lifestyle. [26:43] - The number one profession for serial killers is a trucker. What is it about the job? Does it attract killers or make killers? [29:17] - Most people think that people they know would never be a victim of a crime like this. [31:06] - Human trafficking is most commonly initiated by someone the victim knows. [32:56] - Get rid of the notion that this can't happen to your family. That's dangerous in and of itself because you'll never see it coming. [34:40] - Connecting with potential victims has moved online. [37:57] - Trafficking victims are often victimized more and treated like criminals themselves. [40:01] - What are the similarities between crime scenes in many of these cases? [42:42] - The 850 unsolved cases only account for the ones that are known. [43:46] - There is an organization called Truckers Against Trafficking (T.A.T.). Frank explains what they do and how they help. [46:48] - Technological advances are making a huge difference, particularly in DNA. [49:19] - These crime scenes are the worst Frank has ever seen even after his 25 years in law enforcement. [52:40] - Sometimes, a victim's name is not known for many years if at all. It is hard to track the solve-rate of these crimes. [55:12] - There are DNA testing organizations that work with police departments. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Frank Figliuzzi's Website

May 29, 202459 min

Ep 221Next Gen Romance Scams with Anna Rowe

Scammers have gone from postal mail and faxes to email and phone calls where you never see the person, but now with AI, you can even have a live video call that seems completely real with deep fake technology. It's no longer safe to just see a person, but there are other things you can do to know if you're communicating with the individual they claim to be. Today's guest is Anna Rowe. Anna is the founder of Catch the Catfish and co-founder of LoveSaid. She is a Subject Matter Expert in Romance Fraud and Victim Support. Show Notes: [0:55] - Anna shares her background as a teacher and describes how she was catfished in 2015. [2:52] - How can you make genuine informed consent when someone is deceiving you at that level? [3:45] - A therapist's suggestion of researching narcissists and psychopaths started her healing journey. [5:35] - Anna learned that this type of scam commonly comes from West Africa and the scammers are known as Yahoo Boys. [7:44] - Romance fraud can be in person, like with Anna's experience. But there are romance scams that are online only. [9:32] - It is common for romance scammers to also be perpetrating other types of fraud at the same time. [11:44] - Pig butchering includes another problem, where scammers themselves are also trafficked. [13:59] - A lot of victims don't realize they are interacting with a scammer for a long time because they aren't asking for money. [17:51] - In years past, Photoshopping an image to appear realistic wasn't as easy as it is now with AI. [19:26] - Blending a new face onto an existing photo can even be used in video. [21:15] - Voice cloning is also often used and apps to do this are free. [24:24] - Deep fake scammers use content on social media stories and live streams to record long pieces of video. [26:20] - This technology is improving quickly, but Anna shares some of the ways you can tell if something is a deep fake. [28:51] - There are simple things to check on profiles that you can notice as red flags before getting involved with someone. [33:01] - Scammers also really like using cryptocurrency because it is unregulated. [34:14] - Scammers build a reality typically by using the 5 C's of reasons why their spouse is gone. [37:30] - There are different strategies to look for certain things as you "become your own detective" on various social media platforms. [40:57] - When scammers know that you are "onto them" they know what they can change. [43:36] - Every decision a scammer makes is premeditated. [46:50] - Scammers will keep you hooked and space away from them could get you in a space of trusting your gut. [53:32] - Reverse image searches are extremely helpful. [57:50] - Anna describes some of the ways she was able to determine what her scammer was doing. [61:10] - Anna was put into an open relationship without her consent. [63:05] - Future faking is common in narcissists and psychopaths. [64:26] - These scams are really damaging and it is important to not use victim shaming language when discussing it. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest LoveSaid.com Catch the Catfish

May 22, 20241h 11m

Ep 220Challenges of Employee Onboarding and Offboarding with Craig Davies

Many years ago, people chose to stay with the same employer for decades. Today, employees are changing jobs more regularly. Each company needs to have processes in place allowing access to systems needed to do their jobs, but there's also a risk of when they leave that they may still have access to certain programs. Today's guest is Craig Davies. Craig started in banking, holding many roles including CSO. As the CISO and the Executive Director of Gathid Ltd., he is passionate about helping organizations strengthen access management without completely overhauling their people, processes, physical infrastructure, and technology. Craig has spent more than 25 years in cybersecurity working with infrastructure operations, security architecture and software, web development and operations. He was the first CEO of Ost Cyber and at Atlassian he helped develop the security program for all aspects of their business, including security, cloud operations and protection. Show Notes: [1:32] - Craig shares his background and what his roles are at Gathid. [4:52] - When bringing on new employees, there are several front-end issues that a company and employee can face. [6:22] - It can be really frustrating for a new employee when there are so many different programs to learn and manage. [8:18] - We have to think about the employee's journey. [10:59] - In many cases, new employees receive a ton of access without learning the process during onboarding. [11:49] - Offboarding can be a nightmare because we don't always think about all the things that are connected. [15:26] - We need to protect the person who is leaving. [18:06] - One of the challenges is knowing who should be responsible. [19:12] - There needs to be a list of all the programs and systems that an employee may have access to. [21:17] - Offboarding is not typically a priority but not focusing on it can be a huge risk. [24:43] - Smart use of control is important especially in onboarding and offboarding. [27:26] - Working remotely makes systems and access even trickier. [29:39] - There is a reason the large companies have large systems. [31:50] - Every company has the same problems. The ones that have a process in place have likely experienced a crisis. [34:57] - What are the challenges to the new ways of working post-pandemic? [36:26] - You can't get rid of risk, but you can manage it. [44:50] - These processes all start with a conversation. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Craig Davies on LinkedIn Gathid Website

May 15, 202446 min

Ep 2195 Common Uses of Synthetic IDs with Stuart Wells

There are entire communities set up to fight fraud that use synthetic IDs as well as scammer gangs that are advancing their creative ways to use these documents. This is changing regularly as biometric authentication advances continue. Today's guest is Stuart Wells. Stuart is the CTO of Jumio and is responsible for all aspects of Jumio's innovation, machine learning, and engineering. He is an industry veteran with more than 30 years of tech experience. He was previously the Chief Product and Technology Officer at FICO, and held executive positions at Avaya and Sun Microsystems. Show Notes: [1:18] - Stuart shares his background and what he does at Jumio as the Chief Technology Officer. [3:20] - The science behind document protection is literally decades old. [5:06] - Stuart describes the process of verifying a document at Jumio. [5:57] - What are the practical uses of synthetic IDs? [7:39] - There are large volumes of both fraudulent and honest individuals creating and using synthetic IDs. [9:25] - A lot of businesses are seeking verification from places like Jumio to protect themselves and their reputation. [11:49] - Biometrics as a tool to use against fraudsters has grown globally. [13:54] - Biometrics are very useful, but there are challenges. [15:31] - Stuart shares a recent story about a fake video interaction that cost the victim millions of dollars. [17:37] - At this point in the technology's development, there are some signs of deep fakes that we can spot. [19:03] - How can this negatively impact an individual? [20:18] - Listen to your inner voice and check with another source before sending money. [22:52] - You don't have to be a programmer to use these tools. The creators have made them easy to use and people are using them to do harm. [25:46] - The early versions of deep fake technology had a lot of easy-to-see abnormalities, but they are getting tougher to spot. [27:26] - Although these negative impacts are concerning, there is some excitement about the positive uses of these advances. [32:07] - What direction is verification headed when it comes to biometrics? [33:54] - Documents have anatomy and security measures in place. [36:43] - Most security systems are layered. [40:00] - This landscape is continuously changing. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jumio Website

May 8, 202442 min

Ep 218Vantage Travel Bankruptcy with Michelle Couch Friedman

Imagine booking a vacation only to find out that the company files for bankruptcy a week later. As a consumer, would you know what your rights are? There's a big difference between travel insurance and travel protection. One can leave you with no way to get your money back. Today's guest is Michelle Couch Friedman. Michelle is the founder and CEO of Consumer Rescue. She is an experienced consumer reporter, advocate, mediator, author, and licensed psychotherapist. Michelle has also been a columnist, contributing editor, and former executive director for Elliott Advocacy, a non-profit organization dedicated to consumer advocacy. Show Notes: [1:02] - Michelle shares her background and what she does through Consumer Rescue. [5:00] - The only way to get money back from a bankrupt company is through your credit card company if you paid with one, or if you have travel insurance. [6:36] - Right before announcing their bankruptcy, Vantage did a "sales blitz" and offered great deals to loyal customers, knowing that they wouldn't deliver. [9:49] - Vantage was unique in that it had been a successful business for 40 years and had a loyal customer base. [12:44] - Looking back at the way Vantage behaved after the pandemic, there were some red flags. [15:43] - Michelle explains the difference between travel insurance and travel protection. [17:36] - Travel insurance should be purchased away from the company taking you on the trip. [19:47] - Make sure you can find a clause somewhere that says you are protected against the insolvency of the tour operator with or without bankruptcy. [22:10] - If the tour operator is not able to deliver, you could file a credit card dispute. But there are some limitations. [26:04] - You should always pay with credit cards. Don't be tempted by discounts offered with bank transfers. [31:21] - The average age of Vantage Travel clientele was older and scammers took advantage of their vulnerability. [33:10] - When filing claims and filling out forms, personal information makes its way to scammers on a "victim list." [36:09] - Cryptocurrency is a red flag in cases like this as well. [38:41] - There is some information you can find by contacting the court in the jurisdiction of the bankrupt company. [41:53] - A company bought Vantage Travel's customer list and had all of their contact information. [43:57] - In order to protect yourself, even if you have full trust in the company, do research and find red flags and reports. [46:26] - Never pay with a bank transfer, even if they offer a discount. [50:40] - Make sure the travel insurance policy protects against insolvency, not just bankruptcy. [53:34] - Michelle shares how to reach Consumer Rescue and what services they provide for free. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Michelle Couch-Friedman LinkedIn Consumer Rescue Website

May 1, 202453 min

Ep 217Cybersecurity for Everyday People with Greg Tomchick

Learning how to keep your business safe and protect your online data can be advantageous for your home and personal life as well. Your children and family can create awareness at school and with friends. Today's guest is Greg Tomchick. Greg is a former professional baseball player turned award-winning cybersecurity coach. He has worked with more than 250 world-renowned companies, including American Airlines, Caterpillar, and Trinity Rail. He is regularly featured live on ABC, Fox, and is an expert contributor to Inc. Magazine. He is now the CEO of Valor Cybersecurity and host of The Connected Mindset. Show Notes: [1:10] - Greg shares his background coming from a military family and then as a professional baseball player before learning cybersecurity's impact. [2:42] - As an entrepreneur, Greg's business experienced a cybersecurity attack. [5:45] - The Connected Mindset is helping people become more consciously aware of how they navigate life both physically and digitally. [7:26] - Greg explains why they set up budgets of companies and individuals for cybersecurity at Valor. [9:25] - The focus should be on the mindset first. [10:27] - An unexpected positive is that cybersecurity gives a company or business a competitive advantage. [12:58] - Most people don't think about security until after something has gone wrong. [14:43] - What is the difference between culture and mindset? [15:50] - Greg shares some of the mindsets and cultures that are unhelpful. [18:09] - As connected as we constantly are through technology, we have never been more disconnected. [20:50] - When Greg's business had been attacked, there was no place to report the incident. Things have improved in recent years. [24:48] - No matter the size of the business or amount of money an individual has, everyone can be a target. [27:08] - Some companies are risking things by going remote without any plan, structure, or security in place. [28:45] - Every new device or software that is introduced needs to be considered. [30:16] - Greg discusses AI, including the costs and benefits. [34:03] - What is the minimum cybersecurity mindset that the everyday person needs to have? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Connected Mindset Greg Tomchick's Website Greg Tomchick on LinkedIn Valor Cybersecurity Website

