Folgen
-
Ever noticed how you stay on an app even though you clicked on a link to a different website? This convenient trick is more harmful than you'd think. This week, Carrie talks about the hidden threat that in-app browser's pose to your privacy.
In this episode you'll learn:
What exactly are in-app browsers? What information are they collecting? How much of a risk are they? What you can do to protect your informationCheck out the blogpost at https://privacy-mentor.com/ep78
-
Even though we rely on email for nearly everything we do online, we seem to forget about all the information connected to it. Not to mention all the entities that have access to collect and view this info as well. In this episode, Carrie gets to talk with Brad Deflin of Total Digital Security as they over all of the dangers of using a free email service, and the importance of switching to a more private and secure one.
In this episode you'll learn:
How limited privacy is when using a free email service What exactly is a private email? Why free email services put you at a greater risk of becoming a target of a cyber-attack Why it's easy to switch over to a private email The importance of starting a private email now rather than laterLinks:
Visit Total Digital Security's website https://www.totaldigitalsecurity.com/
Episode referenced where Carrie talks about scam that changes email rules https://carriekerskie.libsyn.com/sneaky-scam-makes-hidden-changes-to-your-email
-
Fehlende Folgen?
-
Remember when scams used to look like scams? Back when you used to be able to find out if something was real or not based on a handful of things you could check. Those were the good ole days.
This week, Carrie talks about a new cyber-attack thatâs as realistic as it gets when it comes to a scam. Criminals are now setting up official PayPal accounts and sending real PayPal emails. From here, they send out fake invoices to as many individuals as theyâd like. Listen to find out the things you can do to detect this fraud, and how you can keep yourself protected.
Things youâll learn in this episode:
An in-depth explanation of how the scam works What to do if you receive one of these emails or see one of these invoices How to dispute the invoices through PayPal Things to do and consider if you ever receive scams similar to this one when you cant determine if itâs real or fake.Link to the PayPal dispute page
-https://www.paypal.com/us/smarthelp/topic/DISPUTES_AND_LIMITATIONS_PER
Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
-
Within the past months thereâs been a growing concern over the threat known as hermit spyware. Breaking news titles warn of the damage and financial havoc caused by this new type of cyberattack, causing people to go into a panic with the fear that they may become the next victim.
But what exactly is this âhermit spywareâ?
Are you at risk of being a victim? How can you protect yourself if you are attacked?
In this episode, Carrie aims to answer these questions and more, while also easing your worries about this new potential threat.
What youâll learn in this episode:
Who is at risk of being a target of hermit spyware? What are some of the things to look for in the event of a spyware attack? What can criminals do after hacking someone with this malware? General rules of thumb to follow to protect yourself against all cyberthreatsVisit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
-
In this Fourth of July episode, Carrie talks about the dangers of relying on banks, credit companies, and other financial institutions. She stresses the importance of knowing whatâs going on in your accounts, and how waiting for your bank to notify you of fraudulent transactions can cost you big time.
Things youâll learn in this weekâs episode:
Why banks arenât as legally obligated to inform you of fraud as you may think they are How long you have to report any fraudulent transactions Things to ask yourself when considering taking back your independence, and whatâs at riskVisit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
-
Technology has made many aspects of our life a lot easier, but it's also come with its fair share of downsides, some of which you may not be aware of.
The convenience that comes in this digital age comes at a price, the cost being your information.
In this episode, Carrie goes over the argument of Privacy vs. Convenience.
Things youâll learn in this episode
What is Privacy vs. Convenience, and what are some examples?
What's the price of using convenience-based products
What about smart devices?
How to switch to a privacy mindsetWant to take our privacy quiz? Click here
Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
-
A new change makes it easier to access your Experian freeze, listen to find out as Carrie explains this new feature to manage your account online.
Resources:
Link to Experian
https://www.experian.com/freeze/center.html
Privacy-Mentor Website
https://privacy-mentor.com
Link to Protect Your Identity in 14 Days
https://kerskie.podia.com/protect_your_identity_14days
-
Want to find out how much your smart devices know about you? Well now you can⊠This week, Carrie interviews the creator and lead of Mozillaâs Privacy Not Included Guide, Jen Caltrider. This guide reviews things like smart speakers, toys, games, wearables, and other devices that are connected to the internet. However, some of these items come with a pretty âcreepyâ downside. Watch the episode to find out more! Links and Resources:
Privacy Not Included - https://foundation.mozilla.org/en/pri...