Apr 24, 202438 min

Ep 216Misunderstanding Victims of Romance Fraud

The media loves sensationalized romance scams, but we need to understand that anyone can be emotionally seduced and it's not just the lonely. No one is off limits to being targeted, no matter the age, status, or career. And the impact is far greater than just financial. Today's guest is Becky Holmes. Becky is the creator and voice behind the popular Twitter account Death to Spinach. Becky's book Keanu Reeves is Not in Love With You looks at all aspects of romance fraud, from the heartbreaking to the hilarious, the academic to the anecdotal, and discusses where we've gone wrong in dealing with those affected. Show Notes: [1:08] - Becky runs a Twitter account where she spends a lot of time wasting the time of romance fraudsters. [2:38] - An unintended consequence of messing with fraudsters, Becky became a sounding board to victims of romance fraud. [4:56] - Once you engage with a fraudster, your name is put on a "sucker list." [6:13] - Becky explains what romance fraud is. [7:22] - Victims of romance fraud are generally assumed to be lonely, middle-aged women, which is a stereotype. [8:27] - The media sensationalizes victim stories, but this could happen to anyone. [9:53] - There's not a lot of services and support for victims of romance fraud. [11:40] - The damage extends farther than the financial loss. [13:43] - When it comes to scams, we focus so much on a victim "falling for it" which implies that they are somehow complicit. [16:31] - Becky describes an experience she had as a victim of fraud. [18:19] - Coercive control is at the center of all types of romance fraud. [19:56] - Becky explains confirmation bias and its prevalence in all types of scams. [21:25] - Romance fraud is really hard to deal with because it involves the heart. [22:43] - Becky shares how scammers usually start conversation and how they navigate getting you on a different app. [26:44] - In addition to social media and dating apps, fraudsters also send messages on online games. [28:07] - Another common technique is for scammers to pretend to be a celebrity. [31:24] - A very successful tactic is when fraudsters pretend to be a part of a charity. [34:18] - Becky explains the inspiration behind the title of her recent book. [35:56] - We should be looking out for our friends and family. [37:21] - If we see something happen, how can we help someone? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Death to Spinach on Twitter

Apr 17, 202441 min

Ep 215Scams Exploiting Emotions with Alan Castel

We can easily stereotype those we believe are susceptible to a scam. But the scammers are keeping up with current events and are prepared to take advantage of our basic human emotions. The impact of these frauds is underreported due to the shame and embarrassment. Today's guest is Alan Castel. Alan is a Psychology professor at The University of California Los Angeles. He studies learning, memory, fraud, and aging. His work has been featured in The New York Times, Wall Street Journal, and Time Magazine. He recently published a book entitled Better With Age: The Psychology of Successful Aging. Show Notes: [1:08] - Alan shares his background and what he focuses on as a psychologist. [3:33] - We are all susceptible to scams, regardless of the stereotypes. [5:50] - Scams focus on our human nature of trying to make sense of the world and our emotional brain. Scams prey on our basic emotions. [7:34] - Scams are tailor made to expose our vulnerabilities. [8:50] - Some scams are situational and can be completely believable. [10:05] - There are people who are much more vulnerable to scams, but it's not based on stereotypes. [12:48] - Education and awareness can come from podcasts like this, but it also needs to come from people who have experienced a scam. [15:33] - Although scams don't only target older adults, the elderly tend to be more susceptible to scams that target their need to help others. [18:19] - There are some phrases that aren't always recognized as false because they sound scientific. [20:48] - There are websites and organizations that support scam victims, and it is highly recommended that you report anything that happens. [22:32] - Alan admits that he has fallen victim to a scam on a website, entering his credit card information to purchase something. [26:37] - Alan describes a reinforcement schedule, which is a psychological tactic to build relationships. [28:10] - Scams are clever and Alan sees their potential to use psychological principles to part people from their money. [32:30] - How does memory play a role in scam vulnerability? [35:05] - Alan describes the "foot in the door" technique. [37:02] - It comes down to curiosity as human nature. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Alan Castel at UCLA Alan Castel on LinkedIn

Apr 10, 202441 min

Ep 2143 Types of Insider Fraud with Claire Maillet

In this episode, we're shining a light on a pervasive threat that often lurks in the shadows of corporate environments: insider fraud. We'll explore the insidious nature of insider threats, the various forms they can take, and most importantly, how organizations can arm themselves with knowledge and strategies to mitigate these risks effectively. Today's guest is Claire Mailet. Claire is an award-winning financial crime prevention expert and has worked in the field for over ten years. In her spare time, Claire assists universities in the UK to support staff and students who stammer and she's currently undertaking a part time Ph.D at the University of Portsmouth, looking at internal fraud in FinTechs. Show Notes: [1:05] - Claire shares her background and what she does now in her career. [5:18] - The growth of counter-fraud in academia has increased in the last few years. [6:31] - Insider fraud is a type of fraud that isn't really well known right now. It is under researched and underestimated. [7:59] - When people think about fraud, they think about the customer. They will very rarely think about people on the inside. [9:09] - What is insider fraud? [10:13] - An underestimated form of insider fraud is when employees who leave a company aren't removed from internal systems and still have access. [12:50] - Organizations need to have vetting measures in place at the time of onboarding to ensure fraud is not committed on a CV. [15:18] - The more in depth you can go, the more safe and secure you are. [16:41] - Deterrents get lost when prevention is focused on. [18:35] - Cost is a real issue for many companies. [21:35] - Companies need to get on board with the idea of having things in place for protection. [23:40] - Current employees working from home can be a risk to data. [27:07] - It doesn't matter how ethical and good someone is. [30:22] - In a lot of startups and small businesses, business owners will hire best friends or family members over someone who can best do the job. [33:50] - What could someone's motivation be to commit insider fraud? [36:30] - There are a lot of different ways to commit insider fraud, such as falsified time sheets and information on a resume. [38:42] - For every possible way a person can commit fraud, there needs to be something in place. Owners need to think through these possibilities. [40:27] - The whole business needs to be involved in the education and prevention of fraud. [42:20] - It is common for employees to think that if "fraud" is not in their job title, they don't have to worry about it. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Claire Maillet on LinkedIn Fraudible Podcast

Apr 3, 202446 min

Ep 2135 Fraud Vulnerability Factors with Martina Dove

Understanding our cognitive biases can help us realize that we sometimes are too trusting of emails, texts, or calls from someone we perceive to be an authority. Today's guest is Martina Dove. Martina is a researcher with a fervent passion for fraud prevention. Her expertise focuses on persuasion, scam techniques, and individual characteristics that make people susceptible to fraud. She is passionate about fighting fraud by teaching people how to spot scammer techniques and has recently published a book on fraud psychology. Show Notes: [0:50] - Martina shares her background in cybersecurity and what she does in her career now. [1:56] - Martina learned a lot about techniques scammers use by noticing cognitive bias. [3:27] - Through interviews with scam victims, Martina learned that it is not always the case that victims are just gullible. She has also been scammed. [5:48] - One of the scales that Martina developed is about how people perceive authority and how gullible they think they are. [7:03] - There are five fraud vulnerability factors: compliance, impulsivity, decision time, vigilance, and the belief in justice. [9:57] - Somebody who follows rules more than breaks them, there's a persuasion technique that scammers use to dupe them. [11:19] - We tend to rationalize why bad things happen to other people. [13:06] - When we are under visceral influence, we lose our ability to reason. [15:42] - Some scams evoke social norms, especially in charity scams and fake social media posts. [19:06] - Scammers are always one step ahead. [21:37] - A good scammer will go a long way to support their story. [23:20] - Websites are very believable. How can you tell when one is legitimate? [24:36] - Fraud situations are complicated because no two human beings will be the same. [26:44] - Even if you have to lie, make it a rule for yourself to not make a decision right away. [29:20] - Scams work because humans are vulnerable and can be persuaded. [30:47] - Martina describes the way scammers control the conversation with a victim. [33:51] - The grooming component of fraud is hard to break. [35:17] - Prevention is always better than intervention. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Martina Dove's Website Martina Dove on LinkedIn The Psychology of Fraud, Persuasion, and Scam Techniques by Martina Dove

Mar 27, 202439 min

Ep 212Hacker Tactics with John Hammond

The tech world is ever-changing and it can be difficult to keep up. As businesses and individuals, it's important to remember to keep your software up to date and apply patches as they are released. Today's guest is John Hammond. John is a cybersecurity researcher, educator, and content creator. As part of the Adversary Tactics Teams at Huntress, John spends his days analyzing malware and making hackers earn their access. He is an online YouTube personality showcasing program tutorials, malware analysis, dark web threats, and other cybersecurity content. Show Notes: [1:01] - John shares his role at Huntress and his side work as a YouTuber that creates content to help educate people about cybersecurity. [2:26] - John explains how he found himself in cybersecurity as a career. [4:10] - He hasn't been a victim of a scam, but in his pursuit of catching hackers in the act, he has certainly been a target. [5:25] - What is doxxing and how can someone track down your information? [7:23] - When popular software is compromised, it is a really big deal. [9:22] - There's a balance between companies releasing information about a threat and that information causing more damage. [13:17] - It is so important to update software and patch right away. [15:22] - Consumers are not always on the lookout for patches and updates. It's crucial for companies to relay this information. [17:49] - One tactic for hackers is the use of remote software to access devices. [19:37] - It is best practice to not allow anyone to use your computer. [21:28] - Since 2020, there has been an increase in people working from home, which means that company devices are now out of their safety and control. [23:54] - John describes the People's Call Center collaboration and the mission of bringing the fight back to scammers. [25:28] - John explains some of the tricks he has used to social engineer the scammers right back. [29:43] - The experience of keeping someone from being scammed or even just making a scammer's life more difficult was rewarding for John. [31:09] - What is the dark web? [35:09] - John shares why he interacts on the dark web to research and learn how threat actors operate. [39:02] - By researching on the dark web, John has learned a lot about how cybercriminals work and think. [41:01] - Some of the ways cybercriminals work are better and more successful than some legitimate businesses and startups. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest John Hammond on YouTube John Hammond on LinkedIn

Mar 20, 202442 min

Ep 211Top 5 Supply Chain Risks with Kevin Kumpf

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving. Today's guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms. Show Notes: [0:54] - Kevin shares what he does in his current role and his background in the industry. [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority. [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim. [6:53] - It comes down to ownership. [8:19] - Know your baseline and who is responsible. [10:07] - Kevin makes an analogy to help us better understand the supply chain. [12:30] - Most of the time, people don't know where and how their data is being transferred back and forth. [14:12] - You trust a process and then when something breaks, how do you find out about it? [17:01] - Kevin describes an example of observing an organization's work and discovering crypto mining. [19:51] - What should be asked about the organization's environment? [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses. [23:27] - Where do all of these components come from? [26:47] - Kevin points out the challenges in the cybersecurity legislature. [28:46] - Ask questions and accept the answers. Determine what is acceptable risk. [31:22] - The trickle down of data is really what the supply chain is. [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches. [35:48] - If you don't know what is normal, you won't know what is abnormal. This is why knowing the baseline is so important. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cyolo Website Kevin Kumpf on LinkedIn

Mar 13, 202437 min

Ep 210The Risks and Rewards of Cryptocurrencies with Natalie Brunell

There are significant risks to be aware of when using crypto and over the past two years, many tokens have imploded. As you choose to invest digitally, do your research and understand the commodity that you use. Today's guest is Natalie Burnell. Natalie is the host of the #1 woman-led show in the bitcoin space, Coin Stories. She is a bitcoin educator, a frequent media commentator, and an award-winning journalist. Show Notes: [0:50] - Natalie shares her background and the mission behind the Coin Stories Podcast. [2:19] - Learning about bitcoin gave Natalie a little more hope as she came from having no background in financial literacy. [3:48] - Anyone can issue a token and it is hard to tell what cryptocurrency is legitimate. [6:42] - There are some that are regulated and unregulated. Natalie shares some red flags. [8:09] - Choosing to work with companies that are Bitcoin only is one way to stay safe because of regulatory clarity. [10:01] - A major red flag is overpromising and guaranteeing unrealistic returns. [11:59] - Longevity should stand out. [14:08] - Natalie explains how Bitcoin custodians work and how you can take your own custody of Bitcoin. [16:29] - Self-custody could be intimidating, but it just takes a few steps to learn. [19:15] - Natalie shares a clever analogy to make the concept easier to learn. [20:47] - Bitcoin offers more privacy than other monetary technology. [22:38] - There are a lot of frictions in banks and the system is ultimately very fragile. [26:07] - If exchanges receive Bitcoin and they don't know where it came from, they are contacted by agencies like the IRS. [28:56] - The knee-jerk reaction to people wanting privacy is to assume that they want to do something bad. [31:17] - Look for verified accounts to interact with. Be careful if someone says they'll send you money. [33:39] - Some companies are trying to help people recover their funds. But most of the time, it is impossible. [34:50] - If you send your money somewhere, you are likely not getting it back. [36:40] - Natalie has several tutorials on her YouTube channel that can help you protect yourself and your money. [38:52] - Bitcoin the block chain was built beautifully for security, but that means it can only fit so much. Bitcoin is "slow" for a reason. [41:20] - Consider Bitcoin built in layers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Coin Stories Podcast Natalie Brunell on YouTube

Mar 6, 202443 min

Ep 209Tax Scams with Richard Gilbert

In this episode, we uncover the intricate web of tax-related scams that prey on unsuspecting individuals every year. From phishing emails promising tax refunds to elaborate identity theft schemes, join us as we expose tactics used by scammers to exploit fear and ignorance during tax season. Today's guest is Richard Gilbert. Richard is the Director of the Examination Division with the North Carolina Department of Revenue. He has been with the department for over 25 years. He is a licensed CPA and has received his Bachelor's of Business Administration from North Carolina Central University. Show Notes: [1:10] - Richard shares his background and what he does in the Examination Division at the North Carolina Department of Revenue. [2:38] - Taxes can get very complicated for a lot of people. [5:17] - The vast majority of tax professionals do their job well and serve their clients honestly. But there are some people who don't focus on the right thing. [8:09] - Tax preparers who say they can get you the largest return, ask questions. [9:36] - Like any other business you employ, you should ask for references. [11:43] - If you can afford a CPA, hire one. [12:39] - Be wary of YouTube tutorials and advice. You are responsible for your taxes and if you are audited, it is all on you. [13:52] - Richard shares some of the things that a good tax preparer will ask for. [15:11] - There are scammers that will try to file someone else's tax return before they do and direct their refund somewhere else. [17:49] - There are things in place that slow down the process that can be frustrating, but are there to protect you. [19:29] - It is highly recommended to file your tax return as early as possible. [20:10] - You will never be contacted over the phone, via text, social media, or email by a legitimate tax collector. It will always begin through the mail. [21:28] - If someone is telling you there is only one way to make a payment, be suspicious. [24:33] - The biggest problem in mail correspondence is when people do not respond. Open your mail especially during tax season. [26:31] - There is a form of identity theft in which people use another person's Social Security number to gain employment. [28:06] - Be sure that you have everything available to validate your identity when verification is asked for. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest North Carolina Department of Revenue

Feb 28, 202431 min

Ep 208Virtual Kidnapping with Titania Jordan

In this episode, we shine a light on the sinister phenomenon of virtual kidnapping. From deceptive phone calls to the psychological manipulation tactics, join us as we delve into the dark world where fears are exploited for profit, leaving victims shaken and families torn apart. Today's guest is Titania Jordan. Titania is a nationally renowned tech, social media, and family expert who has appeared on programs such as the Today Show, Good Morning America, Fox News, CNN, and more. She is the author and founder of Parenting in a Tech World and serves as Chief Parent Officer of the online safety company Bark Technologies. Show Notes: [1:06] - Titania Jordan shares her background and what she does at Bark Technologies. [3:04] - Virtual and cyber kidnapping are the same thing. Anything that involves kidnapping without actually moving a person's physical location against their will. [4:26] - Titania explains a recent event in which an exchange student was targeted. [6:18] - Children and adults alike are targeted everyday, but Titania explains that older teenage boys are heavily targeted and impacted. [9:20] - Another type of scam is actually targeting the family and loved ones of someone to require a ransom for a kidnapping that hasn't happened. [11:17] - Built-in location services are very helpful. Parental controls and alerts are also something important to have in place. [13:53] - Be careful answering the phone from a number you don't know. [16:20] - Contact law enforcement immediately if this is something that happens to you. [19:51] - It is never a bad idea to be prepared. [22:17] - These events are opportunities to have really important conversations with your children. [24:41] - Flip the script and ask your children to help you do a safety audit. [27:52] - If it feels off, it probably is. Don't hesitate to report it and talk about it. [30:26] - Bark Technologies offers a lot of programs and even a family smartphone that can help keep kids safe. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Bark Technologies

Feb 21, 202431 min

Ep 207Balancing Privacy, Security, and Accountability with Kurt Long

In this episode, we navigate the ever evolving landscape of messaging app dynamics, examining the challenges and opportunities in striking the right balance between preserving user privacy, ensuring robust security measures, and maintaining accountability in an ever changing digital landscape. Today's guest is Kurt Long. Kurt is an entrepreneur with over 25 years of experience in starting, growing, and building Information Security and Privacy businesses. Kurt is the Executive Director of The Long Family Force for Good Foundation which focuses on supporting not-for-profits dedicated to improving the mental health of families and children. Kurt is also the Co-Founder and CEO of BUNKR. Show Notes: [1:09] - Kurt shares his background and what he does through The Long Family Force for Good Foundation and BUNKR. [5:01] - He found himself interested in technology and the idea of doing something bigger than himself with a team. [9:26] - Currently, Kurt's work is directed to messaging apps. [13:22] - In the early days of messaging, there was an inherent trust. We didn't think about the bad guys yet. [15:57] - Communication platforms were never intended to secure communication. [17:31] - Most communication apps now do begin with good intent. Kurt describes WhatsApp as an example until it was purchased by Facebook. [19:50] - We want information and access, but we want safety, too. [21:38] - We have to put trust in someone to strike a balance. [23:41] - The Federal Trade Commission has announced apps that don't support legal due process and implemented a fine for use of them. [25:56] - Kurt shares a true story that is a great example of inside trade problems in messaging apps. [28:28] - Using secret messaging apps or apps that feature disappearing messages are hard to track. You could be affiliated with someone doing something illegal. [30:29] - Privacy and security do help us retain rights we have. [32:35] - Messaging issues also impact the medical industry. [34:07] - Some countries have legislation that ban secret messaging apps, but they aren't really being enforced. [36:25] - BUNKR has consumers and public usage in 32 countries worldwide and is popular with families. [37:52] - When companies have more control over their app, there is less criminality involved. [40:02] - This service is invitation based. You cannot receive random messages from anyone you do not invite. [41:55] - "The entire planet deserves to conduct their affairs with dignity at bank level security." [44:29] - Kurt leans towards following United States laws and legal action, but also has a large legal team to help guide through unusual situations. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest BUNKR

Feb 14, 202450 min

Ep 2065 Alerts to Prevent Identity Theft with Paige Hanson

The fundamentals of scams are the same. However the technology used is increasingly more clever. It is important to know how to spot identity theft and credit card fraud and where to report it if and when it happens. Today's guest is Paige Hanson. Paige is an authority in consumer and digital safety with nearly 20 years of experience in identity management. As co-founder and Head of Communications and Partnerships at Secure Labs, Paige has dedicated her career to protecting consumers and businesses from identity theft and cyber threats. She is a certified Identity Theft Risk Management Specialist and holds a certificate in Identity Leadership from the University of Texas. Paige also serves as an advisory board member to R.O.S.E. (Resources/Outreach to Safeguard the Elderly). Show Notes: [1:16] - Paige shares her background and what she does in her current roles. [3:02] - She worked with LifeLock in the early days of her career, but the experience led to her expertise in identity theft now. [6:08] - Chris shares what happened to a friend and their experience with identity theft. [7:40] - The Federal Trade Commission has an Identity Theft Affidavit. [9:25] - If you pay a bill that was made by a fraudster, it will be considered that you made the charge. Paige explains what best practice is. [12:06] - Always watch your credit card bills and take note of things that look unusual. Pay attention, even to the small charges. [13:47] - Notifications from your credit card company are a must have. [16:07] - Sometimes the notifications can seem annoying, but when something is out of the norm, these tools are critical. [17:48] - When you get an email that includes a link to login to an account, even if you recognize the sender, don't click it. Develop the habit of using your browser. [20:22] - It can happen to anybody! Chris and Paige are security-minded, but it could happen to them as well. [22:48] - Paige shares an experience of noticing charges that she did not make and how noticing it early, she could cancel the order. [24:29] - Always use multi-factor authentication. Paige also recommends using an app in addition to what is included with your credit card company. [26:37] - Check links and make sure they are correct. [29:02] - At one time, Chris owned a business and shut it down because of the number of people making a fraudulent order. [30:45] - Online shopping and online payments are so common and a credit card doesn't even need to be present to make a purchase. [32:35] - Paige explains how skimmers work and how they store card numbers. [35:19] - The likelihood of this happening is slimmer than other scams, but there are low-inconvenience and low-cost preventative measures you can take. [36:07] - The safest way to make in person payments is through mobile pay. If a location is breached, it doesn't have your card info. [37:18] - If you use mobile pay, it is crucial that you keep your operating system up to date. [41:23] - When it comes to ATMs, it is best to go inside your bank's branch and use the one inside. The worst ATMs to use are stand alone that are not attached to a bank. [44:33] - Identity theft could be accomplished by fraudsters by just taking advantage of low hanging fruit. [46:29] - Paige recommends using a credit card rather than a debit card. [49:11] - When traveling, Chris has a specific card that limits the amount of loss in the event of an issue. [52:47] - Using a service like PayPal helps with keeping things updated on accounts. [54:33] - When we make a convenient choice, we need to consider all the parts of risk management. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest SecureLabs

Feb 7, 202455 min

Ep 205Advances in Everyday Tech with Leo Laporte

Advances in technology are increasing at a rate we've never experienced before. Many will need to decide how much privacy they're willing to give up for the sake of convenience and the impact that AI will have on that decision. Today's guest is Leo Laporte. Leo is a broadcaster, author, tech pundit, the former host of The Tech Guy weekly radio show, and the founder and host of Twit.tv which is a podcast network focused on technology. Show Notes: [1:20] - Leo has been in broadcasting since 1976. He explains how he got into the industry. [5:02] - Eventually, Leo found himself learning more about technology which led to him writing for magazines. [9:32] - In 2004, Leo started a podcast network. [13:02] - Podcasting didn't peak until 2018 and Leo already had a lot of podcast content online. [15:13] - Leo explains that if he were to start Twit.tv now, it would be a completely different business. [19:01] - Although technology has advanced, Chris admits he still loves listening to the radio and often has it on in the background. [21:40] - What motivated Leo to keep up was the terror and desperation callers showed when asking him questions. [24:09] - The goal has always been to educate people on technology but it is harder now than ever with how fast things are changing. [26:46] - A common problem right now is pig butchering. It is also becoming more and more apparent that many scammers are laborers. [31:04] - People in the field have to have the hope that people are good and we can help each other. [32:29] - Leo shares the experience of his ex-wife falling victim to a scam. [35:14] - A lot of people have the misconception that social media sites like Facebook operate like smaller businesses. [37:22] - Initially, AI like ChatGPT was pretty basic, but as it improves over time, scammers will be even stronger. [39:42] - What sounds impossible right now will be not only possible but a reality soon. [42:37] - If you are willing to give up some privacy, there are some real benefits you will get out of that. [44:17] - Leo shares what he expects will be available by the end of this year. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Twit.tv

Jan 31, 202449 min

Ep 204Financial Exploitation of Older Adults with Joyce Petrowski

Our golden generation, rich with wisdom and experience, unfortunately often finds itself in the crosshairs of deceitful schemes. In today's episode, we shine a spotlight on the tactics employed by scammers, share real-life anecdotes, and provide practical advice to help safeguard our beloved seniors. Today's guest is Joyce Petrowski. Joyce started her professional career in the public accounting sector and is an accountant and tax preparer. As an avid volunteer and philanthropist, she shares her focus on the non-profit sector and co-founded a non-profit in 2014. Since leaving that non-profit in 2021, she saw a need to educate people, especially the older adult population about the financial scams and how to protect themselves and their hard earned assets. In August 2021, Joyce founded R.O.S.E. (Resources/Outreach to Safeguard the Elderly), with the mission to prevent financial exploitation and frauding older adults through advocacy and education. Show Notes: [1:16] - Joyce shares her background and the mission of her non-profit, R.O.S.E. [3:42] - R.O.S.E. provides education and resources for older adults so they are aware of how these scams are happening. [5:54] - When speaking and meeting with people, Joyce sees the hesitation in people coming forward with past experiences with scams. [8:01] - It has been difficult for the general population, specifically the older generation, to keep up with the evolution of scams and red flags. [9:38] - The first sign that should raise some suspicion is unexpected contact. [12:07] - There is an option in your phone that can silence calls from unknown numbers so there is no accidentally answering scam calls. [15:03] - If you're not sure, talk to somebody else that you know and trust. Them asking questions might help you determine if it is a scam. [18:51] - Many older adults feel uncomfortable sharing their experiences with their children to avoid losing their independence. [21:18] - Scammers don't discriminate. They don't care about age, gender, or even how much money you have. [23:34] - It can be very confusing and overwhelming when considering the ways to deal with this problem. [26:00] - Joyce shares some of the things that scammers are looking for and why it can be easy for them to get a victim into an emotional state. [29:44] - Scams are very sophisticated now compared to just ten years ago. [31:45] - Everybody needs to be aware and have conversations about this with the older adults in their lives. [33:17] - Joyce has recently started a podcast called Let's Talk About Scams. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest R.O.S.E. Resources/Outreach to Safeguard the Elderly Let's Talk About Scams Podcast