Mental health apps guide - https://foundation.mozilla.org/privac...
Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
-
2FA was created to protect your online accounts against cyber criminals. In this episode Carrie shares with you a new scam that uses 2FA codes to gain access to your financial accounts.
What youâll learn:
What is 2FA or MFA How this scam works Two tools to avoid becoming a victimWant more great tips? Join the Privacy-Mentor email list. No span, just useful tips, tricks, and tools to help you protect your privacy from identity theft, fraud, and cyber threats. If you value your privacy, check out our site at https://privacy-mentor.com/. Your privacy depends on it.
-
Email plays a big part of communicating in this digital age, but did you know that many of the free email services are scraping your emails to collect information?
Thatâs right.
The reason so many of these email services are free, is due to the fact that they are profiting off of data collected via emails you send and receive. This data is then used and sold for marketing or other purposes.
Following up one of our previous episodes with Startpage's Director of Brand and Strategic Partnerships, Kelly Finnerty, I sit down with Robert E.G. Beens, the Co-Founder and CEO of Startpage and StartMail, and a recognized privacy expert and advocate.
Here are a few key takeaways youâll learn in this episode:
What is StartMail and why was it created Why it's important to protect email privacy What are the risks of not using encrypted email? What to know about encryption Do all parties need to use StartMail to maintain encryption? What shouldnât be sent in an email How to migrate your email to StartMail
Are custom domains available? Do they offer email plans for businesses or only consumers? How StartMail proved they value privacy when censored by Russia?If you are currently using a free email service, you owe it to your privacy to listen to the episode and explore StartMail. Your privacy will thank you.
Also, donât forget to check out episode 66, where we talked to Kelly Finnerty from StartPage.
Robert E.G. Beens is the Co-Founder and CEO of Startpage and StartMail, and a recognized privacy expert and advocate. At Startpage, Beens oversees operations, product development, technology, and finance. He is also a commercial airline pilot with Netherlands-based airline KLM. He earned his Masterâs degree in Corporate, Social & Economic Dutch Law from the University of Utrecht in the Netherlands.
Resources:Check out StartMail - https://www.startmail.com/
Make Startpage your default search engine - https://add.startpage.com/protection/?campaign=11&source=aff
Episode 66 - StartPage, The Ethical Search Engine - https://privacy-mentor.com/ep66/
Visit our website privacy-mentor.com
-
By now youâve probably heard of some form of credit protection service, whether it be a freeze, a lock, or a fraud alert; however, youâd be surprised to know the differences between these services, and how one form may protect you more than another. In this episode, Carrie and Kyle discuss these three forms of credit protections, what they really do, and which one can actually help protect your personal credit.
Things youâll learn in this episode
What are these services, and what they provide Why one of these services is better than the others Where to activate these services Are these free? Will having these in place prevent me from doing anything with my credit?Resources:
Steps to place a freeze and show notes
www.privacy-mentor.com/ep68
-
Remote access software is a topic weâve brought up several times in previous podcast and blog post, and in this episode Carrie and Kyle go over exactly what it is, and how bad guys are using it to their advantage. In this episode youâll learn: What is remote access software? What are some common example of it? How are criminals using it? How to detect and remove it What to know to minimize your risk of falling victims to these scams
Previous episode we reference where we talk about victims of remote access software
https://privacy-mentor.com/ep47/
Visit our site for more episodes and post
https://privacy-mentor.com/
Check out true cybercrime podcast - Modem Mischief
https://www.modemmischief.com/episodes
-
Following up last weekâs episode about 1099 fraud and staying on the topic of tax scams this season, Carrie interviews Ron Loecker, Special Agent in Charge of IRS Criminal Investigations. Ron answers some of Carrie's questions and gives some tips to help you avoid any problems this tax year.
Things youâll learn in this episode:
What to look for when selecting a tax preparer Are you, or your return preparer responsible for your taxes? How to check if your preparer is legit Will the IRS ever call you threatening to take legal action?Resources:
IRS Website https://www.irs.gov/
IRS Press Released 10 Tips file:///C:/Users/kkers/Downloads/Filing%20Season%20_10_Tips_To_Avoid_Fraud.pdf
Watch a video of the interview here: https://youtu.be/Y6FMJT0lzc8
-
This week, Carrie talks about another popular issue we see this time of year around tax season. In this situation, a woman received a 1099 form regarding taxable miscellaneous income sheâs made off an investment account; The problem is, sheâs never opened or had any such account. Find out why criminals are taking advantage of investing platforms, and how victims are being held responsible for paying taxes on money theyâve never made simply because criminals used their identity. Things youâll learn in this episode: Why criminals are setting up crypto/investing platforms using your Identity How the IRS counts on you to file these accounts youâve never set up Steps to take to remove these fraudulent tax claims and to restore your information
Link to episode 52 that Carrie references in the show:
https://carriekerskie.libsyn.com/be-on-the-lookout-for-this-welcome-letter-in-the-mail
In that episode we go over how the FBI and IRS reach out to you over bank accounts that youâve never set up.