Jan 24, 202437 min

Ep 203Advances in Crypto with Bam Azizi

There are so many things to learn about utilizing crypto, understanding the benefits as well as the benefits. It can be used to save time and money, but you need to be careful and only interact with reputable companies. Today's guest is Bam Azizi. Bam is a tech entrepreneur and the co-founder and CEO of Mesh, which provides FinTech companies with a seamless and secure one-click system for users to transfer their assets for deposit, payment, and payout. He previously founded No Password, a cybersecurity identity company acquired by LogMeIn in 2019. Show Notes: [0:53] - Bam shares his background and current endeavors with Mesh, of which he is co-founder and CEO. [2:26] - Bam explains how he found himself working in FinTech with his background in cybersecurity. [5:01] - You cannot educate every single user on the planet. People make mistakes all the time and there should be no shame about that. [7:37] - Defense needs to get it right 100% of the time, but to move the scam forward, the scammer only needs to get it right once. [11:01] - Security and compliance act like guardrails. [12:30] - There are mechanisms in place that can protect users, but there are pitfalls and disadvantages. [13:41] - Crypto is like any other type of data, but how it is stored is different. [14:57] - Crypto is inherently secure, but transit becomes a problem. [17:34] - Sometimes, you just don't know who you are sending money to or if the company receiving funds is legitimate. [19:40] - Bam explains what happens when we initiate a transaction and try to rescind it. [22:02] - We should be able to identify the people interacting with blockchain. [23:40] - The industry wants crypto to be adopted world wide, but if that were to happen, some things need to be accepted. [24:48] - The blame can't be placed on one entity. [26:40] - One major benefit to crypto is global transfers. [30:44] - There are a lot of moving pieces when it comes to crypto and you never actually see it. It's hard to think about in-transit security. [33:30] - There is a huge pushback against crypto from banks and financial institutions. [35:09] - Crypto has been demonized to some extent, but as a technology and the advances we will see in coming years, it's not inherently bad. [37:34] - We can build practices and mechanisms that can prevent collapses. [40:36] - There are some risks in using crypto but some risks are much bigger than others. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Mesh Payments Website Bam Azizi on LinkedIn

Jan 17, 202444 min

Ep 202How Minds Change with David McRaney

There are times we can answer a question without much thought. If we were to examine the reasons why we gave the answer, would we change our response? Today's guest is David McRaney. David is a journalist, author, and lecturer fascinated with brains, minds, and culture. He has created a blog, book, and ongoing podcast entitled You Are Not So Smart which is about self-delusion. His most recent book, How Minds Change, is all about the science behind how and why people do and do not change their mind and the intricacies and nuances of persuasion. Show Notes: [1:09] - David shares what he does as a science journalist and how he found himself interested in the topics he writes and speaks about. [4:38] - The way people work has always fascinated him. [6:50] - David shares a story about psychology that really excited him. [8:35] - In the height of blogging's popularity, David began his blog You Are Not So Smart. [9:57] - David explains what the Introspection Illusion is. [12:31] - If you want something, you will come up with reasons why. [13:40] - An example of this is when you share what you like about another person. [15:59] - This concept can be looked at as delusion, but it's really just how brains work. [19:30] - What do you have in place to approach your own feelings and beliefs? [23:08] - David and Chris go through an exercise to demonstrate guided metacognition. [27:00] - We can answer some questions quickly, but others need more thought. [30:00] - The technique that David demonstrated is used to allow people more introspection. [32:22] - Start with things that you love and practice this technique. [33:37] - David and Chris talk about conspiracy theories and how to improve critical thinking. [35:27] - ConspiracyTest.org is a site that gives you a score on how susceptible you are to conspiratorial thinking. [37:48] - Conspiracy theories seem much more prevalent now, but conspiratorial thinking is no more rampant than it has been in the past. [39:32] - What should we do if a friend or family member has fallen into conspiratorial thinking? [42:17] - Finding reasons to rationalize conspiracy theories has never been easier with the internet. [44:31] - There are reasons that some people are more attuned to this thinking and some are more skeptical. [48:36] - Think about a scenario and imagine your initial reaction. [49:33] - Build rapport and assure the other person that you are not out to shame them. Get out of the debate frame. [52:01] - You can have conversations that don't end in a dead end. [55:13] - Reactance is when someone takes away your agency. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest David McRaney's Website The Conspiracy Theory Test You Are Not Smart Podcast

Jan 10, 202458 min

Ep 201The Intersection of Technology and Domestic Violence with Audace Garnett

The advent of technology has created both advantages and challenges for people trying to protect themselves from harmful situations. Being aware of the capabilities of the technology around us, the data that can be collected, and how it can be accessed can lead us to being physically safer. Today's guest is Audace Garnett. Audace provides assistance nationally and internationally supporting crime victims and domestic violence survivor organizations. She worked at the Brooklyn District Attorney's Office where she served as Teen Services Coordinator in the Victim Services Unit. She is current a Technology Safety Project Manager with Safety Net at the National Network to End Domestic Violence, where she focuses specifically on the intersection between domestic violence, sexual assault, stalking, and technology. Show Notes: [1:12] - Audace shares what she does with Safety Net and the National Network to End Domestic Violence. [5:18] - 97% of cases include tech misuse, but Audace explains that domestic violence is very underreported. [8:06] - Technology is not the problem. It's the person behind the technology that is causing harm. [9:22] - A common problem is the sharing of images without consent. Victims can report this to StopNCII.org. [11:42] - Survivors should trust their instincts. [13:17] - Audace shares some tips on protecting online identification. [15:54] - A major and unfortunately common concern and problem is location tracking through mobile devices. [18:25] - Tracking devices like Airtags and apps on smartphones can alert abusers of your location. [20:33] - Some vehicles also come with integrated GPS tracking. [22:14] - Although these services and tracking/monitoring devices can be used maliciously, the technology itself is not the problem. [24:20] - Another technology misuse possibility is abusers interacting in a victim's social media platform as the victim. [25:56] - The impact of this interferes greatly with day to day life. [28:11] - The Domestic Abuse Hotline is a space to not only report domestic violence, but they can also help with support, resources, and a plan. [30:20] - How can community members help with this problem and build awareness? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest National Network to End Domestic Violence StopNCII.org

Jan 3, 202432 min

Ep 2004 Ways to Reduce Cybercrime with Roger Grimes

Social engineering has become so creative and clever with the ways scammers are trying to infiltrate your world. AI and deep fakes are only going to make things worse. Over the past 30 years, fighting viruses and malware has only increased with no end in sight. Today's guest is Roger Grimes. Roger is a Data-Driven Defense Evangelist for KnowBe4. He is a 34-year computer security expert and an author of 14 books and over 1,300 articles on computer security. Show Notes: [1:06] - Roger shares his background and his drive to continue writing in the field of computer security. [3:17] - In his career as an accountant, Roger found himself more interested in the computer side of things. [7:45] - Things have gotten worse every year. Ransomware has attacked hospitals and law enforcement in addition to personal devices. [10:21] - In many cases, older devices are very hard to replace. [11:44] - Most employees of a company don't know how devices work when it comes to security and things go without updates and patches. [15:10] - Some companies are getting better about making sure products are set to auto-patch. [16:20] - Social engineering is involved in about 70-90% of all successful hacks. [17:23] - Compromised credentials is another common way hackers are easily able to gain access to accounts. [19:38] - Social engineering is all about getting you to perform an action that is harmful to yourself or your organization. [19:50] - Three qualities to look for: unexpected, asking you to do something you've never done before, asking you to do something harmful. [21:12] - If something has those qualities, slow down before clicking anything within an email. [23:26] - Really good scammers will prepare you for the scam. [25:06] - It is hard to retrain yourself to think about these things during any communication. [27:14] - People shouldn't get in trouble with their organization for taking precautions. [29:47] - Scammers prey on vulnerable populations, including the elderly. [32:10] - Always remember that no legitimate organization accepts payments in gift cards. [34:10] - The best we can do right now is educate people to help prevent successful scammers. There's no stopping it. [36:04] - Try to use a MFA that is phishing resistant. [38:55] - Roger shares the experience of his fingerprints being stolen. [41:20] - Security questions are surprisingly guessable in a lot of situations. Your password might not be guessable, but the security questions aren't always secure. [44:31] - Roger shares some data about patches and what is important to remember. [48:31] - Roger sets a time every few months where he sits down and changes every single one of his passwords. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest KnowBe4.com Roger Grimes on LinkedIn

Dec 27, 202353 min

Ep 199Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier

As we approach the next season, threat actors will be keeping a close eye on dating apps. These apps have become a prime target for threat actors due to the size of the market expanding to over 300 million users and the rich information stored in these apps. Today's guests are Jason Kent and Will Glazier. Jason is a hacker-in-residence at Cequence Security. He has a diverse information security, networking, and IT background and a generous level of knowledge for most pieces of the IT spectrum including firewalls, security architecture, security controls, and security infrastructure. Will Glazier is the Head of Threat Research at Cequence Security where they protect some of the world's largest brands from sophisticated bot attacks and threats against the public facing APIs. Will has a background in fraud abuse and prevention as well as building threat intelligence systems. Show Notes: [1:18] - Jason and Will share their backgrounds and current roles at Cequence Security. [5:24] - As common as scams and fraud are, even Jason and Will have personal experience with them. [7:39] - Dating app attacks are particularly hard because they prey on vulnerable people. There are so many cases, that there should not be shame around talking about it. [9:32] - The first red flag is when someone you are talking to on a dating app tries to get you over to texting or another app. [11:37] - In any given month, the amount of malicious API transactions that Cequence is blocking is in the billions. [13:52] - Fake accounts are constantly made but not as heavily used as taken over accounts. [16:08] - Scammers are now paying for premium accounts to appear more legitimate and the investment pays off when they scam someone. [18:11] - There are tools people can buy to make all accounts look real through automation. [19:29] - It is essential that people in a fraud department can trust the information and push it out to Cequence. [22:04] - Some organizations will pay a ransom to decrease the time wasted and money lost. In their eyes, the money lost to pay the ransom isn't as much. [26:11] - Margins are getting tighter for the bad guys. [30:31] - The infrastructure that scammers use varies. There are some that are really well known at Cequence and some that are more difficult. [32:51] - It is easier to take out one big player than to take out hundreds of small ones. [36:03] - There are human and political pressures that make things more challenging for security. [38:07] - Romance scammers are employing new tactics and switching them up. [39:48] - If you put too much trust in the platform that it makes you trust the random person you're talking to, take a step back. [42:40] - Take a look online for things that have been done by scammers historically, especially if you are new to dating apps. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cequence Security Website

Dec 20, 202345 min

Ep 198The Changing World of Data Breaches with Troy Hunt

Everyone who's on the internet is exposed to risk. Every time you set up a new account or app, you create another place where your data can be hacked or breached. This makes your differing passwords crucial. Today's guest is Troy Hunt. Troy is a Pluralsight author and instructor, Microsoft Regional Director, and Most Valued Professional specializing in online security and cloud development. He is a conference speaker and runs workshops on how to build more secure software with organizations. He is also the creator of the popular data breach aggregation service known as Have I Been Pwned. Show Notes: [1:26] - Troy shares what he currently does and the work he is known for. [2:57] - You can put your data in one place and it can traverse the internet and end up in places you don't expect. [6:54] - There's a challenge in running a site that has millions of queries at any time. [9:25] - Troy shares some of the accomplishments of Have I Been Pwned. [13:32] - Does he experience a lot of malicious traffic? He used to. Troy explains how he has managed this. [18:14] - Have I Been Pwned has been around for a while and began as a lot of manual labor for Troy. [23:10] - It is crucial for organizations to be receptive to security reports. [25:09] - In a lot of ransoms, data of specific groups of people are used as threats. [27:56] - Troy lists some of the things that happen on the back end of running a site like Have I Been Pwned. [30:36] - Cloud services have been an amazing advancement in technology, but they open up more points of entry. [33:35] - There is a hierarchy of multi-factor authentication. Troy discusses the current strategies that are best practice. [35:45] - For users, what is the second-factor authentication you can manage to use? [37:27] - There are different risk levels to different things. What do you actually need to carefully protect and what level of inconvenience are you willing to bear? [39:59] - Troy shares how his parents have been impacted by confusing technology. What is the right technology for a demographic? [43:15] - Some data is more important than other pieces of information. [45:33] - Some data is also more or less important to different individuals. [46:54] - For those managing and discussing data breaches, we also need to be aware that there are pieces of data that could be important to someone but isn't important to others. [48:24] - Unfortunately, data breaches haven't gotten less common and aren't really getting better. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Have I Been Pwned? Troy Hunt's Website

Dec 13, 202352 min

Ep 197When Conservatorships Go Wrong with Diane Dimond

As people age and their physical and mental health declines, conservatorships are often considered. If you're not careful, the entire estate can be spent on management costs and abuse can occur. There are things a family can do for better outcomes. Today's guest is Diane Dimond. Diane is the author of four books and is a veteran investigative reporter for radio, TV, and print. Crime and justice is her preferred genre and she broke the Michael Jackson story twice. Currently abusive guardianship and conservatorships are her focus. Show Notes: [0:55] - Diane shares her background as an investigative reporter. [2:48] - Her recent book We're Here to Help: When Guardianship Goes Wrong is all about the possible pitfalls and risks of conservatorships. [5:15] - Diane explains how guardianship and conservatorship is granted. [6:21] - In a lot of cases, Diane has found that judges assume if conservatorship is being asked for that the family is dysfunctional. [8:59] - Guardians are paid out of the ward's estate and many charge an outrageous amount of money. [10:31] - The most public conservatorship that went wrong was Britney Spears's. But some celebrity guardianship scenarios have been beneficial. [12:29] - Diane firmly believes that guardianship needs to be harder to establish. [14:06] - Anybody can initiate a petition. [17:14] - Once it is in front of a judge, it can become a catch-22 situation. [19:11] - Every state is different and many are starting to pass some reform. Florida in particular is a terrible state for this system. [20:42] - SEAR is a very useful resource if you are in an abusive guardianship situation. [23:07] - It is almost impossible for the ward to make any decisions. [25:50] - It is you against a whole system. [27:52] - Unfortunately there is a lot of criminality that is possible. [29:51] - It isn't impossible for abusers to be caught and punished, but it is not common. [31:59] - There are alternatives to guardianships that really should be considered. [34:21] - If these abusers were punished, they would go somewhere else and commit a different crime, but they would at least leave these vulnerable people alone. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest We're Here to Help: When Guardianship Goes Wrong by Diane Dimond Diane Dimond Website

Dec 6, 202337 min

Ep 1965 Things to Teach Your Kids About Predators with Michael Buraimoh

Many parents assume that their children will never be groomed by a predator and then miss the opportunity to educate their kids on the techniques that are used. Every child, regardless of gender, can be manipulated and tricked into making poor choices and put themselves in dangerous situations. Today's guest is Michael Buraimoh. Michael joined Breck Foundation as CEO in January 2022. He is dedicated to the foundation's mission to create a better online world for children and young people and is helping take the foundation's important work to new heights. He is an author, and having his own children inspires him to create a safer digital world for them to grow up in. Show Notes: [1:01] - Michael shares the background and the reason behind the creation of the Breck Foundation. [4:02] - Michael's own background is in criminal justice, specifically with young people. [6:23] - It is crucial that parents are honest and open with their children about this discussion. [7:51] - Ignore the misconceptions about grooming. [10:37] - Safety doesn't mean having to put every form of digital activity aside. Parents need to be involved. [12:07] - Trust is the key to ensuring that a child will tell their parents things that are happening online. [14:05] - There are signs to look out for that could be indicative of something going on. [16:32] - It can be hard to determine what is unsafe and what is normal teenage conversations, but it's important to be aware of red flags. [18:11] - Young people now are digital natives. They have to be able to engage online. [19:52] - There is a place and time for parental controls and limiting access, but relationships are far more important. [21:42] - The Breck Foundation educates parents but also the children and young people themselves. [23:08] - Young people need to know that if someone is trying to isolate them from their friends and family through secret conversations, something isn't right. [24:52] - Look for a trusted adult to report to. For parents, contact authorities. [28:30] - Screenshot, shutdown, and report. The Breck Foundation has a lot of resources for this education. [31:51] - Play virtually, but live real. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Breck Foundation Website

Nov 29, 202332 min

Ep 195The Evolution of Digital Identity with Philipp Pointner

Currently we have hard copy passports and driver's licenses, but as our digital identities evolve, we may find ourselves with a worldwide digital standardized way of proving who we are. Today's guest is Philipp Pointner. Philipp leads Jumio's digital identity strategy and the initiative to enable multiple digital identity providers in its ecosystem. Prior to Jumio, Philipp was responsible for paysafecard, Europe's most popular prepaid solution for online purchases. Show Notes: [0:53] - Philipp shares his background and current role at Jumio. [2:12] - Our online identity has changed very quickly over the last decade. [3:47] - Over time, this evolution has made people a lot more comfortable with technology. [5:50] - The changes that Philipp thinks are coming may cause problems with some countries not accepting them. [7:30] - The digital identity will likely be more secure than physical copies of important documents like passports and driver's licenses. [10:47] - Chris and Philipp discuss a recent experience in verifying the credibility of physical documents. [12:52] - With more sophisticated benefits to a digital identity comes more sophisticated attack attempts. [15:40] - Where does one turn if they are a victim of identity theft? [17:11] - Philipp believes that it should be the responsibility of an organization to ensure the end user is safe. [18:48] - Philipp shares the results of a survey that asked people if they were willing to take more steps to ensure that they were secure online, but the exception was social media. [22:02] - Education around scams is improving and increasing, but not about everything. [26:20] - The technology exists to keep people more secure, but it isn't employed as often as is necessary. [27:47] - At the end of the day, the inconvenience is always put on the end user. [29:07] - Biometrics are strong and have a lot of well governed standards already in place. [31:40] - Research shows that the requirement to change passwords every 90 days is ineffective. [32:59] - Currently, there isn't a one-stop shop to receive the education they need to better understand cybersecurity. [35:48] - Philipp and Chris talk about the recent issue with concert tickets being purchased by bots for scalping. [38:28] - The general public has become an easier target than in years past because of the increase in online activity. [40:09] - People vastly overestimate their ability to detect fake images and deep fakes. [41:42] - Philipp explains what it means to have a reusable digital identity. [43:30] - When digital identity is used to verify in the future, will users have the ability to revoke their provided information? [46:58] - Pursue education on this topic and then take action. [50:01] - Your data is definitely online and it's important to be aware of what is available for potential scammers to know. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jumio's Website

Nov 22, 202351 min

Ep 194Preventing and Reporting Cyber Attacks with Robert Karas

Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks and products. Today's guest is Robert Karas. Rob came to the Cybersecurity and Infrastructure Security Agency in 2010. He has over 30 years experience in the information security field and significant experience in building nationally recognized security platforms. At CISA, Rob built the Cyber Hygiene Program, risk and vulnerability assessments, and penetration testing programs. He has also created the Cyber Defense Education training programs to address industry challenges. Rob was also recognized by Cyber Patriot as Mentor of the Year. Show Notes: [1:03] - Robert shares his background, what he does at CISA, and what CISA does as an agency. [4:01] - At CISA, agents hack into a company's system with their permission to see where the vulnerabilities are. [5:53] - Phishing and social engineering continue to be the most successful attacks. [8:41] - A lot of times it feels like good security equals bad customer service. [10:27] - Playbooks are all the same or similar but the tools that CISA uses are unique. [12:29] - With the introduction and evolution of AI, there is some preparation to be done for an inevitable increase in attacks. [14:07] - Attackers prey on human vulnerability and emotion. [15:53] - Phishing emails are so good now that many times they really appear to come from someone you know. [17:15] - Over the last ten years, the statistics of people reporting a scam have improved. [20:16] - It is important for organizations to be prepared. For help with this, you can email [email protected]. [23:39] - CISA has implemented Secure by Design. [25:30] - If you suspect you are communicating with a scammer, stop communicating right away. [27:02] - It is overwhelming when you think about the amount of devices we have that are connected and relied on. [30:16] - The amount of data we have and can have access to is so immense. How can we inspect everything? [32:09] - When it comes to purchasing new devices, ensure that frequent updates are part of the guarantee. [34:41] - A great place to start for resources on CISA's website. Robert shares some of the resources available, including Secure Our World. [35:54] - CISA also offers free vulnerability scans for businesses. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest CISA Secure Our World CISA's Website

Nov 15, 202339 min

Ep 193Support to Navigate the Justice System with Rachel Gibson

Everyday people are falling victims to scams and fraud. Embarrassment and guilt can prevent people from reporting the incident. Not everyone is aware that there are resources available to help navigate the justice system. Today's guest is Rachel Gibson. Rachel is the Director of the Center of Victim Service Professionals at the National Center for Victims of Crime where she works to further the mission by supporting and overseeing programs for victim service professionals, providing training and technical assistance. Show Notes: [0:48] - Rachel shares her background and her role as the Director of the Center of Victim Service Professionals. [2:53] - We talk a lot about prevention work, but there aren't as many resources for what to do after an incident. [3:47] - Rachel explains the background and how the Center for Victims of Crime was founded. [5:46] - Many victims are experiencing polyvictimization and may not realize they are victims of a crime at first. [7:14] - 24-hour hotlines are available and very impactful. [8:51] - Rachel describes the different programs that she is involved in at the Center for Victims of Crime. [9:57] - Part of the work she does is helping people realize the intersection and connections between different types of crime. [12:08] - Oftentimes in these cases, this is the first time victims have been involved with the justice system. [14:02] - Maybe a victim doesn't want to go to law enforcement, but the crime should still be reported. [15:12] - Financial fraud is a crime where society victim blames right out of the gate. [16:24] - The conversation shouldn't be about who is victimized, but rather who is being targeted. [19:17] - Google is a great first step in determining legitimacy. [21:51] - Fraudsters are banking on targets not being knowledgeable. [23:55] - We have to come to the conversation with an attitude of empowerment. [26:26] - Rachel explains how partnerships are important as service professionals will likely hear about crimes. [28:47] - Legally, there's a difference between a scam and fraud. But there's always an opportunity to connect people to resources. [32:07] - Think about what someone needs in the moment. It might not be to go to law enforcement. [35:03] - Talk to your friends and family. If something seems too good to be true, it probably is. [36:24] - A big trend right now in questions and concerns is the intersection of AI and fraud. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest National Center for Victims of Crime Website Victim Connect Resource Center

Nov 8, 202338 min

Ep 192Human Trafficking Into Scam Call Centers with Matt Friedman

It's hard to imagine finding a job, advancing into a second interview, they send you a ticket to their overseas office, only to find out that you're about to be trafficked into a life of forced labor while they threaten your family. But this is happening all around the world today. Today's guest is Matt Friedman. Matt is an international human trafficking expert with more than 35 years of experience. He is the founder and CEO of The Mekong Club, an organization of Hong Kong's leading businesses which have joined forces to help end all forms of modern slavery. Show Notes: [0:57] - Matt shares his background and the extensive experience he has in this field. [2:09] - Matt explains some of the terrible situations that he has seen in human trafficking and the reason he became an activist. [5:31] - Covid-19 impacted criminal activity in China. They started to trick and deceive people into accepting a job at a scam center. [6:51] - There are tens of thousands of people who have been human trafficked into scam call centers. [9:12] - A red flag is if it sounds too good to be true. [12:15] - Matt describes the buildings these call centers are in. [13:34] - In Myanmar and Cambodia, the people being trafficked into call centers tend to be citizens of other countries. [16:04] - The scams that they are forcing people to do are pig butchering. [18:20] - Matt shares some of the types of scams that they do from these call centers. [20:28] - In these call centers, if a person does not hit their daily quota, they are beaten and tortured. [22:56] - If you think that you want to have a job opportunity overseas, you need to know without a doubt that it is legitimate and have a system in place to make sure your friends and family know where you are. [25:21] - Matt's organization The Mekong Club works with businesses on understanding scams and trafficking. [27:09] - Where does this laundered money go? [28:41] - The Mekong Club has a large social media presence in multiple languages and PSA campaigns to provide education. [31:32] - We've entered a time where scams are commonplace and it's getting harder to tell what is real and what is not. [33:40] - If we don't take action now, we will find ourselves in a situation that we cannot control. [37:33] - Share this information with other people. This is the most important step to take and right away. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Mekong Club Website