-
Recently, Carrie received a call from someone worried that their mobile phone number was hacked. Out of fear, and some bad advice, they made some drastic changes on their own to protect their information. What they did not only gave the bad guys more control but locked the victim out of being able to access their own accounts. Listen to find out how you can avoid a situation like this, and what the right steps to take are to protect against phone number theft. Things youâll learn in this episode: Popular types of phone number fraud The worst thing to do when you find out your number is potentially stolen What the right to do is Tips to protect your number in the future
-
Love is in the air in this episode, as Carrie talks about the notorious sweetheart scammers. This Valentineâs Day inspired topic covers a type of criminal that takes advantage of individuals in search of relationships online; but itâs not just those looking for love that are at risk. Carrie will share with you how non-romantic relationships found online could also pose a threat. Learn about sweetheart scammerâs intentions, and the dangers they present to their victims. What youâll learn from listening to this episode: Who are sweetheart scammers? Why these scams arenât restricted to only romantic relationships Some extreme case examples demonstrating the severity of these scams Red flags that can indicate someone is a potential sweetheart scammer
Link to article Carrie References in the episode: https://www.ftc.gov/news-events/blogs/data-spotlight/2022/02/reports-romance-scams-hit-record-highs-2021
TinderSwindler documentary on Netflix https://www.netflix.com/tudum/articles/who-is-tinder-swindler-real-shimon-hayut
-
Recently, when replying to a clientâs email, we received an email undeliverable response saying that their mailbox was full. However, upon closer review, the email address mentioned didnât belong to my client. We called the client to see if he received my reply. He said âyes.â We then asked him if he was familiar with the email address listed on the undeliverable response, to which he said âno.â
Find out what happened when hidden malicious email rules hijacked our client's emails and what we did to resolve the issue.
-
After listening to last weekâs podcast, Carrieâs interview with Kris Coleman (Red5Security) about how to minimize your online exposure, Kyle was curious about his own online exposure. In this episode Kyle shares with you what he found, and the difficulty of removing the information. Things youâll learn in this episode: How personal data can be found online Tips for navigating data collection sites How difficult or easy is it to remove the information A simple trick that will help reduce information collected on you
-
Carrie is joined by Red5Security CEO Kris Coleman this week as they go over how easy it is for someone to find your personal information online. They discuss topics such as how this information gets out there, and whoâs collecting it. They also talk about if you can remove whatâs already out there, and things you can do to limit how much data is collected on you.
Things youâll learn in this episode:
How your information is collected, even if youâre not the one putting it out there Where itâs collected and why If removing the information out there is possible Tips for limiting your own exposureLink to Red5Securityâs website https://red5security.com/
BIO: Mr. Kris Coleman
Mr. Kris Coleman founded Red Five Security in 2004 to provide world class, state of the art security and protective intelligence services. Mr. Coleman continues to use his knowledge, experience, and integrity to grow Red Five into a multi-faceted company focused on bespoke security solutions for unique clientele.
Working in both the private and public sectors throughout his 20+ year career, he has served with the Central Intelligence Agency, the Federal Bureau of Investigation, and as a former Principal with Good Harbor Consulting. Mr. Colemanâs depth and range of experiences allows the Red Five team to specialize in high quality, proactive, and discreet security services. He has built a unique capability in Red Five to support clients with tailored low-profile security operations, analysis, training, and program and system design.
A distinctive portion of Mr. Colemanâs work in the private sector includes the complete assessment, design development, and installation of cutting-edge security programs for high-net-worth clients. Projects have included large residences in Florida, California and the Washington DC, area (some in excess of 45,000 square feet), commercial facilities with challenging security requirements, as well as unique sites overseas.
Be sure to check out episode 56, where Carrie interviews another employee of Red5, Special Agent Tom Whalen, as he breaks down FBI Operation Trojan Shield, which resulted in the infiltration of criminal organizations around the world.
- Mehr anzeigen