Nov 1, 202338 min

Ep 191Active Shooter Preparedness with Katherine Schweit

No one ever wants to find themselves in an active shooter situation. But if you are, it's important to know how to respond. Today's guest is Katherine Schweit. Katherine is an attorney, consultant, and retired FBI special agent who created and led the FBI's Active Shooter Program after the horrible tragedy at Sandy Hook Elementary School. She joined a White House team working on violence prevention matters, led by then Vice President Biden. She is the author of Stop the Killing: How to End the Mass Shooting Crisis, How to Talk About Guns With Anybody, and the FBI's research on mass shootings, a study of 160 active shooter incidents in the United States between 2000 and 2013. She was part of the crisis team responding to shooting incidents including at the Holocaust Memorial Museum, the Pentagon, and the Navy Yard in Washington, DC. Show Notes: [1:14] - Katherine shares her background, her experience in the FBI, and her work in the Active Shooter Program. [3:05] - In her work, she spent time with parents and families of those killed in mass shootings. [4:23] - What constitutes a mass shooting or an active shooter situation? There is no real definition. [6:10] - Most mass killings are domestic, particularly murder/suicides, but those will not show in data. Katherine explains what the FBI looks at. [8:44] - Journalists and media impact what stories are news-worthy. [10:21] - Katherine released her book How to Talk About Guns With Anyone to keep the conversation going. [13:19] - In 2020, the CDC determined that gun deaths in youth 19 and younger exceeded the deaths by traffic accidents in the same age group. [15:56] - Safety isn't about when it happens. It's about if it happens. [16:58] - The shooting at Columbine changed the way the American public viewed and feared shootings, although public shootings were not new events. [18:32] - Katherine explains the response and training of law enforcement officers during the tragedy at Sandy Hook Elementary. [21:06] - The numbers of incidents have increased but we have not seen the number of casualties increase. [25:00] - Television shows and movies create misunderstandings on what law enforcement officers and FBI agents can accomplish. [26:37] - See something, say something. [28:00] - In most cases, someone close to a shooter had information and didn't say anything. [29:48] - What do you do when something happens? People should have Run, Hide, Fight training. [32:51] - In 13% of shootings, a civilian was successful in getting in to help incapacitate the shooter. [37:40] - A simple thing to be prepared with is knowledge of the exits in your location. [39:19] - It is important when hiding to hide where there is actual cover. [40:27] - Don't stay where there is no protection. [42:51] - Shooters come in with a plan and it is always intentional. [44:11] - Sometimes an unexpected distraction makes a difference because it throws off a shooter's plan. [47:37] - While school shootings are terrible incidents, children are actually more in danger in their homes and neighborhoods. [49:45] - Although they are major news stories when they happen, elementary school shootings are rare. [51:29] - Listen to Katherine's podcast, Stop the Killing, for more information. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest How to Talk About Guns With Anybody by Katherine Schweit Stop the Killing: How to End the Mass Shooting Crisis by Katherine Schweit Katherine Schweit's Website Stop the Killing Podcast

Oct 25, 202352 min

Ep 190The Passwords Are the Problem with Thierry Gagnon and Philippe Desmarais

With the use of passwords, we're hoping to ensure privacy and security, but sometimes it is at the expense of convenience. As technology changes and biometric databases become more utilized, we need to remember that they may also be hacked. Today's guests are Philippe Desmarais and Thierry Gagnon. Philippe is a tech entrepreneur who co-founded Kelvin Zero and currently serves as its CEO, overseeing the company's strategic direction. He is also a member of the Next Generation Advisory Council at Rockefeller Capital Management. Before creating Kelvin Zero, Philippe played a significant role in various start-ups, focusing on data analytics for political campaigns, remote hardware device management, and cybersecurity. Thierry Gagnon is co-founder and Chief Technology at Kelvin Zero. He is an expert in software development, malware analysis, cryptography, and reverse engineering. He has been actively involved in the cybersecurity community, participating in renowned competitions and projects such as Malware Information Sharing Platform. Show Notes: [1:18] - Philippe and Thierry share their backgrounds and their roles in the company they co-founded together, Kelvin Zero. [2:34] - Thierry's expertise is in cybersecurity but Philippe's interest was more in crime. They combined their strengths and passions to create Kelvin Zero. [6:18] - Passwords have been around for millennia. [7:24] - We often confuse being smarter with being faster. [9:45] - Passwords are not often attached to an individual. We have so many passwords and can't actually know them all. [11:53] - We can compromise passwords at scale. [13:20] - The attackers only need to be right once. The defenders need to be right 100% of the time. How can we flip this? [15:47] - The average person is tasked with trying to keep up with cybersecurity and, in most cases, they are not qualified to do this. [17:11] - What does it look like to take a password-less approach? [19:20] - If cybersecurity is done successfully, the opportunities are massive. But regulation holds us back. [21:51] - Once a tech company can serve protection, then companies can focus on their services and products. [24:46] - There are differences between the physical world and the logical world. [28:41] - How do you convince people to share medical data for research when there are constant breaches? [31:33] - Is privacy the same as anonymity? [33:52] - Technology should be able to do what we want it to do, but that's not the case. [36:36] - In a password-less environment, how can we validate a user? [39:40] - Thierry believes we should get away from the server authenticating because then it is the responsibility of the organization. [43:18] - Sci-fi movies sound far-fetched, but a lot of them predict technology. [46:35] - Thierry and Philippe share their thoughts on what we should be putting our focus on now. [49:40] - Stay away from single-factor authorization. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Kelvin Zero Website

Oct 18, 202354 min

Ep 1895 Ways to Stay Safe Online with Patrick McNamara

Staying safe online requires you to be an active participant. You need to do your own research and not rely entirely on other people's tools, some of which are intended to actually take advantage of you. Today's guest is Patrick McNamara. Patrick holds a bachelor's degree in cybersecurity from University of Maryland Global along with multiple certifications. He operates the cyber awareness site DIYSecurityTips.com and is currently a cybersecurity engineer for a software company. Show Notes: [0:52] - Patrick shares his background and current role in cybersecurity. [3:09] - Chris and Patrick discuss the changes in cybersecurity in education in just a few years. [7:18] - When it comes to working in the industry, there are a lot of misunderstandings and inflexible definitions of what cybersecurity is. [9:35] - Volunteer as much as you can. [10:48] - A great place to start for your own online security is with passwords. [13:17] - Literally anything can be breached. A password manager can at least mitigate risk. [15:40] - Is it safe to connect to public wifi? [17:56] - Using your cell phone's hotspot is a lot safer than using public wifi. VPNs are also fantastic to invest in. [20:42] - VPNs that are free could be dangerous as well. How are they making money if they are offering the service for free? [21:33] - Pay attention to the developer before downloading any app on your phone or mobile device. [23:16] - Check the permissions for the apps you download. For example, a calculator app doesn't need access to your contacts and pictures. [25:01] - Anything that is new and exciting, malware developers will be on it very quickly. [27:40] - Understand how crypto works before investing in it. [28:52] - Patrick believes that it is possible to be completely anonymous online but there are a lot of very difficult steps to follow to do so. [32:13] - Privacy is easier to maintain than anonymity. [34:41] - There's special malware for every type of attack. Patrick shares some scenarios on different types of attacks. [35:57] - VPNs cannot protect you from social engineering. [37:21] - Some malware is downloaded through files online on a site that was recently breached. [39:01] - Chris shares an experience in supply chain crypto mining that happened unintentionally. You never know. [40:34] - You should at least know how to back up your data. [44:13] - Patrick shares about his website and how to learn more about online safety. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest DIYSecurityTips.com

Oct 11, 202346 min

Ep 188Tracking Down Scammers with Ryan Kelly

Everyone is being targeted by organized crime to separate you from your money. If you've been scammed, don't allow embarrassment to keep you from reporting it. Your story could keep someone else from going through the same thing. Today's guest is Ryan Kelly. Ryan is a stand-up comedian who hunts scammers with his master's degree in Homeland Security. Show Notes: [0:45] - Ryan shares his background and how he wound up hunting scammers. [2:12] - Just a few months ago, Ryan himself was scammed. [3:25] - Through social media, Ryan shared his experience and all of the comments showed that an incredible amount of people experienced it as well. [6:13] - We do victims an injustice when we describe a hacker as a bored man in a basement and a hoodie. There are incredibly organized scam crime rings. [9:07] - Your phone sells a lot of data. [10:53] - Ryan shares what he does initially when tracking down a scammer. [13:47] - Knowing an IP address can be helpful in knowing a little information, but it's not exact. [15:46] - Some military personnel cannot use fitness trackers or other devices that transmit data. [18:08] - Ryan explains how a fan of his social media content recognized the background of a video and found him in person. [21:03] - If you possibly feel like you are being targeted as a scam but you are unsure, you can ask a series of questions to see if they are lying. [22:16] - Sometimes scammers purposely use bad grammar and spelling to weed out the people who are suspicious. [24:37] - Two factor authorization should be a requirement on every login. [27:01] - Your information is easy to find. There are ways to take some things down. [29:01] - LinkedIn is a great tool, but it can be dangerous as scammers can create a false connection. [32:09] - If you're paying for something and it feels like a weird way to be paying for something, stop. [34:51] - If you are looking at investing in something, think about the risk. Can you afford to possibly lose it all? [37:36] - Scammers also target people under the pretense of helping them get their money back after a scam. [40:25] - Don't send photos to people you don't know. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Ryan Kelly on TikTok Ryan Kelly on Instagram Ryan Kelly Website

Oct 4, 202344 min

Ep 187World Romance Scam Prevention Day - October 3rd with Kathy Waters and Bryan Denny

Romance scammers are patient and willing to take their time to win over their target. In today's episode, we'll talk about how you can help out and make a difference to reduce the impact of romance scams. Today's guests are Kathy Waters and Bryan Denny. Kathy Waters is an expert advocate and an educator on the subject of online romance scams. Kathy is co-founder, along with retired Colonel Bryan Denny, of the non-profit organization Advocating Against Romance Scammers. Both have been working for safer platforms since 2016 with the same goals in mind: justice for victims and educating all online of the cybercrime known to tear people down emotionally, psychologically, and financially. They are now the organizers of World Romance Scam Prevention Day on October 3rd. Show Notes: [1:10] - Kathy and Bryan share their background and why they are passionate about advocating for victims of romance scams. [2:47] - Bryan was a victim of a romance scam, but not in the way you might think. Someone had been using his photo and posing as him. [4:10] - Unfortunately, Bryan's name and photo are still being used by scammers. [6:36] - When someone's profile image is taken, it is used over and over again. Getting one taken down is not going to end it. [8:22] - There are organized crime groups that use Bryan's photos, but they believe that there are independent scammers using it as well. [9:55] - World Romance Scam Prevention Day is October 3rd, and this is the first year it is official. [12:59] - One of the myths about romance scams is the belief that people don't actually fall for these things. [14:47] - Another myth is that this only targets older people, but even juveniles are being targeted specifically for sextortion. [18:01] - Romance scammers typically start to build a relationship slowly. They move the conversation outside a lot of social media apps. [19:49] - People who want to believe it's real, will believe that it's real. [20:44] - Bryan shares some common stories that scammers use in romance scams to get money from a victim. [22:03] - Although some take a lot of time to ask for money, others will test the waters early and ask for small amounts or even content they use to blackmail. [24:19] - Kathy suggests that mental health professionals come forward to provide education and support as well. [26:40] - Never turn your back on a friend or family member who has fallen victim to a romance scam. [27:24] - Learn what you can do to help support World Romance Scam Prevention Day. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest AdvocatingForU.com World Romance Scam Prevention Day Home Page

Sep 27, 202332 min

Ep 186Stopping Financial Fraud with Giles Mason

Scammers try to take advantage of human politeness. Utilizing critical thinking and slowing down conversations with someone who claims to be an authority like a government agency or bank could be what prevents us from making a financial mistake. Today's guest is Giles Mason. Giles is the Director of Campaigns at UK Finance. He is responsible for planning and delivering the organization's communication activities to promote campaigns on behalf of the banking and finance industry. Show Notes: [0:50] - Giles shares his background and current role at UK Finance. [2:36] - In 2016, UK Finance launched Take Five to Stop Fraud. [4:03] - Many victims of fraud often think after they've responded to a scammer that they could tell that something wasn't quite right. [5:36] - The biggest trend at the moment is purchase scams. [6:16] - The type of scam that normally sees the greatest fraud is impersonation scams. [9:08] - Scams that banks see are typically payment scams through their bank account. [10:10] - Once a payment is made, most of the time there's nothing you can do about it. Banks will do what they can, but it's not always possible. [12:38] - There are even scams that involve purchasing a home which are terrible because of the sheer amount of money involved. [14:04] - Hang up and call the number you know for certain is your bank. [17:13] - As humans, we want to be supportive and respect perceived authority. [18:38] - Scammers typically won't have a good reaction to you saying that you will call the number you know, which is a sign that they are not who they say they are. [21:10] - Young people are more willing to share information about a scam. [23:35] - While Giles has not fallen victim to a scam, he has had multiple attempts. [25:41] - Giles describes some of the trends in scamming. [27:48] - Stop, challenge, and protect. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Take Five to Stop Fraud Home Page

Sep 20, 202328 min

Ep 185Buyer Beware with Marta Tellado

The burden is on consumers to question the validity of online offers because privacy laws and standards are not yet well regulated. Consumer Reports is fighting to make changes in this arena. Today's guest is Marta Tellado. Marta is President and CEO of Consumer Reports, the independent non-profit that works side by side with consumers to create a fair and just marketplace. She is a market driven leader with a passion for innovation, public-service, philanthropy, and helping organizations maximize and improve the world. Show Notes: [0:55] - Marta shares her background and her role as CEO of Consumer Reports. [2:19] - We're at a pioneering moment in the consumer market. Regulation hasn't transitioned into the digital marketplace. [4:04] - When online, we assume everything we do is safe. [5:52] - Now with AI, consumer awareness is even more important. [7:41] - As technology advances, so does the potential for scams. [9:27] - Be aware of the red flags. [11:33] - Consumer Reports has a ton of resources and information on scam protection. [13:17] - Everyone is a target and anyone can fall for a scam, including Marta. [15:51] - Marta shares the estimated amount of money lost to scams in 2022 and the increase we are seeing. [17:45] - Instead of connecting your peer-to-peer payment accounts to your bank account, connect them to your credit card where you have more protection. [20:17] - Even when we select the "unsubscribe" button, we may be flagged as someone who is interacting with the scam content and further targeted. [22:58] - The rules and regulations aren't keeping up with the rapid growth and development of technology. [24:55] - Marta describes the ways Consumer Reports works to educate consumers. [26:25] - It takes a really long time to get laws and regulations in place. [29:01] - We can't see or feel the things that keep us safe or harm us online. [31:38] - Even if you feel that you don't have anything that a scammer would want, be aware that any information is valuable to them. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Consumer Reports Home Page

Sep 13, 202334 min

Ep 184Scambaiting with Pierogi

Scammers have used our systems against us, like shipping, rental cars, and rental homes. They've learned how to stay off the radar and, in order to stop money laundering, we need to address fraud one step at a time. Today's guest is Pierogi. Pierogi protects the innocent and vulnerable from internet scammers through his channel Scammer Payback. He exposes these criminals and helps victims through his technology and cybersecurity knowledge. Show Notes: [1:07] - Pierogi shares his background and how he got into cybersecurity. [4:25] - His drive to help people and get back at scammers is why he started Scammers Payback. [6:03] - Scammers can get access to a bank account and ruin everything. [8:32] - Pierogi shares one of the projects he worked on that actually resulted in an arrest. [9:56] - Scammers know how to stay under the radar. [11:31] - Those involved in organized crime consider their victims as customers. [14:32] - Pierogi describes how a well-trained scammer can cater their manipulation to each individual situation. [17:26] - It's a numbers game. At some point, a scammer is going to connect with someone. [19:04] - Scammers can learn so much about you on the internet that makes their false claims that much more believable. [20:56] - A lot of the time, scammers know when to give up and move on. [22:18] - Never send a text message of any type of personal identification. [26:11] - Focus on the mental aspect of this. [27:52] - Employees at different stores that sell gift cards are on high alert and typically do not sell certain numbers of gift cards. [30:14] - In some cases, banks are even calling out possible red flags. [31:31] - Financial institutions can use technology to determine behaviors that are not normal for you to indicate possible fraud. [33:29] - Hackers are using known processes that are good but for bad purposes. [34:58] - Major corporations have a budget for cybersecurity but regular people don't. [36:28] - Phone carriers are trying to do more to prevent scam calls. [38:03] - While playing different roles, Pierogi shares that he actually "married" a scammer. He shares some of the craziest things scammers have done. [39:32] - Pierogi is also learning different languages so he can learn more about where scammers are located. [41:39] - A lot of the experiences of the victims and how scammers talk about them makes Pierogi emotional. [44:40] - These experiences are sometimes hard to listen to. [46:28] - A lot of people say they'll know immediately if they are talking to a scammer, but it isn't that simple. [48:54] - If we know this information, we need to talk about it to others and educate. [51:16] - Scammers are very good at what they do. We portray them as silly, but they are very intelligent and convincing. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Scammer Payback on YouTube

Sep 6, 202358 min

Ep 183Being Foolproof to Misinformation with Sander van der Linden

We've heard the polarizing narrative, "Either you're with me or you're my enemy." Using this polarizing statement can allow people to fall prey to being manipulated. Today's guest is Sander van der Linden. Dr. van der Linden is a professor of Social Psychology and Society and the Director of Cambridge Social Decision Making Lab in the Department of Psychology at the University of Cambridge. He is ranked among the top 1% of highly cited social scientists worldwide and has published over 150 research papers. He's the author of Foolproof: Why Misinformation Infects Our Minds and How to Build Immunity. Show Notes: [1:01] - Sander describes what he does at Cambridge and why we began his work on this topic beginning ten years ago. [3:22] - The early days of the internet created an interest for Sander as he saw that anyone could pretend to be someone else. [5:01] - What exactly is misinformation? [6:29] - Disinformation is the spread of misinformation with harmful or deceitful intent. [8:37] - One form of disinformation is click-baited sensational headlines that seem harmless. [10:32] - Sander describes some of the key phrases within content that usually indicate mis- or disinformation. [13:11] - Even if information is accurate, content can be written manipulatively to evoke emotion, particularly rage. This is misleading. [15:01] - Most people don't want to be a part of a flame war or in an echo chamber but the behavior is common. [16:45] - Social media algorithms seem to reward toxic behavior and amplify polarization that already exists. [20:31] - People are constantly being bombarded with information. [21:47] - Everyone is scattered in their own echo chambers because of fragmented social media. [23:49] - What should platforms be doing to help limit the spread of misinformation? What should individual people do to keep themselves safe? [26:01] - The brain needs a few experiences before developing a habit. [27:50] - Sander explains why most people don't have the facts to actually defend what they believe to be accurate information. [29:56] - Sander has developed games that help users understand misinformation. [32:02] - Using the example of climate change and global warming, Sander demonstrates how people can be misled. [35:01] - False dichotomies are a real problem and politicians in particular use this strategy. [38:50] - The goal is to help others recognize manipulation online, not necessarily to change their mind. [41:41] - There are different types of scams and most are disinformation. [43:45] - Romance scams use these tactics. How can we inoculate people against this type of information? [47:37] - Deradicalization is extremely difficult. [49:20] - There's a benefit to being somewhat skeptical. But how skeptical should you be? [52:03] - We want to be able to live our normal lives without fear, but there needs to be a healthy amount of skepticism. [55:18] - There are some crossovers between persuasion and manipulation. [60:42] - You can play the games Sander described at Inoculation Science. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Foolproof: Why Misinformation Infects Our Minds and How to Build Immunity by Sander van der Linden Sander van der Linden's Home Page Sander van der Linden on LinkedIn Inoculation Science Home Page

Aug 30, 20231h 2m

Ep 182Why We Fall for Scams with Chris Chabris and Dan Simons

Scammers, like magicians, use distractions and illusions to keep you from realizing what is really going on. They may choose to have you focus on something that is urgent hoping that you'll make mistakes that you normally wouldn't. Today's guests are Chris Chabris and Dan Simons. Dr. Chabris is a Cognitive Scientist who has taught at Union College in Harvard University and is a fellow of The Association for Psychological Science. His research focuses on decision-making, attention, intelligence, and behavior genetics. Chris received his PhD in Psychology from Harvard University. Dr. Daniel Simons is a professor of Psychology at the University of Illinois, where he has the Visual Cognitive Laboratory. Dan received his PhD from Cornell University. His research explores the limits of awareness and memory, the reasons why we often are unaware of those limits, and the implications of such limits on our personal and professional lives. Show Notes: [1:18] - Dan and Chris share their background and what their current roles are in their industry. [3:27] - Why did Dan and Chris decide to write a book together? [6:12] - Stories of victims are engaging and interesting, but these stories don't focus on why we are fooled. [8:53] - Chris and Dan share the story of a time they were almost scammed. [13:01] - Fictional stories in movies get some things right about what con artists exploit, but real scenarios are not always so precise. [14:52] - We have the ability to focus on a select amount of the information in front of us. [16:39] - There are a lot of different techniques that scammers employ to put you under time pressure. [19:59] - Confirmation bias is the idea that you try to find evidence of what you believe. [21:04] - There are a lot of theories about why we are good at some things and not as good at others. [22:15] - It is logical to trust someone you know, but social media has created the opportunity to trust misinformation. [24:38] - Commitments are assumptions that we make and hold steadfastly to. [26:41] - It is easy to trust someone when you've committed to your perception of them. [28:33] - Ask yourself if there is anything you believe that could be proven wrong if you were given new information. [31:01] - External validation is a great source for seeing things you might have missed. [32:48] - There are scams in literally everything, even chess. [38:02] - Are scams increasing or is it awareness of scams that is increasing? [40:26] - All scams employ the same principles. They are always going to rely on the same tricks and tap into the same fears. [42:37] - Dan's hope is that people will question the information they get and become less accepting. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Invisible Gorilla: How Our Intuitions Deceive Us by Chris Chabris and Dan Simons

Aug 23, 202348 min

Ep 181Securing IoT and Cyber Warfare with Mikko Hypponen

Our home IoT devices are constantly being probed for weaknesses so that they can be compromised and used for broader nefarious purposes like cyber warfare. The Ukrainians may be considered some of the best in the world when it comes to defending against cyber warfare because they have been regularly attacked and have been defending their systems for years. Today's guest is Mikko Hypponen. He has written for The New York Times, Wired, and Scientific American and has lectured at universities like Oxford, Stanford, and Cambridge. Mikko works as the Chief Research Officer for WithSecure and sits on the advisory board of Europol. Show Notes: [1:11] - Mikko shares his background as an old-school hacker. [2:46] - His mother advised Mikko to pursue this career in the 1980s. [5:23] - Smart devices like doorbells and refrigerators are not configured correctly because security makes the device more expensive. [7:50] - Mikko discusses regulation in Europe and how, most of the time, regulation fails. [9:03] - Many hackable devices wouldn't be hackable if consumers read the manual. [11:13] - Most malware traffic used to be Windows based but is now Linux based. [12:26] - Many people don't think that there's any data that can be stolen from IoT devices, but they are surprisingly powerful. [14:16] - Mikko explains some recent attacks. [15:43] - Medical devices are just as vulnerable as any other IoT device. [17:41] - What is a honeypot? [19:02] - Mikko shares that he has been a victim himself with his credit card number stolen twice. [20:14] - Even experts make mistakes. [21:26] - If you believe you have been hacked or think you are being scammed, take a step back. [23:06] - Mikko describes some of his experience living so near Russia and monitoring cyber warfare. [25:07] - Spying and espionage is a big problem in countries bordering Russia. [30:06] - With invasions in 2022, Ukraine improved many systems. [31:20] - Mikko makes a prediction on what will come next that sounds like Science Fiction, just like cyber war sounded like before. [32:18] - What are Mikko's thoughts on AI? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Mikko.com

Aug 16, 202337 min

Ep 180Behavioral Analysis From an FBI Expert with Robin Dreeke

Our non-verbal communication is as much or more important than what we verbally communicate. We may display mannerisms that our gut instincts pick up as just off, but a trained FBI Behavioral Analysis can pick up on these signs faster than you might expect. Today's guest is Robin Dreeke. Robin is an accomplished executive coach, bestselling author, and professional speaker with an impressive background. As a Marine Corps officer and retired FBI Special Agent, he served as Chief of the Counterintelligence Behavior Analysis Program where he honed his skills on recruiting spies and behavioral assessment. Robin has translated his expertise into his unique interpersonal communication strategies that focus on recruiting allies in business. Show Notes: [1:23] - Robin shares his background and previous roles in the Marine Corps and FBI. [2:45] - Robin has not been a victim of a scam, but there have been many attempts and close calls. [6:02] - We establish normal patterns of behavior and tempo. [7:52] - Be wary of things that deviate from normal patterns of behavior. [10:19] - If we're trying to find something wrong, we miss a lot. [14:07] - Robin explains why he looks for openness, honesty, and transparency in a nice even tempo. [15:42] - Underneath "why" is the "what" and the "how." [17:30] - Vulnerability is the willingness to show your shame. [20:17] - Words are extremely powerful. [22:24] - The more time spent with someone, you will be able to learn their natural tempo and behavior patterns. [24:34] - The techniques Robin talks about aren't just applicable to criminal interviews, but even just personal conversations. [26:07] - Master manipulators are on a timeline. Usually they're not patient. [28:52] - Sales people can also use these techniques to push the tempo out of your comfort zone. [31:31] - Robin only vets people based on in-person interactions now. [33:12] - Robin compares reality to shows like Criminal Minds. [35:43] - The actions that people will take are predictable. [37:52] - Some people have the tendency to find something wrong with everyone and everything. [40:08] - Focus on having a great conversation with other people. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest People Formula Website Robin Dreeke on LinkedIn

Aug 9, 202343 min

Ep 1797 Flags of MLM with Roberta Blevins

Many people have ended up in an MLM because they wanted to help a friend out. But it is important to understand the red flags of how they can motivate and manipulate. Today's guest is Roberta Blevins. Roberta is an anti-MLM advocate who starred in the Amazon Prime documentary Lula Rich and speaks out on social media against MLMs, scams, frauds, and cults and is the host of the podcast Life After MLM. Show Notes: [0:45] - Roberta shares her background and what she does now. [2:20] - In 2015, Roberta heard about LulaRoe and was initially very excited. [3:34] - She wasn't making any more than she had been making in the job she left, but was working a lot more. [4:40] - Roberta realized that it wasn't the right way to run a business and it took a toll on her and her family's mental health. [6:17] - Pressure and pushback against questions are major red flags. [7:28] - Avoid being alone and being led to a second location when talking to someone. [8:28] - Roberta explains how different MLMs operate under a pay-to-play model. [10:05] - The only way to make money is to hit qualifying monthly quotas that are a big challenge to accomplish. [11:58] - What is the difference between a pyramid scheme and an MLM? [14:43] - MLMs tend to invade every area of your life. [16:10] - Many people have a fake-it-till-you-make-it approach which is misleading people to be recruited. [19:26] - Social media plays into this fabricated lifestyle. [21:42] - MLMs exploit personal relationships. [22:54] - Roberta shares how "icky" it felt to keep a "dirt list". [24:38] - There are stories of some people signing up their children in order to meet their recruitment quota. [26:30] - Roberta explains the history of MLMs and how they started. [29:21] - MLMs aren't going anywhere, but Roberta wants to see regulation in an unregulated space. [31:48] - Roberta shares about some of the background work she is doing to help create dialogue about regulation. [34:12] - Social media has strengthened MLMs and has gotten more people to sign up. [35:53] - In some MLMs, more than half of the sellers are making no money. [37:26] - Numbers don't lie. If you are spending or making money, you should track it. [38:51] - Track any amount of time you spend on the business. [41:07] - Roberta outlines a strategy if you are in an MLM and deciding if it is the right fit for you. [44:30] - Have someone who is unbiased listen to you. Be that person for someone else. [46:35] - A company should be able to stand up to scrutiny. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Roberta Blevins Web Page Roberta Blevins on Instagram Roberta Blevins on YouTube Roberta Blevins on Twitter Life After MLM Podcast

Aug 2, 202347 min

Ep 178Reading and Understanding Behavior with Chase Hughes

A scalpel in the hand of a surgeon can be an amazing instrument. But the same tool in the hand of a person choosing to do harm is dangerous. The knowledge on how to read someone's behavior is the same thing, either beneficial or detrimental, based on the person's intentions. Today's guest is Chase Hughes. Chase is a retired US Navy Chief and is the leading military and intelligence behavior expert with 20 years of creating the most advanced behavior skill courses and tactics available worldwide. He is a Harvard educated neuroscientist, keynote speaker, and the author of two bestselling books. He teaches elite groups of government agencies on behavior science skills, including behavior profiling, non-verbal analysis, deception detection, interrogation, and advanced behavioral investigation. Show Notes: [1:08] - Chase shares his background as a US Navy Chief and his current work in educating others on behavior science skills. [2:45] - Chase tells the story of losing a friend as inspiration to grow his knowledge. [4:51] - Hidden stress signals are universal. [7:04] - At a certain point of understanding behaviors, Chase sees a world that is hidden right in front of everyone. [8:06] - In learning behaviors, focus on learning one at a time until you notice them in your day-to-day life. [10:03] - When it comes to psychopaths, there are certain behaviors that are hard to spot. [12:01] - Chase does an activity with Chris to demonstrate eye movement. [15:18] - When it comes to interrogation and questioning, these eye movements are very telling. [17:13] - Women are naturally very good at reading behavior. [18:02] - We learn to lie first with our face. [20:10] - What is a detail mountain and a detail valley? [23:07] - There is a reason we fall so hard for con artists and cult leader personalities. [25:10] - All kinds of influence follow this exact model every time: Perception, Context, Permission. [27:58] - The second thing that Chase teaches is how to access the mammalian brain. [30:36] - Anything we feel emotion about is memorized. [33:21] - The more we learn about this, the better we are at avoiding being manipulated. [34:58] - These tactics are also tools for good parenting. What is the end goal of these tools? [37:10] - Chase discusses some examples of the models he teaches. [39:41] - When it comes to confidence, people look at situations through a hierarchy lens. [41:10] - Chase shares the titles of his books and what they are about. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chase Hughes Home Page

Jul 26, 202342 min

Ep 177Ever-Changing Cyber Crime with Raj Samani

It can be difficult to quantify the impact of good CISO or IT professionals. Protecting the network, infrastructure, and data is a constant effort and they've got to get it right 100% of the time. But the criminals breaking in only need to get it right once. Today's guest is Raj Samani. Raj is the Chief Scientist for the cyber security firm Rapid7. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Raj has been recognized for his contributions to the computer security industry through numerous awards and has co-authored several books and has been a technical editor in others. Show Notes: [1:01] - Raj explains what he does for the cyber security firm, Rapid7, and how he got into the field. [3:40] - In the beginning of his career, cyber security was more of a hobby. [6:07] - There is a level of transparency, but Raj explains how things have to be absolutely certain before releasing information. [7:32] - Raj introduces the topic of cyber security as a service. [9:11] - Without the means to physically interrogate, it is hard to confirm theories about what is happening and who is doing it. [12:01] - "The sooner we collectively as an industry start to provide more transparency, I think the better we'll be." [13:57] - We see CISOs let go when a breach takes place. It is immature as an industry since there are no metrics to measure success. [16:54] - Raj shares the experience of the explosion of Covid-19 related scams. [20:40] - As security professionals, the job is never done. [21:51] - Raj compares educating your children of online safety to wearing a seatbelt in your car. [24:10] - The odds are certainly in favor of the cyber criminals. [26:48] - Raj explains the estimation of money saved by preventing attacks, but also explains that there's no true way to measure this. [28:20] - If we aren't reporting incidents, the government isn't going to do anything because we can't prove the impact. [30:29] - Because it is a global issue, international law enforcement collaboration is crucial. [34:17] - Now that cybercrime is so lucrative, they can actually pay for marketing and make their content much more believable than a simple email with a link. [36:30] - It is a constant case of cat and mouse. [40:32] - Raj does not use the word "hacker" to describe the individuals behind attacks. They are criminals. [42:18] - Raj highly recommends the book Cuckoo's Egg by Clifford Stoll. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Raj Samani on LinkedIn Rapid7 Home Page

Jul 19, 202345 min

Ep 176What NOT to Do When Wiretapping the Government with Bryan Seely

Today's guest is Bryan Seely, a world famous cyber security expert, ethical hacker, author, keynote speaker, and former US Marine. He is known for intercepting calls to the US Secret Service and FBI. We chat about why and how he did it and surprisingly why he didn't go to jail. Show Notes: [0:48] - Bryan shares his background, what he does now, and what he is famous for. [2:10] - To show how easily hacked and manipulated Google Maps was, Bryan changed the names of locations which didn't get their attention. [4:03] - At the time, the FBI didn't know that Bryan wiretapped them. Bryan explains how this was an issue and how he let them know. [6:14] - They didn't believe him and he explains how he proved it and what the major problems with their communications were. [8:03] - At no point was Bryan arrested, but he had to show how he managed to wiretap them. [10:00] - Bryan managed to record 40 calls. [11:26] - Because he had no ill intent, he told them what he was doing and how he did it to help prevent it happening by others, Bryan was not charged. [13:24] - Technically, Bryan didn't do anything that wasn't possible for anyone else to do. He didn't hack a system, but rather saw a logic flaw. [15:51] - There wasn't technically anything wrong. It was just designed in a way that could easily be exploited. [18:50] - The cost of just letting people know about a breach is high. [20:44] - Bryan believes that companies should be honest about breaches and what they will do to fix the problem. [23:41] - We don't intentionally broadcast our information or location, but it is easy to guess in many cases. [24:57] - There are little things that we do that we think are protecting us but are actually giving out more information than we should. [27:26] - Bryan shares some tips in keeping you protected, like turning off Bluetooth and wifi on your phone. [28:36] - Anyone can create a wifi network and name it anything, like Starbucks Wifi or Free Airport Wifi to make it easy to have people connect. [30:47] - Teach your kids how to be safe. [31:42] - Bryan primarily uses authenticator apps for MFA, but any kind is helpful. [35:20] - Bryan is currently writing another book and loves meeting people who have done great things for cyber security education. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Bryan Seely Home Page Bryan Seely LinkedIn Bryan Seely on Twitter

Jul 12, 202341 min

Ep 175The Human Side of Cyber Security with Jessica Barker

The cyber security circle of information will always have some human involvement and raising awareness in how systems were designed, developed, used, and abused is critical. Today's guest is Dr. Jessica Barker. Jessica is an award winning leader in the human side of cyber security and has delivered face to face awareness sessions to over 50,000 people. She is a best selling author, international keynote speaker, media commentator, and serves on numerous boards, including the UK government's Cyber Security Advisory Board. Show Notes: [1:00] - Jessica shares her background and her passion for educating people on cyber security. [2:34] - When it comes to personal experience, Jessica has not been a victim of a scam, but she has come close. [3:49] - Being vigilant is helpful but the right phish at the right time can catch any of us. [5:01] - Take a step back and talk to someone else. Seeing someone else's perspective is helpful. [6:43] - There's a fine line between scam indicators and marketing. [8:51] - There are always people involved. Jessica explains the elements of the human side of cyber security. [10:24] - There is an assumption that the younger generation don't care about cyber security, but it's not accurate. [13:14] - The majority of clients that Cygenta works with are corporate clients. [14:33] - Every organization has a security culture already, but what kind is it? [16:46] - Many departments within a company avoid cyber security and the security team and it creates an adversarial relationship and culture. [19:15] - Measuring the success of cyber security is a challenge. [20:57] - We need to consider our language when explaining cyber security attacks. [22:57] - Jessica's work primarily focuses on prevention. [28:20] - Chris shares the experience of seeing a problem but not knowing where it was coming from. [29:50] - It's important to mitigate risk while also not being so worried all the time. [30:57] - We all need education to help with critical thinking. [33:14] - Education also boosts people's confidence. [34:27] - It is important to have strong organizational values and the ability to tap into people's individual values. [36:01] - Cygenta has a free resource online called The Ultimate Guide to Cyber Security Culture. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cygenta Cyber Security Culture Guide Confident Cyber Security by Dr. Jessica Barker

Jul 5, 202339 min

Ep 174Diet Culture and Wellness Traps with Christy Harrison

With the appearance of health taking focus in today's culture, many are persuaded to try extreme trends to achieve quick weight and health results. Conventional healthcare may not always have the answers we're looking for but it's important to not let our fears and concerns be exploited for someone else's profit. Today's guest is Christy Harrison. Christy and a Registered Dietician Nutritionist, Certified Intuitive Eating Counselor, and a journalist who has been covering food, nutrition, and health for more than 20 years. She is the author of two books, The Wellness Trap and Anti-Diet and the producer and host of the podcasts Rethinking Wellness and Food Psych which has helped tens of thousands of people around the world think critically about diet and wellness and culture and develop a more peaceful relationship with food. Show Notes: [1:05] - Christy shares her background and what she specializes in as a Dietician Nutritionist. [2:19] - Christy describes her past experiences with disordered eating and combined her perspective with her journalism career. [5:15] - Through her own recovery, she discovered her passion for helping others at a large scale. [6:21] - This is not a substitute for physical or mental health advice. [7:20] - There is a long history of how our current societal focus on weight and body shape has evolved. [11:18] - As society developed an anti-fat approach, diets became trendy and scammy weight loss products became prevalent. [13:07] - There's a lot of motivation for scammers to make money in the health and wellness space as it is a huge industry. [14:22] - Christy shares some history on the first diet book and how we are currently seeing similar trends again. [17:03] - Watch out for anything that purports a product to be a cure-all. [19:16] - While there are problems with mainstream healthcare, anyone who turns fear into a sales pitch is a red flag. [22:02] - A lot of people in ads, especially on social media, are paid to promote a product that they probably have never tried. [23:14] - Be aware of the differences between real studies and anecdotal science-sounding claims. [26:32] - A problem with nutritional research is that it is mostly observational. [28:15] - It's not all down to the individual. We can certainly do things to make ourselves less susceptible, but the system needs to change. [29:35] - Unless it is coming from your own medical provider who knows you and your needs, be skeptical of medical information. [32:17] - Before adopting a health and wellness practice, you should do research. [33:39] - Check in with yourself on any emotional pull you have. [35:34] - There are also claims from scammers who will say that you have to feel worse to feel better, which isn't generally the case. [38:37] - Diet culture creates a yo-yo effect for a lot of people. [40:28] - Self efficacy is critical to mental health and dieting takes it away. They have a hugely negative psychological effect. [44:40] - Christy shares some things to consider before making changes to your diet. [46:42] - What are the things you have control over in your life? Don't demonize yourself for the choices you make when there isn't anything else you can choose. [47:56] - There isn't one solution for every single person. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest ChristyHarrison.com Rethinking Wellness Podcast Food Psych Podcast

Jun 28, 202351 min